What is Mobile Cloud Computing? Mobile computing (MC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client.
Why Mobile Computing? Mobile devices face many resource challenges (battery life, storage, bandwidth etc.) Mobile computing offers advantages to users by allowing them to use infrastructure, platforms and software by cloud providers at low cost and elastically in an on-demand fashion. Mobile cloud computing provides mobile users with data storage and processing services in clouds, obviating the need to have a powerful device configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive computing can be performed in the cloud.
MC Popularity According to a recent study by ABI Research, more than 240 million business will use cloud services through mobile devices by 2015. That traction will push the revenue of mobile cloud computing to $5.2 billion. Mobile computing is a highly promising trend for the future of mobile computing.
MC Architecture
MC Architecture Mobile devices are connected to the mobile networks via base stations that establish and control the connections and functional interfaces between the networks and mobile devices. Mobile users’ requests and information are transmitted to the central processors that are connected to servers providing mobile network services. The subscribers’ requests are delivered to a cloud through the Internet. In the cloud, cloud controllers process the requests to provide mobile users with the corresponding cloud services.
Advantages of MC Extending battery lifetime: Computation offloading migrates large computations and complex processing from resource-limited devices (i.e., mobile devices) to resourceful machines (i.e., servers in clouds). Remote application execution can save energy significantly. Many mobile applications take advantages from task migration and remote processing.
Advantages of MC Improving data storage capacity and processing power: MCC enables mobile users to store/access large data on the cloud. MCC helps reduce the running cost for computation intensive applications. Mobile applications are not constrained by storage capacity on the devices because their data now is stored on the cloud.
Advantages of MC Improving reliability and availability: Keeping data and application in the clouds reduces the chance of lost on the mobile devices. MCC can be designed as a comprehensive data security model for both service providers and users: Protect copyrighted digital contents in clouds. Provide security services such as virus scanning, malicious code detection, authentication for mobile users. With data and services in the clouds, then are always(almost) available even when the users are moving.
Advantages of MC Dynamic provisioning: Dynamic on-demand provisioning of resources on a fine-grained, self-service basis No need for advanced reservation Scalability: Mobile applications can be performed and scaled to meet the unpredictable user demands Service providers can easily add and expand a service
Advantages of MC Multi-tenancy: Service providers can share the resources and costs to support a variety of applications and large no. of users. Ease of Integration: Multiple services from different providers can be integrated easily through the cloud and the Internet to meet the users’ demands.
MC Applications Mobile Commerce: M-commerce allows business models for commerce using mobile devices. Examples: Mobile financial, mobile advertising, mobile shopping… M-commerce applications face various challenges (low bandwidth, high complexity of devices, security, …) Integrated with cloud can help address these issues Example: Combining 3G and cloud to increase data processing speed and security level.
MC Applications Mobile Learning: M-learning combines e-learning and mobility Traditional m-learning has limitations on high cost of devices/network, low transmission rate, limited educational resources Cloud-based m-learning can solve these limitations Enhanced communication quality between students and teachers Help learners access remote learning resources A natural environment for collaborative learning
MC Applications Mobile Healthcare: M-healthcare is to minimize the limitations of traditional medical treatment ( eg . Small storage, security/privacy, medical errors, …) M-healthcare provides mobile users with convenient access to resources( eg . medical records) M-healthcare offers hospitals and healthcare organizations a variety of on-demand services on clouds Examples: Comprehensive health monitoring services Intelligent emergency management system Health-aware mobile devices (detect pulse-rate, blood pressure, level of alcohol etc ) Pervasive access to healthcare information Pervasive lifestyle incentive management (to manage healthcare expenses)
MC Applications Mobile Gaming: M-game is a high potential market generating revenues for service providers. Can completely offload game engine requiring large computing resource (e.g., graphic rendering) to the server in the cloud. Offloading can also save energy and increase game playing time ( eg . MAUI allows fine-grained energy-aware offloading of mobile codes to a cloud) Rendering adaptation technique can dynamically adjust the game rendering parameters based on communication constraints and gamers’ demands
MC Applications Assistive technologies: Pedestrian crossing guide for blind and visually-impaired Mobile currency reader for blind and visually impaired Lecture transcription for hearing impaired students Other applications: Sharing photos/videos Keyword-based, voice-based, tag-based searching Monitoring a house, smart home systems …
MC Issues Mobile communication issues: Low bandwidth: One of the biggest issues, because the radio resource for wireless networks is much more scarce than wired networks Service availability: Mobile users may not be able to connect to the cloud to obtain a service due to traffic congestion, network failures, mobile signal strength problems Heterogeneity: Handling wireless connectivity with highly heterogeneous networks to satisfy MCC requirements (always-on connectivity, on-demand scalability, energy efficiency) is a difficult problem
MC Issues Computing issues: Computation offloading: One of the main features of MCC Offloading is not always effective in saving energy It is critical to determine whether to offload and which portions of the service codes to offload Two types: Offloading in a static environment Offloading in a dynamic environment
Computation Offloading Approaches in a Static Environment Kumar and Lu suggest a program partitioning based on estimation of energy consumption before execution Optimal program partitioning for offloading is dynamically calculated based on the trade-off between the communication and computation costs at run time. K. Kumar and Y. Lu, “Cloud Computing for Mobile Users: Can Offloading Computation Save Energy,” IEEE Computer, vol. 43, no. 4, April 2010.
Computation Offloading Approaches in a Static Environment Li et al. present an offloading scheme based on profiling information about computation time and data sharing at the level of procedure calls. A cost graph is constructed and a branch-and-bound algorithm is applied to minimize the total energy consumption of computation and the total data communication cost. Z. Li, C. Wang, and R. Xu , “Computation offloading to save energy on handheld devices: a partition scheme,” in Proc 2001 Intl Conf on Compilers, architecture, and synthesis for embedded systems (CASES), pp. 238-246, Nov 2001.
Computation Offloading Approaches in a Static Environment Chen et al. present an approach to decide which components of Java programs should be offloaded. First divide a Java program into methods and compute execution costs for these methods. Then compare the local execution costs of each method with the estimated remote execution costs to make an optimal execution decision. G. Chen, B. T. Kang, M. Kandermir , N. Vijaykrishnan , M. J. Irwin, and R. Chandranouli , “Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices,” IEEE Transactions on Parallel and Distributed Systems, 15(9):795-806, Sept 2004.
Computation Offloading Approaches in a Static Environment Wang and Li propose a polynomial time algorithm to find an optimal program partition. First partition a program into distributed subprograms by producing a program abstraction. Then, task allocations and data transfer of the abstract memory locations are determined subject to the control and data flow defined over the abstraction. The abstraction is divided into clusters and a heuristic algorithm is applied to find the optimal partition to minimize the execution cost of the program. C. Wang and Z. Li, “A computation offloading scheme on handheld devices,” Journal of Parallel and Distributed Computing, Special issue on middleware, 64(6):740-746. June 2004.
Computation Offloading Approaches in a Static Environment Hunt and Scott present an automatic distributed partitioning system (ADPS) called Coign , which automatically transforms a program into distributed applications without accessing the source codes. Coign constructs a graph model of the application’s inter-component communication through scenario-based profiling to find the best distribution. G. C. Hunt and M. L. Scott, “The Coign automatic distributed partitioning system,” in Proc 3 rd Symposium on Operating systems design and implementation (OSDI), pp. 187-200, Feb 1999.
Computation Offloading Approaches in a Static Environment Xian et al. propose an offloading method which does not require the estimation of execution time. Online statistics of the comp time are used to compute optimal timeout and if the computation is not finished within timeout, it is offloaded to the server. Saves up to 17% more energy than existing methods. C. Xian, Y. H. Lu, and Z. Li, “Adaptive computation offloading for energy conservation on battery-powered systems,” in Intl Conf on Parallel and Distributed Systems, vol. 2, pp. 1, December 2009.
Computation Offloading Issues in a Dynamic Environment Offloading in a dynamic network environment (e.g., changing connection status and bandwidth) is harder. Environment changes can cause additional problems. The transmitted data may not reach the destination The data executed on the server could be lost when it has to be returned to the sender.
Computation Offloading Approaches in a Dynamic Environment Ou et al. analyze offloading systems in wireless environments They consider three circumstances of executing an application to estimate the efficiency of offloading. performed locally (without offloading) performed in ideal offloading systems (without failures) performed with the presence of offloading and failure recoveries (re-offload after failure) S. Ou , K. Yang, A. Liotta , and L. Hu. “Performance Analysis of Offloading Systems in Mobile Wireless Environments,” in Proc IEEE Intl Conf on Communications (ICC), pp. 1821, August 2007.
Computation Offloading Approaches in a Dynamic Environment Chun and Maniatis present a system to partition an application in three steps: application structuring, partitioning choice, and security. Programs are structured to be seamlessly and dynamically executed between mobile and cloud. The application decides what modules to run at the client and at the server dynamically at a runtime. The system will choose a suitable partitioning policy so that the total energy consumption is minimized. Modules containing sensitive data will be executed locally. B-G. Chun and P. Maniatis , “Dynamically partitioning applications between weak devices and clouds,” in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (MCS), no. 7, June 2010.
Computation Offloading Approaches in a Dynamic Environment MAUI is an architecture to dynamically partition an application at a runtime in three steps. First, use code portability to create two versions of a mobile application (for mobile device and cloud). Second, use programing reflection to identify which methods are marked ‘ remoteable ’ or not and type safety to extract only the program state needed by the ‘ remoteable ’ methods. Then, send the necessary program state to the cloud. E. Cuervo , A. Balasubramanian , Dae-ki Cho, A. Wolman, S. Saroiu , R. Chandra, and P. Bahl , “MAUI: Making Smartphones Last Longer with Code offload,” in Proc 8th Intl Conf on Mobile Systems, Applications, and Services, pp. 49-62, June 2010.
Computation Offloading Approaches in a Dynamic Environment Angin and Bhargava propose a computation offloading framework based on mobile agents. During installation of the mobile application on the device, it is partitioned by the application partitioner component. When the user launches the application, the offloading manager component of the framework first contacts a cloud registry to locate virtual machine instances in the cloud to offload application partitions to. Then these application partitions are packaged in mobile agents and sent over the network to the selected instances to start running, and the application task is completed with agent collaboration without further management by the mobile platform. P. Angin , B. Bhargava . “An Agent-based optimization framework for mobile-cloud computing,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 4, no. 2, 2013.
MC Security Issues Protecting user privacy and data/application secrecy from adversaries is key to establish and maintain consumers’ trust in the mobile platform, especially in MCC. MCC security issues have two main categories: Security for mobile users Securing data on clouds
Security for Mobile Users Mobile devices are exposed to numerous security threats like malicious codes and their vulnerability. GPS can cause privacy issues for subscribers. Security for mobile applications: Installing and running security software are the simplest ways to detect security threats. Mobile devices are resource constrained, protecting them from the threats is more difficult than that for resourceful devices.
Mobile User Security Approaches Oberheide et al. present an approach to move the threat detection capabilities to clouds. An extension of the CloudAV platform consisting of host agent and network service components. Host agent runs on mobile devices to inspect the file activity on a system. If an identified file is not available in a cache of previous analyzed files, this file will be sent to the incloud network service for verification. The second major component of CloudAV is a network service that is responsible for file verification J. Oberheide , K. Veeraraghavan , E. Cooke, J. Flinn , and F. Jahanian . “Virtualized in-cloud security services for mobile devices,” in Proc 1st Workshop on Virtualization in Mobile Computing ( MobiVirt ), pp. 31-35, June 2008.
Mobile User Security Approaches Portokalidis et al. present a paradigm in which attack detection for a smartphone is performed on a remote server in the cloud. The smartphone records only a minimal execution trace, and transmits it to the security server in the cloud. G. Portokalidis , P. Homburg, K. Anagnostakis , and H. Bos , “Paranoid Android: versatile protection for smartphones,” in Proc 26th Annual Computer Security Application Conference (ACSAC), pp. 347-356, September 2010.
Privacy Issues in MC Location based services (LBS) faces a privacy issue on mobile users’ provide private information such as their current location. This problem becomes even worse if an adversary knows user’s important information.
Privacy Issues in MC Zhangwei and Mingjun propose the location trusted server (LTS) approach. After receiving mobile users’ requests, LTS gathers their location information and cloaks the information called “cloaked region” to conceal user’s information. The “cloaked region” is sent to LBS, so LBS knows only general information about the users but cannot identify them. H. Zhangwei and X. Mingjun , “A Distributed Spatial Cloaking Protocol for Location Privacy,” in Proc 2nd Intl Conf on Networks Security Wireless Communications and Trusted Computing (NSWCTC), vol. 2, pp. 468, June 2010.
Context-aware Mobile Cloud Services It is important to fulfill mobile users’ satisfaction by monitoring their preferences and providing appropriate services to each of the users. Context-aware mobile cloud services try to utilize the local contexts (e.g., data types, network status, device environments, and user preferences) to improve the quality of service ( QoS ).
Mobile Service Clouds Samimi et al. build the Mobile Service Cloud model. When a customer uses a service, the request firstly goes to a service gateway which will choose an appropriate primary proxy to meet the requirements and then sends the result to the user. In disconnection, MSCs will establish transient proxies for mobile devices to monitor the service path, and support dynamic reconfiguration. The model addresses the disconnection issue and can maintain the QoS at an acceptable level. F. A. Samimi , P. K. Mckinley , and S. M. Sadjadi , “Mobile Service Clouds: A Self-Managing Infrastructure for Autonomic Mobile Computing Services,” in Proceedings of the 2nd International Workshop on Self-Managed Networks, Systems & Services ( SelfMan ), vol. 3996, pp. 130-141, 2006.
Context-aware Mobile Cloud Services La and Kim propose an algorithm to choose a context-aware adapter. The algorithm first determines the gaps occurring in the given contexts. A gap is defined as a result of context changes. Then, the algorithm determines a cause of predefined gaps before saving the current states of the service invocation for disconnection. For each identified gap, this algorithm will choose an appropriate adapter for the mobile user. H. H. La and S. D. Kim, “A Conceptual Framework for Provisioning Context-aware Mobile Cloud Services,” in Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD), pp. 466, August 2010.
Open Issues in MC Network Access Management: An efficient network access management not only improves link performance but also optimizes bandwidth usage. Cognitive radio can be expected as a solution to achieve the wireless access management. Can automatically changes its transmission or reception parameters, in a way where the wireless communications can have spectrum agility in terms of selecting available wireless channels opportunistically. Integrated with MCC for better spectrum utilization
Open Issues in MC Quality of Service: How to ensure QoS is still a big issue, especially on network delay. CloneCloud and Cloudlets are expected to reduce the network delay. CloneCloud uses nearby computers or data centers to increase the speed of smart phone applications. The idea is to clone the entire set of data and applications from the smartphone onto the cloud and to selectively execute some operations on the clones, reintegrating the results back into the smartphone.
Open Issues in MC Quality of Service: A cloudlet is a trusted, resource-rich computer or cluster of computers which is well-connected to the Internet and available for use by nearby mobile devices with on one-hop wireless connection. Mobile users may meet the demand for real-time interactive response by low-latency, one-hop, high-bandwidth wireless access to the cloudlet. Can help mobile users overcome the limits of cloud computing as WAN latency and low bandwidth.
Open Issues in MC Pricing: MC involves with both mobile service provider (MSP) and cloud service provider (CSP) with different services management, customers management, methods of payment and prices. This will lead to many issues. The business model including pricing and revenue sharing has to be carefully developed for MCC.
Open Issues in MC Standard Interface: Interoperability becomes an important issue when mobile users need to interact with the cloud. Web interfaces may not be the best option. It is not specifically designed for mobile devices. May have more overhead. Compatibility among devices for web interface could be an issue. Standard protocol, signaling, and interface for interacting between mobile users and cloud would be required. (HTML5 & CSS3)
Open Issues in MC Service Convergence: Services will be differentiated according to the types, cost, availability and quality. A single cloud may not be enough to meet mobile user’s demands. New scheme is needed in which the mobile users can utilize multiple cloud in a unified fashion. The scheme should be able to automatically discover and compose services for user. Sky computing is a model where resources from multiple clouds providers are leveraged to create a large scale distributed infrastructure. The mobile sky computing will enable providers to support a cross-cloud communication and enable users to implement mobile services and applications. Service integration (i.e., convergence) would need to be explored.
Necessity of Green ICT To deal with global warming by either reducing greenhouse gas emissions or in the alternative its potential harmful effects on the planet.
The global ICT industry accounts for approximately 2 percent of global carbon dioxide (CO2) emissions, a figure equivalent to aviation“. Did You Know…….. 18% of office workers never switch off their PC at night or weekends, and a further 13% leave it on some nights each week,
Did You Know…….. A photocopier which is left switched on overnight needs the same amount of energy as it does to make 1500 photocopies. With the fast growth of ICT application, the total electricity consumption of ICT and other consumer electronics worldwide is predicted to double by 2022. Switching off: Office workers never switch off their PC at night or weekends and a further 13% leave it on some nights each week, producing about 700,000 tonnes of CO2 emissions
Greener Computer use
1 Turn off your computer sets when not in use – as this will save energy. Tips for Greener Computer use 2 Avoid using screen savers because it does not reduce energy use. 3 Configure your printer settings to economy mode as this will save ink and energy
4 Reuse and repair ICT equipment before replacing. 5 Choose dark backgrounds for your screen display—bright-colored displays consume more power. Tips for Greener Computer use
6 Use LCD monitors instead of CRT as they provide up to 70% power savings. The smaller the size of a LCD monitor, the lesser the energy it consumes. 7 Purchase an Energy Star–compliant computer. Note that laptop use much less energy than desktops. 8 Buy multi-functional equipments for tasks such as printing, faxing, copying and scanning as multi-functional equipments save up to 50% in space and 20% in energy. 9 Buy inks which are made from renewable resources (e.g. vegetable and non-petroleum products), as it uses less dangerous solvents, and also produce brighter, cleaner colors. 10 Consider switching to thin client machines and notebooks as these equipments use less energy than desktop PCs. Tips for Greener Computer use
11 Read and review documents and e-mails on screen instead of printing on papers 12 Use double-sided printing functionality of your printer to save paper and energy. Tips for Greener Computer use
Top 10 Ways to Reduce Power Consumption of PCs 13) Turn down the brightness setting on your monitor. The brightest setting on a monitor can consume twice the power used by the dimmest setting. Note that on most laptop computers, the display is the single largest consumer of energy.
ICT Concepts & Characteristics
What is Computer ? Computer is an electronic device. Can store large amounts of data. Can performing operations on data. Performing given function on the data & displays the result as output. Process data whenever needed. Known from ‘to compute’
What is Process? Computer works on data as per programme is called process. Processing means operations like….. Calculations, Logical decision making, Outputting data, Communicating with others computer etc.
Characteristics Speed Arithmetical and Logical Operations Accuracy Reliability Storage Retrieving Data and Programme Automation Versatility (Flexible) Consistency Communications
Applications of Computer Science research Education Business applications Banking Office Automation Desktop publishing Management aids Engineering designing Road traffic control Railway Medicine Information services
What is Internet Inter connection of many computers via net work. Global connected through network (through LAN or WAN) To provide the various application services i.e. E-Mail, Usenet (News), WWW, Telnet, FTP, etc
Uses of Internet Searching E-mail service Commercial Services Electronic books & Publication Video Conferencing Sharing data and results quickly Retrieving files & Program of all types Find information databases and tutorials News paper columns Banking Downloading / Uploading any information News, sports, stocks, music etc. Use of internet in various fields like education, Business, governance, etc. And many more ………………..
Internet as a ICT tools
What is ICT? During last decade of twentieth century there was extraordinary development in information and communication technology (ICT) which led to a transmutation of processes and practices in almost all aspects of human activities. Information and communication technologies (ICTs) are the technologies used in the conveying, manipulation and storage of data by electronic means. 62
Information and Communication Technologies Information is data that has been sorted and arranged. It consists of organized facts and opinions people receive during daily life. Changing data into information is called data processing or information processing. It involves gathering, organizing, and reporting data so it is useful to people. It is often done using information technology.
ICT Tools Radio, television, video, DVD, telephone (fixed line & mobile), satellite systems, computer and network hardware and software; (equipment and services associated with these technologies, such as videoconferencing and electronic mail.) , blogs 64 Blackboard OHP, Phone, Pager TV/VHS, Wireless Phone LCD, PC Whiteboard, Interactive Panel Forums Search Engine, Blogs, e-Groups
Information and Communication Technologies People often use the terms information and communication together. These terms are related, but each means something different. Two words we need to know to understand communication technology are data and information. Data includes individual facts, statistics (numerical data), and ideas. These facts and ideas are not sorted or arranged in any manner.
What is Communication? Communication is simply the act of transferring information from one place to another. Exchanging Information from computer to another computer The classic communication system is made up of an information source, an encoder, a transmitter, a receiver, a decoder, storage, retrieval, and an information destination.
Synchronous Communication Online Chat Text based Audio based Video based Mobile Technology Conferencing Phone Satellite Television channel Video Conferencing 67
Asynchronous Communication Discussion Forums Blogs e-Groups Wikepedia (Knowledge base) Google (search engine) Mobile SMS, MMS & Podcasting 68
Scope of Internet as a ICT Education Research Communication Leisure and Entertainment Exploring the world Finance Shopping And many more …. 69
Scope of Internet as a ICT in Education ICT as a tool to innovate teaching-learning practice via Internet (i.e. digital content, multimedia, teaching-learning methods, learning environment) ICT as an administrative tool (i.e. education management information systems (EMIS) ICT as an expanding learning opportunity (i.e. distance learning, e-Learning) ICT as a facilitator of higher-order thinking skills (i.e. learner-centered, self-directed learning, tailored learning) 70
Traditional v/s Internet based ICT education Approach 71 Traditional Classroom ICT In Education Classroom Physical – limited size Synchronous Unlimited Anytime, anywhere Content PowerPoint / transparency / etc Textbooks / library Video Multimedia / simulation Digital library On demand Syn & Asyn . Communication Personalisation One learning path Learning path and pace determined by learner
Psychology of using Teaching Aids which include ICTs Hear is an effective saying I hear, I forget : Verbal description only are not enough for learners to remember and understand. Visualization of objects especially in science and technology is important I see, I remember: Knowledge that is gained through the site is more colorful, accurate and permanent. It is said that 80% of our knowledge is gained through our eyes.
ICT can help learning Develop understanding Speed and automatic functions of ICT can enable teachers to demonstrate, explore or explain aspects of their teaching, and students learning, more effectively e.g. use of a spread sheet to perform calculations in order that patterns can be concentrated on rather than the calculating .
ICT can help learning Extend access to sources the capacity and range of ICT can enable teachers and students to gain access to historical, recent or immediate information, through, for example, accessing information on CD-ROM or the Internet Enhance enquiry skills search for and compare information from different sources
ICT can help learning Enhance the communication of ideas communicate with other people, locally and over distances, easily and effectively present information in ways which are accessible in different forms for different audiences.
Does ICT increase access to learning opportunity? Education opportunities in dispersed locations where conventional schools are not viable; A choice to students and parents of what they want to learn i.e. Choice based credit system (CBCS); A safety net for school drop-outs so they do not lapse into illiteracy; Alternative venue to schools. Second chance education. Standardised curriculum materials Lifelong learning concept Limiting fraud in assessment process 76
Internet based ICT in Agriculture using web applications There are many web sites available for getting information regarding agricultural products. One of them is “Soil Health Card” a 12th National e-governance award winner. It reflects soil testing report (Current composition of soil) and provides information about which crops farmers should cultivate and which manure should be applied in what proportion. Agmarknet ( Digital Mandi for Indian Kisan –by IIT, Kanpur ) www.kissankerala.net and Many more … 77
Green ICT Green ICT refers to an approach in reducing the energy and other resources consumed and the emissions and other waste produced across the ICT lifecycle – from manufacture, procurement and use of ICT in an organisation to its re-use and aims to improve environmental sustainability of organisations. Specifically, Green ICT as applied to the use of ICT resources aims to: Reduce energy consumption and CO2 emissions during ICT use -Reduce environmental impact of disposal of ICT waste products In addition to the above, Green ICT also explores how ICT applications can be used to help other sectors conserve and optimise energy usage. 78
Steps towards Green ICT Reducing Power Consumption of ICT equipments. Going Paperless Buying Energy-efficient ICT equipments Disposal, Re-use and Recycling ICT Equipments Server Optimisation and Virtualisation Indirect ICT Savings Tele Conferencing Web Conferencing Video Conferencing 79
Our Commitment Accelerating Our Daily life activities by Convergence of Technologies & Sharing of Experiences and Resources. Green ICT can reduce costs and the negative impact on the environment, making being green good for all businesses 80
Useful Keys Internet Network: Connecting computers with each other For exchanging information Client : It is a programme or computer for getting special information from another compute. Server: It is a programme or computer, which gives information to the client computer. Protocol: It’s a rules for connecting to the internet. (TCP/IP) Portal: It is a website. Known as a gateway of internet. (Search engine) 02/08/2022 81
Router: It is a device, which decides where data will be send (Network point) www : World Wide Web Browser: It is a programme which helps us to use internet Website: Group of different web pages. URL : Universal Resource Locator
.com : Commercial organization .net : Large Networks .gov : Government organization .org : non-profit making organization .edu : educational organization .mil : military organization .in : India .au : Australia .us : United States .uk : United Kingdom Types of Website (Domain)
References Le Guan, Xu Ke , Meina Song, and Junde Song, “A Survey of Research on Mobile Cloud Computing”, IEEE/ACIS 10th International Conference on Computer and Information Science (ICIS), 2010, pp. 387-392. Xiaopeng Fan, Jiannong Cao, and Haixia Mao. “A Survey of Mobile Cloud Computing,” ZTE Communications, 9(1):4-8, Mar 2011. Hoang T. Dinh , Chonho Lee, Dusit Niyato , and Ping Wang. “A survey of Mobile Cloud Computing: Architecture, Applications, and Approaches”, Wireless Communication and Mobile Computing. http:// www.csie.ndhu.edu.tw /~ showyang /MCloud2012/04MobileCloudSurvey.pdf Chetan S., Gautam Kumar, K. Dinesh, Mathew K. and Abhimanyu M.A., “Cloud Computing for Mobile World,” 2010. ( http://chetan.ueuo.com/projects/CCMW.pdf )