skip to main content
10.1145/1497185.1497249acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

An effective seamless connectivity scheme for ubiquitous applications

Published:24 November 2008Publication History

ABSTRACT

The idea of ubiquity and seamless connectivity in networks is gaining more importance in recent times because of the emergence of mobile devices with added capabilities like multiple interfaces and more processing abilities. The success of ubiquitous applications depends on how effectively the user is provided with seamless connectivity. In a ubiquitous application, seamless connectivity encompasses the smooth migration of a user between networks and providing him/her with context based information automatically at all times. In this work, we propose a seamless connectivity scheme in the true sense of ubiquitous networks by providing smooth migration to a user along with providing information based on his/her contexts automatically without re-registration with the foreign network. The scheme uses Ubi-SubSystems(USS) and Soft-Switches(SS) for maintaining the ubiquitous application resources and the users. The scheme has been tested by considering the ubiquitous touring system with several sets of tourist spots and users.

References

  1. M. C. e. a. G Borriello. Delivering real-world ubiquitous location systems. Communication of the ACM, 48, March 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K. J. Hazas M., Scott J. Location-aware computing comes of age. IEEE Computer, 37(2), February 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. G. Hightower J. Location systems for ubiquitous computing. IEEE Computer, 34(8), August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Kim and J. A. Copeland. Tcp for seamless vertical handoff in hybrid mobile data networks. In GLOBECOM, Volume 2, Issue, 1--5 Dec, pages 661--665, 2003.Google ScholarGoogle Scholar
  5. W. A. M Shin, Justin Ma. The design of efficient internetwork authentication for ubiquitous wireless communications. Technical Report, University of Maryland, Computer Science Dept.,( CS-TR-4617, UMIACS-2204-59, 2004.Google ScholarGoogle Scholar
  6. D. H. S. N. Rene Soltwisch, Xiaoming Fu. A method for authentication and key exchange for seamless inter-domain handovers. In ICON, Volume 2, Issue, 16--19 Nov., pages 463--469, 2004.Google ScholarGoogle Scholar
  7. M. Silventoinen and T. Rantalainen. Mobile station locating in gsm. In Wireless Communication System Symposium, IEEE, pages 232--238, Feb-1996.Google ScholarGoogle Scholar
  8. Y. K. S. K. T Kang, C Hong. A context-aware handoff management for seamless connectivity in ubiquitous computing environment. In The 2006 World Congress in Computer Science and Applied Computing, Las Vegas, Nevada, USA, pages 128--134, June-2006.Google ScholarGoogle Scholar
  9. C.-P. H. e. a. Tae-Hoon Kang. Sap: Seamless authentication protocol for vertical handoff in heterogeneous wireless networks. In Proceedings of the 3rd International Conference on QoS in Heterogeneous Wireless Networks, Volume 191, Article No. 32, Waterloo, Ontario, Canada, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. K. Ved P. Kafle and S. Yamada. A scheme for graceful vertical handover in heterogeneous overlay networks. In IEEE, Issue, 19--21 June, pages 343--348, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Weiser. Ubiquitous computing. In http://en.wikipedia.org/wiki/Mark_Weiser., July 2008.Google ScholarGoogle Scholar

Index Terms

  1. An effective seamless connectivity scheme for ubiquitous applications

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                MoMM '08: Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
                November 2008
                488 pages
                ISBN:9781605582696
                DOI:10.1145/1497185

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 24 November 2008

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
              • Article Metrics

                • Downloads (Last 12 months)2
                • Downloads (Last 6 weeks)0

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader