SlideShare a Scribd company logo
1 of 12
S
Mobile Devices & Networks
CSC 103 – Intro to Computing
Digital Convergence…
 The use of a single unifying
device to handle media, internet,
entertainment and telephony.
What makes a smartphone
a smartphone?
 Internet access
 PIM features (Contacts, Calendars, etc.)
 Voice Recording Features
 Music Player & Organization
 Digital Image & Video Capture
 GPS; Computing Power to run apps
Are Smartphones
computers?
 IPOS
 Input/Output Devices
 CPU (Processing), Memory
 Storage
What Operating Systems
are used?
 Android
 iOS
 Windows Phone
 Blackberry
What Software can be run?
 Office Apps
 Photo/Video Editing
 GPS, Maps, Calendars, Emails
 Web Browsers, Utilities, Games
 Music Players, Movies/TV, etc.
Messaging
 SMS – Basic “Text Message” stands for
Short Message Services.
 Limited in length and content (text)
 MMS – Unlimited size, adds photos
and video
How do cell phones
work?
 Use an analog-to-digital converter chip
to convert sound waves to digital data
 Digital data is compressed using a
digital signal processor
 Digital data is transmitted as radio waves
How do cellular
networks work?
 Telecommunications company
constructs series of overlapping cells
– or a geographic areas, centered on a
base transceiver station (cell tower)
 Cell tower passes the call to a central
location - mobile switching center
Wireless Providers
 Verizon, AT&T, T-Mobile, Sprint, Virgin
Aspects to take into Account
 Coverage, Reliability, Speed, Performance
Cost, Data Plans, Customer Service
Network Speeds
 2G –50 Kbps (not meant for browsing)
 G – (GPRS) 114 Kbps
 E EDGE 217 Kbps
 3G – 3rd Generation 384 Kbps
 4G LTE - Long Term Evolution 160 Mbps
 LTE Advanced – 300Mbps up to 1 Gbps
5G
Up to 1 Tbps
Concerns/Considerations…
 Data Usage
 Wifi Connection
 Tethering - Using your 3G/4G phone
as a wifi hotspot for your computer

More Related Content

What's hot (10)

Technological Convergence
Technological ConvergenceTechnological Convergence
Technological Convergence
 
TEDx Leuven 2012
TEDx Leuven 2012TEDx Leuven 2012
TEDx Leuven 2012
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
5 pen technology
5 pen technology5 pen technology
5 pen technology
 
5pen pc
5pen pc5pen pc
5pen pc
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Technological Convergence
Technological ConvergenceTechnological Convergence
Technological Convergence
 
Aplikace pro rozpoznávání řeči - Jan Šedivý
Aplikace pro rozpoznávání řeči - Jan ŠedivýAplikace pro rozpoznávání řeči - Jan Šedivý
Aplikace pro rozpoznávání řeči - Jan Šedivý
 
Abbie
AbbieAbbie
Abbie
 
George lee non technical
George lee non technicalGeorge lee non technical
George lee non technical
 

Similar to CSC103 Mobile Networks

Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter seven
Shaheen Khan
 
Information technology
Information technologyInformation technology
Information technology
Ankit Goyal
 
Introduction to Information Technology Your Digital World.docx
Introduction to Information Technology Your Digital World.docxIntroduction to Information Technology Your Digital World.docx
Introduction to Information Technology Your Digital World.docx
mariuse18nolet
 
Alpha Tech Module9 glossary
Alpha Tech Module9 glossaryAlpha Tech Module9 glossary
Alpha Tech Module9 glossary
thinkict
 
how does smart phone works?
how does smart phone works?how does smart phone works?
how does smart phone works?
Sakshi Bhargava
 

Similar to CSC103 Mobile Networks (20)

Mobile devices
Mobile devicesMobile devices
Mobile devices
 
Mobile devices
Mobile devicesMobile devices
Mobile devices
 
Information and communication technology tools(ict)
Information and communication technology tools(ict)Information and communication technology tools(ict)
Information and communication technology tools(ict)
 
Wireless
Wireless Wireless
Wireless
 
Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter seven
 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia System
 
Smart phones presentation v1
Smart phones presentation v1Smart phones presentation v1
Smart phones presentation v1
 
Information technology
Information technologyInformation technology
Information technology
 
Introduction to Information Technology Your Digital World.docx
Introduction to Information Technology Your Digital World.docxIntroduction to Information Technology Your Digital World.docx
Introduction to Information Technology Your Digital World.docx
 
Digital literacy types of computers
Digital literacy types of computersDigital literacy types of computers
Digital literacy types of computers
 
Mobile Glossary 2016
Mobile Glossary 2016Mobile Glossary 2016
Mobile Glossary 2016
 
Computer Hardware & Their Functions
Computer Hardware & Their FunctionsComputer Hardware & Their Functions
Computer Hardware & Their Functions
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM
 
Introduction to technology power point
Introduction to technology power pointIntroduction to technology power point
Introduction to technology power point
 
chapter No. 6 Multimedia presentation .pptx
chapter No. 6 Multimedia presentation .pptxchapter No. 6 Multimedia presentation .pptx
chapter No. 6 Multimedia presentation .pptx
 
Alpha Tech Module9 glossary
Alpha Tech Module9 glossaryAlpha Tech Module9 glossary
Alpha Tech Module9 glossary
 
Fa13 7718-ch8-farmer
Fa13 7718-ch8-farmerFa13 7718-ch8-farmer
Fa13 7718-ch8-farmer
 
how does smart phone works?
how does smart phone works?how does smart phone works?
how does smart phone works?
 

More from Richard Homa

More from Richard Homa (20)

Programming 1: Compilers, Interpreters & Bytecode
Programming 1: Compilers, Interpreters & BytecodeProgramming 1: Compilers, Interpreters & Bytecode
Programming 1: Compilers, Interpreters & Bytecode
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
CSC 103 Databases Overview
CSC 103 Databases OverviewCSC 103 Databases Overview
CSC 103 Databases Overview
 
CSC103 Intro to Programming
CSC103 Intro to ProgrammingCSC103 Intro to Programming
CSC103 Intro to Programming
 
CSC103 Gaming Overview (for Everyone)
CSC103 Gaming Overview (for Everyone)CSC103 Gaming Overview (for Everyone)
CSC103 Gaming Overview (for Everyone)
 
CSC103 3D Software & Technology
CSC103 3D Software & TechnologyCSC103 3D Software & Technology
CSC103 3D Software & Technology
 
CSC103 Vector vs Raster Graphics
CSC103 Vector vs Raster GraphicsCSC103 Vector vs Raster Graphics
CSC103 Vector vs Raster Graphics
 
CSC103 Bits, Bytes & Binary
CSC103 Bits, Bytes & BinaryCSC103 Bits, Bytes & Binary
CSC103 Bits, Bytes & Binary
 
CSC103 Web Technologies: HTML, CSS, JS
CSC103 Web Technologies: HTML, CSS, JSCSC103 Web Technologies: HTML, CSS, JS
CSC103 Web Technologies: HTML, CSS, JS
 
CSC103 Processing, Memory & Storage
CSC103 Processing, Memory & StorageCSC103 Processing, Memory & Storage
CSC103 Processing, Memory & Storage
 
CSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device BasicsCSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device Basics
 
CSC103 Internet
CSC103 InternetCSC103 Internet
CSC103 Internet
 
CCS103 Bits, Bytes, Binary
CCS103 Bits, Bytes, BinaryCCS103 Bits, Bytes, Binary
CCS103 Bits, Bytes, Binary
 
CSC103 Digital Images, Pixels, RGB Colors
CSC103 Digital Images, Pixels, RGB ColorsCSC103 Digital Images, Pixels, RGB Colors
CSC103 Digital Images, Pixels, RGB Colors
 
Excel Review Quiz
Excel Review QuizExcel Review Quiz
Excel Review Quiz
 
CSC102 Excel Basics
CSC102 Excel BasicsCSC102 Excel Basics
CSC102 Excel Basics
 
CSC102 Word Paragraph Formatting
CSC102 Word Paragraph FormattingCSC102 Word Paragraph Formatting
CSC102 Word Paragraph Formatting
 
CSC102 Computer Software
CSC102 Computer SoftwareCSC102 Computer Software
CSC102 Computer Software
 
CSC102 Computer Connectivity
CSC102 Computer ConnectivityCSC102 Computer Connectivity
CSC102 Computer Connectivity
 
CSC 102 Computer Intro
CSC 102 Computer IntroCSC 102 Computer Intro
CSC 102 Computer Intro
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

CSC103 Mobile Networks

  • 1. S Mobile Devices & Networks CSC 103 – Intro to Computing
  • 2. Digital Convergence…  The use of a single unifying device to handle media, internet, entertainment and telephony.
  • 3. What makes a smartphone a smartphone?  Internet access  PIM features (Contacts, Calendars, etc.)  Voice Recording Features  Music Player & Organization  Digital Image & Video Capture  GPS; Computing Power to run apps
  • 4. Are Smartphones computers?  IPOS  Input/Output Devices  CPU (Processing), Memory  Storage
  • 5. What Operating Systems are used?  Android  iOS  Windows Phone  Blackberry
  • 6. What Software can be run?  Office Apps  Photo/Video Editing  GPS, Maps, Calendars, Emails  Web Browsers, Utilities, Games  Music Players, Movies/TV, etc.
  • 7. Messaging  SMS – Basic “Text Message” stands for Short Message Services.  Limited in length and content (text)  MMS – Unlimited size, adds photos and video
  • 8. How do cell phones work?  Use an analog-to-digital converter chip to convert sound waves to digital data  Digital data is compressed using a digital signal processor  Digital data is transmitted as radio waves
  • 9. How do cellular networks work?  Telecommunications company constructs series of overlapping cells – or a geographic areas, centered on a base transceiver station (cell tower)  Cell tower passes the call to a central location - mobile switching center
  • 10. Wireless Providers  Verizon, AT&T, T-Mobile, Sprint, Virgin Aspects to take into Account  Coverage, Reliability, Speed, Performance Cost, Data Plans, Customer Service
  • 11. Network Speeds  2G –50 Kbps (not meant for browsing)  G – (GPRS) 114 Kbps  E EDGE 217 Kbps  3G – 3rd Generation 384 Kbps  4G LTE - Long Term Evolution 160 Mbps  LTE Advanced – 300Mbps up to 1 Gbps 5G Up to 1 Tbps
  • 12. Concerns/Considerations…  Data Usage  Wifi Connection  Tethering - Using your 3G/4G phone as a wifi hotspot for your computer