SlideShare a Scribd company logo

Mobile-Computing ppt.ppt

E
EgguIqbal

Mobile Computing

1 of 24
Download to read offline
1
ANURAG COLLEGE OF ENGINEERING
Aushapur(V), Ghatkesar(M), Medchal(D),T.S
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
MOBILE COMPUTING
Under the guidance of :-
Mr. S. Vijay Kumar
Assistant Professor.
Presented by:
Mr. P. ESHWAR 19PQ1A0560
CONTENTS
1. What is mobile computing?
2. Comparison to wired networks
3. Why go mobile?
4. Types of wireless devices
5. Mobile objects
6. Security & Privacy
7. Applications of mobile computing
8. Challenges
9. Future of mobile computing
10. Conclusion
11. References
2
What Is Mobile Computing?
What is computing?
Operation of computers (according to oxfords advance
learner’s dictionary)
What is the mobile?
That someone /something can move or be moved easily and
quickly from place to place
What is mobile computing?
Users with portable computers still have network
connections while they move
3
What Is Mobile Computing?
(Cont.)
 Mobile Computing is an umbrella term used to describe
technologies that enable people to access network services
anyplace, anytime, and anywhere.
4
Comparison to Wired Net.
Wired Networks
-high bandwidth
-low bandwidth variability
-can listen on wire
-high power machines
-high resource machines
-need physical access(security)
-low delay
-connected operation
Mobile Networks
-low bandwidth
-high bandwidth variability
-hidden terminal problem
-low power machines
-low resource machines
-need proximity
-higher delay
-disconnected operation
5
Why Go Mobile?
• Enable anywhere/anytime connectivity
• Bring computer communications to areas without
pre-existing infrastructure
• Enable mobility
• Enable new applications
• An exciting new research area
6

More Related Content

Similar to Mobile-Computing ppt.ppt

presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computingBalakumar232
 
Mobile computing
Mobile computingMobile computing
Mobile computingnajwa92
 
Mobile computing
Mobile computingMobile computing
Mobile computingAnuja Mane
 
Mobile computing
Mobile computingMobile computing
Mobile computingKelly Zhang
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Infomanjjb
 
Iot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampIot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampYogesh Ojha
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkIOSR Journals
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computingBhupesh Rawat
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESIJNSA Journal
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 

Similar to Mobile-Computing ppt.ppt (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
G011123539
G011123539G011123539
G011123539
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Iot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampIot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCamp
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
MobileComputing by Mudasir
MobileComputing by MudasirMobileComputing by Mudasir
MobileComputing by Mudasir
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 
7 (1)
7 (1)7 (1)
7 (1)
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Internet Of Things(IoT).pptx
Internet Of Things(IoT).pptxInternet Of Things(IoT).pptx
Internet Of Things(IoT).pptx
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 

Recently uploaded

AI Act & Standardization: UNINFO involvement
AI Act & Standardization: UNINFO involvementAI Act & Standardization: UNINFO involvement
AI Act & Standardization: UNINFO involvementMimmo Squillace
 
"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys VasylievFwdays
 
"Running Open-Source LLM models on Kubernetes", Volodymyr Tsap
"Running Open-Source LLM models on Kubernetes",  Volodymyr Tsap"Running Open-Source LLM models on Kubernetes",  Volodymyr Tsap
"Running Open-Source LLM models on Kubernetes", Volodymyr TsapFwdays
 
Battle of React State Managers in frontend applications
Battle of React State Managers in frontend applicationsBattle of React State Managers in frontend applications
Battle of React State Managers in frontend applicationsEvangelia Mitsopoulou
 
Importance of magazines in education ppt
Importance of magazines in education pptImportance of magazines in education ppt
Importance of magazines in education pptsafnarafeek2002
 
Bringing nullability into existing code - dammit is not the answer.pptx
Bringing nullability into existing code - dammit is not the answer.pptxBringing nullability into existing code - dammit is not the answer.pptx
Bringing nullability into existing code - dammit is not the answer.pptxMaarten Balliauw
 
Confoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceConfoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceSusan Ibach
 
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions..."How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...Fwdays
 
Digital Transformation Strategy & Plan Templates - www.beyondthecloud.digital...
Digital Transformation Strategy & Plan Templates - www.beyondthecloud.digital...Digital Transformation Strategy & Plan Templates - www.beyondthecloud.digital...
Digital Transformation Strategy & Plan Templates - www.beyondthecloud.digital...MarcovanHurne2
 
Apex Replay Debugger and Salesforce Platform Events.pptx
Apex Replay Debugger and Salesforce Platform Events.pptxApex Replay Debugger and Salesforce Platform Events.pptx
Apex Replay Debugger and Salesforce Platform Events.pptxmohayyudin7826
 
H3 Platform CXL Solution_Memory Fabric Forum.pptx
H3 Platform CXL Solution_Memory Fabric Forum.pptxH3 Platform CXL Solution_Memory Fabric Forum.pptx
H3 Platform CXL Solution_Memory Fabric Forum.pptxMemory Fabric Forum
 
Dynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringDynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringMassimo Talia
 
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, GoogleISPMAIndia
 
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docxLeveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docxVotarikari Shravan
 
"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor FesenkoFwdays
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxInfosec
 
How we think about an advisor tech stack
How we think about an advisor tech stackHow we think about an advisor tech stack
How we think about an advisor tech stackSummit
 
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
Enhancing Productivity and Insight  A Tour of JDK Tools Progress Beyond Java 17Enhancing Productivity and Insight  A Tour of JDK Tools Progress Beyond Java 17
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17Ana-Maria Mihalceanu
 
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERNRonnelBaroc
 
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...ISPMAIndia
 

Recently uploaded (20)

AI Act & Standardization: UNINFO involvement
AI Act & Standardization: UNINFO involvementAI Act & Standardization: UNINFO involvement
AI Act & Standardization: UNINFO involvement
 
"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev
 
"Running Open-Source LLM models on Kubernetes", Volodymyr Tsap
"Running Open-Source LLM models on Kubernetes",  Volodymyr Tsap"Running Open-Source LLM models on Kubernetes",  Volodymyr Tsap
"Running Open-Source LLM models on Kubernetes", Volodymyr Tsap
 
Battle of React State Managers in frontend applications
Battle of React State Managers in frontend applicationsBattle of React State Managers in frontend applications
Battle of React State Managers in frontend applications
 
Importance of magazines in education ppt
Importance of magazines in education pptImportance of magazines in education ppt
Importance of magazines in education ppt
 
Bringing nullability into existing code - dammit is not the answer.pptx
Bringing nullability into existing code - dammit is not the answer.pptxBringing nullability into existing code - dammit is not the answer.pptx
Bringing nullability into existing code - dammit is not the answer.pptx
 
Confoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceConfoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data science
 
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions..."How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
 
Digital Transformation Strategy & Plan Templates - www.beyondthecloud.digital...
Digital Transformation Strategy & Plan Templates - www.beyondthecloud.digital...Digital Transformation Strategy & Plan Templates - www.beyondthecloud.digital...
Digital Transformation Strategy & Plan Templates - www.beyondthecloud.digital...
 
Apex Replay Debugger and Salesforce Platform Events.pptx
Apex Replay Debugger and Salesforce Platform Events.pptxApex Replay Debugger and Salesforce Platform Events.pptx
Apex Replay Debugger and Salesforce Platform Events.pptx
 
H3 Platform CXL Solution_Memory Fabric Forum.pptx
H3 Platform CXL Solution_Memory Fabric Forum.pptxH3 Platform CXL Solution_Memory Fabric Forum.pptx
H3 Platform CXL Solution_Memory Fabric Forum.pptx
 
Dynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringDynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineering
 
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
 
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docxLeveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
 
"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
How we think about an advisor tech stack
How we think about an advisor tech stackHow we think about an advisor tech stack
How we think about an advisor tech stack
 
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
Enhancing Productivity and Insight  A Tour of JDK Tools Progress Beyond Java 17Enhancing Productivity and Insight  A Tour of JDK Tools Progress Beyond Java 17
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
 
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
 
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
 

Mobile-Computing ppt.ppt

  • 1. 1 ANURAG COLLEGE OF ENGINEERING Aushapur(V), Ghatkesar(M), Medchal(D),T.S DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MOBILE COMPUTING Under the guidance of :- Mr. S. Vijay Kumar Assistant Professor. Presented by: Mr. P. ESHWAR 19PQ1A0560
  • 2. CONTENTS 1. What is mobile computing? 2. Comparison to wired networks 3. Why go mobile? 4. Types of wireless devices 5. Mobile objects 6. Security & Privacy 7. Applications of mobile computing 8. Challenges 9. Future of mobile computing 10. Conclusion 11. References 2
  • 3. What Is Mobile Computing? What is computing? Operation of computers (according to oxfords advance learner’s dictionary) What is the mobile? That someone /something can move or be moved easily and quickly from place to place What is mobile computing? Users with portable computers still have network connections while they move 3
  • 4. What Is Mobile Computing? (Cont.)  Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. 4
  • 5. Comparison to Wired Net. Wired Networks -high bandwidth -low bandwidth variability -can listen on wire -high power machines -high resource machines -need physical access(security) -low delay -connected operation Mobile Networks -low bandwidth -high bandwidth variability -hidden terminal problem -low power machines -low resource machines -need proximity -higher delay -disconnected operation 5
  • 6. Why Go Mobile? • Enable anywhere/anytime connectivity • Bring computer communications to areas without pre-existing infrastructure • Enable mobility • Enable new applications • An exciting new research area 6
  • 7. Types of Wireless Devices  Laptops  Palmtops  PDAs  Cell phones  Pagers  Sensors 7
  • 8. Mobile Objects 1. A mobile object is some code that carries a state 8
  • 9. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. that lives on a host 9
  • 10. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 10
  • 11. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 11
  • 12. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 5. and barred when untrusted 12
  • 13. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 5. and barred when untrusted 6. and will refuse to go to untrustworthy places 13
  • 14. Mobile Objects (Cont.) 7. Mobile objects can talk to their friends 14
  • 15. Mobile Objects (Cont.) 7. Mobile objects can talk to their friends 8. but only by co- operation of the hosts 15
  • 16. Security & Privacy Threats:  Wi-Fi networks are a shared network that makes it easier for others to eavesdrop on your communication.  Devices are Stolen and tampered.  Cryptography.  Connection 16
  • 17. Security & Privacy Solutions:  Secure Web Browsing  Use secure, encrypted sessions.  Secure Internet Transactions  Use UCI’s VPN to encrypt your network traffic.  Always use a Personal Firewall.  Set the firewall to deny.  ALL incoming connections. 17
  • 18. Applications of Mobile Computing (Cont.)  For Estate Agents  In courts  In companies  Stock Information Collection/Control  Credit Card Verification  Taxi/Truck Dispatch  Electronic Mail/Paging 18
  • 19. Challenges  Disconnection  Low bandwidth  High bandwidth variability  Low power and resources  Security risks  Wide variety terminals and devices with different capabilities  Device attributes  Fit more functionality into single, smaller device 19
  • 20. Future of Mobile Computing  Use of Artificial Intelligence  Integrated Circuitry -> Compact Size  Increases in Computer Processor speeds 20
  • 21. Conclusion Mobile computing has severe limitations - however, it is far from impossible, and technology improves all the time Lots of challenges - some have (good) solutions, many others are still waiting to be solved 21