Basics of Ubiquitous Networking

3 downloads 0 Views 3MB Size Report
University of Auckland, New Zealand. Jairo A. Gutiérrez ..... has a GPRS dial-up modem, allowing the council ... land and Wellington City Council (Auckland City.
221

Chapter X

Basics of Ubiquitous Networking Kevin Park University of Auckland, New Zealand Jairo A. Gutiérrez University of Auckland, New Zealand

Abstract Networking is no longer a luxury but rather has reached a stage where it could be regarded as a commodity, if not a necessity. Improvements in networking technologies and devices have resulted in many services and facilities that were considered a dream just a decade ago. The demands of users and organisations are driving networks to provide four “A’s” networking, or the “anytime, anywhere, by anything and anyone” networking, referred to as “ubiquitous networking”. This chapter provides an overview of ubiquitous networking, commencing with a discussion on how ubiquitous networking environments will change our lives, followed by a section on the importance of networking infrastructure, along with the applications and services necessary to maximise the benefits of a ubiquitous networking environment. Furthermore, this chapter addresses the global evolution of ubiquitous networking including some of New Zealand’s attempts in this increasingly important field.

Introduction The exponential growth of the Internet has diminished the difficulties associated with communication between distant places, allowing people to participate in the digital economy regardless of

their geographical limitations. Additionally, developments in wireless technologies are freeing people from using wires for communicating. For example, the conveniences of wireless connections have converted mobile phones in a commodity, rather than a luxury item (Weatherall & Jones,

Copyright © 2008, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.

Basics of Ubiquitous Networking

2002). The worldwide penetration of handheld devices through 2005 is the more than 511 million, with 310 million of those in Asia, as reported in the Statistics for Mobile Commerce (Retrieved April 26, 2006 from: http://www.epaynews.com/statistics/mcommstats.html#7). A report by McKinsey cited in the same Web site forecasts a mobile phone penetration in Europe of 85% for the year 2005. Technological advances of wireless technologies are truly leading us to a world that is capable of delivering “anytime, anywhere, by anything and anyone” networks (Ministry of Internal Affairs and Communications, Japan, 2005a). The idea of “anywhere, anytime, by anything and anyone” (or 4As) networking is at the core of a new emerging networking technology, referred to as a “ubiquitous networking”. The origin of the term “ubiquitous” is Latin, meaning “being everywhere, especially at the same time” (Phobe.com, 2003). The concept of ubiquitous networking originated from the concept of ubiquitous computing, which was aimed to “make many computers available throughout the physical environment, while making them effectively invisible to the user” (Weiser, 1993; Wikipedia, 2005). Yuhan (2003) distinguishes the term “ubiquitous computing” from “ubiquitous networking” by stating “ubiquitous computing requires good network connections, but not necessarily ubiquitous networking”. Additionally, Weiser (1993) highlights four important “networking” issues when focusing on ubiquitous computing, namely: wireless media access, wide-bandwidth range, real-time capabilities for multimedia over standard networks, and packet routing. In the Tokyo Ubiquitous Network Conference, four main objectives of ubiquitous networking were stated, indicating that ubiquitous networking should be: (1) freed from networking constraints concerning capacity, location, and different link ups; (2) freed from the constraints of terminal limitation; (3) freed from the constraints of limited service and contents; and (4) freed from

222

the constraints of network risk (Ministry of Interal Affairs and Communications, Japan, 2005b). The world of ubiquitous networking creates new business opportunities, from the development of services and applications that maximise these earlier-mentioned objectives of ubiquitous networking. Evolving networking technologies will change our daily lives, both in social and economical terms. For example, according to Kitamura (2002), the potential demand that can be generated in Japan with ubiquitous networking environments exceeds 10 trillion yen (Kitamura, 2002). The potential demand includes, but is not limited to services such as ubiquitous health/ concierge systems, ubiquitous automobile systems and ubiquitous education/learning systems. In the following sections of this chapter the concept of ubiquitous networking will be explained in detail. The next section addresses the importance of networking infrastructure in ubiquitous networking, followed by the section, which provides an overview of business models and proposed applications and services. The fourth and fifth sections covers some approaches to ubiquitous networking around the world, including New Zealand. The sixth section addresses the underlying issues in achieving a ubiquitous networking environment, while the last section concludes the chapter.

Network Infrastructure for Ubiquitous Networking The core of a ubiquitous networking environment is the underlying networking infrastructure that is capable of meeting the requirements of users. In general, networking technologies can be divided into two broad categories: (1) wired networks and (2) wireless networks. The key functional distinction between the two types of networks is the speed, where wired networking technologies are capable of providing much higher speed communications compared to wireless network-

Basics of Ubiquitous Networking

ing technologies. The technologies supporting wireless networks will always be “resource-poor” when compared with those supporting wired networks (Satyanarayanan, 1996). The following is the list of key wired and wireless networking technologies. Detailed descriptions of them are beyond the scope of this chapter. • • • • •

• •

Fibre technologies (e.g., FTTH, FTTC) Wireless LANs (802.11g, 802.16) Wireless MANs (Fixed wireless, LMDS) Wireless WANs (3G/4G, GPRS, UMTS, GPS, mesh networks) Short-distance wireless communication technologies (Wireless PAN) (e.g., Bluetooth) Satellite systems (e.g. Motorola’s Iridium) Sensor networks

Figure 1 (sourced from Beltran & Roggendorf, 2005) provides a model for understanding the issue

of resource allocation in wireless networks and it gives a useful way of appreciating the entities involved in providing ubiquitous services. The columns in the model depict the specifics of the different wireless technologies up to the packet layer (IP) which is widely seen as the first unifying layer and provides full transparency to the upper layers. The lowest levels of the layer model are used to describe the specific properties of the particular wireless channel technology (Beltran & Roggendorf, 2005).

Wired vs. Wireless Technologies Drew (2002) argues that wired networks are necessary while considering wireless networks as a supplement. However, in a ubiquitous network environment, the role of wireless networks matches the importance of wired networks. In a ubiquitous networking environment, wired networks act as the backbone providing high to very high speed

Figure 1. A layer model for resource allocation (Beltran & Roggendorf, 2005)

223

Basics of Ubiquitous Networking

connection to end users. However, wired networks are very restricted in terms of mobility. Wireless networks address this deficiency, and provide high mobility to users although, as stated before, with lower speeds than wired networks. Thus, in a ubiquitous networking environment, wired and wireless networking technologies form a symbiotic relationship, by compensating for the deficiencies of each other. Murakami (2004) provides a clear overview of the appropriate utilisation of wired and wireless networking technologies in a given sector of a ubiquitous networking environment (see Figure 2).

Figure 2. The ubiquitous network (Murakami, 2004)

224

In a ubiquitous networking environment, the networking technologies are not limited to providing “person to person” communications; they also need to address “person to object” and “object to object” communications (Ministry of Internal Affairs and Communications, Japan, 2005b). The convergence of wired and wireless technologies will provide an appropriate use of networking technologies for those three different types of communications, maximising the potentials of ubiquitous networking. That convergence is a key characteristic of environments which support the spontaneous appearance of

Basics of Ubiquitous Networking

entities, in other words “persons” or “objects” that move into range and initiate participation in the ubiquitous network (Kindberg & Fox, 2002). The next section discusses a number of suggested business models along with the potential applications and services that could be offered as part of a ubiquitous networking environment.

Business Models and Applications for Ubiquitous Networking As mentioned in the introduction, ubiquitous networking is a promising environment capable of delivering services that were considered a dream only a few years ago. The development of appropriate business models is already in place turning ubiquitous networking environments into a reality. Nagumo (2002) proposed three main types of business models that maximise the characteristics of ubiquitous networking, with possible applications and services in each model. Three main types of business models are: •

• •

Knowledge asset management type business model Wide area measurements business model

Among these three types of business models, the “concierge type” business model delivers the most promising applications and services to everyone.

Healthcare Toilet In Japan, Matsushita Electrical Industrial Co., Ltd. has developed a new service called the “Healthcare Toilet” (see Figure 3). The key idea of this service is to provide a health monitoring system, using a toilet seat equipped with sensors and networking devices. The objective is to provide a seamless service to users, without interrupting one’s life (Nagumo, 2002). The sensors in the toilet seat measure data such as weight, body fat, and glucose levels in urine to monitor one’s daily health status (Nagumo, 2002). Based on this data, the end user will be notified with information about his or her health status, and guidelines to improve his or her nutrition.

Concierge type business model

Figure 3. Health management using a networked toilet (Nagumo, 2002)

225

Basics of Ubiquitous Networking

Ubiquitous Automobile Network Services Another example is found in the automobile industry with the introduction of ubiquitous automobile

network services. This type of service is already in place with the use of GPS (global-positioning system) equipped cars that allow drivers to find the shortest path to a destination, to locate the current position of the vehicle, and to find the routes

Figure 4. Example of a GPS system in an automobile (Langa, 2002)

Figure 5. Services in a ubiquitous networking environment (Nagumo, 2002)

226

Basics of Ubiquitous Networking

with low levels of traffic (Langa, 2002) (see Figure 4). In addition to the services that GPS provides, the ubiquitous automobile network is capable of providing services such as monitoring functions and warning messages regarding the vehicle condition, automatic toll-fee collection, and car theft warning and prevention (Kitamura, 2002). These two examples are just a glimpse of what ubiquitous networking environments can deliver. As suggested by Nagumo (2002), a ubiquitous networking environment is capable of overcoming the troubles and anxieties faced by society (Nagumo, 2002). For example, taking care of elderly relatives or young children can be troublesome for workers who cannot stay with them all the time. In a ubiquitous networking environment, the use of surveillance cameras and sensors can reduce the potential risks, with the ability to send alerts to family members and emergency centres when anomalies are detected. Figure 5 shows an example of a group of concierge services that can be delivered in a ubiquitous networking environment.

Global Evolution of Ubiquitous Networking The promising benefits and attractive proposals of applications and services for ubiquitous networking environments have sparked the interest of many countries around the world and have also attracted the attention of the International Telecommunications Union (ITU), the organisation that is well known for its standardisation efforts in the telecommunications field. Recently, the ITU have addressed the idea of the “Ubiquitous Network Society” as part of their “New Initiatives Programme” which aims to identify the emerging trends in the telecommunications environment (ITU, 2005a). In that ITU programme South Korea and Japan were selected to illustrate early implementations of ubiquitous networking.

Networking Infrastructure in South Korea and Japan Why these two countries? As discussed in the previous section, the networking infrastructure

Figure 6. Broadband subscribers per 100 inhabitants (Source: ITU, 2005a)

227

Basics of Ubiquitous Networking

is the critical factor for ubiquitous networking. According to the ITU, South Korea is the world’s broadband leader by a large margin (24.9 broadband subscribers per 100 inhabitants in 2004, see Figure 6); along with a high number of mobile subscribers that even outnumbers fixed line subscribers (ITU, 2005b). Similar statistics apply to Japan (ITU, 2005c). The high penetration rate of broadband and the widely use of wireless technologies around the country allows facilitates the implementation of “anywhere, anytime by anything, anyone” ubiquitous networking. The success factors for these two countries are explained in detail in the ITU’s case studies (ITU, 2005a, 2005b).

Approaches to Ubiquitous Networking in South Korea In South Korea, the Ministry of Information and Communication has the intention of realising their “digital home plan”, in which digital home appliances with communications capabilities are installed in apartment houses as a total, integrated system (Murakami, 2004). The ministry is about to invest 2 trillion won (2 billion $US) for 10 million households for the four years ending in 2007 (Murakami, 2004). In the private sector, plans for ubiquitous networking are also emerging: the Dongtan Ubiquitous Networking city plan, supported by the Samsung group, involves 40,000 households (Murakami, 2004). At the university level, a number of institutions have successfully implemented ubiquitous networking environments, usually labelled “u-campuses”. For example, at Sukmyung Woman’s University, students can download “credit-card” functionality to their PDA or mobile phone and use the device as a medium for payment (Jung, 2004). The strong focus and national level of support towards ubiquitous networking in South Korea and Japan are driving other countries to adopt similar strategies. In Europe, the project Amigo is addressing the idea of ubiquitous networking,

228

stating that it is an “integrated project that will realize the full potential of home networking to improve people’s lives” (Amigo Project, 2004). Active participants in this project include companies from various countries, among them: France, Germany, Spain, and the Netherlands. However, these efforts are limited to the commercial sector without the stronger government and country-wide support found in South Korea and Japan. According to the ITU, Italy and Singapore are the two other countries that are actively participating in achieving a ubiquitous networking environment (ITU, 2005d, 2005e), with relatively well-established infrastructure throughout their territories. The case of New Zealand will be discussed in the next section.

Approaches to Ubiquitous Networking in New Zealand In New Zealand, the concept of ubiquitous networking is not highly recognised. The networking infrastructure in New Zealand is far behind other countries, in terms of broadband penetration rate, use of mobile communications (See Figure 7), and pricing (both wired and wireless). Despite this situation, a number of attempts have been made to provide some “ubiquitous services”. Three main services will be discussed in this section.

Wireless Hotspots The “Wireless Hotspot” service from Telecom New Zealand can be regarded as an effort to provide ubiquitous networking environments. Telecom provides “Wireless Hotspot” services around New Zealand (TNZ, 2004) in major cities, in places such as major hotels and cafés. The “Wireless Hotspot” service allows users to utilise their devices for Internet connectivity at the places where the service is available. However, this number of “Wireless Hotspots” is very small compared to the “Wireless Hotspots”

Basics of Ubiquitous Networking

Figure 7. New Zealand’s position on broadband penetration rate and mobile Internet use (Source: ITU, 2005c)

available in countries like South Korea (10,000 “Hotspots”) (ITU, 2005b), and the service is only limited to customers of “Xtra”, the largest Internet service provider in New Zealand. Telecom New Zealand recently allowed users to purchase the prepaid cards for the wireless Internet access in the “Wireless Hotspots”.

TXT-a-Park Another example of a ubiquitous networking service in New Zealand is the trial “txt-a-park” system, pioneered by Vodafone and the Auckland City Council. The Auckland City Council claims that the trial “aims to obtain customer feedback and operational performance data about the new parking payment technology, with a view to replacing Auckland City’s existing pay and display machines under the council’s parking asset replacement plan” (Auckland City Council, 2005). Auckland City Council has invested

approximately $100,000 on this service, which is funded from revenue generated by pay and display machines. Each TXT-a-Park machine has a GPRS dial-up modem, allowing the council to configure the machines remotely (Wellington City Council, 2005). To use the TXT-a-Park service, the user first needs to press the “TXT-a-Park” button from the

Figure 8. Txt-a-park service from Vodafone / Auckland and Wellington City Council (Auckland City Council, 2005; Wellington City Council, 2005)

229

Basics of Ubiquitous Networking

parking machine (See Figure 8) to get a cost and code for one- or two-hour parking (Vodafone New Zealand, 2005). To pay for the parking, the user sends a text message to a given number using the obtained code as content. If the text message successfully goes through, the parking machine will notify the user with a beep and ask for confirmation to accept or to cancel the transaction. If the user accepts the transaction the machine will print a parking ticket and confirmation will be sent to the user’s mobile phone. The service is only available to Vodafone customers who have either pre-paid or monthly mobile phone plans.

RoamAD’s Metro Wi-Fi Networks RoamAD’s proprietary solution on Metro Wi-Fi (802.11b/g) networks provides ubiquitous wireless networking services to end users in a metropolitan area (RoamAD, 2002). The solution is based on a multipoint-to-multipoint wireless 802.11b/g star grid topography created using RoamAD’s proprietary software, which consists of node software operating on intelligent network nodes (INNs) and intelligent network servers (INS). The proprietary software allows use of existing 802.11b/g wireless networking devices, and is

Figure 9. RoamAD’s proprietary Metro Wireless Network (RoamAD, 2005)

KEY R1 R4 INS INN

230

1 Radio INN (Operating RoamAD INN Software) 4 Radio INN (Operating RoamAD INN Software) Intelligent Network Server Multi-radio Intelligent Network Node assembled from commodity hardware

R2 R6 GS

2 Radio INN (Operating RoamAD INN Software) 6 Radio INN (Operating RoamAD INN Software) Gateway Server (Operating RoamAD Software)

Basics of Ubiquitous Networking

also capable of creating wireless networks with a coverage area of 150 square kilometres (Watson, 2002). The first functional demonstration network in New Zealand covers 3 kilometres of downtown Auckland, and allows users within this area to use always-on wireless broadband connections to the Internet, their office network and the PSTN (Wireless Developer Network, 2002). The aspect which separates the RoamAD’s technology from traditional wireless hotspots is that RoamAD’s technology is not reliant on existing terrestrial network infrastructure (Watson, 2002). This technology is also used in campus environments, providing ubiquitous wireless networking services to students near or on campus (Brislen, 2005). An example of RoamAD’s metro network is illustrated in Figure 9. Despite these discussed attempts, New Zealand is still far from achieving a complete ubiquitous network environment. However, early attempts to provide services utilising ubiquitous networking principles look promising, and it is expected that more services will develop in parallel with the improvements in the networking infrastructure.

Issues in Ubiquitous Networking The ubiquitous networking technology is still in its very early stages, and there are numerous issues that need to be addressed before achieving a perfect operating environment. One of the major issues is to maintain interoperability between different networking technologies. For example, an office employee may have a Bluetooth device that connects with her laptop, use a wireless LAN based on 802.11g, a wireless WAN based on 3G, and a wired connection using ADSL. To maximise the benefits from a ubiquitous networking environment, these various technologies should be able to communicate without any disruptions.

Additionally, processing power of mobile devices and issue of security is one of other concerns for true ubiquitous networking environment. Currently, significant research emphasis is given to the security and middleware side of ubiquitous networking to address this, and it is highly related with improvements in the processing power of mobile devices.

Network Selection and Billing Selection of networks in a ubiquitous networking environment is one of the main operating issues with this technology (Beltran & Roggendorf, 2004a). For example, in a ubiquitous networking environment, a cordless phone may substitute your mobile phone when you are outside the house. Choosing the best network based solely on the user requirements complicates the selection of the “ideal” network for a particular connection time and location. The user-initiated selection of a provider also generates the issue of billing. Currently customers “subscribe” to the desired services, and get billed based on the usage. However, in a ubiquitous networking environment, there is no need to “subscribe” for a desired service, but rather users have the capability to employ ad-hoc type services when needed as depicted in Figure 10. This adds complexity to existing billing systems however these requirements need to be addressed to achieve a truly ubiquitous networking environment. The ubiquitous networking environment creates new challenges in security and requires development of new approaches to address both existing and new security problems (Van Dyke & Koc, 2003). Heterogeneous networking environments add a complexity to existing security mechanisms, and different techniques needs to be developed to ensure optimum levels of security in the ubiquitous networking environment (Privat, 2005).

231

Basics of Ubiquitous Networking

Figure 10. Issue of interoperability and network selection (Beltran & Roggendorf, 2004b)

Wireless WAN, 3G Network

Which network should I use?

Wireless LAN, based on 802.11g

`

Middleware The advancements in handheld devices are one of the key drivers of ubiquitous networking, and these devices are improving its capabilities at exponential rates. However, due mainly to their size restrictions, these devices suffer from a number of limitations. These limitations include but are not limited to: inadequate processing capability, restricted battery life, limited memory space, slow expensive connections, and confined host bandwidth (Sharmin, Ahmed, & Ahamed, 2006). To address these limitations, middleware can play an essential role. For example, rather than delegating processing responsibility to the light-weight handheld devices, core processing can be performed by the middleware applications. Currently developed middleware applications are capable of providing services such as security, data backup services, resource discovery services, and ad-hoc communication services, to list a few (Sharmin, Ahmed, & Ahamed, 2006). Given that middleware is the most viable solution to minimise limitations of handheld devices, a large number of middleware applications are under research by

232

both academics and practitioners (Murphy, Picco, & Roman, 2001; Sharmin, Ahmed, & Ahamed, 2006; Yau, Wang, & Karim, 2002).

Security Security has always been a critical issue within the area of networking, and this is not an exception in ubiquitous networking environments. In fact, security in this type of environment requires more emphasis than what has been perceived in traditional networks. The convenience of handheld devices, such as PDAs, means that people are storing personal data on these devices, which means that more stringent security mechanisms to protect this data are required. The typical characteristics of handheld devices also create security concerns, such as (Raghunathan, Ravi, Hattangady, & Quisquater, 2003): •

Mobile communications uses a public transmission medium, which creates opportunity for hackers to eavesdrop communications more easily than with secured private connections.

Basics of Ubiquitous Networking

• •

Mobile devices are vulnerable to theft, loss, and corruptibility. Processing power limitations on mobile devices can imply restrictions on security features (e.g., Algorithm selection).

To address these issues, various methods are proposed. The common approach is the use of security protocol, middleware, and hardware-driven security. Many application vendors and researchers are working together to develop a more lightweight security protocols for handheld devices, and standards such as wireless application protocol (WAP) and wired equivalent privacy (WEP) are in wide-spread use nowadays (Raghunathan, Ravi, Hattangady, & Quisquater, 2003).

Conclusions During the Tokyo Ubiquitous Networking Conference, Mr. Taro Aso, Minister of Internal Affairs and Communications stated that “We aim to realize this ubiquitous network society by 2010. At the end of last year, we formulated policy for realizing a ubiquitous network society which consists of three pillars: preparations for ubiquitous networks, enhancement of ICT applications, and the setting up of an environment conducive to usage” (Aso, 2005). It is clear that “anywhere, anytime by anything and anyone” networking will not arrive overnight. It will be an incremental process that requires commitment, careful planning and preparation. Viable implementations will initially take place at a relatively small scale, in apartment buildings or university campuses before extending to a wider environment. Eventually, a world-wide level of ubiquitous networking will be reached, allowing people to use the same device everywhere. Developments in networking have changed our everyday lives, especially with the introduction and popularity of the Internet. High demand from individual users and organisations has brought

the concept of ubiquitous networking to the front as seen in the cases of South Korea and Japan. The importance of the underlying networking infrastructure is one of the key success factors for establishing ubiquitous networking environments along, of course, with successful applications and services. Ubiquitous networking is not without problems, and there are a number of critical issues that need to be resolved. However, the technology offers great promise, and it will eventually reach us, converting our “4As” networking dreams into reality.

References Amigo Project. (2004, December). Ambient intelligence for the networked home environment: Summary. Retrieved from: http://www.hitechprojects.com/euprojects/amigo/ Aso, T. (2005, May). Message from the organizers. Minister of Internal Affairs and Communications, Japan. Tokyo Ubiquitous Network Conference. Retrieved from: http://www.wsis-japan.jp/ministeriac_e.html Auckland City Council. (2005, March). Transport: Parking – Princess Street pay and display trial. Retrieved from: http://www.aucklandcity.govt. nz/auckland/transport/parking/princesst.asp Beltran, F., & Roggendorf, M. (2004a, October). Innovative pricing and charging in nextgeneration wireless networks (pp. 1-4). PING Research Group, ISOM Department, University of Auckland. Beltran, F., & Roggendorf, M. (2004b, December). An incentive-compatible pricing scheme for competitive access to wireless networks (pp. 16). PING Research Group, Dream Project, ISOM Department, University of Auckland. Beltran, F., & Roggendorf, M. (2005). A simulation model for the dynamic allocation of network

233

Basics of Ubiquitous Networking

resources in a competitive wireless scenario. Proceedings of the Second International Workshop, MATA 2005, Montreal, Canada, October 17-19. Lecture Notes in Computer Science 3744, Springer. Brislen, P. (2005, April). RoamAD sells metro WiFi to Perth ISP: Kiwi company transitions from carrier to vendor. Computerworld New Zealand. Retrieved from: http://computerworld.co.nz/news. nsf/UNID2B8B78E695883CAFCC256FE80026 A6D0?OpenDocument&Highlight=2,roamad Drew, Jr., W. (2002, June). Wireless networks: New meaning to ubiquitous computing (p. 1-11). University of New York. ITU [International Telecommunication Union]. (2005a). New initiatives programmes, Feb 2005. Retrieved from: http://www.itu.int/osg/spu/ni/

Kindberg, T., & Fox, A. (2002). System software for ubiquitous computing. IEEE Pervasive Computing, January, 70-81. Kitamura, M. (2002, September). NRI papers: Using ubiquitous networks to create new services based on the commercial and public infrastructure (pp. 1-14). Nomura Research Institute. Langa, F. (2002, August). Langa letter: A reallife GPS road test. InformationWeek. Retrieved from: http://www.informationweek.com/story/ showArticle.jhtml?articleID=6502601&pgno=1 Ministry of Internal Affairs and Communications, Japan. (2005a, May).Towards realisation of ubiquitous networking society. Tokyo Ubiquitous Networking Conference. Retrieved from: http:// www.wsis-japan.jp/about_e.html

ITU [International Telecommunication Union]. (2005b, April). ITU workshop on ubiquitous network societies: The case of the Republic of Korea (pp. 10-45).

Ministry of Internal Affairs and Communications, Japan. (2005b, May). Tokyo Ubiquitous Networking conference: Program (Session 5) Ubiquitous Network Society. Retrieved from: http://www. wsis-japan.jp/session5_e.html

ITU [International Telecommunication Union]. (2005c, April). ITU workshop on ubiquitous network societies: The case of the Japan (pp. 13-45).

Murakami, T. (2004, August). NRI papers: Ubiquitous networking: Business opportunities and strategic issues (pp. 1-24). Nomura Research Institute.

ITU [International Telecommunication Union]. (2005d, April). ITU workshop on ubiquitous network societies: The case of the Italian Republic (pp. 25-50).

Murphy, A. L., Picco, G. P., & Roman, G. C. (2001, May). Time: A middleware for physical and logical mobility. Proceedings of the 21st International Conference on Distributed Computing Systems.

ITU [International Telecommunication Union]. (2005e, April). ITU workshop on ubiquitous network societies: The case of the Republic of Singapore (pp. 21-39).

Nagumo, T. (2002, June). NRI papers: Innovative business models in the era of ubiquitous networks (pp. 1-13). Nomura Research Institute.

Jung, K. U. (2004, December). Community, S&A research group, research group notice board: Ubiquitous campus in Korea. Ubiquitous IT Korea Forum. Retrieved from: http://www.ukoreaforum. or.kr/bbs/view.php?code=c_rg01&page=1&numb er=2&keyfield=&key=

234

Phobe.com. (2003). Yer latin lesson for today: Today’s latin lesson. Retrieved from: http://www. phobe.com/octopusmotor/latin.html Privat, G. (2005, April). Ubiquitous network & smart devices: New telecom services & evolution of human interfaces. ITU Ubiquitous Network

Basics of Ubiquitous Networking

Societies Workshop. Retrieved from: http://www. itu.int/osg/spu/ni/ubiquitous/Presentations/8_ privat_applications.pdf Raghunathan, A., Ravi, S., Hattangady, S., & Quisquater, J. (2003). Securing mobile appliances: New challenges for the system designer. Proceedings of the Design, Automation and Test in Europe Conference and Exhibition. RoamAD. (2005, January). Products & services: Introduction. Retrieved from: http://www.roamad. com/prodservintro.htm Satyanarayanan, M. (1996). Fundamental challenges in mobile computing. Fifteenth ACM Symposium on Principles of Distributed Computing, Philadelphia, PA, May, 7pp. Sharmin, M., Ahmed, S., & Ahamed, S. I. (2006). MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) for mobile devices of computing environments. Proceedings of Third International Conference on Information Technology: New Generation (ITNG 2006), Las Vegas, NE, April, 6 pages. Telecom New Zealand. (2004, June). Product finder: Internet and data, Telecom’s wireless hotspot service. Retrieved from: http://www. telecom.co.nz/content/0,3900,204163-1487,00. html Van Dyke, C., & Koc, C. K. (2003, February). On ubiquitous network security and anomaly detection (pp. 1-5). Electrical & Computer Engineering, Oregon State University. Vodafone New Zealand. (2005, March). Business services: Paying with your mobile – TXT-a-Park. Retrieved from: http://www.vodafone.co.nz/ promos/txt-a-park/txt_a_park.jsp?item=txt_a_ park

Watson, D. (2002, September). Auckland wireless net lures Asians: A firm planning a large wireless network around downtown Auckland is already claiming interest from Asia and the Pacific islands in its distance-boosting technology. Computerworld New Zealand. Retrieved from: http://computerworld.co.nz/news.nsf/UNID/ CC256CED0016AD1ECC256C3C007A6299?O penDocument&Highlight=2,roamad Weatherall, J., & Jones, A. (2002, February). Ubiquitous networks and its applications. IEEE Wireless Communications, 9(1), 18-29. Weiser, M. (1993, July). Some computer science problems in ubiquitous computing. Communications of the ACM, 36(7), 75-84. Wellington City Council. (2005, March). Technology & software, TXT-a-Park. Retrieved from: http://www.wellington.govt.nz/innovation/details/txtapark.html Wikipedia. (2005, May). Article: Ubiquitous computing. Wikipedia: The Free Encyclopaedia. Retrieved from: http://mobileman.projects.supsi. ch/glossary.html Wireless Developer Network. (2002, August). Wireless developer network – Daily news: RoamAD announces 802.11b breakthrough with metropolitan-wide Wi-Fi network. Wireless Developer Network. Retrieved from: http://www. wirelessdevnet.com/news/2002/238/news1.html Yau, S., Wang, Y., & Karim, F. (2002). Development of situation aware application software for ubiquitous computing environments. Computer Software and Application Conference (pp. 233238). Yuhan, A. H. (2003). Ubiquitous computing and its network requirements. Samsung Advanced Institute of Technology. Retrieved from: http:// www.t-engine.org/aucnc2003/yuhan.pdf

235