Background Transfer Method for Ubiquitous Computing
Recently, as smart computing is constantly growing in terms of data and the number of users, the demand for memory and network resources on a wireless mobile terminal has increased rapidly. To accommodate the need for terminal and network resources, previous techniques have been studied for efficient use of the limited network channels and terminal memory resources. This paper presents a new transmission method which overcomes the data transmission limitations of wireless-handsets such as constraints on the transmission channels and storage capacity of a wireless smart terminal in ubiquitous computing. The wireless device’s transmission and storage capacity limitations have hindered the advancement of ubiquitous computing on wireless Internet. This study proposes a real-time background transfer method to overcome these problems for powerful data transmission and large storage capacity among ubiquitous computing items.
KeywordsTransfer method ubiquitous computing mobile network transfer recovery
Unable to display preview. Download preview PDF.
- 1.McCann, J., Bryson, D.: Smart clothes and wearable technology, pp. 3–24, 205–213. CRC Press (2009)Google Scholar
- 2.Krumm, J.: Ubiquitous Computing Fundamentals, pp. 1–35. CRC Press (2010)Google Scholar
- 4.Al-bar, A., Wakeman, I.: A Survey of Adaptive Applications in Mobile Computing. In: The 21st International Conference on Distributed Computing Systems Workshops (ICDCSW 2001), p. 246 (2001)Google Scholar
- 6.Goth, G.: Mobile Devices Present Integration Challenges. In: IEEE IT Pro., pp. 11–15 (May 1999)Google Scholar
- 7.Poslad, S.: Ubiquitous Computing-smart devices, environments and interactions, pp. 343–378. John Wiley & Sons (2009)Google Scholar
- 8.Xu, Y., Li, W.J., Lee, K.K.: Intelligent Wearable Interfaces, pp. 5–30. John Wiley & Sons Press (2008)Google Scholar
- 10.Chu, G.H.: Image transmission apparatus and method using CDMA communication network, U.S. Patent No. US007505782B2, March 17 (2009)Google Scholar
- 11.Siewiorek, D., Smailagic, A., Starner, T.: Application Design for Wearable Computing, pp. 51–58. Morgan & Claypool Publishers (2008)Google Scholar
- 12.Lo, A., Lu, W., Jacobsson, M., Prasad, V., Niemegeers, I.: Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (July 2006)Google Scholar
- 14.Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and Physical Layer specifications," IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements, Std. 802.3 (2008)Google Scholar