SlideShare a Scribd company logo
1 of 11
Information and Communication
Technologies(ICT)
Principles and Perspectives
Lecture : Distributed multimedia systems
Mobile IP
• The Internet architecture and protocols for supporting mobility, collectively
known as mobile IP
• Supports many different modes of operation
• with or without a foreign agent
• multiple ways for agents and mobile nodes to discover each other
• use of single or multiple COAs
• multiple forms of encapsulation etc.
Mobile IP standard
1. Agent discovery. Mobile IP defines the protocols used by a home or foreign
agent to advertise its services to mobile nodes, and protocols for mobile nodes to
solicit the services of a foreign or home agent
2. Registration with the home agent. Mobile IP defines the protocols used by the
mobile node and/or foreign agent to register and deregister COAs with a mobile
node’s home agent.
3. Indirect routing of datagrams. The standard also defines the manner in which
datagrams are forwarded to mobile nodes by a home agent, including rules for
forwarding datagrams, rules for handling error conditions, and several forms of
encapsulation
Mobility in Cellular networks
• Home network
• Home location register (HLR)
• Visited network
• Visitor location register (VLR)
Handoffs in GSM
Steps of Handoffs
Context aware Applications
• The location, identities of nearby people and objects and changes to those objects
• The user’s location, the environment, the identity and the time
• The user’s emotional and physiological state, focus of attention, location and
orientation, data and time, objects and people in the user’s environment, user
preferences, patterns, calendar, team structure
• The aspects of the current situation
• The elements of the user’s environment that the computer knows about
Main categories of context
• External (physical)
• detecting location, light, sound, movement, touch, temperature, air pressure etc.
• Internal (logical)
• the user’s goal, tasks, work context, business processes, the user’s emotional state, etc.
Context aware applications
• Context aware applications are therefore those which are able to adapt their
operations to the current context without explicit user intervention and aim
at increasing usability and effectiveness by taking the user context into
account
• location-sensitive tourist guide
• advertising
• navigation systems
• health monitoring systems

More Related Content

Similar to wireless networks

Mobile computing
Mobile computingMobile computing
Mobile computingpooja s p
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisDr Geetha Mohan
 
Introduction to the Programmable City Project
Introduction to the Programmable City ProjectIntroduction to the Programmable City Project
Introduction to the Programmable City ProjectProgCity
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of thingsRehmat Ullah
 
Mobile fraud detection using neural networks
Mobile fraud detection using neural networksMobile fraud detection using neural networks
Mobile fraud detection using neural networksVidhya Moorthy
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
The ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesThe ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesrobkitchin
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IoT Processing Topologies.pptx
IoT Processing Topologies.pptxIoT Processing Topologies.pptx
IoT Processing Topologies.pptxtaruian
 
Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesHongseok Kim
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 

Similar to wireless networks (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Sirris presentation
Sirris presentationSirris presentation
Sirris presentation
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
Introduction to the Programmable City Project
Introduction to the Programmable City ProjectIntroduction to the Programmable City Project
Introduction to the Programmable City Project
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
 
Mobile fraud detection using neural networks
Mobile fraud detection using neural networksMobile fraud detection using neural networks
Mobile fraud detection using neural networks
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
The ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart citiesThe ethics and risks of urban big data and smart cities
The ethics and risks of urban big data and smart cities
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT Processing Topologies.pptx
IoT Processing Topologies.pptxIoT Processing Topologies.pptx
IoT Processing Topologies.pptx
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
P Sweta
P SwetaP Sweta
P Sweta
 

More from Saqib Shehzad

خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfخاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfSaqib Shehzad
 
Multimedia continued
Multimedia continuedMultimedia continued
Multimedia continuedSaqib Shehzad
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability EvaluationSaqib Shehzad
 
User centered Design
User centered DesignUser centered Design
User centered DesignSaqib Shehzad
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCISaqib Shehzad
 
Cognitive frameworks
Cognitive frameworksCognitive frameworks
Cognitive frameworksSaqib Shehzad
 
Cognition, information processing, perception and attention
Cognition, information processing, perception and attentionCognition, information processing, perception and attention
Cognition, information processing, perception and attentionSaqib Shehzad
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer InteractionSaqib Shehzad
 

More from Saqib Shehzad (20)

خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfخاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
 
Security
Security Security
Security
 
wireless networks
wireless networkswireless networks
wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia continued
Multimedia continuedMultimedia continued
Multimedia continued
 
Multimedia
MultimediaMultimedia
Multimedia
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability Evaluation
 
Prototype in HCI
Prototype in HCIPrototype in HCI
Prototype in HCI
 
User centered Design
User centered DesignUser centered Design
User centered Design
 
HCI
HCIHCI
HCI
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCI
 
Interaction styles
Interaction stylesInteraction styles
Interaction styles
 
Cognitive frameworks
Cognitive frameworksCognitive frameworks
Cognitive frameworks
 
Cognition, information processing, perception and attention
Cognition, information processing, perception and attentionCognition, information processing, perception and attention
Cognition, information processing, perception and attention
 
Conceptual Model
Conceptual ModelConceptual Model
Conceptual Model
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

wireless networks

  • 1. Information and Communication Technologies(ICT) Principles and Perspectives Lecture : Distributed multimedia systems
  • 2. Mobile IP • The Internet architecture and protocols for supporting mobility, collectively known as mobile IP • Supports many different modes of operation • with or without a foreign agent • multiple ways for agents and mobile nodes to discover each other • use of single or multiple COAs • multiple forms of encapsulation etc.
  • 3. Mobile IP standard 1. Agent discovery. Mobile IP defines the protocols used by a home or foreign agent to advertise its services to mobile nodes, and protocols for mobile nodes to solicit the services of a foreign or home agent 2. Registration with the home agent. Mobile IP defines the protocols used by the mobile node and/or foreign agent to register and deregister COAs with a mobile node’s home agent. 3. Indirect routing of datagrams. The standard also defines the manner in which datagrams are forwarded to mobile nodes by a home agent, including rules for forwarding datagrams, rules for handling error conditions, and several forms of encapsulation
  • 4. Mobility in Cellular networks • Home network • Home location register (HLR) • Visited network • Visitor location register (VLR)
  • 7.
  • 8.
  • 9. Context aware Applications • The location, identities of nearby people and objects and changes to those objects • The user’s location, the environment, the identity and the time • The user’s emotional and physiological state, focus of attention, location and orientation, data and time, objects and people in the user’s environment, user preferences, patterns, calendar, team structure • The aspects of the current situation • The elements of the user’s environment that the computer knows about
  • 10. Main categories of context • External (physical) • detecting location, light, sound, movement, touch, temperature, air pressure etc. • Internal (logical) • the user’s goal, tasks, work context, business processes, the user’s emotional state, etc.
  • 11. Context aware applications • Context aware applications are therefore those which are able to adapt their operations to the current context without explicit user intervention and aim at increasing usability and effectiveness by taking the user context into account • location-sensitive tourist guide • advertising • navigation systems • health monitoring systems

Editor's Notes

  1. Common MSC
  2. Common MSC
  3. Mobility: cellular networks versus mobile IP.