SlideShare a Scribd company logo
1 of 13
BY
M.Meghana
INTRODUCTION
• mobile operator face the challenge of managing
  a dramatic rise in mobile data traffic
• mobile broadband continues to rise in popularity
  and usage
• Attackers see mobile devices and networks as
  new ground for attacks
HISTORY
• Mobile infrastructure will require plan for OSI
  layer
   to send and receive data
• First generation:
   before 1990’s
   no security to data just mobile was invented
• Second generation(1990’s):
   customer is not satisfied with mobile services
• Third generation(after 1990’s):
   deals with mobile traffic on network
• Fourth generation:
  solves problem of mobile traffic
WORKING PROCESS
• Arbor's Peak flow SP solution allows mobile
 network operators to optimize and protect their
 mobile infrastructure and services.

• Mobile infrastructure protection


• Mobile service protection
TECHNOLOGIES
1)java
• Mobile infrastructure uses Java run time
  environment in cell phones.

2)Database
• database store data when communications are
  done
• brings the applications that were once limited
  to the world where they are most needed.
3)Xml
 XML (Extensible Markup Language) is used
  for integration of software running in mobile
APPLICATIONS
1)SAP Mobile Infrastructure :
 The SAP MI offers tools for synchronization
 It is based on
   java
    xml
2) Wyse technology:
• provider of cloud-based mobile infrastructure
  management technology.
ADVANTAGES
 Decrease security risk and costs involved with
  lost devices.
 Users can select the devices that best
  meets their needs
 get their devices up and running quickly, in just
  minutes instead of days.
• Users get reliable, secure and easy access to
 corporate email and applications

• Use custom attributes to track asset
 information

• Benefit from service level guarantees
DISADVANTAGES
 forced to rely on your chosen vendor’s
  capabilities
 Some times not accessible from anywhere in
  the country
CONCLUSION
 Mobile Infrastructure serves as the universal
 platform for mobilizing your enterprise
 applications

 provides security to data that is transferred
 from one device to other

More Related Content

What's hot

Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
David Livingston J
 

What's hot (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
Introduction to Mobile Cloud Computing
Introduction to Mobile Cloud ComputingIntroduction to Mobile Cloud Computing
Introduction to Mobile Cloud Computing
 
Challenges of Conventional Systems.pptx
Challenges of Conventional Systems.pptxChallenges of Conventional Systems.pptx
Challenges of Conventional Systems.pptx
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloud
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Cloud Deployments Models
Cloud Deployments ModelsCloud Deployments Models
Cloud Deployments Models
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMIEvolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Authentication in cloud computing
Authentication in cloud computingAuthentication in cloud computing
Authentication in cloud computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 

Viewers also liked

Heliodisplay brochure
Heliodisplay brochureHeliodisplay brochure
Heliodisplay brochure
Benn Sachi
 
Analysis of the power quality impact of multiple directed energy loads on an ...
Analysis of the power quality impact of multiple directed energy loads on an ...Analysis of the power quality impact of multiple directed energy loads on an ...
Analysis of the power quality impact of multiple directed energy loads on an ...
cahouser
 
Holographic versatile disc
Holographic versatile discHolographic versatile disc
Holographic versatile disc
Akhil Kumar
 

Viewers also liked (20)

Bright talk summit ea and innovation - jude umeh
Bright talk summit   ea and innovation - jude umehBright talk summit   ea and innovation - jude umeh
Bright talk summit ea and innovation - jude umeh
 
Designing Web Interfaces
Designing Web InterfacesDesigning Web Interfaces
Designing Web Interfaces
 
Surface Computing
Surface ComputingSurface Computing
Surface Computing
 
5D DVD
5D DVD5D DVD
5D DVD
 
Heliodisplay brochure
Heliodisplay brochureHeliodisplay brochure
Heliodisplay brochure
 
Light fidelity
Light fidelity Light fidelity
Light fidelity
 
holographic versatile disc
holographic versatile discholographic versatile disc
holographic versatile disc
 
Analysis of the power quality impact of multiple directed energy loads on an ...
Analysis of the power quality impact of multiple directed energy loads on an ...Analysis of the power quality impact of multiple directed energy loads on an ...
Analysis of the power quality impact of multiple directed energy loads on an ...
 
HVD
HVDHVD
HVD
 
Fuel cells
Fuel cellsFuel cells
Fuel cells
 
AirBar Sensor
AirBar SensorAirBar Sensor
AirBar Sensor
 
3 d optical data storage
3 d optical data storage3 d optical data storage
3 d optical data storage
 
Htc ppt
Htc pptHtc ppt
Htc ppt
 
A review of cloud computing for transportation system
A review of cloud computing for transportation systemA review of cloud computing for transportation system
A review of cloud computing for transportation system
 
Presentation on edt
Presentation on edtPresentation on edt
Presentation on edt
 
AUTOMATIC NIGHT LAMP WITH MORNING ALARM
AUTOMATIC NIGHT LAMP WITH MORNING ALARMAUTOMATIC NIGHT LAMP WITH MORNING ALARM
AUTOMATIC NIGHT LAMP WITH MORNING ALARM
 
Holographic versatile disc
Holographic versatile discHolographic versatile disc
Holographic versatile disc
 
Holographic Versatile Disc - Seminar
Holographic Versatile Disc - SeminarHolographic Versatile Disc - Seminar
Holographic Versatile Disc - Seminar
 
Surface computing
Surface computingSurface computing
Surface computing
 
Application of cloud computing to agriculture
Application of cloud computing to agriculture Application of cloud computing to agriculture
Application of cloud computing to agriculture
 

Similar to mobile infrastructure management

Mobile computing
Mobile computingMobile computing
Mobile computing
amellia27
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 

Similar to mobile infrastructure management (20)

Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Basics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptxBasics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptx
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
The Mobile Ecosystem
The Mobile EcosystemThe Mobile Ecosystem
The Mobile Ecosystem
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
4 gppt
4 gppt4 gppt
4 gppt
 
5G 2
5G 25G 2
5G 2
 
Management and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and ApplicationsManagement and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and Applications
 
GSM ARCHITECTURE-Mobile Communication.pptx
GSM ARCHITECTURE-Mobile  Communication.pptxGSM ARCHITECTURE-Mobile  Communication.pptx
GSM ARCHITECTURE-Mobile Communication.pptx
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
 
Chapter 5. infrastructure ti
Chapter 5. infrastructure tiChapter 5. infrastructure ti
Chapter 5. infrastructure ti
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile Devices
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 

More from Akhil Kumar

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solids
Akhil Kumar
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solids
Akhil Kumar
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planes
Akhil Kumar
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of lines
Akhil Kumar
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projection
Akhil Kumar
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersection
Akhil Kumar
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen method
Akhil Kumar
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solids
Akhil Kumar
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problem
Akhil Kumar
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)
Akhil Kumar
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
Akhil Kumar
 

More from Akhil Kumar (20)

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solids
 
Edp scales
Edp  scalesEdp  scales
Edp scales
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solids
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planes
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of lines
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projection
 
Edp isometric
Edp  isometricEdp  isometric
Edp isometric
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersection
 
Edp excerciseeg
Edp  excerciseegEdp  excerciseeg
Edp excerciseeg
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen method
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solids
 
Edp curves2
Edp  curves2Edp  curves2
Edp curves2
 
Edp curve1
Edp  curve1Edp  curve1
Edp curve1
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problem
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
yii framework
yii frameworkyii framework
yii framework
 
cloud computing
cloud computingcloud computing
cloud computing
 
WORDPRESS
WORDPRESSWORDPRESS
WORDPRESS
 
AJAX
AJAXAJAX
AJAX
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

mobile infrastructure management

  • 2. INTRODUCTION • mobile operator face the challenge of managing a dramatic rise in mobile data traffic • mobile broadband continues to rise in popularity and usage • Attackers see mobile devices and networks as new ground for attacks
  • 3. HISTORY • Mobile infrastructure will require plan for OSI layer to send and receive data • First generation: before 1990’s no security to data just mobile was invented • Second generation(1990’s): customer is not satisfied with mobile services • Third generation(after 1990’s): deals with mobile traffic on network
  • 4. • Fourth generation: solves problem of mobile traffic
  • 5. WORKING PROCESS • Arbor's Peak flow SP solution allows mobile network operators to optimize and protect their mobile infrastructure and services. • Mobile infrastructure protection • Mobile service protection
  • 6.
  • 7. TECHNOLOGIES 1)java • Mobile infrastructure uses Java run time environment in cell phones. 2)Database • database store data when communications are done • brings the applications that were once limited to the world where they are most needed.
  • 8. 3)Xml  XML (Extensible Markup Language) is used for integration of software running in mobile
  • 9. APPLICATIONS 1)SAP Mobile Infrastructure :  The SAP MI offers tools for synchronization  It is based on java xml 2) Wyse technology: • provider of cloud-based mobile infrastructure management technology.
  • 10. ADVANTAGES  Decrease security risk and costs involved with lost devices.  Users can select the devices that best meets their needs  get their devices up and running quickly, in just minutes instead of days.
  • 11. • Users get reliable, secure and easy access to corporate email and applications • Use custom attributes to track asset information • Benefit from service level guarantees
  • 12. DISADVANTAGES  forced to rely on your chosen vendor’s capabilities  Some times not accessible from anywhere in the country
  • 13. CONCLUSION  Mobile Infrastructure serves as the universal platform for mobilizing your enterprise applications  provides security to data that is transferred from one device to other