SlideShare a Scribd company logo
1 of 21
Table OfTable Of ContentsContents
 Mobile Computing
Mobile (Moving)
+
Computing ( using
computer)
. Mobile Computing
is an umbrella term used to describe
technologies that enable people to
access network services anyplace,
anytime, and anywhere
IntroductionIntroduction
Mobile computingMobile computing
 In recent years, distributed computer has become
the norm, especially after the advent of the internet.
 Today, technological advances are shaping a new
computing environment where the user is free from
the need to work at a specific location, and is even
enabled to work while on the move.
 This new paradigm is often called MOBILE
COMPUTING.
 A device that moves
 Between different
geographical locations
 Between different
networks
 Between different
applications
 Such as Palm-top,
laptop, Cell phonesCell phones
 A device due to which
mobile communication is
possible
 Modems.
What Is Mobility ?What Is Mobility ?
Mobile Computing DevicesMobile Computing Devices
 Display Only
 Info Pad model: limited
portable processing
 Like a cordless phone.
 Laptop Computer
 ThinkPad model: significant
portable processing, operates
independently of wireless
infrastructure.
 Personal Digital Assistant
[PDA] :Somewhere between these
extremes. a handheld device that combines
computing, telephone/fax, Internet and networking
features.
Wireless NetworkTechnology :Wireless NetworkTechnology :
Inside ItInside It
“Wireless Overlay” Network
Mobile IPMobile IP
Wireless NetworksWireless Networks
Security and PrivacySecurity and Privacy
 Security and privacy
Threats:
Wi-Fi networks are a shared
network that makes it easier for
others to eavesdrop on your
communication.
 Devices are Stolen and
tampered.
 Cryptography.
 Connection.
 Security and privacy
Solutions:
 Secure Web Browsing
 Use secure, encrypted
sessions.
 Secure Internet Transactions
 Use UCI’s VPN to
encrypt your network
traffic.
 Always use a Personal Firewall
 Set the firewall to deny
ALL incoming
connections.
 Detecting man in the middle
trying to steal information
Each device displays the
hash of its public key.
The keys are exchanged by
Diffie-Hellman protocol.
The two hashes of the keys
are compared.
If the two match then there
is no man in the middle.
 If the two don’t match it’s
assumed there is a man in
the middle.
Never store Sensitive Data on mobile
devices unless absolutely necessary.
Disconnected Operations
AND
Various Challenges
Disconnected OperationsDisconnected Operations
Low bandwidth
High bandwidth
variability
Low power and
resources
Security risks
Wide variety
terminals and
devices with different
capabilities
Fit more
functionality into
single, smaller
device
Disconnection
LIMITATIONS
Insufficient bandwidth
If the user needs access to a network they must resort to slow wireless WAN systems primarily
intended for telephone use. Higher speed wireless LANs are only available in specific sites
Security standards
When working mobile one is dependent on public networks, requiring careful use ofVPNs.
Power consumption
Mobile computers must rely entirely on battery power. Combined with compact size, this means
unusually expensive batteries be used
Transmission interferences
Weather and terrain problems as well as distance-limited connection exist with some technologies.
Reception in tunnels and some buildings is poor.
Potential health hazards
Potential health damage from cellular radio frequency emission is not known yet. However, more car
accidents are related to drivers who were talking through a mobile device. Also, cell phones may
interfere with sensitive medical devices.
Human interface with device
As, screens are often too small. Keyboards are impractical, especially one-handed, and alternate
methods such as speech or handwriting recognition require training.
Future AspectsFuture Aspects
 Track your friends on a
map by picking up GPS signals
from other Android phones,
so you can search for nearby
parties.
 Geolife
This app will send you
reminders based on location
instead of time. For example,
as you approach a grocery
store, it will remind you to
pick up milk.
 Mobile computing has severe limitations
- however, it is far from impossible, and
technology improves all the time
 Lots of challenges
- some have (good) solutions, many others are
still waiting to be solved
Conclusion
Thank You…………

More Related Content

What's hot

What's hot (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Wir eless tren dz..
Wir eless tren dz..Wir eless tren dz..
Wir eless tren dz..
 
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHATRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
 
Wir e less trends..
Wir e less trends..Wir e less trends..
Wir e less trends..
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 

Viewers also liked

Rural Development In India
Rural Development In IndiaRural Development In India
Rural Development In IndiaAshish Singh
 
Urban Co-operative Bank
 Urban Co-operative Bank Urban Co-operative Bank
Urban Co-operative BankDona Sara Jacob
 
dissertation report on credit appraisal
dissertation report on credit appraisal dissertation report on credit appraisal
dissertation report on credit appraisal durgakk
 
Mivan aluminium formwork
Mivan  aluminium formworkMivan  aluminium formwork
Mivan aluminium formworkAnup Kude
 
Economics - Long run & short run Production
Economics - Long run & short run ProductionEconomics - Long run & short run Production
Economics - Long run & short run ProductionOnline
 
Statistics for Class XI (CBSE)
Statistics for Class XI (CBSE)Statistics for Class XI (CBSE)
Statistics for Class XI (CBSE)mini4deb
 
Global Warming Presentation
Global Warming PresentationGlobal Warming Presentation
Global Warming Presentationgueste67764
 
Final rural-development-in-india
Final rural-development-in-indiaFinal rural-development-in-india
Final rural-development-in-indiamaheshgautambsr
 
Global Warming Project
Global Warming ProjectGlobal Warming Project
Global Warming ProjectDushmanta Nath
 
Global warming ppt tanya
Global warming ppt tanyaGlobal warming ppt tanya
Global warming ppt tanyashalinisharmaa
 
GLOBAL WARMING (GOOD PRESENTATION)
GLOBAL WARMING (GOOD PRESENTATION)GLOBAL WARMING (GOOD PRESENTATION)
GLOBAL WARMING (GOOD PRESENTATION)elenadimo
 

Viewers also liked (20)

Rural Development In India
Rural Development In IndiaRural Development In India
Rural Development In India
 
Urban Co-operative Bank
 Urban Co-operative Bank Urban Co-operative Bank
Urban Co-operative Bank
 
dissertation report on credit appraisal
dissertation report on credit appraisal dissertation report on credit appraisal
dissertation report on credit appraisal
 
Managerial economics
Managerial economicsManagerial economics
Managerial economics
 
Demand forecasting
Demand forecastingDemand forecasting
Demand forecasting
 
Expansion path
Expansion pathExpansion path
Expansion path
 
Mivan aluminium formwork
Mivan  aluminium formworkMivan  aluminium formwork
Mivan aluminium formwork
 
Economics - Long run & short run Production
Economics - Long run & short run ProductionEconomics - Long run & short run Production
Economics - Long run & short run Production
 
Statistics for Class XI (CBSE)
Statistics for Class XI (CBSE)Statistics for Class XI (CBSE)
Statistics for Class XI (CBSE)
 
Global Warming Presentation
Global Warming PresentationGlobal Warming Presentation
Global Warming Presentation
 
Rural development
Rural developmentRural development
Rural development
 
Final rural-development-in-india
Final rural-development-in-indiaFinal rural-development-in-india
Final rural-development-in-india
 
Rural Development
Rural DevelopmentRural Development
Rural Development
 
Global Warming Project
Global Warming ProjectGlobal Warming Project
Global Warming Project
 
Economic project report
Economic project reportEconomic project report
Economic project report
 
Global warming ppt tanya
Global warming ppt tanyaGlobal warming ppt tanya
Global warming ppt tanya
 
dissertation project
dissertation projectdissertation project
dissertation project
 
Rural development ppt
Rural development pptRural development ppt
Rural development ppt
 
GLOBAL WARMING (GOOD PRESENTATION)
GLOBAL WARMING (GOOD PRESENTATION)GLOBAL WARMING (GOOD PRESENTATION)
GLOBAL WARMING (GOOD PRESENTATION)
 
Global Warming Ppt
Global Warming PptGlobal Warming Ppt
Global Warming Ppt
 

Similar to Mobile computing

Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfkhajapasha5978
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfkhajapasha5978
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and180192
 
Small computing & Mobile Computing
Small computing & Mobile ComputingSmall computing & Mobile Computing
Small computing & Mobile ComputingPaul Kahoro
 
Computer wireless trends
Computer wireless trendsComputer wireless trends
Computer wireless trendsDevanshTelanga
 
Mobile computing
Mobile computingMobile computing
Mobile computingJeha Ryhan
 
Communication technology by nikund
Communication technology by nikundCommunication technology by nikund
Communication technology by nikundsheshank jain
 
Type of computer network
Type of computer networkType of computer network
Type of computer networkTapashRoy16
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computingBalakumar232
 

Similar to Mobile computing (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdf
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdf
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and
 
MIS
MISMIS
MIS
 
Chapter 09 pertemuan 13- donpas - mobile computing
Chapter 09  pertemuan 13- donpas - mobile computingChapter 09  pertemuan 13- donpas - mobile computing
Chapter 09 pertemuan 13- donpas - mobile computing
 
Small computing & Mobile Computing
Small computing & Mobile ComputingSmall computing & Mobile Computing
Small computing & Mobile Computing
 
Computer wireless trends
Computer wireless trendsComputer wireless trends
Computer wireless trends
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Unit 1
Unit 1Unit 1
Unit 1
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Communication technology by nikund
Communication technology by nikundCommunication technology by nikund
Communication technology by nikund
 
Type of computer network
Type of computer networkType of computer network
Type of computer network
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

Mobile computing

  • 1.
  • 2. Table OfTable Of ContentsContents
  • 3.  Mobile Computing Mobile (Moving) + Computing ( using computer) . Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere IntroductionIntroduction
  • 4. Mobile computingMobile computing  In recent years, distributed computer has become the norm, especially after the advent of the internet.  Today, technological advances are shaping a new computing environment where the user is free from the need to work at a specific location, and is even enabled to work while on the move.  This new paradigm is often called MOBILE COMPUTING.
  • 5.  A device that moves  Between different geographical locations  Between different networks  Between different applications  Such as Palm-top, laptop, Cell phonesCell phones  A device due to which mobile communication is possible  Modems. What Is Mobility ?What Is Mobility ?
  • 6.
  • 7. Mobile Computing DevicesMobile Computing Devices  Display Only  Info Pad model: limited portable processing  Like a cordless phone.  Laptop Computer  ThinkPad model: significant portable processing, operates independently of wireless infrastructure.  Personal Digital Assistant [PDA] :Somewhere between these extremes. a handheld device that combines computing, telephone/fax, Internet and networking features.
  • 8.
  • 9. Wireless NetworkTechnology :Wireless NetworkTechnology : Inside ItInside It “Wireless Overlay” Network
  • 12.
  • 13. Security and PrivacySecurity and Privacy  Security and privacy Threats: Wi-Fi networks are a shared network that makes it easier for others to eavesdrop on your communication.  Devices are Stolen and tampered.  Cryptography.  Connection.
  • 14.  Security and privacy Solutions:  Secure Web Browsing  Use secure, encrypted sessions.  Secure Internet Transactions  Use UCI’s VPN to encrypt your network traffic.  Always use a Personal Firewall  Set the firewall to deny ALL incoming connections.
  • 15.  Detecting man in the middle trying to steal information Each device displays the hash of its public key. The keys are exchanged by Diffie-Hellman protocol. The two hashes of the keys are compared. If the two match then there is no man in the middle.  If the two don’t match it’s assumed there is a man in the middle. Never store Sensitive Data on mobile devices unless absolutely necessary.
  • 17. Disconnected OperationsDisconnected Operations Low bandwidth High bandwidth variability Low power and resources Security risks Wide variety terminals and devices with different capabilities Fit more functionality into single, smaller device Disconnection
  • 18. LIMITATIONS Insufficient bandwidth If the user needs access to a network they must resort to slow wireless WAN systems primarily intended for telephone use. Higher speed wireless LANs are only available in specific sites Security standards When working mobile one is dependent on public networks, requiring careful use ofVPNs. Power consumption Mobile computers must rely entirely on battery power. Combined with compact size, this means unusually expensive batteries be used Transmission interferences Weather and terrain problems as well as distance-limited connection exist with some technologies. Reception in tunnels and some buildings is poor. Potential health hazards Potential health damage from cellular radio frequency emission is not known yet. However, more car accidents are related to drivers who were talking through a mobile device. Also, cell phones may interfere with sensitive medical devices. Human interface with device As, screens are often too small. Keyboards are impractical, especially one-handed, and alternate methods such as speech or handwriting recognition require training.
  • 19. Future AspectsFuture Aspects  Track your friends on a map by picking up GPS signals from other Android phones, so you can search for nearby parties.  Geolife This app will send you reminders based on location instead of time. For example, as you approach a grocery store, it will remind you to pick up milk.
  • 20.  Mobile computing has severe limitations - however, it is far from impossible, and technology improves all the time  Lots of challenges - some have (good) solutions, many others are still waiting to be solved Conclusion