SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 98
THE COMMON CHALLENGES OF MOBILE INTERNET FOR UP-
COMING GENERATION
A.Siles Balasingh
1
, N.Surenth
2
1,2
Lecturer, Department of Computer science and Engineering, St.Joseph University in Tanzania, East Africa
singh_bala@yahoo.co.in, suren.zin1@gmail.com
Abstract
In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection
which is provided by the telecommunication network provider and the second one is the wireless network which is getting from
internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer
(protocols and Transport layer protocols).
----------------------------------------------------------------------***------------------------------------------------------------------------
INTRODUCTION
There are lots of researches and modifications are going on to
make shape the internet spans across the wide range on
protocols, devices and standards to solve the existing problems
and introducing new idea. Here we attempt to categorize some
major challenges for themobile internet of upcoming
generation, let‘s enter into a brief discussion on the recent
advances and future directions. We have categorized the three-
tire perspective.
1. The application perspective, which is very important
on existing mobile applications and recent development
applications.
2. The service Software perspective, which helps to run
the applications with mobile operatingsystems.
3. The Protocols and Networks, which helps to grow the
uniformity of internet speed from low speed to high speed
in both wired to wireless network.
MOBILE APPLICATION SOFT WARES
A lot of existing and new applications in the market with
sufficient for users but after investigating of all application are
called context-ware applications, which take into account the
position of the user her interest, and the capabilities of her
mobile device. Some applications only used in common places
and common for every one like ―face-book, Twitter‖, which can
be called location-aware because the user can expose their ideas
and other can view and response their opinion
(Publically).There are some consumers are let through the shop
by a mobile device attached to the shopping cart, these
applications are built on top of WLAN/ Internet. Our team
members has investigated the most of the applications are quite
narrow and misunderstanding of the service offered.
Especially in the face-book & Twitter services the users tried to
set-up peer-to-peer [1,2]communication whereas the service
offered was more like a public blackboard
In recent approach was the integration of sensor
networks [6] into the Internet. A dominant application here
is the combination of body area networks and medical
sensors; a very interesting field in which a lot of open
questions concerning reliability, energy consumption, security
and privacy have to be addressed. In order to simplify the
development of the above Mentioned applications, new
platforms are needed. The new platforms should carry an
abstraction of the hybrid network and Non-uniform devices,
in order to assist the application Programmers to not get
swamped with all details. An issue here is to find the
‗golden rule‘ of the abstraction: it should also allow
programmers to explicitly take into account the specific
architecture of their networks, the constraints of their
environments and the requirements of their applications.
Such an engineering flexibility can be used to tune
up applications according to their special needs.
MOBILE MIDDLEWARE APPROACHES
The development of distributed applications is a tedious task
even in homogenous networks. However, in Non- uniform
networks with a wide variety of devices, the complexity
of future distributed applications may increase by
several orders of magnitude. Existing middleware
approaches such as CORBA, DCOM and Java RMI did not
manage to meet the requirements for Developing context-
aware services [4] in hybrid networks. They do not
provide the technology to efficiently integrate networks,
positioning systems, user and device profiles. That said, it
should not be surprising that middleware platforms, which
are tailored for the development of location-aware services,
have attracted a lot of attention during the recent years.
Some major issues such as adapting content to current location
of and to the preferences of the users have been
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 99
investigated thoroughly. The same holds true for the adaptation
of the presentation of this content to the capabilities of the
actually used mobile device: Selection of content
according to the current location and the interests of the user.
In the approaches investigated in the selection of the content
to be displayed on the mobile device is done according to the
current position of the mobile. Here, the content is known
beforehand and a mapping between the content and a certain
position is provided by the service provider. The latter uses
information retrieval services to get content based on the
current location and user preferences, whereas the
former uses metadata to compile content that corresponds
to the user‘s current position. An advanced version of what
can be done with user profiles is presented. The Shark
approach allows information exchange between mobile
devices, Based on the personal profiles of their users.
Adapting content to the capabilities of the actually used
mobile device. Authors describe architecture that allows
protocols to adapt the presentation of given content
to the capabilities, e.g. size of the display, of the device
on which the content is going to be displayed. The content
adaptation is realized using XML/XSL, I.e. the content itself
is described using XML and its representation on a certain
mobile device is defined in XSL. The
aforementioned approaches focus primarily on how to
enable application programmers to exploit the new
features of the wired/wireless Internet [5]. However, they
Ignore or at least neglect the different
characteristics of the end devices and the reliability of the
transport media in the fixed and the wireless part of the
Internet. † In contrast to handheld devices, PCs and
Workstations that are usually used in the fixed Internet have
indeed sufficient resources, i.e. energy and processing
power to run complex algorithms. The different
capabilities of the end devices are very important with
respect to security issues. On one hand in wireless networks
eavesdropping is trivial due to the medium‘s ease of
accessibility. On the other hand exhaustive use of security
means, i.e. cipher mechanisms, is not possible due to the
limited resources of the handheld devices. Here the user is
always forced to decide between secure communication and
convenience of his mobile device. † The deployment of
wireless data networks has only extended partially the
traditional Internet. For example, there are still places where
connectivity cannot be guaranteed. This might be caused by the
error rates of the wireless link, which are several orders of
magnitude higher than the corresponding rates in wired
networks, or by the fact that no access points or base stations
are deployed in some regions. In parallel, the capabilities of
mobile devices are increasing constantly. For example the
‗high-end-class‘ of mobile devices is equipped with processors
that run at 400 MHz. Nevertheless, the question that calls for an
urgent answer is what platform developers can do tounify
the system behavior from the applicationperspective
and to allow programmers to take advantage of specific
performance improvements of the underlying technology. Such
platforms, which are designed with the hybrid network and the
high variety of devices in mind, are definitely needed.
A vertical approach, that takes into account the limitations of
the mobile devices, the special characteristics of the underlying
networks and protocols as well as hardware/software co-design
for platform components, will hopefully lead to better results.
To justify the expectation, we can consider that up to now most
middleware platforms did not differentiate between mobile
devices during run time. They considered mobile devices to be
thin or fat clients, but they did not provide means to configure
the platform to the current needs of the mobile and its user.
There is some work towards a more flexible approach, which
allows to support disconnected operations [21] and to configure
the platform in order to reduce power consumption [22].The
better a platform can adapt to the measured network
parameters, the better the application performance, and the
longer the duty cycles of the mobile devices. Very interesting
topics here are energy management and load balancing.
Optimizing the energy consumption and optimizing the
performance of the whole system are contradicting goals, at
least in certain situations. Authors in Ref. [23] discuss an
approach in which the security component of the platform
enables mobile devices to shift the computational intensive
operations of public key algorithms into the
infrastructure. From the Viewpoint of each single mobile
device this approach may be very appealing. But, the
performance of the whole system may be degraded. The
infrastructure servers are now taking an additional burden,
which may, for example, increase their response times, etc. If
the performance of the whole system is the major optimization
goal, it might be desirable to shift Workload to the mobile
devices. At least for the 400 MHz devices it seems feasible
to run parts of the platform locally, e.g. the selection of content
to the current location could be done at the mobile device.
Flexible concepts that allow the realization of different
optimization goals should be integrated into platforms within
the next years. These concepts should enable application
programmers and users to adapt the behavior of the platform
to their needs. From the energy viewpoint it may be
interesting to think about hardware/software co-design on the
platform level. In the protocol area this is done quite
successfully [24,25].In the middleware area the integration of
energy awareness is rather new. The integration of hardware
accelerators for cipher mechanisms into a location-aware
middleware is discussed in Ref. [26]. The interesting point
in this architecture is that the integration of the accelerators is
completely transparent to applications and even to the
platform. In Ref. [27] a broker-based approach towards an
energy-aware middleware is presented. Here it is proposed to
make operating system services energy-aware and to enable
applications to monitor and control parameters such as voltage
and task scheduling. Privacy is a crucial issue when it comes
to the acceptance of new services. A significant proportion of
the users of the fixed Internet are already concerned about their
privacy [28,29]. By using mobile devices to access the Internet,
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 100
it becomes possible to connect the real- and cyber-world
behavior of Internet users. So, privacy becomes more and more
important. There are approaches [30–32] in which the user gets
the possibility to decide how much information she is willing to
reveal. In Ref. [33] the middleware intentionally reduces
the accuracy of the position information. This helps to
protect privacy but it cannot be used in systems that need an
accurate position to work properly. Ensuring privacy can only
be achieved by applying security mechanisms, i.e.
authentication, authorization, de-/encryption and digital
signatures. Especially the public key algorithms used for
authentication and digital signatures are computationally
expensive. So, here the limited resources of the wireless
devices have to be taken into account. An open point still, is
privacy enforcement, i.e. what can be done to ensure that
service providers adhere to what they promise in accordance
with their privacy policies.
CONVERGENCEOFNON-UNIFORM
COMMUNICATION CHANNELS
There is a lot of ongoing research on issues of convergence
of wired and wireless networks.
The research spans across a variety of subtopics from the
architectural aspects, which deal with the question ‗where
is the right place to achieve convergence‘ to protocol
design issues, which address the questions of best dealing
with the assumptions of wired networks or even with issues of
defining new metrics and methodologies for the evaluation of
protocol behavior. In the architectural arena, the end-to-end
argument was once again evaluated and criticized. The real
issue here is to provide means that enable error detection and
classification [34]. The informative source can be the local base
station, the protocol sender, or even the protocol receiver.
Given the nature of wireless networks, a local source may
play a very informative role in the protocol engineering
strategy and it may proxy the communication. The proxy
can actually locally correct the detected problems, buffer un-
acknowledged packets, preserve the transmission order, and
leave the transport layer unchanged, at least theoretically Issues
of concern here are plenty: Shall we add a burden to the base
station for managing the inefficiencies of TCP? 910 P.
Langendo¨rfer, V. Tsaousidis / Computer Communications 27
(2004) 908–913 shall we end up with sophisticated base
stations instead of sophisticated transport protocols? Can
we really resolve all the operational conflicts between TCP
and local protocols, such as the timers? Can we expect that
device heterogeneity—in terms of Functionality and
sophistication—will eclipse in the near future? Since some
level of heterogeneity in terms of protocol version or device
functionality is inevitable, the real question here is whether
it is more appropriate to deal with issues of heterogeneity at the
proxy level or at the transport level. And finally and more
generally, † when we detect an inefficiency at the transport
protocol, such as TCP‘s inefficiency to detect the nature of the
error (i.e. congestion or not), shall we change the network to
deal with the problem or shall we change the protocol itself?
The other category of proposals discusses modifications to
existing protocols, esp. TCP. Some proposals deal with
very specific problems, such as the handoff‘s impact on
TCP‘s performance. A reasonable proposal here is TCP
Freeze. However, there are several proposals that attempt
to deal with a wider range of problems. For example, TCP-
Probing deals with the error Classification prior to recovery
and hence it targets efficiency beyond the handoff procedure.
Similarly, TCP Real attempts to improve the impact of wireless
errors on smoothness, competing with TCP-Westwood. The
desirable behavior of TCP-Real is precisely to
demonstrate efficiency in Non-uniform environments with
wired or wireless networks and delay-sensitive or – tolerant
applications. Receiver-oriented error control incarnates the
property of the receiver to determine with better accuracy the
data delivery rate and the potential level of data loss. This
abrogates the impact of false assessments at the sender due to
lost or delayed acknowledgements. TCP-Real estimates the
level of contention allowing for early measures towards
congestion avoidance, which, in turn, reduces the damaging
transmission gaps. TCP-Westwood relies on bandwidth
estimation to set the slow start threshold and the congestion
window upon three duplicate acknowledgments or timeout. No
specific mechanism exists to support error classification and the
corresponding recovery tactics for wired/wireless networks,
albeit the proposed mechanism appears to be relatively
effective over symmetric wireless links due to its efficient
congestion control. In summary, the framework for potential
improvements is circumscribed by the application requirements
and the Limitations of TCP‘s congestion control. We identify
four distinct subtopics of protocol engineering related with the
convergence of wired/wireless networks.
Additive increase is not efficient when the network dynamics
encompass rapid changes of bandwidth availability. For
example, when short flows that cause congestion complete their
task, bandwidth becomes available. Similarly, when a handoff
is completed in a cellular network, the entire channel‘s
bandwidth becomes available.
Multiplicative decrease causes transmission gaps that hurt the
performance of real-time applications that experience jitter
and degraded good put. Furthermore, multiplicative
decrease with a factor of 1/2 or a window adjustment to
two packets characterizes a rather conservative strategy
Note that multiplicative increase applies also in cases of
wireless errors. Departing from AIMD show that, by
removing a—what can be characterized as a minor technical
flaw, both smoothness and responsiveness of the
algorithm can be improved.
Error detection lacks an appropriate classification module that
would permit a responsive strategy, oriented by the nature of
potential errors. That is, when errors appear to be transient due
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 101
to short-lived flows or random wireless interference,
congestion control mechanisms (i.e. timeout extension and
multiplicative window adjustment) are triggered unduly. The
insufficient error detection/classification may also lead to
unfair bandwidth allocation in mixed wired/wireless networks.
By default, flows that experience wireless errors do not balance
their bandwidth loss with a more aggressive recovery although
such behavior could be justified: flows that experienced no
losses have occupied extra bandwidth at the router temporarily,
when the wireless errors forced some senders to back off. This
situation is discussed as an open issue in Ref. [34].
Source-based decision on the transmission rate, based on the
pace of the acknowledgements, necessarily incorporates the
potentially asymmetric characteristics (e.g. ack delays and/or
losses) of the reverse path, which is common in wireless and
satellite networks. Hence, the sender‘s transmission rate does
not always reflect the capacity of the forward path. This
situation has a direct impact on efficiency since available
bandwidth remains unexploited. In addition to the
wired/wireless convergence, heterogeneity exists also at the
level of bandwidth and capacity. Being designed with persistent
congestion in mind, traditional TCP does not scale well to G-bit
networks and beyond. Congestion itself exhibits different
properties in such networks (i.e. more transient), the amount of
transported data increases rapidly and consequently the amount
of lost data can be in the order of hundreds or P. Langendo¨rfer,
V. Tsaoussidis / Computer Communications 27 (2004) 908–
913 911 thousands of packets, the timeout and RTT-based
transmission does not allow for efficient bandwidth
exploitation, and the ack–clock limits further the
transmission rate. Some mechanisms have been proposed to
improve the performance of the protocol over high-speed
links. Fast TCP attempts to predict the highest data at
which data can be transmitted without losses. XCP appears to
be a promising approach but requires router level assistance.
AIMD-FC on the other hand, relies on‗fixing‘ the details of
original AIMD in order for it to reach an equilibrium faster
and achieve much higher efficiency. The above three
approaches correspond to different fixes but they all
improve the enhancements of TCP to allow communication at
higher rates. We note that it is important to reach a standard
that does not only allow TCP to work well in high-speed
networks but also in low-speed ones. Else, the solution will not
bridge the gap but instead, it may make it worse. New TCPs
therefore, including Fast TCP, should be evaluated from this
perspective as well.
CONCLUSIONS
There is a lot of research going on in different fields with the
aim to diminish the differences between the wired and the
wireless part of the Internet. People are looking at the limited
resources of the wireless devices from the operating systems
viewpoint, from the protocol viewpoint and from the
middleware viewpoint. This clearly indicates that the
integration of the mobile and the fixed Internet is a very
complex task. In addition the question of how protocol and
platform functionality is realized is crucial to what can be
achieved. For example, the use of hardware accelerators
helps to reduce the power consumption dramatically.
The achievements so far are very promising. Despite the
complexity of the task, there already applications available,
which work well, even with the hybrid architecture of the
Wireless Internet. We expect that the number of successful
mobile applications will significantly increase as soon as
handheld devices become more common and a better
coverage with WLAN and 3G networks is provided. From the
technical point of view, there are still several problems to be
solved. On one hand, it appears a natural approach to isolate
these problems and to try to tackle them independently;
applying layer-specific methods. On the other hand, an
integrated approach in which a problem is considered from a
global perspective may lead to a better solution. There are
several groups that follow this approach. In the end, both
methodologies may provide complementary results.
REFERENCES
[1] J. Burrell, G.K. Gay, E-graffiti: evaluating real-world use of
a contextaware system, Interacting with Computers (Special
Issue on Universal Usability) 14 (4) (2002) 301–312.
[2] W.G. Griswold, et al., Active Campus Sustaining
Educational Communities through Mobile Technology,
Technical Report #CS2002-0714, University of California,
San Diego, 2002.
[3] Metro Group, The Technical Concepts implemented at the
Extra Future Store, available at: http://www.future-
store.org/servlet/PB/show/1000815/pa-events-ecr-bookl-
eng.pdf, last visited Dec. 2003
[4] L. Mehrmann, B. Kreller, Context-aware
Community Applications For Mobile Youngsters, In:
Proceedings of the First Mobile Communications Summit,
2001.
[5] A. Luebke, From Internet in the car towards cars in the
Internet,presentation at the DLR Workshop Quo Vadis
Wireless Internet,2003, abstract available at:
http://www.gzvb.de/informationssysteme/
abstracts/Luebke.html, last viewed December 2003.
[6] M. Schuster, Body-Sensor Wireless Networks Monitoring
Patients‘ Health with BAN, FOKUS-Fraunhofer Institute for
Open Communication Systems Competence Center CATS,
availableat
http://www.fokus.fhg.de/medizin/download/BAN_E.pdf last
visited Dec. 2003
[7] Object Management Group, The Common Object
Request Broker: Architecture and Specification, revision 2.2,
OMG Document Technical Report, 98-07-01, 1998.
[8] Microsoft Corporation, DCOM Technical Overview, 1996,
http://msdn.microsoft.com/library/default.asp?url ¼
/library/en-us/ dndcom/html/msdn_dcomtec.asp, last viewed
September 24, 2003.
[9] E. Pitt, K. McNiff, java.rmi: The Guide to Remote
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 102
Method Invocation, Addison-Wesley, Boston, 2001.
[10] B. Keller, A.S. Park, J. Meggers, G. Forsgern, E. Kovacs,
M. Rosinus, UMTS: a middleware architecture and
mobile API approach, IEEE Personal Communications 5 (2)
(1998) 32–38.
[11] R. Jose´, A. Moreira, F. Meneses, G. Coulson, An Open
Architecture for Developing Mobile Location-based
Applications Over the Internet, Proceeding of the Sixth IEEE
Symposium on Computers and Communications, 3–5 July,
IEEE Computer Society,
Los Alamitos, 2001, ISBN 0-7695-1177-5.
[12] F. Hohl, U. Kubach, A. Leonhardi, M. Schwehm, K.
Rothermel, Nexus: an open global infrastructure for spatial-
aware applications, Proceedings of the Fifth International
Conference on Mobile
Computing and Networking (MobiCom 99), August 15–19,
ACM Press, Seattle, Washington, USA, 1999.
[13] A. Pashtan, R. Blattler, A. Heusser, P. Scheuermann,
CATIS: A Context-Aware Tourist Information System,
Poceedings of the
Fourth International Workshop of Mobile Computing, June
17–18, Rostock, Germany, 2003.
[14] A. Escudero, G.Q. Maguire, Role(s) of a proxy in location
based services. PIMRC 2002, Thirteenth IEEE International
Symposium on
Personal, Indoor and Mobile Radio Communications.
16–18
September, Lisboa, Portugal, 2002.
[15] condat AG: Skyware, available at
http://www.condat.de/english/pdf/Skyware_eng.pdf,last visited
Dec 2003
[16] H. Maab, Location-aware mobile applications based on
directoryservices, MONET 3 (2) (1998) 157–173.
[17] R. Kraemer, P. Schwander, Bluetooth based wireless
internet applications for indoor hot spots: experience of a
successful experiment during CeBit 2001, Computer Networks
(2003).
[18] P. Langendoerfer, O. Maye, Z. Dyka, R. Sorge, R.
Winkler, R. Kraemer, in: Q. Mahmoud (Ed.), Middleware
for Location-based Services: Design and Implementation
Issues, Middleware for Communications, Wiley, New York,
2004.
[19] St. Volz, J.-M. Bonfiger, Integration of Spatial Data
within a Generic Platform for Location-Based Applications,
In: Proceedings of the Joint International Symposium on
Geospatial Theory, Processing and Applications,
2002.912 P. Langendo¨rfer, V. Tsaoussidis / Computer
Communications 27 (2004) 908–913
[20] Th. Schwotzer, K. Geihs, Shark—a System for
Management, Synchronization and Exchange of
Knowledge in Mobile User
Groups, Journal of Universal Computer Science 8 (6) (2002).
[21] B. Wuest, O. Dro¨gehorn, K. David, FAME2: Software
Architecture for B3G and 4G Networks, First Summit on
Mobile and Wireless Communication, Aveiro, Portugal, 2003,
pp. 837–841.
[22] S. Mohapatra, N. Venkatasubramanian, PARM: Power
Aware Reconfigurable Middleware, IEEE International
Conference on Distributed Computer Systems (ICDCS-23),
Rhode Island, May, 2003.
[23] P. Langendo¨rfer, Z. Dyka, O. Maye, R. Kraemer, A Low
Power Security Architecture for Mobile Commerce,
Proceedings of the Fifth IEEE CAS Workshop on Wireless
Communications and Networking (2002).
[24] J. Riihijaervi, P. Maehoenen, M.J. Saaranen, J. Roivainen,
J.-P. Soininen, Providing network connectivity for small
appliances: a functionally minimized embedded web server,
IEEE Communications Magazine October (2001).
[25] E. Grass, et al., On the single-chip implementation of a
Hiperlan/2 and IEEE 802.11a capable modem, IEEE Personal
Communications Magazine December (2001).
[26] P. Langendoerfer, Z. Dyka, F. Vater, O. Maye, Rolf
Kraemer: A vertical approach towards energy-efficient
application of cipher mechanisms in hot-spots running
location-aware services, In: Proceedings of the International
Conference on Advances in the Internet, Processing, Systems,
and Interdisciplinary Research, 2003. [27] R. Cornea, et al.,
ServiceFORGE: A Software Architecture for Power and
Quality Aware Services, Workshop at the International FME
Symposium, September, 2003. [28] L.F. Cranor, Beyond
Concern: Under-standing Net Users‘ Attitudes About Online
Privacy, in: I. Vogelsang, B.M. Compaine (Eds.), The
Internet Upheaval: Raising Questions, Seeking Answers in
Communications Policy, The MIT Press, Cambridge,
Massachusetts, 2000, pp. 47–70.
[29] Jupiter Research: Consumers worried about online
privacy, 2002 available at:
http://www.nua.com/surveys/index.cgi?f ¼ VS&art_id
¼ 905358019&rel ¼ true; last visited Dec. 03
[30] P. Langendo¨rfer, R. Kraemer, Towards User Defined
Privacy in location-aware Platforms, Proceeding of the
Third International Conference on Internet Computing,
CSREA Press, USA, 2002.
[31] M. Bennicke, P. Langendo¨rfer, Towards Automatic
Negotiation of Privacy Contracts for Internet Services,
Proceeding of the 11th IEEE Conference on Networks (ICON
2003), IEEE Society Press, New York, 2003.
[32] W. Wagealla, S. Terzis, C. English, Trust-based
Model for Privacy Control in Context-aware Systems,
Second Workshop on Security in Ubiquitous Computing,
Ubicomp, 2003.
[33] M. Gruteser, D. Grunwald, Anonymous Usage of
Location- Based Services Through Spatial and Temporal
Cloaking ACM/USENIX International Conference on
Mobile Systems, Applications, and Services (MobiSys), 2003.
[34] V. Tsaoussidis, I. Matta, Open issues on TCP for Mobile
Computing, Journal of Wireless Communications and Mobile
Computing (WCMC) 2 (1) (2002) 3–20. Wiley, New York.
[35] H. Balakrishnan, S. Seshan, E. Amir, R.H. Katz,
Improving TCP/IP Performance over Wireless Networks,
In: Proceedings of ACM Mobicom ‗95, November, 1995
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 103
BIOGRAPHIES:
A.Siles Balasingh .M.Tech (I.T) .He is
currently working as Lecturer in
Department of Computer Science and
Engineering in St. Joseph College of
Engineering and Technology, Dar Es
Salaam, Tanzania, East Africa. He has 4
publications to his credit. He has guided
more than 20 projects to final year
B.E/B.Tech students with good industry
and teaching experience. His areas of
interest in Computer Networks, Computer
Networks and security, Neural networks
and sBioinformatics Computer Architecture
and Ethical hacking.
N.Surenth M.Tech (I.T) He is currently
working as Lecturer in of Department in
Computer Science and Engineering in St.
Joseph College of Engineering and
Technology, Dar Es Salaam, Tanzania,
East Africa. He has guided more than 15
projects to final year B.E/B.Tech students
and his area of interest in Computer
Networks and Artificial Intelligence.

More Related Content

PDF
DOCX
Mobile Computing by Tapesh Chalisgaonkar
PDF
Design and implementation of intelligent community system based on thin clien...
PDF
Mobile Cloud Computing
PDF
Networking java titles Adrit Solution
PDF
4 (mobile computing)
PDF
A Posteriori Perusal of Mobile Computing
PDF
ijais13-451015
Mobile Computing by Tapesh Chalisgaonkar
Design and implementation of intelligent community system based on thin clien...
Mobile Cloud Computing
Networking java titles Adrit Solution
4 (mobile computing)
A Posteriori Perusal of Mobile Computing
ijais13-451015

What's hot (14)

PDF
Ad hoc networks technical issues on radio links security & qo s
PDF
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
PDF
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PDF
Node selection in p2 p content sharing service in mobile cellular networks wi...
PDF
Cooperative hierarchical based edge-computing approach for resources allocati...
PDF
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
PDF
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
DOCX
Dr.Wagdy Anis_Cover Letter
PDF
A distributed agent media access framework
PDF
An analysis of a large scale wireless image distribution system deployment
PDF
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
PDF
PDF
Efficient Local Resource management for Wireless Devices integration
PDF
A survey on cost effective survivable network design in wireless access network
Ad hoc networks technical issues on radio links security & qo s
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
Node selection in p2 p content sharing service in mobile cellular networks wi...
Cooperative hierarchical based edge-computing approach for resources allocati...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
Dr.Wagdy Anis_Cover Letter
A distributed agent media access framework
An analysis of a large scale wireless image distribution system deployment
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
Efficient Local Resource management for Wireless Devices integration
A survey on cost effective survivable network design in wireless access network
Ad

Viewers also liked (20)

PDF
Development of strain prediction models for concrete roads
PDF
Analysis of three dimensional couette flow and heat
PDF
Analytical solutions for square shape pressure
PDF
Analysis of denial of service (dos) attacks in wireless sensor networks
PDF
Performance of square footing resting on laterally confined sand
PDF
Community profiling for social networks
PDF
Efficient contrast enhancement using gamma correction with multilevel thresho...
PDF
Motion based action recognition using k nearest neighbor
PDF
Using transfer learning for video popularity prediction
PDF
Performance analysis of autonomous microgrid
PDF
Survey of local binary pattern for fire & smoke using
PDF
Thermal analysis and dc conductivity of
PDF
Effect of dyeing parameters on dyeing of cotton fabrics with fluoro chloro py...
PDF
A technical method of extraction of gold from e waste a multi-sensor based me...
PDF
An analysis of pfc converter with high speed dynamic
PDF
Design of workplace for the assembly of monoblock
PDF
Real time voting system using face recognition for different expressions and ...
PDF
Review work on analysis of f1 car frame using ansys
PDF
Wireless server for total healthcare system for clients
PDF
Voltage sag mitigation using supercapacitor based dynamic voltage restorer
Development of strain prediction models for concrete roads
Analysis of three dimensional couette flow and heat
Analytical solutions for square shape pressure
Analysis of denial of service (dos) attacks in wireless sensor networks
Performance of square footing resting on laterally confined sand
Community profiling for social networks
Efficient contrast enhancement using gamma correction with multilevel thresho...
Motion based action recognition using k nearest neighbor
Using transfer learning for video popularity prediction
Performance analysis of autonomous microgrid
Survey of local binary pattern for fire & smoke using
Thermal analysis and dc conductivity of
Effect of dyeing parameters on dyeing of cotton fabrics with fluoro chloro py...
A technical method of extraction of gold from e waste a multi-sensor based me...
An analysis of pfc converter with high speed dynamic
Design of workplace for the assembly of monoblock
Real time voting system using face recognition for different expressions and ...
Review work on analysis of f1 car frame using ansys
Wireless server for total healthcare system for clients
Voltage sag mitigation using supercapacitor based dynamic voltage restorer
Ad

Similar to The common challenges of mobile internet for up coming generation (20)

PDF
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
PDF
Access To Mobile Services 1st Edition Athman Bouguettaya Xu Yang Auth
PDF
Access To Mobile Services 1st Edition Athman Bouguettaya Xu Yang Auth
PDF
The importance of correctly identifying devices and services that fit users' ...
PPS
PPT
Tacconi PhD final exam
PDF
Mobile services and its impact on GPDs and Return on Investment
PPTX
Introduction To Mobile Computing
PDF
introductionsssssssss-140822224222-phpapp01 (2).pdf
PDF
SIMagine 2009 Awards - Gemalto
PDF
Developing For The Pervasive Internet Of Things
PPTX
Chapter Modified -1.pptx Cloud computing is the on-demand availability of com...
PPTX
lect 10 & 11.pptx MOBILE COMPUTING AND INFO
PDF
Essentials of Management Information Systems 10th Edition Laudon Solutions Ma...
PPT
Sws lecture13
PPT
4 How to Prepare for an Inclusive Future: Identifying Enablers for Upcoming I...
PDF
PDF
PDF
Essentials of Management Information Systems 10th Edition Laudon Solutions Ma...
PDF
Essentials of Management Information Systems 10th Edition Laudon Solutions Ma...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
Access To Mobile Services 1st Edition Athman Bouguettaya Xu Yang Auth
Access To Mobile Services 1st Edition Athman Bouguettaya Xu Yang Auth
The importance of correctly identifying devices and services that fit users' ...
Tacconi PhD final exam
Mobile services and its impact on GPDs and Return on Investment
Introduction To Mobile Computing
introductionsssssssss-140822224222-phpapp01 (2).pdf
SIMagine 2009 Awards - Gemalto
Developing For The Pervasive Internet Of Things
Chapter Modified -1.pptx Cloud computing is the on-demand availability of com...
lect 10 & 11.pptx MOBILE COMPUTING AND INFO
Essentials of Management Information Systems 10th Edition Laudon Solutions Ma...
Sws lecture13
4 How to Prepare for an Inclusive Future: Identifying Enablers for Upcoming I...
Essentials of Management Information Systems 10th Edition Laudon Solutions Ma...
Essentials of Management Information Systems 10th Edition Laudon Solutions Ma...

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PDF
Visual Aids for Exploratory Data Analysis.pdf
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPT
Total quality management ppt for engineering students
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
Artificial Intelligence
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
introduction to high performance computing
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
communication and presentation skills 01
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Visual Aids for Exploratory Data Analysis.pdf
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Fundamentals of safety and accident prevention -final (1).pptx
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Total quality management ppt for engineering students
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Exploratory_Data_Analysis_Fundamentals.pdf
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
III.4.1.2_The_Space_Environment.p pdffdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Categorization of Factors Affecting Classification Algorithms Selection
Artificial Intelligence
R24 SURVEYING LAB MANUAL for civil enggi
introduction to high performance computing
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Module 8- Technological and Communication Skills.pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Soil Improvement Techniques Note - Rabbi
communication and presentation skills 01
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf

The common challenges of mobile internet for up coming generation

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 98 THE COMMON CHALLENGES OF MOBILE INTERNET FOR UP- COMING GENERATION A.Siles Balasingh 1 , N.Surenth 2 1,2 Lecturer, Department of Computer science and Engineering, St.Joseph University in Tanzania, East Africa singh_bala@yahoo.co.in, suren.zin1@gmail.com Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols). ----------------------------------------------------------------------***------------------------------------------------------------------------ INTRODUCTION There are lots of researches and modifications are going on to make shape the internet spans across the wide range on protocols, devices and standards to solve the existing problems and introducing new idea. Here we attempt to categorize some major challenges for themobile internet of upcoming generation, let‘s enter into a brief discussion on the recent advances and future directions. We have categorized the three- tire perspective. 1. The application perspective, which is very important on existing mobile applications and recent development applications. 2. The service Software perspective, which helps to run the applications with mobile operatingsystems. 3. The Protocols and Networks, which helps to grow the uniformity of internet speed from low speed to high speed in both wired to wireless network. MOBILE APPLICATION SOFT WARES A lot of existing and new applications in the market with sufficient for users but after investigating of all application are called context-ware applications, which take into account the position of the user her interest, and the capabilities of her mobile device. Some applications only used in common places and common for every one like ―face-book, Twitter‖, which can be called location-aware because the user can expose their ideas and other can view and response their opinion (Publically).There are some consumers are let through the shop by a mobile device attached to the shopping cart, these applications are built on top of WLAN/ Internet. Our team members has investigated the most of the applications are quite narrow and misunderstanding of the service offered. Especially in the face-book & Twitter services the users tried to set-up peer-to-peer [1,2]communication whereas the service offered was more like a public blackboard In recent approach was the integration of sensor networks [6] into the Internet. A dominant application here is the combination of body area networks and medical sensors; a very interesting field in which a lot of open questions concerning reliability, energy consumption, security and privacy have to be addressed. In order to simplify the development of the above Mentioned applications, new platforms are needed. The new platforms should carry an abstraction of the hybrid network and Non-uniform devices, in order to assist the application Programmers to not get swamped with all details. An issue here is to find the ‗golden rule‘ of the abstraction: it should also allow programmers to explicitly take into account the specific architecture of their networks, the constraints of their environments and the requirements of their applications. Such an engineering flexibility can be used to tune up applications according to their special needs. MOBILE MIDDLEWARE APPROACHES The development of distributed applications is a tedious task even in homogenous networks. However, in Non- uniform networks with a wide variety of devices, the complexity of future distributed applications may increase by several orders of magnitude. Existing middleware approaches such as CORBA, DCOM and Java RMI did not manage to meet the requirements for Developing context- aware services [4] in hybrid networks. They do not provide the technology to efficiently integrate networks, positioning systems, user and device profiles. That said, it should not be surprising that middleware platforms, which are tailored for the development of location-aware services, have attracted a lot of attention during the recent years. Some major issues such as adapting content to current location of and to the preferences of the users have been
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 99 investigated thoroughly. The same holds true for the adaptation of the presentation of this content to the capabilities of the actually used mobile device: Selection of content according to the current location and the interests of the user. In the approaches investigated in the selection of the content to be displayed on the mobile device is done according to the current position of the mobile. Here, the content is known beforehand and a mapping between the content and a certain position is provided by the service provider. The latter uses information retrieval services to get content based on the current location and user preferences, whereas the former uses metadata to compile content that corresponds to the user‘s current position. An advanced version of what can be done with user profiles is presented. The Shark approach allows information exchange between mobile devices, Based on the personal profiles of their users. Adapting content to the capabilities of the actually used mobile device. Authors describe architecture that allows protocols to adapt the presentation of given content to the capabilities, e.g. size of the display, of the device on which the content is going to be displayed. The content adaptation is realized using XML/XSL, I.e. the content itself is described using XML and its representation on a certain mobile device is defined in XSL. The aforementioned approaches focus primarily on how to enable application programmers to exploit the new features of the wired/wireless Internet [5]. However, they Ignore or at least neglect the different characteristics of the end devices and the reliability of the transport media in the fixed and the wireless part of the Internet. † In contrast to handheld devices, PCs and Workstations that are usually used in the fixed Internet have indeed sufficient resources, i.e. energy and processing power to run complex algorithms. The different capabilities of the end devices are very important with respect to security issues. On one hand in wireless networks eavesdropping is trivial due to the medium‘s ease of accessibility. On the other hand exhaustive use of security means, i.e. cipher mechanisms, is not possible due to the limited resources of the handheld devices. Here the user is always forced to decide between secure communication and convenience of his mobile device. † The deployment of wireless data networks has only extended partially the traditional Internet. For example, there are still places where connectivity cannot be guaranteed. This might be caused by the error rates of the wireless link, which are several orders of magnitude higher than the corresponding rates in wired networks, or by the fact that no access points or base stations are deployed in some regions. In parallel, the capabilities of mobile devices are increasing constantly. For example the ‗high-end-class‘ of mobile devices is equipped with processors that run at 400 MHz. Nevertheless, the question that calls for an urgent answer is what platform developers can do tounify the system behavior from the applicationperspective and to allow programmers to take advantage of specific performance improvements of the underlying technology. Such platforms, which are designed with the hybrid network and the high variety of devices in mind, are definitely needed. A vertical approach, that takes into account the limitations of the mobile devices, the special characteristics of the underlying networks and protocols as well as hardware/software co-design for platform components, will hopefully lead to better results. To justify the expectation, we can consider that up to now most middleware platforms did not differentiate between mobile devices during run time. They considered mobile devices to be thin or fat clients, but they did not provide means to configure the platform to the current needs of the mobile and its user. There is some work towards a more flexible approach, which allows to support disconnected operations [21] and to configure the platform in order to reduce power consumption [22].The better a platform can adapt to the measured network parameters, the better the application performance, and the longer the duty cycles of the mobile devices. Very interesting topics here are energy management and load balancing. Optimizing the energy consumption and optimizing the performance of the whole system are contradicting goals, at least in certain situations. Authors in Ref. [23] discuss an approach in which the security component of the platform enables mobile devices to shift the computational intensive operations of public key algorithms into the infrastructure. From the Viewpoint of each single mobile device this approach may be very appealing. But, the performance of the whole system may be degraded. The infrastructure servers are now taking an additional burden, which may, for example, increase their response times, etc. If the performance of the whole system is the major optimization goal, it might be desirable to shift Workload to the mobile devices. At least for the 400 MHz devices it seems feasible to run parts of the platform locally, e.g. the selection of content to the current location could be done at the mobile device. Flexible concepts that allow the realization of different optimization goals should be integrated into platforms within the next years. These concepts should enable application programmers and users to adapt the behavior of the platform to their needs. From the energy viewpoint it may be interesting to think about hardware/software co-design on the platform level. In the protocol area this is done quite successfully [24,25].In the middleware area the integration of energy awareness is rather new. The integration of hardware accelerators for cipher mechanisms into a location-aware middleware is discussed in Ref. [26]. The interesting point in this architecture is that the integration of the accelerators is completely transparent to applications and even to the platform. In Ref. [27] a broker-based approach towards an energy-aware middleware is presented. Here it is proposed to make operating system services energy-aware and to enable applications to monitor and control parameters such as voltage and task scheduling. Privacy is a crucial issue when it comes to the acceptance of new services. A significant proportion of the users of the fixed Internet are already concerned about their privacy [28,29]. By using mobile devices to access the Internet,
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 100 it becomes possible to connect the real- and cyber-world behavior of Internet users. So, privacy becomes more and more important. There are approaches [30–32] in which the user gets the possibility to decide how much information she is willing to reveal. In Ref. [33] the middleware intentionally reduces the accuracy of the position information. This helps to protect privacy but it cannot be used in systems that need an accurate position to work properly. Ensuring privacy can only be achieved by applying security mechanisms, i.e. authentication, authorization, de-/encryption and digital signatures. Especially the public key algorithms used for authentication and digital signatures are computationally expensive. So, here the limited resources of the wireless devices have to be taken into account. An open point still, is privacy enforcement, i.e. what can be done to ensure that service providers adhere to what they promise in accordance with their privacy policies. CONVERGENCEOFNON-UNIFORM COMMUNICATION CHANNELS There is a lot of ongoing research on issues of convergence of wired and wireless networks. The research spans across a variety of subtopics from the architectural aspects, which deal with the question ‗where is the right place to achieve convergence‘ to protocol design issues, which address the questions of best dealing with the assumptions of wired networks or even with issues of defining new metrics and methodologies for the evaluation of protocol behavior. In the architectural arena, the end-to-end argument was once again evaluated and criticized. The real issue here is to provide means that enable error detection and classification [34]. The informative source can be the local base station, the protocol sender, or even the protocol receiver. Given the nature of wireless networks, a local source may play a very informative role in the protocol engineering strategy and it may proxy the communication. The proxy can actually locally correct the detected problems, buffer un- acknowledged packets, preserve the transmission order, and leave the transport layer unchanged, at least theoretically Issues of concern here are plenty: Shall we add a burden to the base station for managing the inefficiencies of TCP? 910 P. Langendo¨rfer, V. Tsaousidis / Computer Communications 27 (2004) 908–913 shall we end up with sophisticated base stations instead of sophisticated transport protocols? Can we really resolve all the operational conflicts between TCP and local protocols, such as the timers? Can we expect that device heterogeneity—in terms of Functionality and sophistication—will eclipse in the near future? Since some level of heterogeneity in terms of protocol version or device functionality is inevitable, the real question here is whether it is more appropriate to deal with issues of heterogeneity at the proxy level or at the transport level. And finally and more generally, † when we detect an inefficiency at the transport protocol, such as TCP‘s inefficiency to detect the nature of the error (i.e. congestion or not), shall we change the network to deal with the problem or shall we change the protocol itself? The other category of proposals discusses modifications to existing protocols, esp. TCP. Some proposals deal with very specific problems, such as the handoff‘s impact on TCP‘s performance. A reasonable proposal here is TCP Freeze. However, there are several proposals that attempt to deal with a wider range of problems. For example, TCP- Probing deals with the error Classification prior to recovery and hence it targets efficiency beyond the handoff procedure. Similarly, TCP Real attempts to improve the impact of wireless errors on smoothness, competing with TCP-Westwood. The desirable behavior of TCP-Real is precisely to demonstrate efficiency in Non-uniform environments with wired or wireless networks and delay-sensitive or – tolerant applications. Receiver-oriented error control incarnates the property of the receiver to determine with better accuracy the data delivery rate and the potential level of data loss. This abrogates the impact of false assessments at the sender due to lost or delayed acknowledgements. TCP-Real estimates the level of contention allowing for early measures towards congestion avoidance, which, in turn, reduces the damaging transmission gaps. TCP-Westwood relies on bandwidth estimation to set the slow start threshold and the congestion window upon three duplicate acknowledgments or timeout. No specific mechanism exists to support error classification and the corresponding recovery tactics for wired/wireless networks, albeit the proposed mechanism appears to be relatively effective over symmetric wireless links due to its efficient congestion control. In summary, the framework for potential improvements is circumscribed by the application requirements and the Limitations of TCP‘s congestion control. We identify four distinct subtopics of protocol engineering related with the convergence of wired/wireless networks. Additive increase is not efficient when the network dynamics encompass rapid changes of bandwidth availability. For example, when short flows that cause congestion complete their task, bandwidth becomes available. Similarly, when a handoff is completed in a cellular network, the entire channel‘s bandwidth becomes available. Multiplicative decrease causes transmission gaps that hurt the performance of real-time applications that experience jitter and degraded good put. Furthermore, multiplicative decrease with a factor of 1/2 or a window adjustment to two packets characterizes a rather conservative strategy Note that multiplicative increase applies also in cases of wireless errors. Departing from AIMD show that, by removing a—what can be characterized as a minor technical flaw, both smoothness and responsiveness of the algorithm can be improved. Error detection lacks an appropriate classification module that would permit a responsive strategy, oriented by the nature of potential errors. That is, when errors appear to be transient due
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 101 to short-lived flows or random wireless interference, congestion control mechanisms (i.e. timeout extension and multiplicative window adjustment) are triggered unduly. The insufficient error detection/classification may also lead to unfair bandwidth allocation in mixed wired/wireless networks. By default, flows that experience wireless errors do not balance their bandwidth loss with a more aggressive recovery although such behavior could be justified: flows that experienced no losses have occupied extra bandwidth at the router temporarily, when the wireless errors forced some senders to back off. This situation is discussed as an open issue in Ref. [34]. Source-based decision on the transmission rate, based on the pace of the acknowledgements, necessarily incorporates the potentially asymmetric characteristics (e.g. ack delays and/or losses) of the reverse path, which is common in wireless and satellite networks. Hence, the sender‘s transmission rate does not always reflect the capacity of the forward path. This situation has a direct impact on efficiency since available bandwidth remains unexploited. In addition to the wired/wireless convergence, heterogeneity exists also at the level of bandwidth and capacity. Being designed with persistent congestion in mind, traditional TCP does not scale well to G-bit networks and beyond. Congestion itself exhibits different properties in such networks (i.e. more transient), the amount of transported data increases rapidly and consequently the amount of lost data can be in the order of hundreds or P. Langendo¨rfer, V. Tsaoussidis / Computer Communications 27 (2004) 908– 913 911 thousands of packets, the timeout and RTT-based transmission does not allow for efficient bandwidth exploitation, and the ack–clock limits further the transmission rate. Some mechanisms have been proposed to improve the performance of the protocol over high-speed links. Fast TCP attempts to predict the highest data at which data can be transmitted without losses. XCP appears to be a promising approach but requires router level assistance. AIMD-FC on the other hand, relies on‗fixing‘ the details of original AIMD in order for it to reach an equilibrium faster and achieve much higher efficiency. The above three approaches correspond to different fixes but they all improve the enhancements of TCP to allow communication at higher rates. We note that it is important to reach a standard that does not only allow TCP to work well in high-speed networks but also in low-speed ones. Else, the solution will not bridge the gap but instead, it may make it worse. New TCPs therefore, including Fast TCP, should be evaluated from this perspective as well. CONCLUSIONS There is a lot of research going on in different fields with the aim to diminish the differences between the wired and the wireless part of the Internet. People are looking at the limited resources of the wireless devices from the operating systems viewpoint, from the protocol viewpoint and from the middleware viewpoint. This clearly indicates that the integration of the mobile and the fixed Internet is a very complex task. In addition the question of how protocol and platform functionality is realized is crucial to what can be achieved. For example, the use of hardware accelerators helps to reduce the power consumption dramatically. The achievements so far are very promising. Despite the complexity of the task, there already applications available, which work well, even with the hybrid architecture of the Wireless Internet. We expect that the number of successful mobile applications will significantly increase as soon as handheld devices become more common and a better coverage with WLAN and 3G networks is provided. From the technical point of view, there are still several problems to be solved. On one hand, it appears a natural approach to isolate these problems and to try to tackle them independently; applying layer-specific methods. On the other hand, an integrated approach in which a problem is considered from a global perspective may lead to a better solution. There are several groups that follow this approach. In the end, both methodologies may provide complementary results. REFERENCES [1] J. Burrell, G.K. Gay, E-graffiti: evaluating real-world use of a contextaware system, Interacting with Computers (Special Issue on Universal Usability) 14 (4) (2002) 301–312. [2] W.G. Griswold, et al., Active Campus Sustaining Educational Communities through Mobile Technology, Technical Report #CS2002-0714, University of California, San Diego, 2002. [3] Metro Group, The Technical Concepts implemented at the Extra Future Store, available at: http://www.future- store.org/servlet/PB/show/1000815/pa-events-ecr-bookl- eng.pdf, last visited Dec. 2003 [4] L. Mehrmann, B. Kreller, Context-aware Community Applications For Mobile Youngsters, In: Proceedings of the First Mobile Communications Summit, 2001. [5] A. Luebke, From Internet in the car towards cars in the Internet,presentation at the DLR Workshop Quo Vadis Wireless Internet,2003, abstract available at: http://www.gzvb.de/informationssysteme/ abstracts/Luebke.html, last viewed December 2003. [6] M. Schuster, Body-Sensor Wireless Networks Monitoring Patients‘ Health with BAN, FOKUS-Fraunhofer Institute for Open Communication Systems Competence Center CATS, availableat http://www.fokus.fhg.de/medizin/download/BAN_E.pdf last visited Dec. 2003 [7] Object Management Group, The Common Object Request Broker: Architecture and Specification, revision 2.2, OMG Document Technical Report, 98-07-01, 1998. [8] Microsoft Corporation, DCOM Technical Overview, 1996, http://msdn.microsoft.com/library/default.asp?url ¼ /library/en-us/ dndcom/html/msdn_dcomtec.asp, last viewed September 24, 2003. [9] E. Pitt, K. McNiff, java.rmi: The Guide to Remote
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 102 Method Invocation, Addison-Wesley, Boston, 2001. [10] B. Keller, A.S. Park, J. Meggers, G. Forsgern, E. Kovacs, M. Rosinus, UMTS: a middleware architecture and mobile API approach, IEEE Personal Communications 5 (2) (1998) 32–38. [11] R. Jose´, A. Moreira, F. Meneses, G. Coulson, An Open Architecture for Developing Mobile Location-based Applications Over the Internet, Proceeding of the Sixth IEEE Symposium on Computers and Communications, 3–5 July, IEEE Computer Society, Los Alamitos, 2001, ISBN 0-7695-1177-5. [12] F. Hohl, U. Kubach, A. Leonhardi, M. Schwehm, K. Rothermel, Nexus: an open global infrastructure for spatial- aware applications, Proceedings of the Fifth International Conference on Mobile Computing and Networking (MobiCom 99), August 15–19, ACM Press, Seattle, Washington, USA, 1999. [13] A. Pashtan, R. Blattler, A. Heusser, P. Scheuermann, CATIS: A Context-Aware Tourist Information System, Poceedings of the Fourth International Workshop of Mobile Computing, June 17–18, Rostock, Germany, 2003. [14] A. Escudero, G.Q. Maguire, Role(s) of a proxy in location based services. PIMRC 2002, Thirteenth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. 16–18 September, Lisboa, Portugal, 2002. [15] condat AG: Skyware, available at http://www.condat.de/english/pdf/Skyware_eng.pdf,last visited Dec 2003 [16] H. Maab, Location-aware mobile applications based on directoryservices, MONET 3 (2) (1998) 157–173. [17] R. Kraemer, P. Schwander, Bluetooth based wireless internet applications for indoor hot spots: experience of a successful experiment during CeBit 2001, Computer Networks (2003). [18] P. Langendoerfer, O. Maye, Z. Dyka, R. Sorge, R. Winkler, R. Kraemer, in: Q. Mahmoud (Ed.), Middleware for Location-based Services: Design and Implementation Issues, Middleware for Communications, Wiley, New York, 2004. [19] St. Volz, J.-M. Bonfiger, Integration of Spatial Data within a Generic Platform for Location-Based Applications, In: Proceedings of the Joint International Symposium on Geospatial Theory, Processing and Applications, 2002.912 P. Langendo¨rfer, V. Tsaoussidis / Computer Communications 27 (2004) 908–913 [20] Th. Schwotzer, K. Geihs, Shark—a System for Management, Synchronization and Exchange of Knowledge in Mobile User Groups, Journal of Universal Computer Science 8 (6) (2002). [21] B. Wuest, O. Dro¨gehorn, K. David, FAME2: Software Architecture for B3G and 4G Networks, First Summit on Mobile and Wireless Communication, Aveiro, Portugal, 2003, pp. 837–841. [22] S. Mohapatra, N. Venkatasubramanian, PARM: Power Aware Reconfigurable Middleware, IEEE International Conference on Distributed Computer Systems (ICDCS-23), Rhode Island, May, 2003. [23] P. Langendo¨rfer, Z. Dyka, O. Maye, R. Kraemer, A Low Power Security Architecture for Mobile Commerce, Proceedings of the Fifth IEEE CAS Workshop on Wireless Communications and Networking (2002). [24] J. Riihijaervi, P. Maehoenen, M.J. Saaranen, J. Roivainen, J.-P. Soininen, Providing network connectivity for small appliances: a functionally minimized embedded web server, IEEE Communications Magazine October (2001). [25] E. Grass, et al., On the single-chip implementation of a Hiperlan/2 and IEEE 802.11a capable modem, IEEE Personal Communications Magazine December (2001). [26] P. Langendoerfer, Z. Dyka, F. Vater, O. Maye, Rolf Kraemer: A vertical approach towards energy-efficient application of cipher mechanisms in hot-spots running location-aware services, In: Proceedings of the International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research, 2003. [27] R. Cornea, et al., ServiceFORGE: A Software Architecture for Power and Quality Aware Services, Workshop at the International FME Symposium, September, 2003. [28] L.F. Cranor, Beyond Concern: Under-standing Net Users‘ Attitudes About Online Privacy, in: I. Vogelsang, B.M. Compaine (Eds.), The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy, The MIT Press, Cambridge, Massachusetts, 2000, pp. 47–70. [29] Jupiter Research: Consumers worried about online privacy, 2002 available at: http://www.nua.com/surveys/index.cgi?f ¼ VS&art_id ¼ 905358019&rel ¼ true; last visited Dec. 03 [30] P. Langendo¨rfer, R. Kraemer, Towards User Defined Privacy in location-aware Platforms, Proceeding of the Third International Conference on Internet Computing, CSREA Press, USA, 2002. [31] M. Bennicke, P. Langendo¨rfer, Towards Automatic Negotiation of Privacy Contracts for Internet Services, Proceeding of the 11th IEEE Conference on Networks (ICON 2003), IEEE Society Press, New York, 2003. [32] W. Wagealla, S. Terzis, C. English, Trust-based Model for Privacy Control in Context-aware Systems, Second Workshop on Security in Ubiquitous Computing, Ubicomp, 2003. [33] M. Gruteser, D. Grunwald, Anonymous Usage of Location- Based Services Through Spatial and Temporal Cloaking ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), 2003. [34] V. Tsaoussidis, I. Matta, Open issues on TCP for Mobile Computing, Journal of Wireless Communications and Mobile Computing (WCMC) 2 (1) (2002) 3–20. Wiley, New York. [35] H. Balakrishnan, S. Seshan, E. Amir, R.H. Katz, Improving TCP/IP Performance over Wireless Networks, In: Proceedings of ACM Mobicom ‗95, November, 1995
  • 6. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 103 BIOGRAPHIES: A.Siles Balasingh .M.Tech (I.T) .He is currently working as Lecturer in Department of Computer Science and Engineering in St. Joseph College of Engineering and Technology, Dar Es Salaam, Tanzania, East Africa. He has 4 publications to his credit. He has guided more than 20 projects to final year B.E/B.Tech students with good industry and teaching experience. His areas of interest in Computer Networks, Computer Networks and security, Neural networks and sBioinformatics Computer Architecture and Ethical hacking. N.Surenth M.Tech (I.T) He is currently working as Lecturer in of Department in Computer Science and Engineering in St. Joseph College of Engineering and Technology, Dar Es Salaam, Tanzania, East Africa. He has guided more than 15 projects to final year B.E/B.Tech students and his area of interest in Computer Networks and Artificial Intelligence.