INTRODUCTION• mobile operator face the challenge of managing a dramatic rise in mobile data traffic• mobile broadband continues to rise in popularity and usage• Attackers see mobile devices and networks as new ground for attacks
HISTORY• Mobile infrastructure will require plan for OSI layer to send and receive data• First generation: before 1990’s no security to data just mobile was invented• Second generation(1990’s): customer is not satisfied with mobile services• Third generation(after 1990’s): deals with mobile traffic on network
• Fourth generation: solves problem of mobile traffic
WORKING PROCESS• Arbors Peak flow SP solution allows mobile network operators to optimize and protect their mobile infrastructure and services.• Mobile infrastructure protection• Mobile service protection
TECHNOLOGIES1)java• Mobile infrastructure uses Java run time environment in cell phones.2)Database• database store data when communications are done• brings the applications that were once limited to the world where they are most needed.
3)Xml XML (Extensible Markup Language) is used for integration of software running in mobile
APPLICATIONS1)SAP Mobile Infrastructure : The SAP MI offers tools for synchronization It is based on java xml2) Wyse technology:• provider of cloud-based mobile infrastructure management technology.
ADVANTAGES Decrease security risk and costs involved with lost devices. Users can select the devices that best meets their needs get their devices up and running quickly, in just minutes instead of days.
• Users get reliable, secure and easy access to corporate email and applications• Use custom attributes to track asset information• Benefit from service level guarantees
DISADVANTAGES forced to rely on your chosen vendor’s capabilities Some times not accessible from anywhere in the country
CONCLUSION Mobile Infrastructure serves as the universal platform for mobilizing your enterprise applications provides security to data that is transferred from one device to other