View page as slide show

Wireless service engineering


  • Mobile Internet Technical Architecture book series, Nokia and IT PRESS
    • Technologies and standardisation
    • Solutions and tools
    • Visions and implementations
  • Ubiquitous computing
    • Magazines
      • Personal and ubiquitous computing magazine - springer verlag
      • IEEE Pervasive Computing magazine - IEEE
    • Books
      • Security for Ubiquitous Computing - Frank Stajano
      • Pervasive Computing: Technology and Architecture of Mobile Internet Applications - Jochen Burkhardt et al.
      • World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing - Richard Hunter

Mobile internet

  • Not just conventional web browsing
    • Browsing is cumbersome with mobile devices
  • Applications and services
    • Transactions
    • Connectivity to people
    • Games and entertainment
    • source for media content
    • Manage everyday events.


  • Architecture specifications
    • Permanent baseline of MITA
  • Key system Specifications
    • end-to-end system aspects
  • Architecture frameworks
    • defines how to handle some special issues like security and QoS

Architecture specifications

  • UI and application framework
    • Guidelines for user interfaces
    • limited set of UI styles
    • mapping application functionality to physical UI in udnerstandable way
    • minimizing customer learning curve to adopt new application and services
  • Interaction models
    • Messaging
      • Non real time
      • client-server based communication
      • asynchronous
      • server functionality
        • store and forward (SMS, EMS, MMS)
        • store and retrieve (EMAIL)
        • store and push
        • publish and subscribe
  • Browsing
    • near real time
    • request-response
    • one way audio and video streaming capability
    • XHTML Mobile Profile
    • Online and offline browsing
  • Rich Call
    • two-way real time communication
    • QoS
      • jitter (variation in time between the packets arriving)
      • latency
    • Voice and video calls
    • concurrent communication
  • Internet protocols in MITA
    • IP protocols extended to support mobility (mobile IP)
  • OS and Platform support in MITA
    • Sets basic requirements for OS and platform
    • Defines required functionality
      • Libraries, APIs, network protocols…
    • Does not define preferred OS just the required capabilities
    • Eases the portability of applications
  • Multiple Access in MITA
    • Defines the elements needed to allow access from mobile device to IP network
    • Access independetn interface shields the mobile internet layer from underlying technology

Key System Specifications

  • Naming Numbering and Addressing (NNA)
    • Identity/addressing
      • Phone number
      • WWW-address
      • E-mail address
    • Translations between different types of naming schemes on different types of communications
  • Presence
    • Provides dynamic information about the status and availability of users and mobile devices.
    • One user may have multiple application level identities (i.e. presence can be different for different applications)
  • Reachability
    • Defines how the user/device can be reached through web /mobile domain
    • Tries to solve the problem caused by different types of networks
  • Access independent connectivity
    • mobility management
    • reliability to end-to-end communications
  • Service Discovery
    • Three types of methods
      • SD on ad hoc networks
      • SD on internet
      • SD for presence and virtual community
  • Location
    • Defines software and protocol interfaces for location services
  • Device Management and Data synchronization
    • distributed applications and databases
    • link between presence and contact/calendar
    • PIM (Personal Information Management
    • content download
  • Content formats
  • Content adaptation
    • To support different types of devices
  • Privacy

Architecture Frameworks

  • Defines how to handle some issues that are complicated to solve without having common and unified model
    • structured under common framework before a more detailed architecture is built
  • Current frameworks include:
  1. Directories
  2. Security in MITA
  3. QoS
  • Directories
    • network repositories about people, places and things
  1. Schema
  2. Access method
  3. Directory store
  • Security
  1. Integrity
  2. Confidentiality
  3. Availability
  4. Authentication
  5. Authorization
  • Mobile Internet Interfaces
    • open interface to software and protocols for software developers and integrators.
  • Quality of Service

Ubicomp and application areas

  • Ubiquitous Computing : Mark Weiser(1952-1999), Xerox Parc 1988
    • Each person is continually interacting with hundreds of nearby interconnected computers without explicitly attending to them.
    • Computers are integrated in everyday objects like motors. People use the items not computer, just like they use a drill instead of motor.
    • “The most profound technologies are those that disappear. They weave themselves into fabric of everyday life until they are indistinguishable from it” - Weiser M., The computer for the twenty-first century, Scientific American, September 1991
  • Pervasive Computing: Academia, IBM 1999
    • Pervasive computing encompasses the dramatically expanding sphere of computers embedded within and intrinsically part of larger devices. -IBM
  • Ambient Intelligence: European Commission
    • “People living easily in digital environments in which the electronics are sensitive to

people's needs, personalized to their requirements, anticipatory of their behaviour and responsive to their presence” -Phillips

  • “Ambient Intelligence represents a vision of the future where we shall be surrounded by electronic environments, sensitive and responsive to people. Ambient intelligence technologies are expected to combine concepts of ubiquitous computing and intelligent systems putting humans in the centre of technological developments.”

-2nd european symposium on ambient intelligence

  • Calm Computing : Weiser and John Seely Brown, 1996
    • Computing activity takes place in background and provide outcome in an unobtrusive way
    • Dangling string, LaughingLily…
  • Active Environments, augmented environments, augmented reality
    • Virtual reality takes people in digital world, augmented environment brings digital enhancements in normal environment.
  • Augmenting humans
    • Adding capabilities to humans
  • Wear Comp.
  • Awareness
    • Communication with environment
    • Knowledge of current situation
    • Knowledge of users


  • User interface
    • Multimodality
      • Modality == way to convey information between a user and interface of application using single distinct human capability to process the information
        • Text, graphics, Speech, audio…
      • User interface adapted to the device capabilities.
        • Speaker, graphical display…?
        • Microphone, keyboards …?
  • Connections
    • Machine to machine communications?
  • Automation
    • System control vs. user control
    • Privacy vs usability

Comlab and ubicomp applications

  • Guidance system
  • Mobile phone and bicycle communications
  • Automated locks and computer logins
  • ME- Mobile Electronic Personality
Last modified: 2013/07/01 14:42