Mobile access to the Internet: a mediator-based solution

被引:2
|
作者
Alanko, T [1 ]
Kojo, M [1 ]
Liljeberg, M [1 ]
Raatikainen, K [1 ]
机构
[1] Univ Helsinki, Dept Comp Sci, SF-00510 Helsinki, Finland
关键词
cellular communications; computer architectures; distributed data processing; Internet; mobile communications;
D O I
10.1108/10662249910251372
中图分类号
F [经济];
学科分类号
02 ;
摘要
Nomadicity is a new challenge for computing and communication technologies. Modern cellular telephone systems extend the usability of portable personal computers enormously. A nomadic user can be given ubiquitous access to remote information stores and computing services. However, the behaviour of wireless links creates severe inconveniences within the traditional data communication paradigm. In this paper we give an overview of the problems related to wireless mobility We also present a new software architecture for mastering the problems and discuss a new paradigm for designing mobile distributed applications. The key idea in the architecture is to place a mediator, a distributed intelligent agent, between the mobile node and the wireline network.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 50 条
  • [21] Mobile and wireless Internet access
    Makki, SAM
    Pissinou, N
    Daroux, P
    COMPUTER COMMUNICATIONS, 2003, 26 (07) : 734 - 746
  • [22] Mobile Internet access in BAS
    Li, TH
    Mien, CK
    Arn, JLS
    Seah, W
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2004, : 736 - 741
  • [23] A Trustworthy Mobile Solution for Healthcare Based on Internet of Things
    Kang, Kai
    Wang, Cong
    INTERNET OF THINGS: USER-CENTRIC IOT, PT I, 2015, 150 : 217 - 222
  • [24] A mobile agent based system for distributed database access on the Internet
    Yan, W
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 1587 - 1590
  • [25] A novel mobile Internet access system based on of DM/TDD
    Cho, Seong Chul
    Kim, Hyung Jin
    Kim, Jin Up
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS, 2006, : 113 - +
  • [26] A secure data access method based on eID for mobile Internet
    Yang, M. H.
    Yao, J. J.
    Liu, Z. X.
    Manufacturing and Engineering Technology, 2015, : 405 - 408
  • [27] Mobile Internet Access Control Strategy Based on Trust Perception
    Chen, Lu
    Zhao, Xinjian
    Zhao, Ran
    Yuan, Guoquan
    Zhang, Song
    Chen, Shi
    Wu, Fan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 598 - 611
  • [28] Applying Adult Behavior Change Theory to Support Mediator-Based Intervention Implementation
    Sanetti, Lisa M. H.
    Kratochwill, Thomas R.
    Long, Anna C. J.
    SCHOOL PSYCHOLOGY QUARTERLY, 2013, 28 (01) : 47 - 62
  • [29] Mediator-based evolutionary design and development of image meta-analysis environments
    Fredriksson, J
    Svensson, P
    Risch, T
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2001, 17 (2-3) : 301 - 322
  • [30] Mediator-Based Evolutionary Design and Development of Image Meta-Analysis Environments
    Jesper Fredriksson
    Per Svensson
    Tore Risch
    Journal of Intelligent Information Systems, 2001, 17 : 301 - 322