UNIVERSITY EXAMINATIONS: NOV/DEC 2010
ANNA UNIVERSITY OF TECHNOLOGY, COIMBATORE
REGULATION 2007
070250041-PERVASIVE COMPUTING
PART A
1. What is Pervasive computing?
Pervasive Computing is a technology that pervades the users environment by making use of multiple independent information devices (both fixed and mobile, homogeneous or heterogeneous) interconnected seamlessly through wireless or wired computer communication networks which are aimed to provide a class of computing / sensor / communication services to a class of users, preferably transparently and can provide personalized services while ensuring a fair degree of privacy / non-intrusiveness.
2. Write about Xforms.
XForms is an XML format for the specification of a data processing model for XML data and user interface(s) for the XML data, such as web forms. XForms was designed to be the next generation of HTML / XHTML forms, but is generic enough that it can also be used in a standalone manner or with presentation languages other than XHTML to describe a user interface and a set of common data manipulation tasks.
3. What is smart card?
Smart card is an integrated circuit card which holds entity information in its memory in terms of some KB. Smart card is used in identification purpose and carries data relevant to that entity.
4. What is messaging component?
Exchanging messages is a recurring task when dealing with any device, which is connected to a network or just to another device. Applications need to be enabled to transmit information using a high-level interface and without having to take care of communication issues themselves.
This message components deals with network interfaces, supports multiple communication hearers and protocols, allows intermittent connections, assures delivery of messages, and handles recovery alter system problems.
5. What are the PDA operating systems?
Microsoft windows CE
Palm computing-Palm OS
Symbian- EPOC OS
Other OS like ..BeOS, QNX Neutrino, Embedded Linux
6. What are the new features introduced in WML over HTML?
User defined tags, micro browser, and compatible with low power devices & intermittent connection.
7. What are the features of Palm OS?
a. User management: used as personal device-single user operating system
b. Task management: one application at a time and can call other application
c. Power management: sleep/doze/running
d. OS size:V3.5/1.4 MB/runtime memory:64kb
e. User Interface: handwriting recognize/single button access
f. Memory management: dynamic heap/storage
8. What is WAP push?
The message which does not requires any form of answer from receiver side use the WAP push service. Example: sports updates, stock quotes.
Push operation is triggered from a push initiator by sending a push message to push proxy gateway (PPG) using the Push Access Protocol. Then the PPG deliver the message to mobile device using push over the air protocol (OTA).
9. Write some application examples showing how businesses can benefit from pervasive computing?
The technology reduces the man power such away it eases the work.
Inventory system gets benefitted.
Smart shopping.
10. What are the properties of a mobile application can possess?
- Disconnected or intermittently connected
- Context awareness
- Device and network adaption
- Local collaboration
11. What is the goal of pervasive computing?
Integrating computing in to the environment rather than having computers as a distinct objects.
It targets to ease our work, and does not need user distraction more.
12. What is document object model?
DOM is a standard for programmatically accessing the structure and data contained in XML document.
It defines the programmatic interface includes names and properties.
13. What is Jini technology?
Jini was designed for software and hardware targeted for small office ,market focusing on instantaneous networking.
It (applications) can be plugged in and out as power supply.
Provides SOA, self healing networks, legacy system integration.
14. How authentication is provided using smart cards?
Authentication is provided using following methods
Using public key cryptography
Non-public key cryptography
TLS/SSL protocol
Simple servlets
15. Write Short notes on WAP
WAP is Wireless Application Protocol that extends internet technology for mobile devices.
WAP is used to access services and information
WAP is inherited from Internet standards
WAP is a protocol designed for micro browsers(WAP phones)
WAP enables the creating of web applications for mobile devices.
16. What are the differences between PC and PDA?
PC will have larger display, higher data rate, high network capabilities, typical power supply, consume more power, variety of interfaces, all in one purpose
PDA has battery power supply, smaller display, low network capabilities, touch screen, low data rate, meant for specific purpose.
17. Write about Bluetooth technology.
Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth Specification defines a uniform structure for a wide range of devices to connect and communicate with each other.
18. What are the parameters of pervasive device security?
User mobility
Heterogenous environment
Low power devices
Always On
Less memory- hence firewall, antivirus and physical lock is not possible.
19. Write short notes on DTD.
DTD is to define the structure of an XML document.
It defines the structure with a list of legal elements
20. What are the different types of browsers available for PDA?
AvantGo
5NINE
KBrowser
PartB
21. Explain about Mobile IP
<What is the need for MOBILE IP
<Its advantages>
Mobile IP was developed as a means for transparently dealing with problems of mobile users
l Enables hosts to stay connected to the Internet regardless of their location
l Enables hosts to be tracked without needing to change their IP address
l Requires no changes to software of non-mobile hosts/routers
l Requires addition of some infrastructure
l Has no geographical limitations
l Requires no modifications to IP addresses or IP address format
l Supports security
<List the entities involved: home agent, foreign agent,>
<Include tables in router, agents, IP mapping, and tunneling concept>
<Refer course notes for diagram on registration, tunneling, tables.>
22.a. what are the evolving technologies that influence the evolution of mobile devices.
<List the basic technologies that support mobile device>
VLSI- embedded systems
Wireless technology
Web technology
Middleware software components.
<Explain the technical content of each technology with example>
<Moores law –Embedded systems resulting high storage , capability IC of even smaller size, less weight.>
<RFID,Bluetooth,CDMA,GSM,CSMA..IEEE802.11 standards..>
22.b. What are pervasive computing principles? Explain.
<First list the principles one by one>
ü Decentralization
ü Diversification
ü Connectivity
ü Simplicity
<Then explain each topic in connection to pervasive computing and refer course notes for detailed answer >
ü Decentralization
Distributed systems
Synchronizing Information
Managing Applications
ü Diversification
Targeting specific needs
ü Connectivity
A vision of boundless connectivity
Manifold devices are seamlessly integrated in an IT world without boundaries.
Exchange information through infra-red, data cable, Bluetooth.
Cellular phones with GSM, CDMA also involved in the environment.
ü Simplicity
Device operations need to be easy, so that the user shall feel comfort with his needs.
User Interfaces should not have complicated operations.
At present “one touch “keys are designed for user easiness.
23.a. What are the components of WAP architecture? Explain.
The WAP protocol architecture is shown below alongside a typical Internet Protocol
stack.
<List the layers in architecture, and describe each its functions involved in it>
WAP is designed in a layered fashion so that it can be extensible, flexible, and scalable.
As a result, there are five layers:
· Application Layer
· Session Layer
· Transaction Layer
It offers three classes of transaction services
Class0:provides unreliable one-way messages without confirmation
Class1:provide reliable one way message without result
Class2: provides reliable two way request-response messages.
· Security Layer
WTLS give several options for key exchange including RSA, Diffie-Hellman, ECC-Elliptic Curve Cryptography.
Privacy can be secured using DES-Data Encryption Standard and IDEA-International Data Encryption Algorithm.
· Transport Layer
Wireless Datagram Protocol (WDP).
Error during transmission is communicated via WCMP-Wireless Control Message Protocol
<Refer course notes for detailed answer for each layer>
23.b. Write about WAP infrastructure.
<Draw a sample WAP infrastructure, refer course notes or text book>
<List the components and entities involved>
<Function of Dail-in router,WAP gateway>
<Need for protocol conversion, Encoding and Decoding>
24. Write short notes on WML script? Write an example program to convert the given temperature from Celsius to Fahrenheit.
Temperature converter WML deck:
Scree shots:
25. Explain smart card programming.
Java Card is an open, interoperable platform for smart cards and secure tokens. Learn about the main features of this technology (portability and security), as well as its language restrictions.
The Java Card platform is the tiniest of Java targeted for embedded devices. It is an open, interoperable platform for smart cards and secure tokens; the technology is also widely used in SIM cards (it’s used in GSM mobile phones) and ATM cards.
Java Card gives users the ability to program a device and make it application specific and lets smart card developers use a common card platform. Smart cards, unlike magnetic stripe cards, can carry all necessary functions and information on the card; therefore, they do not require access to remote databases at the time of the transaction.
Security is determined by various aspects of this technology, which include the following:
· Applet: The applet is a state machine that processes only incoming command requests and responds by sending data or response status words backs to the interface device.
· Cryptography: Commonly used encryption algorithms like DES, 3DES, AES, and RSA are supported. Cryptographic services like signing, key generation, and key exchange are also supported.
· Applet firewall: Different applications are separated by an applet firewall that restricts and checks access of data elements of one applet to another.
· Data encapsulation: Data is stored within the application. Java Card applications are executed in an isolated environment (the Java Card Virtual Machine), separate from the underlying operating system and hardware.
<Sample program for grant access to an entity using smart card developed under java platform is available in course notes.>
25. Explain how WAP provides security? Describe the advanced security features of WAP and also explain WAP session security?
WAP provides security with the help of WTLS ,which involves Diffie Hellman key exchange, Elliptic curve cryptography.
Privacy through DES or IDEA (Data Encryption Standard & International Data Encryption Algorithm)
· Special features: WIM -WAP Identification Module
· WPKI- WAP Public key Infrastructure
Session Security:
The security issues identified in current WAP Architecture
ü End-end security
ü Missing secure authentication
ü Unauthenticated OTP
ü Missing public key Infrastructure
<The end to end security is achieved through TLS >
<Redirection to secure WAP gateway is another method to solve the security issue>
With the above shown diagrams describe the issues and solutions : refer course notes for content
27. a .Write about database components on handheld devices.
<Next list the database components in order>
ü Oracle9i Lite
ü DB2 Everyplace
ü Sync Database
<Then explain any two you know well with diagram where essential, refer: course notes >
Oracle9i Lite
Oracle9i Lite is actually a complete solution for mobile or wireless applications that require the use of a relational database on the mobile client.
It includes support for Win32, Windows CE, PalmOS, and EPOC database clients, integration with Oracle's Advanced Queuing (AQ) mechanism, and data and application synchronization software (to enterprise Oracle databases, of course).
DB2 Everyplace
DB2 Everyplace would be the God of Mobile Databases. The name DB2 Everyplace, or DB2e, refers to a family of products, each of which include the DB2 Everyplace Database, a small footprint database that fits on your PDA. Below are the different products available.It can be used on many different PDA platforms:
ü Windows CE / Pocket PC
ü Palm OS
ü Symbian OS
ü Embedded Linux & MIDP devices
b. Write short notes on Software components of PDA.
Software components are meant for synchronization, process of data, exchange them with other devices.
<List the SW components>
ü Applications
ü Connectivity
ü Synchronization
ü Device management
<Explain each topics with relevant data like calendars, to-do list for applications, Bluetooth for connectivity, modified data need to be updated: sync, ISPs for device management>
28 a. Write about standards of pervasive devices.
Pervasive devices are heterogeneous in nature and have different interfacing methods.
So common standards are essential to have a proper interoperability.
Communication protocol standard.
STANDARDS
<Standards are to be fixed for the relevant content used across devices to overcome incompatibility>
Electronic document Formats
<Discuss the topic with example –HTML markups for simple style, formatting-refer course notes>
Synchronization protocols
<discuss the need of SYNC, while the devices are variant in nature. Discuss about MAL>
Database formats
Application data specific format
Operating system specific format
Comma separated values
Electronic document standards
Local store with logical appearance of Relational DB (IBM DB2 Everyplace)
b. Write a sample code for inserting record in palm database.
In Most PDA, Palm OS is used.
In their DB, the users have to store and retrieve their record based on their needs.
<The sample code is available in Text Book : chapter 11.,page No.304>