Mobile computing

38,707 views 16 slides Nov 07, 2016
Slide 1
Slide 1 of 16
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16

About This Presentation

Mobile computing:Introduction,History,Function and its types,productivity,connectivity,cloud computing,cellular boadband,wifi ,security,mobile computing vs ubiquitous computing,challenges,Future wireless network and computing.


Slide Content

Mobile Computing presentation

What is Mobile Computing Mobile computing is a technology that allows transmission of data,voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.

History Developments in mobile technology have led to many different types of mobile computing . Though mobile computing technology has existed since the 1980s,it was in the late 1990s and 2000s that advances in the technology put it into the hands of numerous consumers.

Mobile computing function User mobility Network mobility Device mobility

User mobility User mobility refers to a user who has access to the same or similar telecommunication service at different place.i.e.the user can be a mobile and the service will follow him. Network mobility Network mobility is the mobility of an entire network that changes its point of attachment to internet as a single unit .

Device mobility Device mobility is a new feature of CUCM allows CUCM endpoint to be dynamically reconfigured based on their actual location as determine by the IP address that is used by the device.

Productivity Matching a device with your mobile business should be easy. You can choose from: Ultra-portables Mobile engineering workstation Easily expandable memory Disk space Fast processors for optimum performance

WiFi The most commonly used and least expensive wireless access service is WiFi . WiFi uses radio waves to broadcast an internet signal from a wireless router to the immediate surrounding area If the wireless network is not encrypted,anyone can jump on. WiFi is commonly used in public places to create hotspots.

Cellular Boardband An alternative to WiFi is cellular broadband . This type of mobile computing technology utilizes a cellular modern or air card to connect to cell towers for internet access. The air card fits into the PC card or Express card slot of a notebook or laptop,delivering internet access on the go.

Cloud Computing Cloud computing provides access to a network-like environment with various applications and virtually unlimited resources so that field representatives , can utilize website resource rather than being supplied with company software and data.

Connnectivity Need access to emails , video conferencing or updates from the home office . Laptop keep you connected anytime , virtually anywhere with : Integrated WiFi and buletooth . Optional broadband or optional 3G/4G services .

Security Keep data as secured by protecting data with: hard drive encryption . optional biometric fingerprint scanners. optional smart card locking systems . Tracking and Recovery service . firewall and virtual private network security.

Mobile Computing vs. Ubiquitous Computing Mobile Computing is a generic term describing the application of small, portable, and wireless computing and communication devices. This includes devices like laptops with wireless LAN technology, mobile phones, wearable computers with Bluetooth or IRDA interfaces , and USB flash drives . Ubiquitous computing ( ubicomp , or sometimes ubiqcomp ) integrates computation into the environment, rather than having computers which are distinct objects. Another term for ubiquitous computing is pervasive computing . Promoters of this idea hope that embedding computation into the environment would enable people to move around and interact with computers more naturally than they currently do.

Challenges in mobile computing Mobility means changes Hardware Lighter, smaller, energy management, user interface Low bandwidth, high bandwidth variability Kbit/s to Mbit/s, bandwidth fluctuation Security risk Devices more vulnerable, endpoint authentication harder Location awareness Locality adaptation Higher loss-rates, higher delays, more jitter Connection setup time, hand-off Restrictive regulations of frequencies Frequencies have to be coordinated

Future mobile and wireless networks Improved radio technology and antennas smart antennas, beam forming dynamic spectrum allocation Core network convergence IP-based, quality of service, mobile IP Ad-hoc technologies spontaneous communication, power saving, redundancy Simple and open service platform more service providers, not network operators only

THANK YOU