Upload
maheshwar-reddy
View
5
Download
1
Tags:
Embed Size (px)
DESCRIPTION
good one to give seminar abt mobile computing
Citation preview
WELCOME TO
SEMINOR
SEMINAR ON
“MOBILE COMPUTING”
INTRODUCTION
Mobile simply describes computing device that is not restricted to a
desktop.
A mobile device may be a PDA ,a “small” cell phone or web phone ,a
laptop Computer, or any one of numerous other devices that allow the
user to complete computing tasks without being tethered ,or
connected.
What Is Mobile Computing?
What is computing? Operation of computers (according to oxfords advance learner’s dictionary).What is the mobile? That someone /something can move or be moved easily and quickly from place to place .What is mobile computing? Users with portable computers still have network connections while they move.
Why mobile computing?
Mobile data communications has become a hotly debated issue.
Interest surrounding paging, circuit-switched and packet –switching
networks has lit the fir for the debate and the announcement of
new-technology networks is adding fuel to the fire.
Voice telecommunication has been introduced by the mobile phone
and is spreading around all over the world like a contagious virus.
Where mobile computing?
Mobile phones
Cellular networks
Mobile phones
The fixed PSTN severely limits communications by forcing people
to be present at particular location for connection to be established
The need of new networks that provide the ability of mobile
communications is met
Cellular networks
The number of cellular subscribers world wide has been increased
to 40 million in only twelve years.
Each cell has a number of channels assigned to it which can
then be used by a subscriber.
Data communications Andmobility
Circuit switching
Packet switching
The senderThe receiverThe position of the packet in the messageThe actual message
CDPD technology
oThere are other alternatives to this technology namely circuit
switched cellular,specialised mobile radio and wireless data
Networks.
oCDPD networks allow fixed or mobile users to connect to the
network across a fixed link and a packet switched system
respectively.
CDPD overview
The hierarchy consists of the following levels.
•Mobile data intermediate
systems. .Mobile end user interface. •Mobile data base station.
CDPD NETWORK RELIABILITY
User Anonymity
Fraud prevention
Protection of user data
User Authentication
User Authentication:
The procedure which checks if the identify of the subscriberTransferred over the radio path corresponds with the details held in the network.
User Anonymity:
Instead of the actual directory telephone number, the international mobile subscriber identity number is used with in the network to uniquely identify a mobile subscriber.
Fraud Prevention:Protection against impersonation of authorized users and fraudulent use of the network is required.
Protection of user data:All the signals within the network are encrypted and the identification key is
never transmitted through the air. This ensures maximum network and data security.
Mobile DevicesGiga Information Group suggests a categorization of five different types of mobile devices:
Laptop computers
PDAs and handheld PCs
Pagers
Smart phones and cellular phones
Task devices, such as bar code scanners
Mobile Users
Telecommuters who work away from the office but connect directly to
the office from a remote location.
Casual telecommuters and other workers who work a few days per
month outside the office.
Predominantly mobile employees
APPLICATIONS OF MOBILE
COMPUTING For Estate Agents
Emergency Services
In courts
In companies
For Estate Agents
Estate agents can work either at home or out in the field. With mobile
computers they can be more productive.
They can obtain current real estate information by accessing multiple listing
services, which they can do from home, office or car when out with clients.
Emergency Services
Ability to receive information on the move services are involved.
Information regarding the address, type and other details of an
incident can be dispatched quickly, via a CDPD system using
mobile computers, to one or several appropriate mobile units
which are in the vicinity of the incident.
In courts
Defense counsels can take mobile computers in court. When the
opposing counsel references a case which they are not familiar, they
can use the computer to get direct, real-time access to on-line legal
database services, where they can gather information on the case
and related precedents.
In companies
Managers can use mobile computers in, say, critical presentations to
major customers.
They can access the latest market share information.
At a small recess, they can revise the presentation to take advantage of
this information.
Conclusion
Mobile computing is rapidly becoming popular, and user demand for
useful wireless applications is increasing. Additionally, this paper
shows how these behavioral extensions serve as a powerful
abstraction for practical systems