This tutorial provides a gentle introduction to the important issues in mobile computing, addressing both advantages and challenges of this hot research area.
The widespread use of mobile computing devices has changed the way people compute and vastly expanded research areas in distributed computing and networking. In fact, traditional distributed computing is actually a subset of the broad area of mobile computing. Many topics in "mature" areas like distributed databases, distributed fault tolerance, and resource management now require much additional study, because many traditional assumptions are challenged. Mobile computers operate in more hostile environments, are resource-constrained (limited power, frequent disconnection), and are peripheral-poor. This tutorial provides an introduction to mobile computing, including a survey of representative technologies, the promises and challenges, and research areas. It will also briefly cover several interesting mobile computing topics, including Mobile-IP, data dissemination, and resource management. The goal is that a participant in the tutorial will leave with a conversational level of knowledge about mobile computing, be aware of the important issues, and know where to find further information about topics of interest. The Mobile Computing II tutorial will examine two important areas, sensor networks and service discovery, in greater detail.
This tutorial will appeal to anyone interested in a gentle introduction to mobile computing. No significant background in mobile computing is assumed. A basic background in computer science, especially distributed systems and networking, is recommended.
Biographies of speakers:
See Tutorial 3.
This tutorial provides an overview of the state of the art in computer security and then examines the specific problems introduced by mobile devices and wireless network access. No experience in computer security is assumed.
The growth in the popularity of laptop and handheld devices, coupled with the increase in use of wireless technologies, is driving mobile computing closer to the ubiquitous presence predicted by early visionaries. The downside to the readily available technology is that it is equally accessible to adversaries for use against us. Thus there is a growing need for better security for mobile computing. This tutorial surveys some of the general issues in computer security, then focuses on the security mechanisms available for several popular mobile technologies.
This tutorial will appeal to a broad audience, including students, developers, and researchers interested in mobile security. An introduction to security issues (applicable to both wire-based and wireless systems), as well as the wireless technologies and protocols will be provided, so anyone with a basic computer science background should find this tutorial approachable.
Broad Overview of the Tutorial
Biography of speaker:
Dr. Frank Adelstein is currently employed by Odyssey Research Associates (ORA) in Ithaca, NY. Since joining ORA at the beginning of 1999, Dr. Adelstein has been involved in many computer security projects, including intrusion detection with computational immunology and computer forensics using automated reasoning. He has participated in Red Team exercises, as well as the penetration testing of the security of a Fortune 500 company. He has also conducted research in wireless security on a project to provide multipolicy information assurance for microsensor, autonomous wireless local area networks. His current research in computer security involves increasing the effectivenes of techniques to correlate reconnaissance probes and attacks.
Prior to joining ORA, Dr. Adelstein was a postdoctoral associate with the Cornell Computer Science Department, working for the Xerox Design Research Institute (DRI). At DRI, he was the primary contributor for projects involving the integration of heterogeneous database resources and the creation of a web-based metadata repository. His PhD work involved protocols for real-time data, as well as formulating metrics for describing multicast efficiency.
This tutorial is a continuation of Introduction to Mobile Computing I, and examines two important areas in greater detail: service discovery technologies (Jini, Bluetooth, Service Location Protocol, Salutation, and Microsoft's Universal Plug and Play) and sensor networks.
The broad goals of service discovery technologies are to enable device cooperation, reduce configuration hassles, and provide services for peripheral-poor devices. The service discovery portion of the tutorial will survey several competing approaches to service discovery, including Bluetooth SDP, Salutation, Jini, and Microsoft's Universal Plug and Play. You'll emerge with a good understanding of service discovery, without having to read the 1500 page Bluetooth specification!
The other half of the tutorial will examine sensor networks. The recent development of high-performance microprocessors, novel sensing materials, and low-power communications has stimulated great interest in the development of smart sensors -- physical, chemical, or biological sensors combined with integrated circuits. These smart sensors can be relatively inexpensive to build, allowing for the large-scale deployment of networks of smart sensors. The applications of smart sensors are extensive. Sensor networks have been proposed for application areas including industrial, biomedical, environmental, and military, to name just a few. Many applications can benefit from a wireless interface to sensor networks. Interaction between sensor nodes and conventional computing devices will allow users of mobile computing devices to interact with their environment as they travel.
This tutorial will appeal to anyone interested in a deeper study of several important topics in mobile computing.
Biographies of speakers:
Loren Schwiebert received the B.S. degree in Computer Science and Mathematics from Heidelberg College, Tiffin, OH, and the M.S. and Ph.D. degrees in Computer and Information Science from The Ohio State University, Columbus, OH. Since 1995 he has been a faculty member at Wayne State University, Detroit, MI, where he is currently a Assistant Professor in the Computer Science Department. His research interests include interconnection networks, computer networking, and wireless communication. He is a member of the ACM, IEEE, and IEEE Computer Society.
Golden G. Richard III has been a faculty member in the Department of Computer Science at the University of New Orleans in Louisiana since 1994. His research interests include mobile computing, wireless networking, operating systems, and fault tolerance. Golden is on the Executive Committee of the IEEE Technical Committee on the Internet, is a member of the ACM and IEEE, and serves as USENIX's Educational Outreach Liaison for the University of New Orleans. He lectures frequently on networking and mobile computing issues, concentrating on service discovery technologies. When he's not hacking, he can be found consuming New Orleans jazz.
The need for "information anywhere anytime" has been a driving force for the increasing growth in Web and Internet technology, wireless communication, and portable computing devices. The field of mobile computing is the merger of these advances in computing and communication with the aim of providing seamless and ubiquitous computing environment for mobile users. These environments are enriched by new applications which are context-aware and location-dependent. Such applications require support from underlying system to provide them information about the location and context of the mobile users.
In this tutorial we will cover how location information can be provided to applications and how it can be efficiently managed by a mobile system. An application of location information service is location-based querying. The tutorial will demonstrate how applications can benefit from location based services by using the example of location-based querying.
Engineers, scientists, software developers, system analysts, network users and designers, project managers, faculty members, graduate and undergraduate students, who are interested in knowing the fundamentals of location information management and the recent advances and practices in the field.
Biography of speaker:
Sandeep Kumar S. Gupta received the B.Tech degree in computer science and engineering from Institute of Technology, Banaras Hindu University, Varanasi, India, the M.Tech. degree in computer science and engineering from Indian Institute of Technology, Kanpur, and the M.S. and Ph.D. degree in computer and information science from The Ohio State University, Columbus, Ohio. He is currently an Associate Professor in Department of Computer Science and Engineering at Arizona State University, Tempe, AZ. He has previously served as faculty at Duke University, Ohio University, and Colorado State University. His research interests include mobile and pervasive computing, compilers, wireless and embedded sensor networks.
Dr. Gupta has given tutorials on Mobile IP (IPCCC'99 and MASCOTS'99), Mobile ATM (IPCCC'99), and Mobile Databases (MobiCom'00). He was program chair for Int'l workshop on Group Communication and program co-chair for Int'l Workshop on Wireless Networks and Mobile Computing, and Int'l Workshop on Pervasive Computing. He was a program committee member for Mobile Data Access (MDA'99) and 1999 Int'l Conference on Parallel Processing (ICPP'99). He is a co-guest editor for special issue of IEEE Personal Communication Magazine (on Pervasive Computing), IEEE Transactions on Computer (Mobile Computing and Databases) and ACM/Baltzer Monet (on Pervasive Computing). Dr. Gupta is a member of the Association of Computing Machinery and a senior member of the IEEE.
Golden G. Richard III, Ph.D.
Asst. Professor of Computer Science
Dept. of Computer Science
Univ. of New Orleans
New Orleans, LA 70148
For questions/suggestions/problems with the IPCCC website please
mail the webmaster: firstname.lastname@example.org