Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Assignment on Mobile and Pervasive Computing

Category: Engineering Paper Type: Assignment Writing Reference: APA Words: 1700

TASK 1:
DETAIL DESCRIPTION OF DELIVERABLES

In this report there are two tasks as shown in the below discussion;

In the task 2 it has two question the first about the significance of the context information in the pervasive computing environment. And the 2nd question is about the application area of pervasive computing.

Now in the task 3 there are three question, the first is about the WAP architecture and the 2nd is about the security problem in the WAP, and the third question is about the application of the WAP architecture.

OVERVIEW OF PROPOSED PLAN OF TASK 2

The proposed plan of task 2 is;

·         Role/importance of context information in pervasive computing environment.

·         Outline the pervasive computing applications area.

TASK 2
IMPORTANCE OF CONTEXT INFORMATION IN PERVASIVE COMPUTING ENVIRONMENT

In pervasive computing, basic services are provided by smart devices like sensors etc. more complex and advance service can be provided when these different device act together. Context can be defined as the set of information which completely or partly situation of some entity. The context information can be broadly categorized into two types which are low level context information also known as implementation context, high level context information also known as application context (Soylu et al , 2009). Implementation context is usually gathered through sensor data or application logs. Application context is derived from implementation context. The notion of context is there in many scientific domains but in case of pervasive computing the context of any application in terms of its physical parameters is very important. In pervasive computing, physical context which is acquired using sensor data is the most important type of context. These sensor data are very important for the functioning of different devices in pervasive computing. The context information also depends on the type of task at hand e.g. if we were to derive <<high temperature>> from context about a room, it is not sufficient because we would need to know about what kind of room are we talking about, are we talking about an air-conditioned room or a sauna (Euzenat et al , 2006).


As the main purpose of ubiquitous computing to make an environment which has computing and computational abilities and it must also integrate with human users. To make these pervasive computing systems minimally disruptive, it is very important make them context aware so that they are aware about the basic information about a user like their identity, their location, their activity etc. Making pervasive computing systems context aware also make them more flexible and adaptable at the same time. Making pervasive computing systems context aware makes them proactive.

 A proactive system is the one which records user’s intent and give solution proactively also keeping in mind that it does not irritate the user. If context awareness is added to the system, it can use that information to make proactiveness better and can make better decision if it adds user context with user intent information. Adding context information in ubiquitous system also make them more invisible to the user which is a very important characteristic in these system as they have to ensure minimal intrusion in a user’s life. Without context awareness, users will have to enter the input data in the system which defeats the purpose of invisibility. In case the context is provided, the system can gather input data without user’s intervention. Another important thing that context awareness adds to the ubiquitous adaptability. In case there is mismatch between supply and demand, the system should be able to adjust itself according to new demand and that is impossible without the context information e.g. a smart vacuum cleaner won’t be able to clean the full house without running out of battery if it is not location aware (Foley , 2006).

PERVASIVE COMPUTING APPLICATIONS AREA

About 30 years ago the idea of ubiquitous computing was predicted and it was predicted there would be computing devices in almost every object we interact with. These devices interact with user and are visible at the same time. We can find pervasive computing applications everywhere we see (Barbosa, 2015).

The pervasive computing has different application from the home care and health environments monitoring as well as intelligent system of transport.  Between the myriad tools which is expected to support the various application integrity circuit

·         Speech recognition

·         Gesture re-cognition (Hu,et al , 2010)

TASK 3
WAP LAYERED ARCHITECTURE.

WAP (wireless Application protocol) is an industry standard which has find its application in various communication networks and business applications. WAP application architecture can be divided into different layers just like TCP/IP protocol where it is optimized specifically for wireless communication. In each layer of WAP there is a standard interface defined which can be used by the upper layer in the stack to interact with the lower layer. Following are the layers in a WAP architecture:

1.      WAE: Wireless Application Environment

2.      WSP: Wireless Session Protocol

3.      WTP: Wireless Transaction Protocol

4.      WTLS: Wireless Transport Layer Security Protocol

5.      WDP: Wireless Datagram protocol

WAE can be considered a common suite which can be used to develop and run application on various wireless communication network. With the help of WSP WAE can provide session-oriented services with are based on WTP and WDP which are stateless/connection services. WTP is protocol which provide transaction like services, it can also provide unreliable one-way request (like UCP in web) or reliable one-way or two-way requests (like TCP in web). As an optional service it also provides user to user reliability and also band response as well. It also supports asynchronous transactions. As WAP is TCP/IP architecture which has security concern WTLS adds security of WAP and is based of Transport Layer Security (TLS) and is optimized for narrow bandwidth communications. Its main features are providing data integrity, authentication, privacy and protection in case of DoS attacks. WDP is the transport protocol in WAP architecture and provides upper layer an interface which is agnostic of the topology of the upper layer means it will work regardless of the underlying wireless network. The bottom layer is the underlying wireless network (Ahmadpanah et al , 2016).

ROLE OF THE WAP GATEWAY ASSOCIATED BY SECURITY PROBLEMS

WTLS protocol is responsible for security in WAP architecture, it accepts the raw data from the upper layer and then apply compression and encryption algorithms to this data before transmitting it. It is a record protocol which means it takes care of the data integrity and decrypted. Received data is then decrypted and decomposed before passing it to the upper layers. The record protocol is further divided into 4 protocol which Change Cipher spec protocol (CCP_, handshake protocol (HP), Alert protocol (AP), Application Data protocol (ADP). First of all, the security parameters are agreed upon between sender and receiver in the handshake phase, and after that change cipher spec message is sent. There are three types of alert message which are warning, critical and fatal. If an alert message labelled as fatal is sent, the communication is terminated both by sender and receiver right away. While the other connection that use the same secure connection can continue. In case of critical alert message, the secure connection is terminated.

All the error handling is done with the use of alert messages. The cryptographic parameters of a secure connection are established during handshake and these are various parameter like protocol versions being used, used crypto algorithms etc. To secure the connection encryption key or initial values which are used to compute keys are exchanged in a secure manner. Privacy is attained by encrypting the communication channel. Data integrity is attained using Message Authentication Codes (MAC). The algorithm for MAC is decided as the same time the encryption algorithm is decided between sender and receiver. The client sends the list of MAC protocol with the top protocol having the most preference and server sends the decided MAC protocol in the initial hello message. There are many MAC algorithms which WTLS supports like MD5, and SHA etc. These are the different ways in which WAP addresses different security issue like authentication, privacy, data integrity etc (Radhamani et al , 2002).

IMPORTANT WAP APPLICATIONS

WAP is being used in many important applications. It is being used in mobile commerce application which carry out various financial transactions. There are now mobile banking programs which incorporates different elements which private information services, WAP and security. All existing mobile phone can use mobile banking systems, WAP make mobile banking secure which is fundamental requirement for any banking system. One example of such mobile banking system provider In Materna. WAP is used to distribute games across mobiles we can go to different websites like www.digitalbridges.com which supplies games over WAP and buy games. WAP is also used to download ringtones in mobiles and its popularity is increasing day by day. WAP is used for internet emails as well, people can be notified about new email on their mobiles with WAP Push protocol. WAP has so many other applications in addition to these (Eng.tau.ac.il, 2019).

REFERENCES of Mobile and Pervasive Computing

Ahmadpanah et al , S. . H., 2016. Wireless Application Protocol Architecture Overview. Conference: 3rd National Conference on Computer Engineering and IT Management, At Tehran.

Barbosa, J. L. V., 2015. Ubiquitous Computing, s.l.: s.n.

Eng.tau.ac.il, 2019. Applications for WAP. [Online]
Available at: http://www.eng.tau.ac.il/~sharon/WAP/apps.htm

Euzenat et al , J., 2006. A Context Information Manager for Pervasive Computing Environments.

Foley , A., 2006. Context Awareness – Why is this characteristic important to applications in a ubiquitous computing environment?, s.l.: IC03329721|Ubiquitous Computing Assignment.

Hu,et al , B., 2010. Special issue: pervasive computing technology and its applictaions. WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, Volume 10, p. 1281–1282.

Radhamani et al , G., 2002. Security Issues in WAP WTLS Protocol. IEEE.

Soylu et al , A., 2009. Context and Adaptivity in Pervasive ComputingEnvironments: Links with Software Engineeringand Ontological Engineering. JOURNAL OF SOFTWARE, 4(9).

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Quick N Quality

ONLINE

Quick N Quality

1428 Orders Completed

George M.

ONLINE

George M.

1344 Orders Completed

Study Master

ONLINE

Study Master

1617 Orders Completed