SlideShare une entreprise Scribd logo
1  sur  39
Chapter 6



                Mobile, Wireless and
                Pervasive Computing




1   Chapter 6
Need for Mobile Computing-1
     To make computer small enough so that they can be easily
       carried around.
         Laptop computers were invented.
         PDAs and other handheld devices.
         Much lighter and more powerful in processing speed and
           storage.




2   Chapter 6
Need for Mobile Computing-2
     To replace wires with wireless communication media.
         Wireless systems used in radio, TV and telephones led to
           adaption of WCM to the computing environment




3   Chapter 6
Need for Mobile Computing-3
     To use mobile devices in a wireless environment.
         Wireless mobile computing: enables combination of a real-time
           connection between a mobile device and other computing
           environments such as Internet and intranet.




4   Chapter 6
-cont…
         Used in education, health care, entertainment, security.
         Available anywhere, anytime.




5   Chapter 6
Driving factors for Mobile computing :
    Intel Centrino Chip-2003
     Standard feature in most laptop.
     Capabilities:
         A connection device to a wireless LAN
         Low usage of electricity, enabling users to do more work on a
          single battery charge
         A high level of security




6   Chapter 6
Driving factors for Mobile computing :
    3G and 4G
     Introduction of 3rd generation and 4th generation wireless
      environments.
     Adoption of a Wi-fi as a wireless LAN




7   Chapter 6
Mobile Commerce
     The impact of mobile computing on human lives is very
      significant.
     It also has its impact occurring in the way of conducting the
      business.
     This impact is described as mobile commerce (also
      known as m-commerce and m-business),




8   Chapter 6
M-commerce/business
     M-commerce/business is basically any e-commerce or e-
       business done in a wireless environment, especially via the
       Internet.




9   Chapter 6
-cont…
      m-commerce can be done via
          the Internet,
          private communication lines,
          smart cards, or other infrastructures




10   Chapter 6
-cont…
      M-commerce is a variation on existing Internet services;
      it is a natural extension of e-business.
      Mobile devices create an opportunity to deliver new services
        to existing customers and to attract new ones




11   Chapter 6
Mobile Computing Basic Terminology
      Global positioning system (GPS).
         A     satellite-based tracking system that enables the
            determination of a GPS device’s location.




12   Chapter 6
Mobile Computing Basic Terminology
      Personal digital assistant (PDA).
          A small portable computer, such as the family of Palm
            handhelds and the Pocket PC devices from companies like HP.




13   Chapter 6
Mobile Computing Basic Terminology
      Short Message Service (SMS)
          A technology, in existence since 1991, that allows for the
           sending of short text messages.
          SMS messages can be sent or received concurrently, even
           during a voice or data call.
          Used by hundreds of millions of users, SMS is known as the e-
           mail of m-commerce.




14   Chapter 6
Mobile Computing Basic Terminology
      Enhanced Messaging Service (EMS).
          An extension of SMS that is capable of simple animation,
            tiny pictures, and short melodies.




15   Chapter 6
Mobile Computing Basic Terminology
      Multimedia Messaging Service (MMS).
          The    next generation of wireless messaging, this
            technology will be able to deliver rich media.




16   Chapter 6
Mobile Computing Basic Terminology
      Bluetooth.
          A chip technology wireless standard designed for
            temporary, short-range connection (data and voice) among
            mobile devices and/or other devices




17   Chapter 6
Mobile Computing Basic Terminology
      Wireless Application Protocol (WAP).
          A technology that offers Internet browsing from wireless
            devices




18   Chapter 6
Mobile Computing Basic Terminology
      Smartphones
          Internet-enabled cell phones that can support mobile
           applications.
          These “phones with a brain” are becoming standard devices.
          They include WAP microprocessors for Internet access and the
           capabilities of PDAs as well.




19   Chapter 6
Mobile Computing Basic Terminology
      Wi-Fi (short for wireless fidelity)
          Refers to a standard 802.11b on which most of the wireless
            local area networks (WLANs) run.




20   Chapter 6
Mobile Computing Basic Terminology
      WLAN (wireless local area network)
          A broad term for all 802.11 standards.
          Basically, it is a wireless version of the Ethernet networking
            standard.




21   Chapter 6
Attributes and Drivers of Mobile
     Computing
      Mobility
      Broad reach




22   Chapter 6
Mobility
      Mobile computing and m-commerce are based on the
        fact that users carry a mobile device everywhere they go.
          Mobility implies portability.
          Users can initiate a real-time contact with other systems from
            wherever they happen to be if they can connect to a wireless
            network.




23   Chapter 6
Broad Reach
      In mobile computing, people can be reached at any time.
          Of course, users can block certain hours or certain messages,
            but when users carry an open mobile device, they can be
            reached instantly.




24   Chapter 6
Value-added attributes
      attributes that drive the development of m-commerce:
          ubiquity,
          convenience,
          instant connectivity,
          personalization, and
          localization of products and services




25   Chapter 6
Drivers Of Mobile Computing And M-
     commerce
      Widespread Availability of Mobile Devices
      No Need for a PC
      The Handset Culture
      Vendors’ Push
      Declining Prices and Increased Functionalities
      Improvement of Bandwidth




26   Chapter 6
M-Commerce Value Chain and
     Revenue Models
      m-commerce is a complex process involving a number of
        operations and a number of players (customers, merchants,
        mobile operators, and the like)




27   Chapter 6
Mobile Computing – Value Chain

 Link               Function                                   Provider

 Transport          Maintenance and operation of the Technology
                    infrastructure      supporting data platform
                    communication between mobile users  vendors
                    and application providers
 Enabling           Server hosting, data backup, and system Infrastructure
    services           integration                              equipment
                                                                vendors
 Transaction        Mechanisms        for     assisting   with Application
    support         transactions, security, and billing          platform
                                                                 vendor
 Presentation       Conversion of content of Internet-based Application
    services        applications to applications suitable for developer
28      Chapter 6   mobile devices
Mobile Computing – Value Chain
 Link               Function                             Provider


 Personalization    Gathering of users’ preferences, Content developer
    support         information, and devices in order to
                    provide individualized applications


 User               General and specialized applications Mobile     service
    applications      for mobile users                     provider

 Content            Design and operation of portals that Mobile     portal
   aggregators      offer categorized information and      provider
                    search facilities


29      Chapter 6
WLAN
      A wireless LAN (WLAN) is like a wired LAN without
       the cables.
      WLANs transmit and receive data over the airwaves.




30   Chapter 6
Wi-fi
      a transmitter with an antenna, called a wireless access point,
        connects to a wired LAN from a fixed location or to satellite
        dishes that provide an Internet connection.




31   Chapter 6
-cont…
      A wireless access point provides service to a number of users
        within a small geographical perimeter (up to a couple
        hundred feet), known as a “hot spot” or hotspot zone.




32   Chapter 6
 Several wireless access points are needed to support larger
       numbers of users across a larger geographical area.
      End users can access a WLAN with their laptops, desktops,
       or PDAs by adding a wireless network card.




33   Chapter 6
Wireless Personal Area Networks
     (Wpans)
      A wireless personal area network (WPAN) is a kind of WLAN that
        people have at their home offices.




34   Chapter 6
-cont…
      With 6.2 MOBILE COMPUTING INFRASTRUCTURE
        249 Wireless Local Area Networks and Wi-Fi such a
        network,
          one can connect PCs, PDAs, mobile phones, and digital music
            players that detect each other and can interact




35   Chapter 6
Problems with Wi-Fi
        Roaming – users cannot roam from hotspot to hotspot if the
          hotspots use different Wi-Fi network services

        Security – because Wi-Fi uses radio waves, it is difficult to
          protect

        Cost – commercial Wi-Fi services are low cost but not free and
          each service has its own fees and separate accounts for users to
          logon




36     Chapter 6
Mobile Computing Infrastructure   – WWAN’s




37     Chapter 6
Mobile Computing – L-Commerce Applications




38     Chapter 6
Landscape of Mobile Computing




39   Chapter 6

Contenu connexe

Tendances

Supelec M2M, IoT - course - conclusions - 2012
Supelec   M2M, IoT - course - conclusions - 2012Supelec   M2M, IoT - course - conclusions - 2012
Supelec M2M, IoT - course - conclusions - 2012Thierry Lestable
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Interworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networksInterworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networksMichal Jarski
 
Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008eComm2008
 
Fixed mobile convergence (fmc)
Fixed mobile convergence (fmc)Fixed mobile convergence (fmc)
Fixed mobile convergence (fmc)IEEE VESIT
 
P1 WiMAX Frontlines
P1 WiMAX FrontlinesP1 WiMAX Frontlines
P1 WiMAX FrontlinesGreen Packet
 
Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Justus @GreenPacket
 
Next Decade for WiMAX - WiMAX 2.0
Next Decade for WiMAX - WiMAX 2.0Next Decade for WiMAX - WiMAX 2.0
Next Decade for WiMAX - WiMAX 2.0Green Packet
 
SP Wi-Fi White Paper - CCI Systems
SP Wi-Fi White Paper - CCI SystemsSP Wi-Fi White Paper - CCI Systems
SP Wi-Fi White Paper - CCI SystemsEric Hurzeler
 
UMAandFemtocells-MakingFMCHappen
UMAandFemtocells-MakingFMCHappenUMAandFemtocells-MakingFMCHappen
UMAandFemtocells-MakingFMCHappenPartho Choudhury
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile ConvergenceInderjeet Singh
 
Supelec m2m - iot - update 2013 - part 3
Supelec  m2m - iot - update 2013 - part 3Supelec  m2m - iot - update 2013 - part 3
Supelec m2m - iot - update 2013 - part 3Thierry Lestable
 
Technologies in the Networked Society, IP Networks in transition
Technologies in the Networked Society, IP Networks in transitionTechnologies in the Networked Society, IP Networks in transition
Technologies in the Networked Society, IP Networks in transitionEricsson Slides
 
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessJuniper Networks
 
IMT Lecture: Mobile Device & Mobile Operation Systems
IMT Lecture: Mobile Device & Mobile Operation SystemsIMT Lecture: Mobile Device & Mobile Operation Systems
IMT Lecture: Mobile Device & Mobile Operation SystemsDjadja Sardjana
 

Tendances (20)

Supelec M2M, IoT - course - conclusions - 2012
Supelec   M2M, IoT - course - conclusions - 2012Supelec   M2M, IoT - course - conclusions - 2012
Supelec M2M, IoT - course - conclusions - 2012
 
M2M Strategies
M2M StrategiesM2M Strategies
M2M Strategies
 
Managing the Internet of Things
Managing the Internet of ThingsManaging the Internet of Things
Managing the Internet of Things
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Virtuora Catalog_lowres
Virtuora Catalog_lowresVirtuora Catalog_lowres
Virtuora Catalog_lowres
 
Interworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networksInterworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networks
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008
 
Fixed mobile convergence (fmc)
Fixed mobile convergence (fmc)Fixed mobile convergence (fmc)
Fixed mobile convergence (fmc)
 
P1 WiMAX Frontlines
P1 WiMAX FrontlinesP1 WiMAX Frontlines
P1 WiMAX Frontlines
 
Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2
 
Next Decade for WiMAX - WiMAX 2.0
Next Decade for WiMAX - WiMAX 2.0Next Decade for WiMAX - WiMAX 2.0
Next Decade for WiMAX - WiMAX 2.0
 
SP Wi-Fi White Paper - CCI Systems
SP Wi-Fi White Paper - CCI SystemsSP Wi-Fi White Paper - CCI Systems
SP Wi-Fi White Paper - CCI Systems
 
UMAandFemtocells-MakingFMCHappen
UMAandFemtocells-MakingFMCHappenUMAandFemtocells-MakingFMCHappen
UMAandFemtocells-MakingFMCHappen
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
 
Supelec m2m - iot - update 2013 - part 3
Supelec  m2m - iot - update 2013 - part 3Supelec  m2m - iot - update 2013 - part 3
Supelec m2m - iot - update 2013 - part 3
 
Technologies in the Networked Society, IP Networks in transition
Technologies in the Networked Society, IP Networks in transitionTechnologies in the Networked Society, IP Networks in transition
Technologies in the Networked Society, IP Networks in transition
 
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper Wireless
 
Sw Wp Smart Grid
Sw Wp Smart GridSw Wp Smart Grid
Sw Wp Smart Grid
 
IMT Lecture: Mobile Device & Mobile Operation Systems
IMT Lecture: Mobile Device & Mobile Operation SystemsIMT Lecture: Mobile Device & Mobile Operation Systems
IMT Lecture: Mobile Device & Mobile Operation Systems
 

En vedette

En vedette (7)

Unit3
Unit3Unit3
Unit3
 
Unit4
Unit4Unit4
Unit4
 
Unit6
Unit6Unit6
Unit6
 
Unit5
Unit5Unit5
Unit5
 
Unit2
Unit2Unit2
Unit2
 
Arrive RoomPoint
Arrive RoomPointArrive RoomPoint
Arrive RoomPoint
 
Unit 1 introduction to visual basic programming
Unit 1 introduction to visual basic programmingUnit 1 introduction to visual basic programming
Unit 1 introduction to visual basic programming
 

Similaire à Ch6

373_23865_CR315_2011_1__2_1_CH09 Mobile Computing.ppt
373_23865_CR315_2011_1__2_1_CH09 Mobile Computing.ppt373_23865_CR315_2011_1__2_1_CH09 Mobile Computing.ppt
373_23865_CR315_2011_1__2_1_CH09 Mobile Computing.pptNilamHonmane
 
Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityKAILASH CHAUHAN
 
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFIA CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFIJose Katab
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
Fundamentals in Wimax
Fundamentals in  WimaxFundamentals in  Wimax
Fundamentals in WimaxDehbi Sahbi
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteAviat Networks
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesCognizant
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 

Similaire à Ch6 (20)

373_23865_CR315_2011_1__2_1_CH09 Mobile Computing.ppt
373_23865_CR315_2011_1__2_1_CH09 Mobile Computing.ppt373_23865_CR315_2011_1__2_1_CH09 Mobile Computing.ppt
373_23865_CR315_2011_1__2_1_CH09 Mobile Computing.ppt
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivity
 
Ch09
Ch09Ch09
Ch09
 
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFIA CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
A017220112
A017220112A017220112
A017220112
 
Fundamentals in Wimax
Fundamentals in  WimaxFundamentals in  Wimax
Fundamentals in Wimax
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell Site
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
5g tech
5g tech5g tech
5g tech
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile Devices
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Manet overview
Manet overviewManet overview
Manet overview
 

Plus de Abha Damani (20)

Ch14
Ch14Ch14
Ch14
 
Ch12
Ch12Ch12
Ch12
 
Ch11
Ch11Ch11
Ch11
 
Ch10
Ch10Ch10
Ch10
 
Ch08
Ch08Ch08
Ch08
 
Ch01 enterprise
Ch01 enterpriseCh01 enterprise
Ch01 enterprise
 
3 data mgmt
3 data mgmt3 data mgmt
3 data mgmt
 
2 it supp_sys
2 it supp_sys2 it supp_sys
2 it supp_sys
 
1 org.perf it supp_appl
1 org.perf it supp_appl1 org.perf it supp_appl
1 org.perf it supp_appl
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
Unit2
Unit2Unit2
Unit2
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 5
Unit 5Unit 5
Unit 5
 
Unit 6
Unit 6Unit 6
Unit 6
 
Unit 1
Unit 1Unit 1
Unit 1
 
Language processor
Language processorLanguage processor
Language processor
 
Introduction to compiler
Introduction to compilerIntroduction to compiler
Introduction to compiler
 
Function of device driver
Function of device driverFunction of device driver
Function of device driver
 
Unit 3 assembler and processor
Unit 3   assembler and processorUnit 3   assembler and processor
Unit 3 assembler and processor
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Dernier (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Ch6

  • 1. Chapter 6 Mobile, Wireless and Pervasive Computing 1 Chapter 6
  • 2. Need for Mobile Computing-1  To make computer small enough so that they can be easily carried around.  Laptop computers were invented.  PDAs and other handheld devices.  Much lighter and more powerful in processing speed and storage. 2 Chapter 6
  • 3. Need for Mobile Computing-2  To replace wires with wireless communication media.  Wireless systems used in radio, TV and telephones led to adaption of WCM to the computing environment 3 Chapter 6
  • 4. Need for Mobile Computing-3  To use mobile devices in a wireless environment.  Wireless mobile computing: enables combination of a real-time connection between a mobile device and other computing environments such as Internet and intranet. 4 Chapter 6
  • 5. -cont…  Used in education, health care, entertainment, security.  Available anywhere, anytime. 5 Chapter 6
  • 6. Driving factors for Mobile computing : Intel Centrino Chip-2003  Standard feature in most laptop.  Capabilities:  A connection device to a wireless LAN  Low usage of electricity, enabling users to do more work on a single battery charge  A high level of security 6 Chapter 6
  • 7. Driving factors for Mobile computing : 3G and 4G  Introduction of 3rd generation and 4th generation wireless environments.  Adoption of a Wi-fi as a wireless LAN 7 Chapter 6
  • 8. Mobile Commerce  The impact of mobile computing on human lives is very significant.  It also has its impact occurring in the way of conducting the business.  This impact is described as mobile commerce (also known as m-commerce and m-business), 8 Chapter 6
  • 9. M-commerce/business  M-commerce/business is basically any e-commerce or e- business done in a wireless environment, especially via the Internet. 9 Chapter 6
  • 10. -cont…  m-commerce can be done via  the Internet,  private communication lines,  smart cards, or other infrastructures 10 Chapter 6
  • 11. -cont…  M-commerce is a variation on existing Internet services;  it is a natural extension of e-business.  Mobile devices create an opportunity to deliver new services to existing customers and to attract new ones 11 Chapter 6
  • 12. Mobile Computing Basic Terminology  Global positioning system (GPS). A satellite-based tracking system that enables the determination of a GPS device’s location. 12 Chapter 6
  • 13. Mobile Computing Basic Terminology  Personal digital assistant (PDA).  A small portable computer, such as the family of Palm handhelds and the Pocket PC devices from companies like HP. 13 Chapter 6
  • 14. Mobile Computing Basic Terminology  Short Message Service (SMS)  A technology, in existence since 1991, that allows for the sending of short text messages.  SMS messages can be sent or received concurrently, even during a voice or data call.  Used by hundreds of millions of users, SMS is known as the e- mail of m-commerce. 14 Chapter 6
  • 15. Mobile Computing Basic Terminology  Enhanced Messaging Service (EMS).  An extension of SMS that is capable of simple animation, tiny pictures, and short melodies. 15 Chapter 6
  • 16. Mobile Computing Basic Terminology  Multimedia Messaging Service (MMS).  The next generation of wireless messaging, this technology will be able to deliver rich media. 16 Chapter 6
  • 17. Mobile Computing Basic Terminology  Bluetooth.  A chip technology wireless standard designed for temporary, short-range connection (data and voice) among mobile devices and/or other devices 17 Chapter 6
  • 18. Mobile Computing Basic Terminology  Wireless Application Protocol (WAP).  A technology that offers Internet browsing from wireless devices 18 Chapter 6
  • 19. Mobile Computing Basic Terminology  Smartphones  Internet-enabled cell phones that can support mobile applications.  These “phones with a brain” are becoming standard devices.  They include WAP microprocessors for Internet access and the capabilities of PDAs as well. 19 Chapter 6
  • 20. Mobile Computing Basic Terminology  Wi-Fi (short for wireless fidelity)  Refers to a standard 802.11b on which most of the wireless local area networks (WLANs) run. 20 Chapter 6
  • 21. Mobile Computing Basic Terminology  WLAN (wireless local area network)  A broad term for all 802.11 standards.  Basically, it is a wireless version of the Ethernet networking standard. 21 Chapter 6
  • 22. Attributes and Drivers of Mobile Computing  Mobility  Broad reach 22 Chapter 6
  • 23. Mobility  Mobile computing and m-commerce are based on the fact that users carry a mobile device everywhere they go.  Mobility implies portability.  Users can initiate a real-time contact with other systems from wherever they happen to be if they can connect to a wireless network. 23 Chapter 6
  • 24. Broad Reach  In mobile computing, people can be reached at any time.  Of course, users can block certain hours or certain messages, but when users carry an open mobile device, they can be reached instantly. 24 Chapter 6
  • 25. Value-added attributes  attributes that drive the development of m-commerce:  ubiquity,  convenience,  instant connectivity,  personalization, and  localization of products and services 25 Chapter 6
  • 26. Drivers Of Mobile Computing And M- commerce  Widespread Availability of Mobile Devices  No Need for a PC  The Handset Culture  Vendors’ Push  Declining Prices and Increased Functionalities  Improvement of Bandwidth 26 Chapter 6
  • 27. M-Commerce Value Chain and Revenue Models  m-commerce is a complex process involving a number of operations and a number of players (customers, merchants, mobile operators, and the like) 27 Chapter 6
  • 28. Mobile Computing – Value Chain Link Function Provider Transport Maintenance and operation of the Technology infrastructure supporting data platform communication between mobile users vendors and application providers Enabling Server hosting, data backup, and system Infrastructure services integration equipment vendors Transaction Mechanisms for assisting with Application support transactions, security, and billing platform vendor Presentation Conversion of content of Internet-based Application services applications to applications suitable for developer 28 Chapter 6 mobile devices
  • 29. Mobile Computing – Value Chain Link Function Provider Personalization Gathering of users’ preferences, Content developer support information, and devices in order to provide individualized applications User General and specialized applications Mobile service applications for mobile users provider Content Design and operation of portals that Mobile portal aggregators offer categorized information and provider search facilities 29 Chapter 6
  • 30. WLAN  A wireless LAN (WLAN) is like a wired LAN without the cables.  WLANs transmit and receive data over the airwaves. 30 Chapter 6
  • 31. Wi-fi  a transmitter with an antenna, called a wireless access point, connects to a wired LAN from a fixed location or to satellite dishes that provide an Internet connection. 31 Chapter 6
  • 32. -cont…  A wireless access point provides service to a number of users within a small geographical perimeter (up to a couple hundred feet), known as a “hot spot” or hotspot zone. 32 Chapter 6
  • 33.  Several wireless access points are needed to support larger numbers of users across a larger geographical area.  End users can access a WLAN with their laptops, desktops, or PDAs by adding a wireless network card. 33 Chapter 6
  • 34. Wireless Personal Area Networks (Wpans)  A wireless personal area network (WPAN) is a kind of WLAN that people have at their home offices. 34 Chapter 6
  • 35. -cont…  With 6.2 MOBILE COMPUTING INFRASTRUCTURE 249 Wireless Local Area Networks and Wi-Fi such a network,  one can connect PCs, PDAs, mobile phones, and digital music players that detect each other and can interact 35 Chapter 6
  • 36. Problems with Wi-Fi  Roaming – users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services  Security – because Wi-Fi uses radio waves, it is difficult to protect  Cost – commercial Wi-Fi services are low cost but not free and each service has its own fees and separate accounts for users to logon 36 Chapter 6
  • 37. Mobile Computing Infrastructure – WWAN’s 37 Chapter 6
  • 38. Mobile Computing – L-Commerce Applications 38 Chapter 6
  • 39. Landscape of Mobile Computing 39 Chapter 6