- Ms Word Format
- 87 Pages
- 1-5 Chapters
A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT-GENERATION MOBILE NETWORKS
Table of Contents Hide
A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT-GENERATION MOBILE NETWORK
The first generation mobile phones which used analog technology were heavy and their coverage was patchy. Technical innovations in terms of hardware, software and protocols have contributed to the success of the mobile phones and have added them new capabilities. The handsets have become smaller and lighter, the battery life has increased and the reception has improved due to the improvements in digital technology and better use of the finite spectrum. The current generation of mobile phones is built using digital technology and they connect to the internet via the new generation of wireless communications. Therefore, they provide higher information transfer capability than the earlier generations (Yesim and Kivanc, 2007).
Due to the advancement of mobile phones and wireless technologies, data functionalities (such as the text or multimedia messages, email and streaming video) are now possible at a variety of broadband speeds, making the popularity of these media soar. The mobile terminals are developing, getting new features and enhanced hardware at a fast pace. The new mobile phones are called smart phones, because their features can be added and modified. Most of these smart mobile phones are programmable and can run any conceivable application. They readily support General Packet Radio Service (GPRS), Bluetooth, Multimedia Messaging Service (MMS), inbuilt or attachable camera, as well as other sophisticated applications. The smart phones have high-resolution color display (176×208 pixels with 4096 colors) and several megabytes of internal memory, which can be supplemented with memory cards. They are small, light, but powerful mobile terminals (Tsalgatidou et al., 2005).
Mass production has substantially lowered the cost of smart phones on the cellular phone market making them more affordable to the average consumer. It is estimated that currently over one half of the world‟s population own a mobile phone (Winters et al., 2008). The convergence of multiple technologies including GPS, GIS, mobile information systems, internet, wireless communications, location identification and mobile devices has given rise to exciting new types of information utilities called Location Based Services (LBS). They provide the capability to find the geographical location of the mobile device and then offer services based on information of this location (Steiniger et al.,2006).
Location Based Services (LBS) are especially used in special circumstances such as driving or walking; thus the user is not piled with large amounts of information that may distract his/her attention. A mobile environment imposes strong constraints on the implementation of LBS because mobile devices have limited memory, low computational power and small screen size with low resolution, short battery life and uncomfortable input tools that usually do not allow a user to operate quickly. Besides, mobile networks are characterized with limited bandwidth, high latency, low connection stability and low predictable availability (Yesim and Kivanc, 2007). By taking all these constraints into consideration along with user‟s high performance and good service demands that conflict with them, an optimal security application for java-enabled mobile phones has been designed and implemented in this research.
Location awareness plays a major role in security enhancement and several applications have been proposed that rely on knowing or predicting the location of the user. Several key issues should be addressed when designing location-aware software applications that require real-time traveler information using GPS-enabled mobile phones. First, the user experience is severely constrained due to the limited user interface. To provide an effective user experience, every effort must be made to design intelligent applications which require user input only when necessary (Maharj et al., 2009). Therefore, a predictive mechanism is desired that will passively monitor traveler‟s transit behavior.
Another consideration for designing traveler security systems is the underlying circumstances. In case the user is attacked in a kidnap, which in many cases the attackers force the user to deviate from his usual route to unusual destinations, he/she may not be in a position to call the care-givers for help. Therefore, a system that is automated to immediately inform the care-givers of any deviations from the route is required.In recent research, route prediction is being extensively examined for use in the context of mobile and wireless computing, towards more efficient network and resource management schemes. If the network can predict where the user is, then considerable bandwidth can be saved and resources optimizedfor mobility management (Akoush et al.,2006).
In this work, a GPS-enabled phone has been programmed to periodically obtain and send its location data to a database server. This allows one to get real-time information logs about the user‟s movements. The application focusses on monitoring the user while on transit and detects any possible deviation from thepre-destined route or speed range. An alert is send to the required personnel if any of these two aspects is transgressed.
We are living in an insecure society where people are in danger from criminal attacks like kidnaps to internet predators. Systems that can detect situations where the care-givers attention is required exist in form of domestic fire and burglar alarms. In the area of security and health care, industry and academia have actively conducted research using various external sensors such as visual monitors, motion detectors and proximity sensors. However, these sensors may not always be available in outdoor activities. An easily portable and a versatile device like a mobile phone then become handy for enhancing personal security. The expectation that mobile phone users are able to answer phone calls most of the time enables one to determine the well-being of another by simply calling them. However in case of an accident or emergency situation, conditions may not be favorable for any phone call. This raises a question of how to increase awareness of our dependents‟ situations in order to provide help when needed.
Mobile phones equipped with GPS receivers can enable the tracking of one‟s location. This functionality can be used by individuals to identify where they are on a map. However, there are a few problems with the existing GPS security systems. First, the interface for monitoring position requires a lot of user input and is based on plotting a dot on an electronic map. A moving dot on a map only shows information about where the user is located but doesn‟t give detailed information about the type of situation in which he/shemaybe. Secondly,current GPS systems do not detect any deviations. Guardians are constantly required to focus their attention on the map and assess the situations themselves. In this work, the above issues are addressed by developing a system which can store the user‟s regular routes, monitor him/her while on transit and alert required personnel if there is deviation from the expected route or speed range.
To develop and implement an optimal mobile phone-based security system, with the ability to locate the user‟s current location, monitor his/her movements and notify the required personnel in the event of deviations from the required route and speed range.
- To develop the client-side application using Java 2 Micro Edition (J2ME), for the phone to submit its position data periodically to a database server.
- To develop the server-side application, which has a database with tables to receive and update the phones position data, then store all the users possible route data and speed limits.
- To develop an optimal method for detecting deviations from the pre- determined route and speed range.
- To develop a mechanism for sending an alert to the required personnel in case of any deviation.
Currently, security all over the world has become a serious issue, raising a lot of concern among the affected parties. This study increases awareness of the dependents‟ situations and be able to provide help remotely. Therefore, it is deemed that this study is necessary due to the following reasons;
- It will enable the dissemination of mobile terminal‟s position data to third party security service providers ensuring that in case of any criminal attack, necessary measures are taken quickly andeffectively.
- It will enable care-givers have peace of mind because they are aware of their dependents‟movements.
- The system can also be extended to applications like vehicle tracking, asset monitoring and management, monitoring of criminals and location based emergency warnings for publicsafety.