Module1 Mobile Computing Architecture

raksharao 8,494 views 58 slides Dec 07, 2015
Slide 1
Slide 1 of 58
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58

About This Presentation

Three Tier Architecture, Design Consideration for Mobile Computing, Architecture of Mobile Computing


Slide Content

Client layers of the
optical layer
Module 1
1

Architecture for mobile computing
ThefirstlayerisUserInterfaceorPresentationTier.
Dealswithuserfacingdevicehandlingandrendering
Includesausersysteminterfacewhereuserservicesreside
SecondtieristheProcessManagementorApplicationTier.
Herebusinesslogicandrulesareexecuted.
Capableofaccommodatinghundredsofusers
Controlstransactions
Asynchronousqueuingtoensurereliablecompletionoftransactions.
ThirdtierisDatabaseManagementorDataTier
Fordatabaseaccessanddesign
Providesincreasedperformance,flexibility,maintainability,reusabilityandscalability,
whilehidingthecomplexityofdistributedprocessingfromtheuser
2

Three-tier architecture for mobile
computing
3

Three-tier architecture (in detail)
Tohaveuniversalaccess,theserverisconnectedtoa
ubiquitousnetworklikeinternet.
Tohaveaccesswithnetwork,anapplicationcalledweb
browserisrequiredsuchasInternetexplorer,Mozillaetc
Threelayers
PresentationTier(Tier1)
ApplicationTier(Tier2)
DataTier(Tier3)
4

The mobile
computing
architecture
5

Presentation Tier (Tier 1)
Firsttier
Layerofagentsapplicationsandsystems.
Applicationsrunontheclientdeviceandofferalltheuser
interfaces.
Responsibleforpresentingtheinformationtotheenduser.
Humansuseaudioandvideotoreceiveinformationfromthe
machine
Informationisgiventothesystemfromkeyboard(computer,
laptop,cellphones),pen(tablet,palmtop)etc
Itincludeswebbrowsers
6

Application Tier (Tier 2)
Consideredasengineoftheapplication
Performsthebusinesslogicoftheprocessinginput,obtainingdataand
makingdecisions.
IncludestechnologieslikeCGIs,Java,JSP,.NETservices,PHPetc.deployed
inproductssuchasApache,Websphereetc.
Tierispresentationanddatabaseindependent.
Operationssuchasnetworkmanagement,securityareperformedusinga
middlewaresoftware
Middlewareisdefinedasalayerofsoftware,whichsitsinbetweenthe
operatingsystemanduserfacingsoftware.
Canalsobedefinedasasoftwaregatewayconnectingtwoindependentopen
objects.
7

Middleware categories
Message-orientedMiddleware(MOM)
Transactionprocessing(TP)Middleware
DatabaseMiddleware
CommunicationMiddleware
DistributedObjectandComponents
TranscodingMiddleware
InternetContentAdaptionprotocol(ICAP)
Webservices
8

Message-oriented Middleware (MOM)
Itconnectsdifferentapplicationsthroughasynchronousexchangeofmessages.
Worksoveranetworkedenvironmentwithoutknowingwhatplatformor
processortheotherapplicationisresidenton.
Themessagecancontainformatteddata,requestsforactionsorunsolicited
response.
Providesamessagequeuebetweenanytwointeroperatingapplications.
Ifthedestinationprocessisbusy,thenmessageisheldintemporarystorage
untilitisprocessed.
9

Itisasynchronous,peertopeer,worksin
Publish/Subscribefashion.
Inthismode,oneormoreobjectssubscribetoanevent.
Aseventoccursitwillbepublishedbythelooselycoupled
asynchronousobject.
MOMwillnotifyaboutthisevent,Isappropriateforevent
drivenapplications
Eg:MessageQueuefromIBMknownasMQseries
10

Transaction Processing (TP) middleware
Itprovidestoolsandenvironmentfordevelopingtransactionbaseddistributed
applications.
Inputsthedataintoasystematpointofinformationsourceandoutputthe
dataatinformationsink.
Usedindatamanagement,networkaccess,securitysystems,deliveryorder
processing,airlinereservations,customerserviceetc
Capableofprovidingservicestothousandsofclientsinadistributedclient/
serverenvironment.
11

Includesfeaturessuchasrestartingfailedprocess,
dynamicloadbalancingandensuringconsistencyofdata.
Independentofdatabasearchitecture.
Itoptimisestheuseofresourcesbymultiplexingmany
clientfunctionsontomuchsmallersetofapplication
serviceroutines.
Eg:MVC
12

Transaction processing middleware
13

Model view controller MVC
JavausesMVCarchitecture,whichisanexampleofTPmiddleware
Itsplitsapplicationintoseparatelayersi.e.presentation,domainlogicand
dataaccess.
Model
domainspecificrepresentationoftheinformationonwhichtheapplicationoperates.
Domainlogicmanipulatesandaddsthemeaningtotherawdata
View
Responsibleforrenderingthemodelintoaformsuitableforinteractionandunderstoodby
theuser
Controller
Managestheprocessandrespondstoevents,typicallyuseractions,mayinvokechangesin
themodel
14

Communication middleware
Similartoconnectingoneapplicationtoanotherwiththe
helpoftelnet
Usedintelecommunicationworld
Userinterfaceisthroughtelnet
Amediationserverautomatesthetelnetprotocolto
communicatewiththesenodesinthenetwork.
Eg:TN5250,TN3270
15

Distributed Object and Components
Eg:CORBA(CommonObjectRequestBrokerArchitecture)
Opendistributedcomputinginfrastructurebeingstandardized
byobjectmanagementgroup.
Isvendor–independentinfrastructure.
CORBAbasedprogramfromanyvendoronalmostanycomputer,
operatingsystem,programminglanguageandnetworkcan
interoperatewithaCORBAbasedprogramfromsameor
anothervendor
Handleslargenumberofclientsathighrateswithhigh
reliability.
16

Transcoding Middleware
Usedtotranscodeoneformatofdatatoanothertosuitthe
needoftheclient.
Toaccesswebpagesonphone,theHTMLpagesaretranscoded
intoWMLpagessothatmobilephonecanaccessit.
Itisusedforcontentadaptationtofittheneedofthedevice.
Contentadaptationisalsorequiredtomeetthenetwork
bandwidth.
Contentadaptationisdonethroughproprietaryprotocols
17

Internet Content Adaptation Protocol
(ICAP)
Contentspresentintheinternetisaccessedfromdifferent
agentsanddevices.
Isaprotocolaimedatprovidingsimpleobjectbasedcontent
vectoringforHTTPservices.
LightweightprotocoltodotranscodingonHTTPmessages.
AllowsICAPclientstopassHTTPmessagestoICAPserversfor
somesortoftransformation.
Theserversendsbackthetransformedmessagesbacktoits
clients.
Beforedocumentisdisplayedfortheagent,itischeckedvirus.
18

Typical data flow in ICAP environment
19

Steps performed
TheuseragentmakesarequesttoanICAPclientforanobject
onanobjectserver.
TheclientsendstherequesttotheICAPserver
TheICAPserverexecutestheICAPresourceserviceonthe
requestandsendsthepossiblymodifiedrequestoraresponse
totherequestICAPclient
Theclientsendstherequest,possiblydifferentfromthe
originalclient’srequesttotheoriginalserver.
Theoriginserverrespondstotherequest
TheICAPclientsendsthereplytotheclient.
20

Services provided by ICAP servers
Viruscheckingfortherequestedcontent
ContentfilteringbasedonthesensorratinglikePG(
parentalguidance),R(Restricted)
Localrealtimeadvertisementinsertionliketelevision
Wirelessprotocoltranslation
Imagemagnificationforelderly
Peertopeercompression
Encryptionofdataandmanymore.
21

Web services
Itprovidesastandardmeansofcommunicationandinformationexchangeamong
differentsoftwareapplications,runningonavarietyofplatformsorframeworks.
IsasoftwaresystemidentifiedbyURLwhosepublicinterfacesandbindingsare
definedusingXML
Thebasicarchitectureincludeswebservicetechnologiescapableof:
Exchangingmessages
Describingwebservices
Publishinganddiscoveringwebservicedescriptions.
Webservicesarchitecturedefinesthestandardforexchangeofmessages
betweentheservicerequesterandserviceprovider.
22

Serviceprovidersareresponsibleforpublishinga
descriptionoftheservicestheyprovide
Requestersmustbeabletofindanddiscoverdescriptions
oftheservices.
Softwareagentsinthebasicarchitecturecantakeonone
orallofthefollowing:
Servicerequester:requeststheexecutionofthewebservice
Serviceprovider:processesawebservicerequest
Discoveryagency:agencythroughwhichawebservicedescription
ispublishedandmadediscoverable.
23

Data (Tier 3)
Usedtostoredataneededbytheapplicationandactsas
repositoryforbothtemporaryandpermanentdata.
Thedatacanbestoredinanyformofdatastoreor
database.
DatacanbestoredinXMLformatforinteroperabilitywith
othersystemsanddatasources.
24

Database Middleware
Databaseindependencehelpsinmaintenanceofthesystembetter.
Allowsthebusinesslogictobeindependentandtransparentofthedatabase
technologyandthedatabasevendor.
Runsbetweentheapplicationprogramandthedatabase.
Alsocalledasdatabaseconnectorsaswell.
Eg:ODBC,JDBC
Withthehelpofthesemiddleware's,theapplicationwillbeabletoaccess
datafromanydatasource.
Datasourcescanbetextfiles,flatfiles,spreadsheetsornetwork,relational
,indexed,hierarchical,XMLdatabaseetc.
25

SyncML
Isaprotocolisanemergingstandardforsynchronizationofdataaccessform
differentnodes.
Newindustryinitiativetodevelopandpromoteasinglecommondata
synchronizationprotocolthatcanbeusedindustrywide.
Supportsthenamingandidentificationofrecordsandcommonprotocol
commandstosynchronizelocalandnetworkdata.
Supportsidentificationandresolutionofsynchronizationconflicts.
Itworksoverallnetworksusedbymobiledevicesbothwirelessandwireline.
26

Design consideration for mobile
computing
Thetermcontextmeans,alltheinformationthathelpsdeterminethestateofan
objectoractor
Itcanbeaperson,device,aplace,aphysicalorcomputationalobject.
Contentwithcontextawareness
Buildeachapplicationwithcontextawareness
Therearedifferentservicesfordifferentclientcontext
Bankprovidingservicesoninternet,formobilephonesandPDA
HavedifferentURLforeachtypeofdevice
Contentswitchoncontext
Providesadaptationofcontentwithinservice
Transparenttotheclient
Hereserviceisthesameforinternet,PDAandWAP
AllaccessthebanksitefromsameURL
27

Contenttranscodingoncontext
Performstheadaptationofcontentbasedonthecontextand
behaviourofthedevice
Transparentfortheclientandtheapplication
Middlewareisusedtoperformalltheoperation
MiddlewareisintelligenttoconvertfromHTMLtoXMLorvice
versaasneedoccurs.
28

Client Context Manager
29

Identityinformation
Thedevicewillbeinapositiontocommunicateitsidentitywithoutanyambiguity
Spatialinformation
Informationrelatedtosurroundingspacei.e.location,orientation,speed,elevationand
acceleration
Temporalinformation
Informationrelatedtotimesuchastimeofday,date,timezone,seasonoftheyear
Environmentalinformation
Relatedtoenvironmentsurroundingssuchastemperature,airquality,moistureetc
Socialinformation
Relatedtosocialenvironmentsuchaswhoiswithyou,peoplenearby,whethertheuser
isinthemeetingorparty.
30

Resourcethatarenearby
Relatestotheresourcesaccessiblenearbysuchasdevices,hostsorinformationsinks.
Availabilityofresources
Informationaboutthedeviceinusesuchasbatterypower,processingpower,displayetc
Physiologicalmeasurements
Relatestophysiologicalstateoftheusersuchasbloodpressure,heartrate,respirationrate
,toneofvoice
Activity
Relatestotheactivityoftheusersuchastalking,reading,walkingandrunning.
Schedulesandagendas
Relatestotheschedulesandagendasoftheuser. 31

Asystemiscontextawareofitcanextract,interpretandusecontextrelated
informationtoadaptitsfunctionalitytothecurrentcontext.
Threeaspectsofthecontextmanagement
Contextsensing
Thewayinwhichtheinformationisobtained
Contextrepresentation
Thewayinwhichthecontextinformationisstoredandtranscoded.
Contextinterpretation
Thewayinwhichthemeaningisobtainedfromthecontextrepresentation.
W3Cproposedastandardforcontextinformation,i.e.CompositeCapabilities/Preference
Profiles(CP/PP)
32

Composite capabilities/ Preference
Profiles (CC/PP)
ProposedbyW3C
ModelisbasedonRDF(ResourceDescriptionFramework)and
canbeserializedusingXML.
Containsanumberofattributenamesandassociatedvalues
thatareusedbyanapplicationtodeterminetheappropriate
formaresourcetodelivertoaclient.
Helpaclient/proxytodescribetheircapabilitiestoanorigin
serverorothersenderofresourcedata.
Firdifferentapplicationtointeroperate,somecommon
vocabularyisneeded.
33

Steps are
Devicesendsserializedprofilemodelwithrequestforcontent
OriginserverreceivesserializedRDFprofileandconvertsitinto
anin-memorymodel
Theprofilefortherequesteddocumentisretrievedandin-
memorymodeliscreated.
Thedeviceprofilemodelismatchedagainstthedocument
profilemodel
Asuitablerepresentationofthedocumentischosen.
Documentisreturnedtodeviceandpresented.
34

The simplest use of CC/PP
35

Policy Manager
Responsibleforcontrollingpoliciesrelatedtomobility
Apolicyissetofrules,theserulesneedtobefollowedunderdifferent
conditions.
Whenmobilityisconsidered,theinformationwillbevisiblefromoutsidethe
fourwallsoftheenterprise.
Organizationswillhavepoliciesregardingthedisclosureoftheinformation.
Eg:certaindocumentscanbeviewedonlyattheofficeofCEO
Thesekindsofpoliciesmustbetransferabletomobilecomputingpolicy
manager.
Itwillbeabletodefinepolicyforthedocumentsandassignrolestousers.
Eachrolewillhavepermission,prohibition,obligationsassociatedwithit.
Policymanagerwillhaverightstoread,writeandexecute
36

Semantic Web
Howtomakemachinesunderstandpoliciesandmakethem
behaveintheexpectedfashion?
Semanticwebaddressesthisneed
Dataisdefinedinthewebandlinkedinsuchawaythatitcan
beusedbythemachinenotforjustdisplay,butforthe
automation.Security,filtering,integrationandreuseofdata
acrossvariousapplications.
ItisgenerallybuiltonsyntaxeswhichuseURLstorepresent
data,usuallytuplebasedstructures.
ThesesyntaxiscalledResourceDescriptionFramework(RDF)
syntaxes.
37

Security manager
Providesaconnectionbetweentheclientdeviceandtheoriginserver.
Securitymanagerwillensuresecuritywithrespectto
Confidentiality:
Themessagetransactedneedstobeconfidential
Nobodyshouldbeabletoseeit.
Managedbyencryptioneg:AES
Integrity
Themessagetransactedneedstobetamper-resistant
Nobodyshouldbeabletochangeanypartofthemessage
Managedusingvarioushashingalgorithms
38

Availability
Thesystemwillbeavailable
Nobodywillbeabletostoptheservice
Non-repudiation
Usersofthesystemcanbeidentified
Nobodyafterusingwillclaimotherwise
Managedbydigitalsignatures
Trust
Therearecomplexissuesofknowingwhatresources,servicesoragentsto
trust.
Thesystemwillbetrusted.
39

Platform for privacy preference project
(P3P)
IsanemergingstandarddefinedbyW3C
Enableswebsitestoexpresstheirprivacypracticesinstandardized
formatsothattheycanberetrievedandinterpretedasuseragents.
WithP3P,usersneednotreadtheprivacypoliciestheyvisit
Insteadkeyinformationaboutthecontentofthewebisconveyedto
theuser
ThegoalofP3Pistoincreasetheusertrustandconfidenceinthe
web.
Thisinformstheprivacypoliciesaboutthesite,hencemakestheuser
todecidewhethertoreleasepersonalinformationornot.
40

Adaptability Manager
Responsibleforadaptingcontent,behaviourandother
aspectsacc.tothecontextandpolicy
Maytakeanynumberofactionsdependingonthe
informationpassedtothecontextmanager
Mostcommonactionperformedistranscodingofthe
contentsothatitmaybeviewedonaparticulardevice
Appendinglocation-specificinformationtothedocument.
41

Content adaption and transcoding
Contentadaptationcanbedoneateithercontentlevelinserverend
ortheagentlevelinclientdevice
Canbedoneinintermediatelevelinamiddlewareframework.
Contentadaptationneedstoconsiderthefollowingattributes:
Physicalcapabilitiesofthedevice
Screensize,widthandheightinpixels,color
Logicalcapabilitiesofthedevice
Displayimage,audio,video
Effectivenetworkbandwidth
Payload
Thetotalamountofbitscanbedeliveredtotheagentforstaticparts.
42

Types of transcoding
Spatial
Transcodinginspaceordimension
Astandardframeisdownscaledandreduced.
Theframeischangedfromonesizetodifferentsizetosuitthetargetdevice
Temporal
Reductionofnumberofframesontimescale
Downscalestheno.oftransferredframestosuitthetargetdeviceand
networkbandwidth
Code
Usedtochangethecodingstandardfromonetoanother
Eg:transcodingBMPcodeintoWBMPforwirelessdevices
43

Types of transcoding
Color
Requestedformonochromeclients
Useslesspixelsandreducesbandwidthconsumption
Modifiestheperceptionoftheimage
Objectorsemantic
Comprisesvarioustechniquesbasedonthecomputervision
techniques
Extractsthevaluableobjectfromthescene,transferthemwith
loweramountofcompressioninordertomaintainthebothdetails
andspeed.
44

Serversideadaptation,resourcerequirementsare
Staticcontentsizeinbits
Displaysizesuchasheight,widthandarea
Streamingbit-rate
Colorrequirements
Compressionformat
Hardwarerequirementsuchasdisplayforimages,supportfor
audioandvideo
45

Transcoding done through middleware
Benefitofthemiddlewareapproachisitistotally
transparenttothedeviceandcontent
Drawbackis
Contentprovidershavenocontroloverhowtheircontentwill
appeartodifferentclients
Theremaybelegalissueslikecopyright
Htmltagsprovidesformattinginformationratherthansemantic
information
Transcodingofvideosandaudioisnoteasy
Developingageneralpurposetranscodingengineisverydifficult.
46

Content Rating and Filtering
W3ChasproposedastandardcalledPICS(PlatformforInternetContentSelection)
forratingofthewebcontent
Filteringofthecontenttakesplacebasedonthisrating
Itissetoftechnicalspecificationsforlabelsthathelpsoftwareandratingtowork
together
Ratingisallowedtotheserviceprovider,sinceitinvolvessomeamountof
subjectivejudgement
Ratingcanbethroughselflabellingorthirdpartlabellingofthecontent
PICSwasconcernedaboutchildrenaccessingtheinappropriatematerials,i.emeta
datasystem,meaningthatlabelsprovideanykindofdescriptiveinformationabout
internetmaterial
Controllingwasdoneusing:
47

DigitalSignature:
Couplingtheabilitytomakeassertionswithcryptographicsignatureblockthatensure
integrityandauthenticity
IntellectualPropertyRightManagement
Usingthemeta-datasystemtolabelWebresourceswithrespecttoauthors,owners,rights
managementinformation
Privacy(P3)
UsingMeta-Datasystemtoallowsitestomakeassertionsabouttheirprivacypracticesand
foruserstoexpresstheirpreferencesforthetypeofinteractiontheywanttohavewith
thosesites.
Personalization
Basedonsomepolicy,thecontentcanbepersonalizedtosuittheneedofuserandthe
service
48

Content Aggregation
Fourparties
EndUser(EU)
ContentProvider(CP)
ContentAggregator(CA)
InternetServiceProvider(ISP)/WirelessNetworkOperator(NO)
NOwillhaverouters,gateways,cacheetctoofferservice
Anynodecanberesponderandrequester
Therewillbedifferentparameterstodeterminethecontent
Theycanbestaticordynamicparameters
Staticparameterisreceivedbeforetheservicebegins
Dynamicparameterarethosewhicharerequiredwitheveryrequest.
49

Types of service (Content Aggregator ‘s
perspective)
SingleServiceRequest
Worksatuserlevel
Worksforonlyoneuser
Groupservicerequest
Worksforgroupofusers
InitiatedatCAlevelortheNOlevel
50

Seamless Communication
Asystemshouldbeavailableandaccessiblefromanywhereand
anytimeandthroughanynetworkordevice
Theusershouldbeabletoaccessthesystemwhentravelling.
Patienttravellingfromhousetohospitalviaambulanceor
helicopter,hereinformationhastoexchangewithoutany
interruptions.
SeamlessCommunicationwillcombineseamlesshandoffsand
seamlessroaming
51

Handoffistheprocesswhichtheconnectiontothe
networkismovedfromonebasestationtoanotherbase
stationwithinthesamenetwork
Roamingisaprocessinwhichconnectiontothenetwork
ismovedfromonebasestationofonenetworktoanother
basestationofanotherbasestation.
Offersfreedomtoroamacrossdifferentwirelessnetworks
RoamingworkswithinhomogeneousnetworkslikeGSMto
GSMorCDMA2000toCDMA2000
52

Followingaspectsneedstobemaintainedinseamless
communication
Authenticationacrossnetworkboundaries
Authorizationacrossnetworkboundaries
Billingandchargingthedatacollection
Endtoenddatasecurityacrossroaming
Handoffbetweenwirelessaccesspoints
Roamingbetweenthenetworks
Sessionmigration
IPmobility
53

Autonomous Computing
Thepurposeofautonomoussystemistofreeusersandsystem
administratorsfromthedetailsofthesystemoperationandmaintenance
complexity.
Systemwillrun24X7
Combinationofthefollowingfunctions
SelfConfigurable
Willconfigureautomaticallyinaccordancewithhighlevelpolicies
Selfoptimizing
Continuouslylookforwaystoimproveitsoperationwithrespecttocost,resource
andperformance
SelfHealing
Willdetect,diagnoseandrepairlocalizedproblemsresultingfrombugsorfailures.
54

SelfProtecting
Itwillbewelldefinedfromexternalattacks
Willnotcascadefailurestootherpartsofthesystem
SelfUpgradeable
Willbeabletogrowandupgradeitselfwithinthecontrolofthe
aboveproperties.
55

Context aware Systems
Contextmanageristomaintaininformationpertainingtolocation,
mobiledevices,networks,users,theenvironmentaroundeach
mobiledeviceandothercontextinformationdeemedrelevant
Informationsuchas
Locationinformation
Helpstoidentifythelocationoftheuser/device
Canbeachievedusingdeviceorthroughnetwork
Fromdevice-GPS,canofferlocationprecisionof10feetradius
Fromnetwork-timingadvancedtechnology-precisionof100feetradius
Deviceinformation
Theknowaboutthecharacteristicsofthedevice
Todeterminetheresourcecapabilityandtheuserinterfacecapability
User-AgentparameterofHTTPwecanobtainthedeviceinformation
56

Networkinformation
Mobilecomputingenvironment,devicemovesfromonenetworktoanothernetwork
Isrequiredtoidentifythecapabilityofthenetwork
Includesinformationsuchassecurityinfrastructure,servicesofferedbythenetworks
Userinformation
Thisinformationisrequiredtoidentifytheusercorrectly
Thesystemneedstoensurethattheuserisgenuineandwhoheclaimstobe
Informationcanbevalidatedthroughauthenticationindependentofdeviceornetwork
Environmentinformation
Tellsaboutthesurroundingenvironment
Knowaboutthetemperature,elevation,moistureetcwhichismainlyrequiredforsensor
basednetworks 57

GPS
GlobalPositioningSystem,isasystemthatgivesexactpositiononthisearth
FundedandcontrolledbyUSDepartmentofDefence
GPSsatellitesareorbitingaroundtheearth,whichtransmitsthesignalsthatcanbedetectedby
anyonewithaGPSreceiver
Hasthreeparts
Spacesegment
Usersegment
Controlsegment
SpaceSegment
Consists24satellites,eachinitsownorbit
EachGPSsatellitetakes12hourstoorbittheearth
Eachsatelliteisequippedwithaclocktobroadcastsignalswithrespecttotime
Usersegment
Hasreceivers,whichcanbeusershand,embeddedinamobiledeviceormountedinavehicle.
Receivesthesignalfromsatelliteatthespeedoflight
58