Mobility Innovations from Microsoft Research - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile
Commentary
7/31/2008
12:00 AM
Commentary
Commentary
Commentary
50%
50%

Mobility Innovations from Microsoft Research

If you have an opportunity browse through the research projects going on at Microsoft Research.  As the site states the research projects are not the ivory tower type but are focused on "turning ideas into reality".  The overarching goals of the projects are "to enhance the user experience on computing devices, reduce the cost of writing and maintaining software, and invent novel computing technologies".

Here are a couple I found on the site focused on mobile technology:

SPACE: Secure Protocol for Address-Book based Connection Establishment

SPACE is focused on addressing the largely unrealized potential of peer-to-peer mobile applications, examples sited are collaboration and gaming.  The research team provides 2 main reasons why the potential of peer-to-peer mobile applications remains "unrealized".  First, the existing connection establishment protocols for Bluetooth and IEEE 802.11 have known security flaws which limit the categories of applications that can comfortably be deployed.  Second, the protocols are do not provide automatic ad-hoc connections, they require explicit user interaction to initiate a connection, for example entering a passkey.

 The solution, SPACE, a protocol for secure automatic ad-hoc connection-establishment between two devices based on the address book entries contained on the devices.  The team's premise?,  if  two  people  have  each  other's contact  details  in  their  address  books there is a  basis for a trust relationship  between  their  devices, and an automatic ad-hoc connection can be made without additional  user  intervention.

WiFiAds: A Novel Approach for Delivering Location-Sensitive Advertisements Using Wi-Fi Networks

WiFiAds has its foundation in an interesting augmentation of WiFi Access Point (AP) to device communication called "beacon stuffing". When a wireless client associates with an AP to begin wireless communications it can no longer communicate with other APs in the reachable area without using sophisticated software.  The research team argues that this limitation in the wireless world is no better, if not similar, to the wired model where an ethernet cable connection needlessly limits the capabilities.  Why limit a wireless client to simply hearing or being aware of other non-associated APs, why not enable the  exchange useful information with them.  If a wireless client were able to exchange information with non-associated APs it might be able to determine which AP has the lowest load or highest bandwidth, enabling clients to select and deselect APs based on this information. 

This is where "beacon stuffing" comes in, a low bandwidth communication protocol for IEEE 802.11 networks that enables APs to communicate with clients without association.  The concept is based on the fact that APs send beacons to clients that are not associated with them, and that it is possible to overload fields in the beacons and management frames to embed interesting data. The approach is complimentary to 802.11 association and works by overloading 802.11 management frames without breaking the standard, in fact the team claims that minor driver changes are required at the client and AP.

The team has come up with a number of new applications that are enabled by "beacon stuffing".  One application we discussed above, is the ability of APs to embed network selection content into beacons to broadcast performance or pricing information about their wireless network.  Another application is for APs to send location-specific advertisements or coupons to unassociated clients to advertise goods and services. For example you walk into a coffee shop and get a coupon to try the coffee of the day. 

 

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
10 Ways to Prepare Your IT Organization for the Next Crisis
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/20/2020
News
IT Spending Forecast: Unfortunately, It's Going to Hurt
Jessica Davis, Senior Editor, Enterprise Apps,  5/15/2020
Commentary
Helping Developers and Enterprises Answer the Skills Dilemma
Joao-Pierre S. Ruth, Senior Writer,  5/19/2020
White Papers
Register for InformationWeek Newsletters
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Slideshows
Flash Poll