The document discusses various aspects of mobile devices including what they are, types of mobile devices, mobile operating systems, form factors over time, trends in accessories, security issues, and effects of mobile devices. It covers topics like smartphones, tablets, e-readers, features of mobile OSs like Android and iOS, and potential future technologies such as augmented reality, foldable screens, voice control, and holograms.
2. What is a Mobile Device?
- What is a Smart Mobile Device?
Types of Mobile Devices
Mobile Operating System
- Features of Mobile OS
- Popular Mobile Operating Systems
Form Factors: Then & Now
Recent Trends in Smart Device Accessories
Mobile Device Security
Positive Effects of Mobile Device
Negative Effects of Mobile Device
Some Key Features to Expect in the Future
3. A mobile device is a small handheld and
extremely portable computing device having a
display screen with touch input or miniature
keyboard.
4. It is a device that has:
the ability to connect to the internet
supports user input and interaction
autonomous operationality
offers multiple functionality
light weight and small size
5.
6.
7. Wireless, portable personal computer
Touch screen interface
Form factor smaller than notebook but larger
than smartphone.
Idea of tablet came from Alan Kay of Xerox in
1971.
First Widely sold tablet was Apple’s Newton
which was not a commercial success.
Most common type today is slate style e.g.,
Apple’s iPad, Microsoft’s Surface, Amazon
Kindle Fire, etc.
8.
9. E-book is electronic version of traditional print
book.
Have either an e-paper display or LCD display.
e-paper or electronic paper usually displays in
black & white.
It’s not backlit, so it’s not a trouble out in the
sun.
Doesn’t support videos or other apps because
refresh rate is too low.
LCD is the screen found in laptops and
computers.
Coloured & versatile but more difficult to view in
bright sunlight.
10.
11. Cellular device with integrated computer and
other features not associated with telephones.
Has operating system, web browsing and ability
to run software applications.
Either have a virtual keyboard or physical one.
First smartphone was IBM’s Simon, which was
presented as a concept device at the 1992
COMDEX computer industry trade show.
12. A mobile operating system (or mobile OS) is a
system software that manages the device’s
hardware and software resources and provides
common services for its programs.
13. touchscreen
cellular
bluetooth
WiFi
GPS navigation
camera
speech recognition
voice recorder
music player
near field
communication
infrared blaster
Along with the features of a personal
computer, mobile OS also has
14.
15. • Android is an open source,
Linux-derived platform backed
by Google Inc. along with major
hardware and software
developers.
• It has the largest installed
base worldwide on
smartphones.
• Currently Android Lollipop
(Android 5.1.1) is available.
16. • A closed source platform.
•.Built on open source Darwin core
OS.
• Earlier called iPhone OS is
created and developed by Apple
Inc.
• Distributed exclusively for Apple
Hardware such as iPhone, iPad,
iPod Touch and second generation
Apple TV.
17. • The third largest
installed base on
smartphones behind
Android and iOS
• From Microsoft.
• It is a closed source
and proprietary
platform.
18. Some other prominent mobile OS are BlackBerry,
Firefox OS, Sailfish OS, Tizen, Ubuntu Touch OS.
21. Also referred to as “candy bar”, this is
the most basic of handset form factors.
The phone is rectangular in shape, and
does not have any hinges or moving
parts.
You’ll find a display screen and the
standard set of number keys.
Depending upon the specific phone
model, you may also find soft keys,
‘answer’ and ‘end’ buttons, and
navigation keys.
The screen and all these keys are placed
on the front of the device.
Since the keys are exposed, most phones
using this form factor also provide a key-
guard feature.
22. Most components including the
screen and the keys are placed on
the bottom half of the phone.
The top half is usually a plastic flap
that folds on top.
Depending upon the phone model,
the top half may contain a speaker
and even a transparent window
that enables the user to see a
portion of the screen when the
phone is closed.
The visible part of the screen
displays the time and caller ID
information.
23. The phone has two parts - one
with the screen and speakers
along with some keys, and the
other half containing the main
keypad.
However, instead of folding, the
bottom half with the keypad
slides out from under the top half.
This kind of design also allows the
phone to be quite small.
Also, in most cases, you can
perform certain operations such
as answering and ending calls and
accessing the phone book and call
history without opening the slider.
24. This is the form factor which is
in common use nowadays.
Smartphones, tablets,
phablets, e-book readers, etc.
have this kind of form.
A touchscreen or slate phone
is a subset of the bar form that
has few physical buttons,
instead relying upon
touchscreen and an onscreen
QWERTY keyboard.
25. Bluetooth keyboards, phone covers that double as keys, and styli
(either built-in, or third-party, which you keep in your pocket) are
growing in popularity and getting better too.
LG recently came up with a foldable and ultra-portable keypad
which rolls itself to fit anywhere, called the LG Rolly.
The keypad houses a remarkable design and a feature that lets you
roll the keypad into a cube, so it can be more portable when not in
use.
Microsoft also has a foldable keyboard you can slip into your
pocket, which works with Android and iOS.
Samsung's Note series of phones meanwhile has always made great
use of the stylus, and Apple revealed the Apple Pencil recently as
well, albeit it works with only one iPad model right now.
26. There are different levels of security that a
wireless network can provide.
Building on levels of security a network can
provide, there are multiple types of
encryption.
27. The oldest and least secure of these different
security levels is Wired Equivalent Privacy
(WEP) (introduced in 1999).
This form of security for wireless networks is
rarely used anymore due to its many security
flaws.
28. Wi-Fi Protected Access (WPA) provides a more
secure way of connecting to the network than WEP.
Two different modes exist, personal mode or
preshared key (PSK) and enterprise or WPA-802.1X.
PSK is most often used in small offices and homes,
since it is meant for small amount of users.
Enterprise mode means that the user is using a
username and password, or digital certificate, to
authenticate to a server rather than using a
preshared key.
29. The 802.11i standard, or WPA2, was released in
2004 and improves on the security mechanisms
that WPA uses.
WPA2 has the same two different modes that
WPA has.
30. Hashing is a technique used to secure a user’s
password.
It is essentially a complicated algorithm.
There are many different hashing algorithms
out there: SHA1, MD6, SHA256, etc.
31. MS-CHAP is the Microsoft version of the
Challenge-Handshake Authentication
Protocol (CHAP).
There are two versions of the protocol, MS-
CHAPv1 and MS-CHAPv2.
MS-CHAPv1 is very weak and easy to crack
but MS-CHAPv2 solves this disadvantage.
32. The working cycle of CHAP authentication. Once the link has
been established, the authenticator sends a challenge
message to the peer. Both the client and the server must know
the challenge; in this case, “pizza.”
33.
34. They are lightweight, small size and portability.
We can stay with our loves ones anywhere
anytime.
So, it is the best way of communication.
35. Mobile device is nothing but a complete
portable entertainment devices.
It entertains us on the go.
These devices have super impressive features
related to entertainment.
36. In both fields, it has become a compulsory
gadget.
Students can access internet on the go, and
thus can get knowledge of any topic they wish
to.
The business persons can keep themselves
updated with the markets, also they can stay n
touch with their employees and clients.
37.
38. Students are getting addicted to mobile
phones.
They can be seen playing games or chatting.
It has become more of a waste of time.
39. Many accidents happen because of mobile
devices.
These have resulted in dangerous driving.
It has bad impact on health too.
Harmful rays of damage our health.
40.
41. The term ‘augmented reality’ or AR when used in the
context of computer technology refers to what we
perceive through our senses (usually sight)
enhanced through the use of computer-generated
sensory input such as sound, video, graphics and
GPS data.
42. It is the technology of OLED (Organic Light Emitting
Diode) in which screens can be folded and
unfolded. This paper-thin screen can even project
from both sides of the screen.
43. Using a built-in DLP (Digital Light Projection), WVGA
projectors can project device’s screen to 50 inches
in size at 15 lumens.
Samsung Galaxy Beam was released back in the
second half of 2010 with similar technology.
44. The interest with voice control for computers and
especially smartphones has always been there since
the pioneer MIT research, "Put That There" studied
different ways to communicate with computers in
1980.
Voice control exists in many devices, such as Siri in
Apple devices. Research has been made to advance
the development of voice control. That, combined
with gestures may bring interactivity to a new level
for smart devices and their users.
45. After Apple’s ‘Retina display’ which can actually
provide a resolution that is sharper than what the
human eye can perceive, companies are moving from
2D to 3D screens.
At present, we have a couple of 3D smartphones in the
market, such as the LG Optimus 3D, the Motorola
MT810 as well as the very first Samsung AMOLED 3D.
46. Holographic projections will mean a combination of 3D
screen devices and projections from the it.
According to Mobiledia Network, MasterImage 3D had
previously showcased their ongoing development on a
projection system that allows smartphones to display
3D holograms at the annual Mobile World Congress.
47. Mobile Devices: Tools & Technologies by Lauren
Collins and Scott R. Ellis
Digit Fast Track to Mobile Telephony
Gartner Inc. website
searchmobilecomputing.techtarget.com
www.hongkiat.com