Difference between revisions of "N800"

From PublicWiki
Jump to: navigation, search
 
Line 47: Line 47:
  
 
<p>
 
<p>
2. For the mobile P2P file sharing example, what are some of the questions that we would like to know? Why are the existing studies not sufficient?
+
2. For the mobile P2P file sharing example, what are some of the questions that we would like to answer? Why are the existing studies not sufficient?
 
</p>
 
</p>

Latest revision as of 21:51, 3 January 2008

The Nokia N800 Internet Tablet

Getting Started:

1. Flash the N800 with latest OS2007 image
2a. Get root with red pill
2b. Install xterm, ssh
3. Check out tutorial at http://maemo.org/development/documentation/tutorials/Maemo_tutorial_bora.html#settingup

Setting up the development environment:

4. Create an Ubuntu image for VMWare
5. Install Xorg and a window manager (Fluxbox)
6. Install VMare Tools

http://www.internettablettalk.com/forums/showthread.php?t=8241
7. Install scratchbox
8. Install and set up Maemo-SDK-3.1
9. Upgrade to 3.2
10. Install Xephyr

========================================================

Trying out the tutorials Couldn't install maemopad! ./configure apparently couldn't find intltool stuff,
so I had to manually copy those files from /scratchbox/devkits/doctools/share/intltool/* to .

It worked fine after that, and now I have maemopad installed

===========================================================

Potential ideas for measurement study

1. Lot of the existing measurement studies are focused towards modeling mobility and interaction time between users. The two primary consumers of these measurement studies have been: a) Simulating store-and-forward adhoc routing b) Understanding the propagation of malware in such mobile networks.

Questions asked in the malware propagation studies are typically: How fast would the malware spread? What percentage of the population is infected? How to contain the infected nodes? etc.

We could take this ahead and start with the assumption that we have 50 infected mobile nodes. Using this infrastructure, could we understand the dynamics of some wide area attack? An example of a wide area attack could be location tracking.

2. For the mobile P2P file sharing example, what are some of the questions that we would like to answer? Why are the existing studies not sufficient?