Challenges for nomadic computing

Mobility management and wireless communications

Research output: Contribution to journalArticle

26 Citations (Scopus)

Abstract

In this paper, we present several challenges and innovative approaches to support nomadic computing. The nomadic computing environment is characterized by mobile users that may be connected to the network via wired or wireless means, many of whom will maintain only intermittent connectivity with the network. Furthermore, those accessing the network via wireless links will contend with limitations of the wireless media. We consider three general techniques for addressing these challenges: (1) asymmetric design of applications and protocols, (2) the use of network-based proxies which perform complex functions on behalf of mobile users, and (3) the use of pre-fetching and caching of critical data. We examine how these techniques have been applied to several systems, and present results in an attempt to quantify their relative effectiveness.

Original languageEnglish (US)
Pages (from-to)3-16
Number of pages14
JournalMobile Networks and Applications
Volume1
Issue number1
DOIs
StatePublished - Jan 1 1996

Fingerprint

Communication
Telecommunication links

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

@article{d09f1c79b94045b88bc40bb4fa133d2c,
title = "Challenges for nomadic computing: Mobility management and wireless communications",
abstract = "In this paper, we present several challenges and innovative approaches to support nomadic computing. The nomadic computing environment is characterized by mobile users that may be connected to the network via wired or wireless means, many of whom will maintain only intermittent connectivity with the network. Furthermore, those accessing the network via wireless links will contend with limitations of the wireless media. We consider three general techniques for addressing these challenges: (1) asymmetric design of applications and protocols, (2) the use of network-based proxies which perform complex functions on behalf of mobile users, and (3) the use of pre-fetching and caching of critical data. We examine how these techniques have been applied to several systems, and present results in an attempt to quantify their relative effectiveness.",
author = "{La Porta}, {Thomas F.}",
year = "1996",
month = "1",
day = "1",
doi = "10.1007/BF01342727",
language = "English (US)",
volume = "1",
pages = "3--16",
journal = "Mobile Networks and Applications",
issn = "1383-469X",
publisher = "Springer Netherlands",
number = "1",

}

Challenges for nomadic computing : Mobility management and wireless communications. / La Porta, Thomas F.

In: Mobile Networks and Applications, Vol. 1, No. 1, 01.01.1996, p. 3-16.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Challenges for nomadic computing

T2 - Mobility management and wireless communications

AU - La Porta, Thomas F.

PY - 1996/1/1

Y1 - 1996/1/1

N2 - In this paper, we present several challenges and innovative approaches to support nomadic computing. The nomadic computing environment is characterized by mobile users that may be connected to the network via wired or wireless means, many of whom will maintain only intermittent connectivity with the network. Furthermore, those accessing the network via wireless links will contend with limitations of the wireless media. We consider three general techniques for addressing these challenges: (1) asymmetric design of applications and protocols, (2) the use of network-based proxies which perform complex functions on behalf of mobile users, and (3) the use of pre-fetching and caching of critical data. We examine how these techniques have been applied to several systems, and present results in an attempt to quantify their relative effectiveness.

AB - In this paper, we present several challenges and innovative approaches to support nomadic computing. The nomadic computing environment is characterized by mobile users that may be connected to the network via wired or wireless means, many of whom will maintain only intermittent connectivity with the network. Furthermore, those accessing the network via wireless links will contend with limitations of the wireless media. We consider three general techniques for addressing these challenges: (1) asymmetric design of applications and protocols, (2) the use of network-based proxies which perform complex functions on behalf of mobile users, and (3) the use of pre-fetching and caching of critical data. We examine how these techniques have been applied to several systems, and present results in an attempt to quantify their relative effectiveness.

UR - http://www.scopus.com/inward/record.url?scp=0030204733&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0030204733&partnerID=8YFLogxK

U2 - 10.1007/BF01342727

DO - 10.1007/BF01342727

M3 - Article

VL - 1

SP - 3

EP - 16

JO - Mobile Networks and Applications

JF - Mobile Networks and Applications

SN - 1383-469X

IS - 1

ER -