mobile computing

Preview:

DESCRIPTION

good one to give seminar abt mobile computing

Citation preview

WELCOME TO

SEMINOR

SEMINAR ON

“MOBILE COMPUTING”

INTRODUCTION

Mobile simply describes computing device that is not restricted to a

desktop.

A mobile device may be a PDA ,a “small” cell phone or web phone ,a

laptop Computer, or any one of numerous other devices that allow the

user to complete computing tasks without being tethered ,or

connected.

What Is Mobile Computing?

What is computing? Operation of computers (according to oxfords advance learner’s dictionary).What is the mobile? That someone /something can move or be moved easily and quickly from place to place .What is mobile computing? Users with portable computers still have network connections while they move.

Why mobile computing?

Mobile data communications has become a hotly debated issue.

Interest surrounding paging, circuit-switched and packet –switching

networks has lit the fir for the debate and the announcement of

new-technology networks is adding fuel to the fire.

Voice telecommunication has been introduced by the mobile phone

and is spreading around all over the world like a contagious virus.

Where mobile computing?

Mobile phones

Cellular networks

Mobile phones

The fixed PSTN severely limits communications by forcing people

to be present at particular location for connection to be established

The need of new networks that provide the ability of mobile

communications is met

Cellular networks

The number of cellular subscribers world wide has been increased

to 40 million in only twelve years.

Each cell has a number of channels assigned to it which can

then be used by a subscriber.

Data communications Andmobility

Circuit switching

Packet switching

The senderThe receiverThe position of the packet in the messageThe actual message

CDPD technology

oThere are other alternatives to this technology namely circuit

switched cellular,specialised mobile radio and wireless data

Networks.

oCDPD networks allow fixed or mobile users to connect to the

network across a fixed link and a packet switched system

respectively.

CDPD overview

The hierarchy consists of the following levels.

•Mobile data intermediate

systems. .Mobile end user interface. •Mobile data base station.

CDPD NETWORK RELIABILITY

User Anonymity

Fraud prevention

Protection of user data

User Authentication

User Authentication:

The procedure which checks if the identify of the subscriberTransferred over the radio path corresponds with the details held in the network.

User Anonymity:

Instead of the actual directory telephone number, the international mobile subscriber identity number is used with in the network to uniquely identify a mobile subscriber.

Fraud Prevention:Protection against impersonation of authorized users and fraudulent use of the network is required.

Protection of user data:All the signals within the network are encrypted and the identification key is

never transmitted through the air. This ensures maximum network and data security.

Mobile DevicesGiga Information Group suggests a categorization of five different types of mobile devices:

Laptop computers

PDAs and handheld PCs

Pagers

Smart phones and cellular phones

Task devices, such as bar code scanners

Mobile Users

 

Telecommuters who work away from the office but connect directly to

the office from a remote location.

Casual telecommuters and other workers who work a few days per

month outside the office.

Predominantly mobile employees

APPLICATIONS OF MOBILE

COMPUTING For Estate Agents

Emergency Services

In courts

In companies

For Estate Agents

Estate agents can work either at home or out in the field. With mobile

computers they can be more productive.

They can obtain current real estate information by accessing multiple listing

services, which they can do from home, office or car when out with clients.

Emergency Services

Ability to receive information on the move services are involved.

Information regarding the address, type and other details of an

incident can be dispatched quickly, via a CDPD system using

mobile computers, to one or several appropriate mobile units

which are in the vicinity of the incident.

In courts

Defense counsels can take mobile computers in court. When the

opposing counsel references a case which they are not familiar, they

can use the computer to get direct, real-time access to on-line legal

database services, where they can gather information on the case

and related precedents.

In companies

Managers can use mobile computers in, say, critical presentations to

major customers.

They can access the latest market share information.

At a small recess, they can revise the presentation to take advantage of

this information.

Conclusion

Mobile computing is rapidly becoming popular, and user demand for

useful wireless applications is increasing. Additionally, this paper

shows how these behavioral extensions serve as a powerful

abstraction for practical systems

Recommended