In terms of application enhancements, thumb-
tribes could benefit from numerous additions. One
such addition could be a location-oriented event sys-
tem. The user would be able to enter details of an
event and supply coordinates. Other users would then
be able to pick up these events when in a defined
proximity. Tagged locations could be another useful
thumbtribes addition. Here users could walk around
an area and tag locations with a short description.
This information could also then be available to other
local users. Many similar location-aware features
could be implemented, all of which benefit from the
low-bandwidth protocol employed in the thumbtribes
system. The current development version of thumb-
tribes is being built as a plugin to an open source IRC
client. Rather than embed thumbtribes functionality,
a special purpose client could be created. The ideal
client would mask the fact IRC is being used as the
underlying communication protocol. This would al-
low a more simplistic and user-friendly interface for
mobile phones to be built.
7 CONCLUSION
Users have become accustomed to a certain level of
quality of service from the broadband connections
they use at home. In contrast to a typical broadband
connection, a mobile network is likely to have less
bandwidth as well as exhibit higher packet loss in
conjunction with increased round trip times. The mo-
bile network operator might also apply a usage tar-
iff. Often when applications are ported from a desk-
top environment to mobile environment they will lack
consideration for these issues. In addition, it is of-
ten more straightforward for mobile application de-
velopers to design network protocols based on popu-
lar standards such as XML. Unfortunately such stan-
dards can be verbose, even after applying well known
compression techniques. The thumbtribes project
demonstrated this by comparing gzip compression
with packedobjects encoding. The bulk of the traffic
generated during a thumbtribes session occurs during
its location request/response cycle. Here the client pe-
riodically sends a small message to the server contain-
ing geographic coordinates. Tests showed that while
packedobjects encoding was able to offer significant
levels of compression, gzip compression actually in-
creased the size of the original message. When larger
message sizes were examined, packedobjects was
able to reduce typical message sizes on average by
62% compared to when gzip was used. The signif-
icance of these savings depends on usage. However,
with today’s multi-tasking phones, it is not an uncom-
mon requirement to be able to leave an application
running in the background. In such circumstances, it
is easy to show why reducing costs on a metered net-
work is important.
REFERENCES
Barr, M. and Massa, A. (2006). Programming Embedded
Systems. O’Reilly.
Crispin, M. (1988). Interactive Mail Access Proto-
col: Version 2, Request for Comments: 1064.
http://www.ietf.org/rfc/rfc1064.txt.
Deutsch, P. (1996). GZIP file format specifica-
tion version 4.3, Request for Comments: 1952.
http://www.ietf.org/rfc/rfc1952.txt.
LaMance, J., DeSalas, J., and Jarvinen, J. (2002).
Assisted GPS: A Low-Infrastructure Approach.
http://www.gpsworld.com/gpsworld/article/articleDe
tail.jsp?id=12287.
McCarthy, J. (1960). Recursive Functions of Symbolic Ex-
pressions and Their Computation by Machine, Part I.
Communications of the ACM, 3(4):184–195.
Moore, J. (2006a). Developing on hand-
helds, University of Birmingham.
http://www.cs.bham.ac.uk/internal/courses/comm-
prog/slides/moore.pdf.
Moore, J. (2006b). packedobjects. In WINSYS 2006 In-
ternational Conference on Wireless Information Net-
works and Systems.
Moore, J. (2007). packedobjects. http://packedobjects.com.
Oikarinen, J. and Reed, D. (1993). Internet Re-
lay Chat Protocol, Request for Comments: 1459.
http://www.ietf.org/rfc/rfc1459.txt.
Rivest, R. and Lampson, B. (1996). SDSI - A
Simple Distributed Security Infrastructure.
http://theory.lcs.mit.edu/ rivest/sdsi10.html.
Saint-Andre, P. (2004). Extensible Messaging and
Presence Protocol (XMPP): Instant Messaging
and Presence, Request for Comments: 3921.
http://www.ietf.org/rfc/rfc3921.txt.
Winkelmann, F. (2007). Chicken Scheme. http://www.call-
with-current-continuation.org/.
WINSYS 2007 - International Conference on Wireless Information Networks and Systems
202