{"title":"Overcoming the Network Bottleneck in Mobile Computing","authors":"M. Ebling, L. Mummert, D. Steere","doi":"10.1109/WMCSA.1994.30","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.30","url":null,"abstract":"System designers have traditionally treated the network as an inexhaustible resource, focusing their efforts on optimizing CPU and storage usage. For instance, the popular NFS file system [8] supports diskless operation, thereby avoiding use of local secondary storage at the expense of increased network usage. But in mobile computing, it is the network, rather than CPU or storage, that will be the scarce resource. The time has come when we must treat the network as a first-class resource, expending the CPU and storage resources necessary to use it intelligently. In this paper we argue that prescient caching and smart scheduling are key techniques/or overcoming the network bottleneck. We use the Coda file system [9] as a case study to substantiate our position.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116858256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware Computing Applications","authors":"Bill N. Schilit, N. Adams, R. Want","doi":"10.1109/WMCSA.1994.16","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.16","url":null,"abstract":"This paper describes systems that examine and react to an individual's changing context. Such systems can promote and mediate people's interactions with devices, computers, and other people, and they can help navigate unfamiliar places. We believe that a limited amount of information covering a person's proximate environment is most important for this form of computing since the interesting part of the world around us is what we can see, hear, and touch. In this paper we define context-aware computing, and describe four catagories of context-aware applications: proximate selection, automatic contextual reconfiguration, contextual information and commands, and contex-triggered actions. Instances of these application types have been prototyped on the PARCTAB, a wireless, palm-sized computer.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using ATM for a Campus-Scale Wireless Internet","authors":"D. Comer, V. Russo","doi":"10.1109/WMCSA.1994.42","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.42","url":null,"abstract":"This paper reviews the problem of routing in a wireless internet, and discusses a plan that combines wireless network technology with high-speed A synchronous Transfer Mode (ATM) switching technology. The combination provides a wireless communication system with sufficient aggregate bandwidth to handle both data transfers and routing updates for a university sized network. More importantly, this paper details why wireless communication is a particularly difficult problem on a university campus, and describes a routing update mechanzsm that can scale to routing on a large campus.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous Video Coding for Wireless Transport","authors":"D. Messerschmitt, J. M. Reason, A. Lao","doi":"10.1109/WMCSA.1994.12","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.12","url":null,"abstract":"Wireless access to continuous-medis services such as video, voice, and audio is becoming increasingly prevalent. Interactive video services such as video conferencing and multimedia editing is one such service, but existing compression standards (designed for wired, circuit-switclrcd services) are unsatisfactory for wireless packet-video services. We propose a novel strategy for video transport using a layered source coder in conjunction with a variableQOS, multiple-substream abstraction for the transport. This abstraction addresses specifically the need to obtain simultaneously high spectral efficiency, good subjective quality, and low perceptual delay on awireless channel. It also addresses the heterogenous transport resulting from the concatenation of a wireless access link with a broadband backbone network. We use asynchronous video (ASV) reconstruction, running counter to current techniqucs, which use strictly synchronous (frame-by-frame ) video processing. By doing so we hope to achieve a perceptual delay that is much lower than the worst-cese tronsport delay. (By \"perceptual delay\" , we refer to the effective end-to-end latency observed by the user,for example es represented by the audio delay required to maintain lip synchronization.) By identifying packets to the transport with relaxed reliability andlor delay requirements (through the subsream identifier), the transport (particularly wireless) can achieve high traffic capacity. Reasonable and promising simulation results are achieved, although much work remains on achieving significant video compression in this environmcnt.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Demers, K. Petersen, M. Spreitzer, D. Terry, M. Theimer, B. Welch
{"title":"The Bayou Architecture: Support for Data Sharing Among Mobile Users","authors":"A. Demers, K. Petersen, M. Spreitzer, D. Terry, M. Theimer, B. Welch","doi":"10.1109/WMCSA.1994.37","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.37","url":null,"abstract":"The Bayou System is a platform of replicated, highly-available, variable-consistency, mobile databases on which to build collaborative applications. This paper presents the preliminary system architecture along with the design goals that influenced it. We take a fresh, bottom-up and critical look at the requirements of mobile computing applications and carefully pull together both new and existing techniques into an overall architecture that meets these requirements. Our emphasis is on supporting application-specific conflict detection and resolution and on providing application controlled inconsistency.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Replication Strategies for Mobile E-Mail","authors":"B. Fitler, D. Betz","doi":"10.1109/WMCSA.1994.31","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.31","url":null,"abstract":"Mobile computer users may have multiple computers and various communicaton methods available to them. Thus, effective e-mail services in diverse mobile environments, including both wireless and wireline scenarios, can be significantly enhanced using replication services. In this paper we discuss our adaptations of R.A. Golding's weak-consistency group communication and membership protocols[1,2] for robustness in mobile environments.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125904073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Design for Wireless Computing","authors":"T. Watson","doi":"10.1109/WMCSA.1994.10","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.10","url":null,"abstract":"As mobile computing becomes more prevulent, systems ond applications must deal with a growing disparity in resources types and availability at the user interface device. Network characteristics, display size, method of input, local storage and computing, are sorne of the rnore obuiously affected contponents. AIthough the chullenges of effectiuelg managing these resoarces are partially addressed bg etisting systems, their solutions are hindered by the system's lack of knowledge obout application behauior. This, combined with the nar'rower domain of applications comrnonly used during mobile computing, suggests addressing these concerns from the application leael. This paper presents strategies for designing applications f-or a wirCless enaironment, by reducing the demands placed on the wireless network. A World Wide Web client browser is used to illastrate this design.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129522228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Causally Ordered Message Delivery in Mobile Systems","authors":"S. Alagar","doi":"10.1109/WMCSA.1994.13","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.13","url":null,"abstract":"There is a growing trend in using mobile computing environment for several applications, and It is important that the mobile systems are provided adequate support both at the systems level and at the communication level. Causal ordering is a useful property, particularly in applications that involve human intcractions. In this paper, we present three algorithms for causal ordering in mobile systems. The first algorithm handles the resource constraints of the mobile hosts. But the system is not easily scalable and is not graceful to host disconnections and connections. The second algorithm eliminates the above disadvantages at the Cost of inhibiting some messages. The third algorithm is a trade-off between thc first two algorithms.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymity in a Mobile Computing Environment","authors":"N. Asokan","doi":"10.1109/WMCSA.1994.9","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.9","url":null,"abstract":"In a mobile computing environment, it is desirable to protect information about the movements and activities of mobile entities from onlookers. Solutions to this problem of providing anonymity have to be developed with the constraints of mobile computing environments in mind. In this paper, it is argued that this issue merits investigation. A brief survey of the nature of anonymity provided in proposed or existing mobile computing environments is presented. It is argued further that achieving limited but practical anonymity using standard cryptographic techniques is feasible. Example solutions are presented.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126690144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Changing Communication Environments in MosquitoNet","authors":"Mary Baker","doi":"10.1109/WMCSA.1994.14","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.14","url":null,"abstract":"MosquitoNet is a new project at Stanford University for investigating operating system and application issues in mobile and wireless computing. Our initial goals focus on providing the appearance of continuous network connectivity for mobile hosts. To achieve these goals we must first enable portable computers to move seamlessly from one communications medium to another, for example from an Ethernet connection to a wireless modem, without rebooting or restarting applications. Second, we must determine how to manage the resulting dynamic changes in network characteristics, either transparently or through a simple interface between the network and the applications. Other goals include developing power management policies for network devices and experimenting with file data consistency algorithms for networks in which disconnection may be economically desirable, but seamless network re-connection is almost always possible.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121506180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}