Advertisement

Background Transfer Method for Ubiquitous Computing

  • Tae-Gyu Lee
  • Gi-Soo Chung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7645)

Abstract

Recently, as smart computing is constantly growing in terms of data and the number of users, the demand for memory and network resources on a wireless mobile terminal has increased rapidly. To accommodate the need for terminal and network resources, previous techniques have been studied for efficient use of the limited network channels and terminal memory resources. This paper presents a new transmission method which overcomes the data transmission limitations of wireless-handsets such as constraints on the transmission channels and storage capacity of a wireless smart terminal in ubiquitous computing. The wireless device’s transmission and storage capacity limitations have hindered the advancement of ubiquitous computing on wireless Internet. This study proposes a real-time background transfer method to overcome these problems for powerful data transmission and large storage capacity among ubiquitous computing items.

Keywords

Transfer method ubiquitous computing mobile network transfer recovery 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    McCann, J., Bryson, D.: Smart clothes and wearable technology, pp. 3–24, 205–213. CRC Press (2009)Google Scholar
  2. 2.
    Krumm, J.: Ubiquitous Computing Fundamentals, pp. 1–35. CRC Press (2010)Google Scholar
  3. 3.
    Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F.: A survey of key management schemes in wireless sensor networks. Computer Communications 30, 2314–2341 (2007)CrossRefGoogle Scholar
  4. 4.
    Al-bar, A., Wakeman, I.: A Survey of Adaptive Applications in Mobile Computing. In: The 21st International Conference on Distributed Computing Systems Workshops (ICDCSW 2001), p. 246 (2001)Google Scholar
  5. 5.
    Ramana, K.S., Chari, A.A., Kasiviswanth, N.: A Survey on Trust Management for Mobile Ad Hoc Networks. International Journal of Network Security & Its Applications (IJNSA) 2(2), 75–85 (2010)CrossRefGoogle Scholar
  6. 6.
    Goth, G.: Mobile Devices Present Integration Challenges. In: IEEE IT Pro., pp. 11–15 (May 1999)Google Scholar
  7. 7.
    Poslad, S.: Ubiquitous Computing-smart devices, environments and interactions, pp. 343–378. John Wiley & Sons (2009)Google Scholar
  8. 8.
    Xu, Y., Li, W.J., Lee, K.K.: Intelligent Wearable Interfaces, pp. 5–30. John Wiley & Sons Press (2008)Google Scholar
  9. 9.
    Dang, P.P., Chau, P.M.: Robust image transmission over CDMA channels. IEEE Transactions on Consumer Electronics 46(3), 664–672 (2000)CrossRefGoogle Scholar
  10. 10.
    Chu, G.H.: Image transmission apparatus and method using CDMA communication network, U.S. Patent No. US007505782B2, March 17 (2009)Google Scholar
  11. 11.
    Siewiorek, D., Smailagic, A., Starner, T.: Application Design for Wearable Computing, pp. 51–58. Morgan & Claypool Publishers (2008)Google Scholar
  12. 12.
    Lo, A., Lu, W., Jacobsson, M., Prasad, V., Niemegeers, I.: Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (July 2006)Google Scholar
  13. 13.
    Frazier, H.: The 802.3z Gigabit Ethernet Standard. IEEE Network 12(3), 6–7 (1998)CrossRefGoogle Scholar
  14. 14.
    Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and Physical Layer specifications," IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements, Std. 802.3 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Tae-Gyu Lee
    • 1
  • Gi-Soo Chung
    • 1
  1. 1.Korea Institute of Industrial Technology (KITECH)AnsanKorea

Personalised recommendations