Network Applications For Mobile Computing
Network Applications For Mobile Computing
Network Applications For Mobile Computing
Mobile computing, which enables real-time remote access to corporate networks from
a notebook computer, is now being spotlighted as notebook computers become smaller
and more complex, and ISDN, wireless networks, and cellular phones become more
popular. Unlike conventional networks, many problems encountered when construct-
ing mobile computing environments affect mobile computing users and network ad-
ministrators. This paper discusses these problems and introduces three
communications software products to help users overcome them.
creased 3 or 4 times.
5) Compliance with WINS protocol administrator for help in completing their work.
When multiple gateway machines equipped For instance, to print something, these users ask
with IR Gateway run on LAN and a mobile com- about which printer (and printer driver) to use,
puter is moved between each machine, the IP ad- or to pass files to someone, they ask about which
dress of the mobile computer on LAN will change network drive of which server should be shared.
dynamically. The IP address of the mobile com- The growing workload placed on intranet admin-
puter does not change, however, and registration istrators can no longer be ignored. To resolve such
in WINS is not updated. Consequently, the con- problems, we will implement the three features
tents of registration in WINS may differ from the described below.
actual IP address from the standpoint of LAN. To • Automatic configuration of the application
solve this problem, the gateway machine checks environment
the contents of WINS registration upon detecting This feature allows Network AccessDirector
a connection by IR. If the IP addresses do not servers to configure mobile computers automati-
match, the gateway machine updates the regis- cally according to the environment information set
tration instead of the mobile computer. by the administrator in advance so that mobile
users can use applications like browsers when
3.2 Network AccessDirector accessing the intranet in the field. Table 1 lists
Network AccessDirector is a product now examples of configuration items.
being developed. It allows employees who use • Automatic sharing of network drives
notebook computers or handheld PCs to access an When mobile users access the intranet in the
intranet more easily, while reducing the adminis- field using shared resources on the Network Ac-
trator’s intranet workload. cessDirector servers set by the administrator in
Network AccessDirector provides all the nec- advance, this feature maps network drives and
essary functions mentioned in Chapter 2 (e.g., au- creates shortcuts on the desktop.
tomatic configuration of network environment in- When a mobile computer is connected to the
formation, network security function) for workers network, files, Web pages and display notices for
dispatched to company offices or other companies. network users, as well as floor plans (showing the
1) Automatic configuration of network environ- location of printers, etc.) can be opened as the need
ment arises.
Mobile users wishing to access the intranet • Automatic sharing of printers
must first configure the address and other infor- When mobile users access the intranet in the
mation for each application (e.g., browser, mailer) field using shared resources on the Network Ac-
in addition to various network settings about the cessDirector servers set by the administrator in
TCP/IP stack. Such users often ask the intranet advance, this feature automatically configures the
File server WWW server Print server Mail server Network AccessDirector
Internet
Network AccessDirector
Mail server
(ISP)
Figure 3.
Mail transmitter.
Plug In
restricts access to critical information and protects
against leakage of internal information.
Figure 2. 4) Mail transmitter
Automatic configuration of network environment.
As a means of communication, e-mail is an
essential feature for mobile users. To receive mail
computer environment (for sharing network print- in the field, users must access the POP3 server in
ers and selecting printer drivers) and allows us- their HOME LAN (in the office) or transfer re-
ers to print. ceived mail to an account that can be accessed in
2) Automatic reconfiguration of the network the field. Accessing the server poses the problems
environment of cost and security. To transfer mail, users must
Thanks to this feature, a mobile computer is ask the mail server administrator to change the
automatically reconfigured and restored to the configuration in advance, which increases admin-
previous network settings made in the field. Au- istrative costs and may prove impossible in the
tomatic configuration and this automatic recon- event of a sudden business trip.
figuration allow mobile users to switch the con- To resolve such problems, Network Access-
figurations of mobile PCs automatically in Director provides the mail transmitter feature.
different network environments and access the The mail transmitter allows users in the field to
network without having to consider location (Fig- transfer mail addressed to the POP3 server in the
ure 2). HOME LAN (in the office) to their home (ISP) or
3) User authentication and restricted access mail account in the network without having to
The risk of internal information being leaked change the current configuration (of the POP3
exists whenever a mobile user uses another sec- server) and network settings of the home envi-
tion’s LAN environment. Network AccessDirec- ronment (Figure 3).
tor provides a function that authenticates users Mail transmitter works as a POP3 client. It
for access to the LAN environment and prevents operates as follows:
unauthenticated users from making such an ac- 1) Mobile users e-mail transmission requests
cess. Network AccessDirector provides another to the mail transmitter. The following infor-
function that blocks packets other than those of mation must be included: Authentication in-
specified services and addresses. This function formation, HOME LAN account, destination
note2) WebCross is a registered trademark of note4) FNA is the generic name of protocols used to
FUJITSU LIMITED. access Fujitsu mainframe computers.
note3) WSMGR is a registered trademark of note5) F6680/I3270 is the name of a device used to
FUJITSU LIMITED. access mainframe computers.
Akiyoshi Ochi received a B.S. degree Keiji Michine received an M.S. degree
in Electrical Engineering from Ehime in Mathematics from Ehime University
University in 1987. in 1983.
He joined PFU Ltd., Machida in 1987 He joined PFU Ltd., Machida in 1983
and has been engaged in the research and has been engaged in the research
and development of software for Inte- and development of mainframe connec-
grated Services Digital Network (ISDN) tivity software for personal computers.
and infrared (IR) communication.