International Journal of Interactive Mobile Technologies (iJIM) - Volume 4, Issue 4, October 2010 MOBILE INFORMATION SYSTEM, HOW TO BUILD WITH CASE STUDY Mobile Information System, How to Build with Case Study doi:10.3991/ijim.v4i4.1357 R. M. H. Al-Sayyed, S. Manaseer and O. Rababeh The University of Jordan, Amman, Jordan Abstract—In a distributed computing environment, com- prising mobile computers and wireless networks, users change their locations frequently while still expecting “ac- ceptable” levels of performance. This complexity will pro- duce poor performance with no exact answer why? In such an environment, a new method of designing applications will be required. It is claimed that understanding network performance is an art rather than a science because in practice there is little underlying useful theory; so, experience with real world examples are used instead to develop rules of thumb [14]. This paper is fundamentally designed to describe types of mobile applications and the major performance factors needed to be considered when designing such kind of appli- cations. Methods of connectivity: always connected, occa- sionally connected, and occasionally disconnected will be addressed as well. We are proposing a Mobile Information System (MIS) model. This model will address the needs for monitoring wireless environment where the mobile applica- tions running in this area and how it is monitoring the per- formance factors. Also provided in the model are the fea- tures of the MIS, the pros and cons of the model, and a simulation to show the effectiveness of the model. Index Terms—MIS, QoS, AuthXtion, Connectivity. I. INTRODUCTION A mobile application is one that requires devices such as PDAs, laptop computers, or phones where you can use it anywhere you move. It is not necessary to have wireless communication capability for mobile applications. Wire- less applications are either thin client (WAP) or thick cli- ent (developed by languages such as: Java and C); they require wireless connection. By nature, mobile applica- tions are small, mobile, and have a personal quality. Mo- bile users have special application needs. Issues such as user interface, display size, data entry problems, the lack of wireless connections, and security must be addressed during the development of such applications. The process of interchanging mobile information is called syncing and it is commonly used with PDAs [1]. Mobile communication has evolved since the 1920s (private mobile and radio). Some mobile-data technolo- gies were introduced in the 1980s (Erricson’s Mobitex and Motorola’s ARDIS). In the early 1990s, Cellular Digital Packet Data (CDPD) was introduced [9]. The introduction of this technology made wireless data applications com- mon in police departments, emergency management staff, and delivery businesses. The market is expected to de- velop rapidly as networks mature, the price of wireless bandwidth drops, and mobile computing platforms be- come capable of supporting industrial-strength applica- tions [1]. Some researches [3] showed that, in some environ- ments, some applications are user-specific; users for such applications are divided into disjoint location-based sub- communities, each with its own movement, activity, and usage characteristics. Most users exploit the network for web-surfing. The high numbers of users mainly use mo- bile computers for synchronous communications. Another important issue is that a single user and appli- cation usually cause peak throughput in the mobile net- work. Also, whilst the overall incoming traffic dominates the outgoing traffic; the reverse situation holds during peak throughput. Peak load can be caused by factors such as the transfer of large volumes of data and increased numbers of users. For interactive application (the goal of this study), software optimization can help in solving the throughput problem. On the user side, latency is a major factor in a user’s satisfaction. Latency for wireless net- works is affected by the kind of network structure, the connection medium, and the efficiency of the application itself. The author of [7] indicated that wireless application de- velopers are not knowledgeable with embedded platforms because they often come from a PC background. As such, they need to be aware of the differences they will find in the new hardware and software environment. Developers who are aware of the differences among the media trans- mission rates, memory resources, user interface, power requirements, processing core architectures and develop- ment environments can plan and execute their software more effectively. In a study about workflow partitioning in mobile infor- mation systems in [2], the authors described a partitioning approach for the execution of Business Process Execution Language (PBEL) onto a network of mobile devices. The produced execution model is “equivalent” to the central- ized one with a support to the components that are discon- nected and independent workflow engines. In [4], the authors described the AmbieSense system they developed which was designed to meet people’s in- formation needs by providing ambient, personalized and context-aware application style. In order to address users’ information need, the authors aimed to enable a more seamless interaction between the mobile users, their physical environment and the situation they encounter. They built and tested the content, software, hardware, architecture and the interaction with users. The approach they followed is useful to consider when developing in- formation systems that also scale up. 12 http://www.i-jim.org http://dx.doi.org/10.3991/ijim.v4i4.1357� MOBILE INFORMATION SYSTEM, HOW TO BUILD WITH CASE STUDY The authors of [10] described a rule-based event-driven modular framework for building self-adaptive applications in mobile environment. They employed a “mobile event engine” for all applications to detect changes. In order to evaluate the potential of the approach, they provided ana- lytical characterization and detail simulation. In order to show the feasibility and effectiveness of their methods, they provided a modular prototype implementation and performance results. The rest of this paper is organized as follows. Section II covers the concepts of developing a mobile/wireless ap- plication, the considerations that must be taken to develop the applications; the connectivity methods, and a brief introduction to synchronization techniques. Section III covers the common features of the MIS, the hardware architecture, the software architecture, and the user view of the system. Section IV covers the design and imple- mentation of the Case Study system along with the per- formance parameters used. Section V covers the pros and cons of the various implementation methods. Section VI covers analysis to WLAN MIS environment and at the end we draw our conclusion. II. DEVELOPPING MOBILE/WIRELESS APPLICATIONS Mobile application developers face many challenges during the development process. Limitations such as bandwidth, nontraditional computing devices, lack of standards, security issues, and transactional integrity [8] affect the design. Mobile developers must also be familiar with the target device's specifications. The following steps should be considered when devel- oping a mobile application [5]: 1. Understand the user. The mobile user helps in speci- fying the real application. The interaction designer creates the typical user (called persona). 2. Build a mobile database with content: The informa- tion design is developed. 3. Design a logical application: simulator, screens are built, and while attached to real content, the business logic is coded. The major components of the applica- tion are Wireless field application, Back office ad- ministrative application and Design a Web PC start page if needed. 4. Use a device: try the application on a device as de- scribed in the persona. 5. Check Quality of Service (QoS) guarantees: QoS consideration is very important when designing ap- plications for low bandwidth and congested mobile environment. Although QoS can be provided at sys- tem level, operating system and application levels, providing QoS at application level only is highly im- portant especially when considering the mobile envi- ronment where QoS parameters are hardware inde- pendent and operating systems are being improved. While expanding the bandwidth can be a clear solu- tion, its cost is not trivial [11], and this implies the ability to control and manage the resources. Designers should consider the connectivity models when designing an application. The connectivity models are [6]:  Always connected: All changes by mobile users are stored immediately in the enterprise.  Occasionally connected: the application connects to the network to access the data on occasions where data is required. Synchronization is needed periodi- cally and databases are compact for small devices.  Occasionally disconnected: the application can function with and without connection. Another name for this type of connection is called always available. The availability of the server is desirable but not es- sential. III. THE MIS FEATURES The MIS is a combination of hardware and software model for an interactive wireless application/tool. The proposed model is for use in a university wireless envi- ronment to help users access needed resources. The emerging mobile computing technologies in communica- tions and hardware have posed many challenges. Users are requesting access to data anywhere and any time from their homes, offices, and while roaming outdoors even though their portable devices have diverse user interfaces and incompatible software. In [12], the authors have pro- posed the Vivian solution (using Java and CORBA), to overcome the problems of weak equipment, limited input and output, heterogeneous platforms, security guarantees, administration routines, and availability on the fly. Information management tools of such systems can be specific (e.g. stock control) or meant to interact with other systems in an unpredictable manner [13]. In this context, mobility is of high importance where user can move from one context to another, from one physical location to an- other, or from one application to another. Information management can be developed to supply real-time data- base queries if location awareness is considered. In addi- tion, mobility raises additional security problems although mobile computers have added a lot of flexibility to dis- tributed systems, however, distributed databases have tra- ditionally not been very flexible because of the need to synchronize all transactions at all sites [15]. A. MIS environment As shown in Figure 1, the following constitute the basic hardware structure of the model: 1. Three wireless labs on a university campus or similar environment 2. Each lab has an access point that is cabled to a switch that is, in turn, cabled to a LAN. 3. The server of the LAN is connected to another server installed in another location, with access to it through the Internet connection L A N W L A N L A N a n d I n te rn e t S e rv e rs A P L a p t o pL a p t o p S W I T C H I T C e n t e r I n t e r n e t L A N S A P S Figure 1. Basic Hardware components iJIM – Volume 4, Issue 4, October 2010 13 MOBILE INFORMATION SYSTEM, HOW TO BUILD WITH CASE STUDY B. MIS Software Architecture Software wise, the architecture of the system is depicted in Figure 2. It is mainly composed of the following sub- systems:  Authentication and authorization system: to protect students’ data from unauthorized access such as oth- ers students or external users  Students’ attendance tracking systems: for both stu- dents and instructors. The instructor records the class attendance of students and the students can query their individual attendance records.  Homework posting and tracking system: this will generate a load on the network for testing purposes; students will hand in their homework assignments to their teachers through this system and get feedback comments about their submitted assignments.  Logging (registry) system: the main goal for this sys- tem is to track all the input and output traffic through the access point to and from the LAN for studying purposes. In addition, students should be able to access the Inter- net and all the other available applications such as the Registration system and the library system. Note that the active users can range from 1 to 25 each of whom is run- ning an application. The applications that run can be all the same or a mixture of different applications. AuthXtion represents the application that is used to validate users’ authentication and authorization. Note that X is used in the name to substitute the parts entica and oriza for both Authentication and Authorization. Figure 3 depicts the behavior of the homework posting application (our case study) and its relation to the user. The Data that is sent to the system includes Student ID, Date, Time, Course ID, and Assignment number. The query results are: Student ID, Course ID, Assignment number, and instructor’s comments. A u t h X t i o n L o g g i n g H W P o s t i n g A t t e n d a n c e A p p l ic a tio n 1 W LA N A p p li ca ti o n s a n d c o n n e c ti o n A P L a p t o p L a p t o p O t h e r s R e p o s it o r y A c ti v e U se rs A p p l ic a ti o n 2 A p p li c a t io n x Figure 2. Basic Software components St ID , D at e, T im e, Fo ld er , C ou rs eI D , Co m m en t HW APP User Interface 1. Hand In a Folder 2. HW Query 3. Back Request Processor HW DBLOGGING Query Result: StID, CourseID, Assign#, and Comments Figure 3. HW Posting System Architecture IV. MIS SYSTEM DESIGN A. Requirements Analysis Phase 1. The application should validate user’ identity for pri- vacy of data 2. The application should display a menu to the student to select from with the options: (a) Hand In a file, (b) HW Query, (3) Exit 3. The fields of interest are: StID, Date, Time, CourseID, Teacher, FileName, Path, Grade, Com- ments 4. The log information (internally) should be like: HWStartTime, HWEndTime, SizeInBytes 5. The application should allow the user to query about the grading of the homework. B. MIS Design, Assumptions, and Preparation for other Phases The system allows users to login securely, select and perform the needed operation such as posting or querying about homework grading. The following assumptions were made for purpose of study: a. The application keeps track of only one homework assignment per student. b. The system considers the student id the same as the UID C. Addressing the Performance Factors: The following factors affect the overall performance of mobile applications and will be studied as follows: D. Response time This work measures the time needed for both “hand in” and “query”. Measuring this factor is done by recording the time (in microseconds) of the hand in process until the homework is delivered and an acknowledgement is re- corded. E. Throughput The throughput between two points (point 1 & point 2) is the amount of data sent from point 1 to point 2 (ac- knowledged) during a certain time. F. Privacy and Security To minimize the effect on overall performance, a sim- ple security mechanism is included in this work. Security is evaluated by comparing the overall time to complete an operation with and without it. V. PROS AND CONS OF MIS IMPLEMENTATION WSTTCP software [16] and the QCHECK software [17] are used for measuring the TCP and UDP perform- ance between two systems; we use them here to evaluate the MIS model. For instance, due to the small size of mo- bile screens, designing an interactive interface for users is not an easy job. If the processing of a command is timely, that will affect the overall application performance. It is not always possible to optimize algorithms for both per- formance and memory at the same time. Communication costs for a mobile device are more than those of its wired counterpart. 14 http://www.i-jim.org MOBILE INFORMATION SYSTEM, HOW TO BUILD WITH CASE STUDY To evaluate the model, the basic application factors should be explained in more details. As part of designing a mobile application, we will look at the factors: display size, restrictions on input facilities, computing power, energy supply, limited bandwidth, and network access. Because these factors are related to each other, consider- ing all of them at the same time is problematic. For in- stance, due to the small size of mobile screens, designing an interactive interface for users is not an easy job. If the processing of a command is timely, that will affect the overall application performance. It is not always possible to optimize algorithms for both performance and memory at the same time. Communication costs for a mobile de- vice are more than those of a wired one, so we choose to use synchronization and replication when possible to avoid on-line connection since it is costly. In wired com- munication, the user doesn’t care much about the band- width or power whereas these are major considerations for mobile applications. A. MIS Evaluation In the design of MIS, the logging application is a bot- tleneck of the proposed model; failure of the logging ap- plication indicates the failure to the whole system. The same applies to the authXtion application. Even though the logging subsystem is the bottleneck of the system, the whole system shouldn’t allow unauthorized users to ac- cess the system. If the environment does not accept any failure, another recovery server can be employed to take over the authXtion turn. By installing more servers, traffic gener- ated to guarantee consistency might degrade the whole performance. If the authXion server is having a second backup server and the authXion is crashed for any reason, recovering from the crash might lead to unacceptable per- formance especially when the second server starts upgrad- ing the authXion for consistency. On the other hand, if the logging application (server) goes down, each application will record the logging in its repository until a successful commit is done. Committing is done automatically if the process succeeds. If for some reasons the process does not succeed, the previous logging information will be recorded in the failures log (sepa- rately) and the operation itself will be rolled back. After a successful commit or rollback, the operation-auditing log should be removed (cleared) making room for other op- erations. All these operations will be recorded on the proper server not the laptop itself to give faster access to laptop users and for better auditing process. This means that the user can access the required application without waiting until the logging application server is up again. All logging information is kept on the various servers until the logging server is up at which time all the logging in- formation is transparently transferred to the logging server. After the logging server acknowledges the other servers’ auditing information is recorded successfully, these servers can then remove the auditing information properly. The assumed connectivity method is always connected with some of the advantages of always available (when the logging server is down). Any application maintenance will not affect the user. We separated the interface from both the data and logic layers making the maintenance simpler on the server side where the application resides. So, any application maintenance will not affect the user. As we employed minimal number of menus, processing of the selected commands is simple enough for users to work with the application and make the system user-friendly. Also, since the type of devices used is only laptops, many standards can be employed to simplify user’s life. The mobility of the user does not need special care in imple- menting the application since students are moving within a limited area inside one campus. Our MIS model can be integrated easily with other applications. The new applica- tion will be installed on a proper server and easily be called by adding another entry for it in the model’s menu. VI. ANALYSIS TO WLAN MIS ENVIRONMENT A. The environment: Figure 4 shows a summary of the hardware equipment and the WLAN configuration. The access point (AP) is installed on the second floor inside a room with all the other equipments. In some tests, the laptop was in the first floor. B. Throughput Results Figure 5 shows the throughput when Wired Equiva- lence Privacy (WEP) is disabled and Figure 6 shows the throughput when WEP is enabled. WEP is with 40-bit encryption key. It is not difficult to determine (by looking at the two figures) that the overall UDP throughput is higher in both cases even through it is started less. Notice also the ex- pected results that with WEP, throughput becomes less due to the security overhead. The results were recorded 5 times and the average was taken to be realistic. LAN Serve r W LA N LA N a n d I n te rn e t AP Lap to pLap to p Sw itch In ternet Serv er: D esktop PC, P 4, 2.66 M H z, Siem en s Fujitsu, 512 M B R AM , 60 G H ard D isk A P : A V A Y A A P3, 80 2.11b w ith R an ge an tenn a 2.5 dB i P3 , 1 G H z, Intel PC M C IA IEE E 802 .11b C ard Figure 4. WLAN Configuration. Throughput WEP Disabled 0 1 2 3 4 5 6 7 0 5000 10000 15000 20000 25000 KBytes T h ro u g h p u t in M b p s TCP-Mbps UDP-Mbps Figure 5. TCP vs. UDP Throughput – WEP Disabled (WS) iJIM – Volume 4, Issue 4, October 2010 15 MOBILE INFORMATION SYSTEM, HOW TO BUILD WITH CASE STUDY Throughput WEP Enable d 0 1 2 3 4 5 6 0 5000 10000 15000 20000 25000 KBytes T h ro u g h p u t in M b p s TCP-Mbps UDP-Mbps Figure 6. TCP vs. UDP Throughput – WEP Enabled (WS) One important thing to add here is that the experiment while WEP is enabled was performed inside the same room where as while the WEP is disabled test was per- formed on a laptop in the first floor while the access point, the server, and the antenna are inside a room in the second floor. The reason for this is to take the best case while WEP is enabled (inside the same room) and a bad case while the WEP is disabled (in another floor); this situation will give results with no courtesy to the environment and we expect such results are practical to consider. C. Response Time Results Figures 7 and 8 show the response time of the system. As can be seen, the UDP has lower response time in both cases. This result holds for the QCHECK software when the WEP is enabled and reversed when the WEP is dis- abled. Figures 9 and 10 indicate that the difference in all cases between the UDP and TCP is small. Response time is measured by selecting the average re- sponse time value is a set of 10 trials (with Min, Avg, and Max) to be practical; i.e. the average of 10 times is re- corded. D. Streaming Results QoS and user satisfaction are of high importance to us- ers of the multimedia, Voice over IP, and video broadcast applications. No need to acknowledge and data sent for faster delivery. In our system, the UDP protocol will be used for this purpose. Lost data in such applications is a measure of acceptance for the whole system; the less lost data, the better the system. QCHWCK software is used to measure this factor. Figure 11 and 12 shows the streaming results. Re spons e Tim e (WEP Dis abled) 0 10 20 30 40 0 10000 20000 30000 Data in Kbytes T im e ( s e c ) TCP (sec) UDP (sec) Figure 7. TCP vs. UDP Response Time (WS) WEP Disabled. Response Tim e (WEP Enabled) 0 10 20 30 40 50 0 10000 20000 30000 Data in KBytes T im e i n S e c TCP (sec) UDP (sec) Figure 8. TCP vs. UDP Response Time (WS) WEP Enabled. Response Time WEP Disabled 0 10 20 30 40 50 60 0 10000 20000 30000 40000 Bytes T im e ( m s e c ) TCP-Avg UDP-Avg Figure 9. TCP vs. UDP Response Time (QC) WEP Disabled. Response Time WEP Enabled 0 20 40 60 80 0 10000 20000 30000 40000 Bytes T im e ( m s e c ) TCP-Avg UDP-Avg Figure 10. TCP vs. UDP Response Time (QC) WEP Enabled. Lost Data vs Data Rate 0 500000 1000000 1500000 0 200 400 600 800 1000 1200 Data Rate in kbps L o s t D a ta i n b y te s Figure 11. Lost Data vs. Data Rate. 16 http://www.i-jim.org MOBILE INFORMATION SYSTEM, HOW TO BUILD WITH CASE STUDY Actual Throughput vs Data Rate 0 100 200 300 400 0 500 1000 1500 Data Rate in kbps A . T h ro u g h p u t in k b p s Figure 12. Throughput vs. Data Rate. By looking at Figures 11 and 12, we notice that the data loss rate increases as the sent data rate increases. This re- sult however, doesn’t hold when the data rate sent is low where the chance for losing data becomes zero. Figure 12 indicates that the actual throughput increases to a point and starts decreasing again and a clear reduction is shown with large data sizes. VII. CONCLUSION Special consideration should be given to developing wireless applications including offloading some of the processing to network, code compaction due to memory limitations, dynamic memory allocation tracking, recur- sive functions consideration, screen size, power consump- tion, code partitioning for better performance, APIs reduc- tion, and the ability to manage. MIS model addresses many performance factors needed to be considered when developing mobile applications and have the limitation of the environment it is used in. Generalizing the MIS to other environment and using other devices shouldn’t be a headache if all the new environmental parameters were taken into considerations. REFERENCES [1] Bryan Morgan. “Introduction to the Wireless World Part 1 & 2”. http://www.InformIT.com, Feb 2, 2001. [2] Luciano Baresi, Andrea Maurino, Stefano Modafferi, “Workflow partitioning in mobile information systems”, Proceedings of IFIP TC8 Working Conference on Mobile Information Systems (MOBIS 2004) [3] Diane Tang and Mary Baker. “Analysis of a Local-Area Wireless Network”. Copyright ACM 2000. [4] Ayşe Göker , Hans Myrhaug, “Evaluation of a mobile information system in context”, Information Processing and Management: an International Journal, v.44 n.1, 2008, p.39-65. doi:10.1016/j.ipm. 2007.03.011 [5] Mark Beaulieu, “Concepts for Working with Wireless Applica- tion”, http://www.InformIT.com, Feb 01, 2002. [6] Eric Giguėr, iAnywhere Solutions, “Designing Mobile Applica- tions for the Enterprise”, a Sybase company, 2000, http://www.perfectxml.com/Conf/Wrox/Files/eric1text.pdf [7] Justin Helmig, “Programming Considerations for Developing Next-Generation Wireless Embedded Applications”, Texas In- strument, SQP002 – January 2002 (White Paper) [8] HP Company, “Wireless and Mobile Computing”, the Total-e- Mobile Business Solution, March 2001. [9] Fred Goldstein, “Wireless Technologies for Mobile Applications”, TIAX LLC, Massachusetts, EntNet@SuperComm, 2001. [10] Shiow-yang Wu , Chun-Shun Chang , Shih-Hsun Ho , Hung-Shun Chao, “Rule-based intelligent adaptation in mobile information systems”, Expert Systems with Applications: An International Journal, v.34 n.2, 2008, p.1078-1092. doi:10.1016/j.eswa.2006. 12.014 [11] Ghani, Rod, (2001), “3G: 2B or not 2B?”, www.starcore- dsp.com/docs/pdf/wsdpaper_oct00.pdf [12] Bourmakin, Eugene; Michael Samarin, Lora Samarina, Eero Vitie, Eugene Gryazin, Johannes Lehtinen, “Indoor Guide A Java and CORBA based mobile application”, Group for Robotics and Vir- tual Reality, Department of Computer Science, Helsinki Univer- sity of Technology, www.nrc.nokia.com/Vivian/Public/Misc/ repBoumarkin0601.pdf [13] Krogstie, John, “Requirements Engineering for Mobile Informa- tion Systems”, 2001, http://www.ifi.uib.no/conf/refsq2001/ papers/p6.pdf [14] Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall PTR, 2003, p 557-573 [15] Joanne Holiday, Divyakant Agrawal, and Amr El Abbadi, “Dis- connection Modes for Mobile Database”, July 2002, Wireless Networks, V 8 issue 4, 2002. [16] WSTTCP software (Copyright © Sungiin Chun, 1996) [17] QCHECK Console Version 1.3 software (Copyright © NetIQ Corporation, 1995-2000). AUTHORS R. M. H. Al-Sayyed, S. Manaseer and O. Rababeh are with the University of Jordan, Amman, Jordan. Manuscript submitted on June 22nd, 2010. Published as resubmitted by the authors on June 29th, 2010. iJIM – Volume 4, Issue 4, October 2010 17 http://dx.doi.org/10.1016/j.ipm.2007.03.011� http://dx.doi.org/10.1016/j.ipm.2007.03.011� http://www.informit.com/� http://www.perfectxml.com/Conf/Wrox/Files/eric1text.pdf� mailto:EntNet@SuperComm� http://dx.doi.org/10.1016/j.eswa.2006.12.014� http://dx.doi.org/10.1016/j.eswa.2006.12.014� http://www.starcore-dsp.com/docs/pdf/wsdpaper_oct00.pdf� http://www.starcore-dsp.com/docs/pdf/wsdpaper_oct00.pdf� http://www.nrc.nokia.com/Vivian/Public/Misc/repBoumarkin0601.pdf� http://www.nrc.nokia.com/Vivian/Public/Misc/repBoumarkin0601.pdf� http://www.ifi.uib.no/conf/refsq2001/papers/p6.pdf� http://www.ifi.uib.no/conf/refsq2001/papers/p6.pdf�