Implementation That Tells All Points Wireless: ‘Let’s All Get Along’

Implementation That Tells All Points Wireless: ‘Let’s All Get Along’

t first glance, bringing peer-to-peer capabilities to mobile wireless devices may appear to impose a needless layer of complexity on the already complex task of providing remote access.

This concept extends to any wireless device that can communicate with the corporate network. When plugged into any of a growing number of peer-to-peer platforms, wireless devices are becoming mini-servers, each capable of running tiny, yet powerful, data-dispensing applications. In this architecture, data flows from person to person across the edge of the network as well as back to the server.

What a mobile P2P user can access depends, of course, on permissions he has been granted?an issue which we’ll discuss later?but it’s likely that the user will have access to at least some co-workers’ devices as well as their own desktop PC. Through this mechanism, the borders of the company’s information infrastructure have been expanded meaningfully?without rebuilding the client-server architecture, engaging in legacy integration, or even building an intra/extranet site.

For that reason, we’d suggest it’s worth getting to know what issues you’ll face in building peer-to-peer functionality into your wireless connectivity schemes. Here, we’ll outline the scope of the wireless P2P development problems and describe some proposed solutions.

More Hassle, More Benefit
In recent times, a steadily growing list of wireless-capable devices has been hitting the scene?including the RIM Blackberry, Handspring Visor, Compaq iPaq, and HP Journada?facing developers with a growing list of interfaces and operating systems to consider. With the mobile device market split among these varied camps, IT departments will probably be asked to support virtually all of them.

Connecting these devices to information sources ranges in difficulty, from familiar processes to a protracted process of adapting code for low-powered devices with non-standard operating systems. For example, programmers who want to connect a handheld computer wirelessly can usually work with familiar tools, as these are typically Win32 devices. In other words, with handhelds like the iPaq already running a version of Windows, integration runs along familiar pathways. Even in that case, however, varied versions of Windows CE may complicate the task somewhat.

Developers working with smart phones, for their part, will encounter a few different operating systems, each with their own quirks. Perhaps the most popular browser is the Openwave Mobile Browser, created by mobile software developer Openwave Systems of Redwood City, CA, but competition does exist, and developers need to know their way around this.

Presenting web information via PDA platforms such as the Palm OS, meanwhile, requires that programmers write more elaborate translation routines, given that client-server systems will not be compatible with this PDA platform. Linux-powered mobile devices such as the Yopy PDA from G.Mate Inc. will call for their own approaches as well.

Which Microbrowser to Implant?
For just about every implementation, developers must choose the type of microbrowser they’ll implement, and decide upon a method for translating ordinary HTML or other data to a supported format such as WAP.

These days, corporate information departments have had little choice but to create connections for these disparate devices, despite the hassles. Given the time-consuming nature of the task, it’s easy to see why adding P2P functionality may sound like just one more unwelcome chore. And up to a point, it’s true?peer-to-peer software isn’t eliminating the problems mobile device developers face, and, in some cases, introduces technical issues of its own.

On the other hand, P2P also brings information sharing, collaboration, and real-time synchronization options that aren’t likely to exist in a pure client-server environment. In fact, peer-to-peer technology may actually simplify the process of opening up worker access to key information, permitting users to tap PC data freely, rather than wait for IT departments to connect them one at a time to critical apps such as Outlook. Tradeoffs like these make the bigger picture seem far more balanced.

Wireless P2P Development Options
As the peer-to-peer market has matured, a growing number of companies have rolled out products that lay the groundwork for wireless P2P development, including the following:

  • Beverly, MA-based P2P collaboration vendor Groove Networks has created an enterprise collaboration platform which can be used to connect peer groups on the fly using its own set of protocols. Both the client and server pieces of the Groove application sit on the user PC, but Groove peer groups can include network-connected mobile devices.
  • Irvine, CA-based P2P collaboration software vendor Endeavors Technology has developed a P2P collaboration platform, Magi, which relies on Internet-standard protocols such as http for data serving and SSL for security. Through Endeavors’ use of WebDAV, users can read and write to remote documents stored on other users’ computers. The Magi Embedded product can run within a WinCE operating system, turning a Compaq iPAQ PocketPC and an HP Journada into web servers.
  • BadBlue from Atlanta, GA-based Working Resources Inc. includes a tiny but fully functional web server known as zShare which can be used for app serving, P2P file sharing, and data transcoding. zShare allows networked users to work concurrently on ODBC-compliant documents, notably Word docs and Excel spreadsheets.
  • San Francisco-based Ellipsus Systems has released a mobile application server suite based on peer-to-peer architecture. The suite, infiniteMASS, is designed to deliver data and applications based on dynamic characteristics of end devices, such as device type, user profile, and location.
  • Ventrada Systems of Ottawa, Canada has developed P2P software which allows mobile users to access and manage files, documents, and data from any Internet-enabled device.
  • The IBM WebSphere Transcoding Publisher can help you extend the reach of your data and applications across various business systems to an ever-expanding number of pervasive devices.
  • Further down the road, open source wireless P2P development tools will also be readily available. Sun Microsystems, for example, is working on Project JXTA, which is aimed at creating a core services layer that they’d like to see adopted by all P2P developers. Sometime in the next few months, Sun plans to release its JXME standard. JXME is a version of the JXTA protocol aimed at the mobile information devices platform contained within the Java 2 Platform Micro Edition.

    Problems in Wireless P2P Development
    While these platforms are designed to solve some implementation problems, wireless P2P developers still face their own unique set of challenges.

    Adapting the client.
    Developers may need to find a way to make the richer “peer experience” of a P2P-enabled device work for their particular situation, even though they face significant limitations in memory, storage, and processing power. For some devices, a fat, highly functional P2P client will be needed, while for others, any client that supports P2P connections will do, notes Matt Page, manager of device platforms for Groove Networks. “Developers must consider if there exists the need for a fat client experience based on the target platform,” Page notes. “For example, smart phone users will likely never use that device to edit large Excel models.”

    Synchronization issues.
    Another problem in wireless P2P development is determining how, when, and under what circumstances developers want to have peer devices synch up with central data stores. Developers will also need to decide how and when users will synch up with each other, which users they will access, and under what circumstances. P2P goups like the ones created by Groove can stay synchronized with each other, even if they’re not connected to the central IT infrastructure. In other cases, it may be better to synch through a central data store. Also, given the variation in wireless networks from place to place, developers may want to give users the option of shutting off P2P synching or even data exchange depending on how good the wireless network coverage is in their location, Page pointed out.

    Securing the data.
    Still another problem in wireless P2P environments is creating a secure environment for data sharing. This topic is complex enough to call for its own full-length article, but in brief, here are just a few of the more critical issues to be addressed.

  • In peer-to-peer networks, edge-of-network devices wind up being rich sources as well as receivers of information. Operating system or application security holes, which might only have exposed a single user’s PC to compromise, may now offer intruders access to an entire network. Staying on top of security bugs in common mobile software apps and platforms is crucial.
  • Extending and revoking permission to access the network is a critical element in controlling mobile device P2P connectivity. If a user loses their device, your network admin must be able to revoke permission to access staff and corporate data.
  • In the case of an 802.11b P2P area network, extra security measures are appropriate. Particularly if rich user data is being shared P2P across such a network in addition to corporate info, developers and other IT staff must take care to protect against unauthorized users sniffing information off of the wireless network, noted Greg Bolcer, chief technology officer of Endeavors.

    To push information across the airwaves, enterprises will have to use a gateway device that speaks the protocol of the receiving network. That device can be leased from an external vendor or run on premise by a company, but either way, a gateway is needed. As data is transmitted from a corporate IP network across a gateway, however, there’s a moment when all of the data is exposed. Some enterprises are comfortable with this and some aren’t; ultimately, it may be your job to be aware of and address this problem.

    Bandwidth/Resource Consumption.
    Finally, bandwidth consumption between peer nodes is also a concern. In a peer-to-peer environment, developers need to plan their data distribution architecture not only to squeeze corporate information across wireless connections to devices, but also to permit information to flow from device to device.

    Take the experience of Cleveland, Ohio-based wireless solutions developer WISP Inc., which has been testing BadBlue’s zShare with a financial services client. Unaware of any potential problems, one of the end-user testers attempted to open a 35MB Excel spreadsheet that resided on another user’s system. The move, while legal on the BadBlue system, brought computing to a halt for both parties. “The machine [that the spreadsheet] was hosted on went into all sorts of fits doing what it had to do so it could share the information,” says Martin Hasemann, network engineer with WISP.

    If developers bear these concerns in mind as they approach P2P, however, they may find that P2P technology is the killer app that makes the effort of connecting mobile devices worthwhile. After all, ultimately, if users have the information they want, the developers have done their job well. The faster and more conveniently they can get it, the better.

    devx-admin

    devx-admin

    Share the Post:
    Bold Evolution

    Intel’s Bold Comeback

    Intel, a leading figure in the semiconductor industry, has underperformed in the stock market over the past five years, with shares dropping by 4% as

    Semiconductor market

    Semiconductor Slump: Rebound on the Horizon

    In recent years, the semiconductor sector has faced a slump due to decreasing PC and smartphone sales, especially in 2022 and 2023. Nonetheless, as 2024

    Learn Web Security

    An Easy Way to Learn Web Security

    The Web Security Academy has recently introduced new educational courses designed to offer a comprehensible and straightforward journey through the intricate realm of web security.

    Military Drones Revolution

    Military Drones: New Mobile Command Centers

    The Air Force Special Operations Command (AFSOC) is currently working on a pioneering project that aims to transform MQ-9 Reaper drones into mobile command centers

    Tech Partnership

    US and Vietnam: The Next Tech Leaders?

    The US and Vietnam have entered into a series of multi-billion-dollar business deals, marking a significant leap forward in their cooperation in vital sectors like

    Bold Evolution

    Intel’s Bold Comeback

    Intel, a leading figure in the semiconductor industry, has underperformed in the stock market over the past five years, with shares dropping by 4% as opposed to the 176% return

    Semiconductor market

    Semiconductor Slump: Rebound on the Horizon

    In recent years, the semiconductor sector has faced a slump due to decreasing PC and smartphone sales, especially in 2022 and 2023. Nonetheless, as 2024 approaches, the industry seems to

    Elevated Content Deals

    Elevate Your Content Creation with Amazing Deals

    The latest Tech Deals cater to creators of different levels and budgets, featuring a variety of computer accessories and tools designed specifically for content creation. Enhance your technological setup with

    Learn Web Security

    An Easy Way to Learn Web Security

    The Web Security Academy has recently introduced new educational courses designed to offer a comprehensible and straightforward journey through the intricate realm of web security. These carefully designed learning courses

    Military Drones Revolution

    Military Drones: New Mobile Command Centers

    The Air Force Special Operations Command (AFSOC) is currently working on a pioneering project that aims to transform MQ-9 Reaper drones into mobile command centers to better manage smaller unmanned

    Tech Partnership

    US and Vietnam: The Next Tech Leaders?

    The US and Vietnam have entered into a series of multi-billion-dollar business deals, marking a significant leap forward in their cooperation in vital sectors like artificial intelligence (AI), semiconductors, and

    Huge Savings

    Score Massive Savings on Portable Gaming

    This week in tech bargains, a well-known firm has considerably reduced the price of its portable gaming device, cutting costs by as much as 20 percent, which matches the lowest

    Cloudfare Protection

    Unbreakable: Cloudflare One Data Protection Suite

    Recently, Cloudflare introduced its One Data Protection Suite, an extensive collection of sophisticated security tools designed to protect data in various environments, including web, private, and SaaS applications. The suite

    Drone Revolution

    Cool Drone Tech Unveiled at London Event

    At the DSEI defense event in London, Israeli defense firms exhibited cutting-edge drone technology featuring vertical-takeoff-and-landing (VTOL) abilities while launching two innovative systems that have already been acquired by clients.

    2D Semiconductor Revolution

    Disrupting Electronics with 2D Semiconductors

    The rapid development in electronic devices has created an increasing demand for advanced semiconductors. While silicon has traditionally been the go-to material for such applications, it suffers from certain limitations.

    Cisco Growth

    Cisco Cuts Jobs To Optimize Growth

    Tech giant Cisco Systems Inc. recently unveiled plans to reduce its workforce in two Californian cities, with the goal of optimizing the company’s cost structure. The company has decided to

    FAA Authorization

    FAA Approves Drone Deliveries

    In a significant development for the US drone industry, drone delivery company Zipline has gained Federal Aviation Administration (FAA) authorization, permitting them to operate drones beyond the visual line of

    Mortgage Rate Challenges

    Prop-Tech Firms Face Mortgage Rate Challenges

    The surge in mortgage rates and a subsequent decrease in home buying have presented challenges for prop-tech firms like Divvy Homes, a rent-to-own start-up company. With a previous valuation of

    Lighthouse Updates

    Microsoft 365 Lighthouse: Powerful Updates

    Microsoft has introduced a new update to Microsoft 365 Lighthouse, which includes support for alerts and notifications. This update is designed to give Managed Service Providers (MSPs) increased control and

    Website Lock

    Mysterious Website Blockage Sparks Concern

    Recently, visitors of a well-known resource website encountered a message blocking their access, resulting in disappointment and frustration among its users. While the reason for this limitation remains uncertain, specialists

    AI Tool

    Unleashing AI Power with Microsoft 365 Copilot

    Microsoft has recently unveiled the initial list of Australian clients who will benefit from Microsoft 365 (M365) Copilot through the exclusive invitation-only global Early Access Program. Prominent organizations participating in

    Microsoft Egnyte Collaboration

    Microsoft and Egnyte Collaboration

    Microsoft has revealed a collaboration with Egnyte, a prominent platform for content cooperation and governance, with the goal of improving real-time collaboration features within Microsoft 365 and Microsoft Teams. This

    Best Laptops

    Top Programming Laptops of 2023

    In 2023, many developers prioritize finding the best laptop for programming, whether at home, in the workplace, or on the go. A high-performing, portable, and user-friendly laptop could significantly influence

    Renaissance Gaming Magic

    AI Unleashes A Gaming Renaissance

    In recent times, artificial intelligence has achieved remarkable progress, with resources like ChatGPT becoming more sophisticated and readily available. Pietro Schirano, the design lead at Brex, has explored the capabilities

    New Apple Watch

    The New Apple Watch Ultra 2 is Awesome

    Apple is making waves in the smartwatch market with the introduction of the highly anticipated Apple Watch Ultra 2. This revolutionary device promises exceptional performance, robust design, and a myriad

    Truth Unveiling

    Unveiling Truths in Bowen’s SMR Controversy

    Tony Wood from the Grattan Institute has voiced his concerns over Climate and Energy Minister Chris Bowen’s critique of the Coalition’s support for small modular nuclear reactors (SMRs). Wood points

    Avoiding Crisis

    Racing to Defy Looming Financial Crisis

    Chinese property developer Country Garden is facing a liquidity challenge as it approaches a deadline to pay $15 million in interest associated with an offshore bond. With a 30-day grace

    Open-Source Development

    Open-Source Software Development is King

    The increasingly digital world has led to the emergence of open-source software as a critical factor in modern software development, with more than 70% of the infrastructure, products, and services

    Home Savings

    Sensational Savings on Smart Home Security

    For a limited time only, Amazon is offering massive discounts on a variety of intelligent home devices, including products from its Ring security range. Running until October 2 or while

    Apple Unleashed

    A Deep Dive into the iPhone 15 Pro Max

    Apple recently unveiled its groundbreaking iPhone 15 Pro and iPhone 15 Pro Max models, featuring a revolutionary design, extraordinary display technology, and unrivaled performance. These new models are the first