SlideShare a Scribd company logo
1 of 20
Sk MOHAMED KASIM
Mobile computing
Mobile Computing
 A simple definition could be: Mobile Computing is using a computer (of one
kind or another) while on the move
 Another definition could be: Mobile Computing is when a work process is
moved from a normal fixed position to a more dynamic position
 A third definition could be: Mobile Computing is when a work process is
carried out somewhere where it was not previously possible
 Mobile Computing is an umbrella term used to describe technologies that
enable people to access services anytime and anywhere
Mobile Computing
 Many other names/overlapping computing paradigms:
 Pervasive Computing
 Ubiquitous Computing
 Wireless Systems
 Internet of Things (IoT)
 Embedded Computing
 Nomadic Computing
 Wireless Sensor Networks
 (Mobile) Ad-Hoc Networks
 Mesh Networks
 Vehicular Networks
 …
Mobile Computing
• Applications
• Location-awareness
• Mobility Support
• Security
• Resource Management
• Network Protocols
• Broadcast
• Technologies
• Standards
• Wireless Medium
Wireless Communication
Mobile Computing
Wired vs Wireless
 Wired Networks
 high bandwidth
 low bandwidth variability
 can listen on wire
 high power machines
 high resource machines
 need physical access (security)
 low delay
 connected operation
 Mobile Networks
 low bandwidth
 high bandwidth variability
 hidden terminal problem
 low power machines
 low resource machines
 need proximity
 higher delay
 disconnected operation
Why Go Mobile?
 Enable anywhere/anytime connectivity
 Bring computer communications to areas without pre-existing infrastructure
 Enable mobility
 Enable new applications
 An exciting new research area
Evolution
 Mobile computing can be categorized into seven major categories of focus
 These categories are the basis for the technology that is used today in
research and design of mobile computing
 Each category or section is a different area that was focused on making
mobile computing what it is today
 These seven categories are: Portability, Miniaturization, Connectivity,
Convergence, Divergence, Apps, Digital Ecosystems
Portability
 Reducing the size of hardware to enable the creation of computers that could
be physically moved around relatively easily
Miniaturization
 Creating new and significantly smaller mobile form factors that allowed the
use of personal mobile devices while on the move
Connectivity
 Developing devices and applications that allowed users to be online and
communicate via wireless data networks while on the move
Convergence
 Integrating emerging types of digital mobile devices, such as Personal Digital
Assistants (PDAs), mobile phones, music players, cameras, games, etc., into
hybrid devices
Applications (Apps)
 The latest wave of applications (apps) is about developing matter and
substance for use and consumption on mobile devices, and making access to
this fun or functional interactive application content easy and enjoyable
Mobile IP - Motivation
 An IP address not only identifies a host but also a point-of-attachment
 A host cannot change its IP address without terminating on-going sessions
 Mobility is the ability of a node to change its point-of-attachment while
maintaining all existing communications and using the same IP address
15-849E Wireless Networking 13
Mobile IP – The Gory Details
 Mobile node can use 2 IP addresses
 Static Home Address (identifies TCP connections)
 Dynamic Care-of-Address (current point of attachment on the network)
15-849E Wireless Networking 14
Mobile IP – Details (Contd.)
 Mobile IP is a cooperation of 3 mechanisms
 Discovering the care-of-address
 Registering the care-of-address
 Tunneling to the care-of-address
15-849E Wireless Networking 15
Mobile IP – Details (Contd.)
15-849E Wireless Networking 16
FA
FA Advertises Service
FA
FA
HA
Remote Redirect
Mobile IP – Details (Contd.)
 Recap (Remote Redirect)
 MH requests service from FA
 FA relays request to HA
 HA accepts the request (if possible) and its modifies routing table
 FA relays this to ths MH
 See anything missing?
 Malicious node could cause HA to alter its routing table with erroneous COA
(DOS Attack?)
15-849E Wireless Networking 17
Mobile IP – Details (Contd.)
 Solution?
 Digitally signed Remote Redirect (RR) messages
 Would it work now?
 What about replay attacks?
 Solution?
 RR messages could be made unique – How?
 Timestamps with each message
 Pseudorandom number with each message
15-849E Wireless Networking 18
How will Mobile IP change with IPv6?
 Stateless Address Autoconfiguration and Neighbor
Discovery precludes the need for Foreign Agents
 Security
 All IPv6 nodes implement strong authentication and
encryption features
 Source Routing
 Correspondent nodes no longer tunnel packets to MHs
 Instead they use IPv6 routing headers (variation of IPv4
source routing option)
 More …
15-849E Wireless Networking 19
Ongoing Work and Open Questions
 Routing inefficiencies
 Triangle Routing
 Security Issues
 Ingress Filtering
 Slow Growth in the Wireless LAN Market
 Competition from other protocols
15-849E Wireless Networking 20

More Related Content

What's hot (20)

Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Wireless network presentation
Wireless network presentationWireless network presentation
Wireless network presentation
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Introduction to Mobile Cloud Computing
Introduction to Mobile Cloud ComputingIntroduction to Mobile Cloud Computing
Introduction to Mobile Cloud Computing
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 

Similar to Mobile Computing: A Guide to Portability, Connectivity and the Evolution of Apps

Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IPAshish Chandurkar
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingNuth Otanasap
 
Seminar technical
Seminar technicalSeminar technical
Seminar technicalt4cashish
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfkhajapasha5978
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfkhajapasha5978
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless laniaemedu
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessiaemedu
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 
Sonu mobile computing
Sonu mobile computingSonu mobile computing
Sonu mobile computingstudentgita
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.pptAkttripathi
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 

Similar to Mobile Computing: A Guide to Portability, Connectivity and the Evolution of Apps (20)

Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IP
 
MobileComputing by Mudasir
MobileComputing by MudasirMobileComputing by Mudasir
MobileComputing by Mudasir
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Seminar technical
Seminar technicalSeminar technical
Seminar technical
 
Seminar report
Seminar reportSeminar report
Seminar report
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdf
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdf
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lan
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wireless
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Sonu mobile computing
Sonu mobile computingSonu mobile computing
Sonu mobile computing
 
Mdm intro-chapter1
Mdm intro-chapter1Mdm intro-chapter1
Mdm intro-chapter1
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 

More from SKMohamedKasim

Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for BeginnersSKMohamedKasim
 
Blockchain types architecture
Blockchain types architectureBlockchain types architecture
Blockchain types architectureSKMohamedKasim
 
Handling digital crime scene
Handling digital crime sceneHandling digital crime scene
Handling digital crime sceneSKMohamedKasim
 
Java database connecticity steps
Java database connecticity stepsJava database connecticity steps
Java database connecticity stepsSKMohamedKasim
 
Mind map of computer science
Mind map of computer scienceMind map of computer science
Mind map of computer scienceSKMohamedKasim
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms SKMohamedKasim
 

More from SKMohamedKasim (11)

Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Blockchain types architecture
Blockchain types architectureBlockchain types architecture
Blockchain types architecture
 
UNIT testing
UNIT testingUNIT testing
UNIT testing
 
Three way handshake
Three way handshakeThree way handshake
Three way handshake
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Handling digital crime scene
Handling digital crime sceneHandling digital crime scene
Handling digital crime scene
 
Mac memory overview
Mac memory overviewMac memory overview
Mac memory overview
 
Java database connecticity steps
Java database connecticity stepsJava database connecticity steps
Java database connecticity steps
 
Operating system
Operating systemOperating system
Operating system
 
Mind map of computer science
Mind map of computer scienceMind map of computer science
Mind map of computer science
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms
 

Recently uploaded

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Recently uploaded (20)

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Mobile Computing: A Guide to Portability, Connectivity and the Evolution of Apps

  • 2. Mobile Computing  A simple definition could be: Mobile Computing is using a computer (of one kind or another) while on the move  Another definition could be: Mobile Computing is when a work process is moved from a normal fixed position to a more dynamic position  A third definition could be: Mobile Computing is when a work process is carried out somewhere where it was not previously possible  Mobile Computing is an umbrella term used to describe technologies that enable people to access services anytime and anywhere
  • 3. Mobile Computing  Many other names/overlapping computing paradigms:  Pervasive Computing  Ubiquitous Computing  Wireless Systems  Internet of Things (IoT)  Embedded Computing  Nomadic Computing  Wireless Sensor Networks  (Mobile) Ad-Hoc Networks  Mesh Networks  Vehicular Networks  …
  • 4. Mobile Computing • Applications • Location-awareness • Mobility Support • Security • Resource Management • Network Protocols • Broadcast • Technologies • Standards • Wireless Medium Wireless Communication Mobile Computing
  • 5. Wired vs Wireless  Wired Networks  high bandwidth  low bandwidth variability  can listen on wire  high power machines  high resource machines  need physical access (security)  low delay  connected operation  Mobile Networks  low bandwidth  high bandwidth variability  hidden terminal problem  low power machines  low resource machines  need proximity  higher delay  disconnected operation
  • 6. Why Go Mobile?  Enable anywhere/anytime connectivity  Bring computer communications to areas without pre-existing infrastructure  Enable mobility  Enable new applications  An exciting new research area
  • 7. Evolution  Mobile computing can be categorized into seven major categories of focus  These categories are the basis for the technology that is used today in research and design of mobile computing  Each category or section is a different area that was focused on making mobile computing what it is today  These seven categories are: Portability, Miniaturization, Connectivity, Convergence, Divergence, Apps, Digital Ecosystems
  • 8. Portability  Reducing the size of hardware to enable the creation of computers that could be physically moved around relatively easily
  • 9. Miniaturization  Creating new and significantly smaller mobile form factors that allowed the use of personal mobile devices while on the move
  • 10. Connectivity  Developing devices and applications that allowed users to be online and communicate via wireless data networks while on the move
  • 11. Convergence  Integrating emerging types of digital mobile devices, such as Personal Digital Assistants (PDAs), mobile phones, music players, cameras, games, etc., into hybrid devices
  • 12. Applications (Apps)  The latest wave of applications (apps) is about developing matter and substance for use and consumption on mobile devices, and making access to this fun or functional interactive application content easy and enjoyable
  • 13. Mobile IP - Motivation  An IP address not only identifies a host but also a point-of-attachment  A host cannot change its IP address without terminating on-going sessions  Mobility is the ability of a node to change its point-of-attachment while maintaining all existing communications and using the same IP address 15-849E Wireless Networking 13
  • 14. Mobile IP – The Gory Details  Mobile node can use 2 IP addresses  Static Home Address (identifies TCP connections)  Dynamic Care-of-Address (current point of attachment on the network) 15-849E Wireless Networking 14
  • 15. Mobile IP – Details (Contd.)  Mobile IP is a cooperation of 3 mechanisms  Discovering the care-of-address  Registering the care-of-address  Tunneling to the care-of-address 15-849E Wireless Networking 15
  • 16. Mobile IP – Details (Contd.) 15-849E Wireless Networking 16 FA FA Advertises Service FA FA HA Remote Redirect
  • 17. Mobile IP – Details (Contd.)  Recap (Remote Redirect)  MH requests service from FA  FA relays request to HA  HA accepts the request (if possible) and its modifies routing table  FA relays this to ths MH  See anything missing?  Malicious node could cause HA to alter its routing table with erroneous COA (DOS Attack?) 15-849E Wireless Networking 17
  • 18. Mobile IP – Details (Contd.)  Solution?  Digitally signed Remote Redirect (RR) messages  Would it work now?  What about replay attacks?  Solution?  RR messages could be made unique – How?  Timestamps with each message  Pseudorandom number with each message 15-849E Wireless Networking 18
  • 19. How will Mobile IP change with IPv6?  Stateless Address Autoconfiguration and Neighbor Discovery precludes the need for Foreign Agents  Security  All IPv6 nodes implement strong authentication and encryption features  Source Routing  Correspondent nodes no longer tunnel packets to MHs  Instead they use IPv6 routing headers (variation of IPv4 source routing option)  More … 15-849E Wireless Networking 19
  • 20. Ongoing Work and Open Questions  Routing inefficiencies  Triangle Routing  Security Issues  Ingress Filtering  Slow Growth in the Wireless LAN Market  Competition from other protocols 15-849E Wireless Networking 20