SlideShare a Scribd company logo
1 of 30
Download to read offline
Wolkite University
College of Computing and Informatics
Department of Computer Science
Chapter Two : Mobile Computing
Prepared by Adem (MSc.)
April 3, 2022
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 1 / 30
Lesson Objective
At the end of this lesson students will able to
Define what is Mobile computing
Understand the function of Mobile computing
Describe the different types of Mobil device
Describe the different types of Mobil os
Understand the challenges of Mobile computing
Describe the application of Mobile computing
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 2 / 30
Outline
1 Introduction
2 mobile computing functions
3 Mobile Computing vs. Wireless Networking
4 Mobile devices and Mobile OS
5 Mobile Computing Characteristics
6 Mobile Computing Technologies
7 MOBILE COMPUTING APPLICATIONS
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 3 / 30
Introduction
computing
The activity of performing computations
The activity of using computer hardware and software for some
purpose.
Computing denotes the capability to automatically carry out
certain processing related to service invocations on a remote
computer.
Mobility , on the other hand, provides the capability to change
location while communicating to invoke computing services at
some remote computers.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 4 / 30
Cont..
Existing computing paradigms
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 5 / 30
Cont..
Personal computing system
refers to the use of personal computers for Computation.
Characterized by
Local software installation,
Local system maintenance
Customizable to user needs
Very low utilization
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 6 / 30
Cont..
Distributed computing :
refers to the use of distributed systems to solve computational
problems.
It is a collection of multiple autonomous/independent computers
that appears to its users as a single coherent system.
Characteristics of Distributed Systems
Differences between the computers and the ways they
communicate are hidden from users
Users and applications can interact with a distributed system in a
consistent and uniform way regardless of location (e.g. atomatic
transactions)
Distributed systems should be easy to expand and scale
(Scalability, Extensibility )
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 7 / 30
Cont..
Parallel Computing
Calculations of large problems are divided into smaller parts and
carried out simultaneously /concurrently on different processors.
Characterized by
In parallel computing, all processors have access to a shared
memory.
Shared memory can be used to exchange information between
processors.
Information is exchanged by passing messages between the
processors.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 8 / 30
Cont..
Cloud Computing
Cloud computing provides computation, software, data access, and
storage services that do not require end-user knowledge of the
physical location and configuration of the system that delivers the
services.”
Cloud computing relies on shared computing resource rather than
having local server or personal device for application.
The services are delivered and used over the internet and are paid
by customer based on pay-per-use business model.
Cloud computing characteristics: Liveliness, Reduced Cost,
Device and Location Independence, On-demand service,
Scalability and High Performance
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 9 / 30
Cont..
Pervasive/ Ubiquitous computing
A computing environment, which is pervasive in nature and can be
made available in any environment.
Characterized by :-
Context Awareness is an environment in which applications can
discover and take advantage of users’ contextual information.
Invisibility is about a complete disappearance of pervasive
computing technology from a user’s
Ad-hoc Networks is a self-configuring (wireless) network of
(mobile) nodes without the presence of static infrastructure.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 10 / 30
Cont..
Mobile computing
It is a technology that allows us to transmit data, audio, and video
via devices that are not connected with any physical link.
It can be defined as a computing environment over physical
mobility.
It is using a computer (of one kind or another) while on the move
The ability to compute remotely while on the move.
It can be defined as to access information from anywhere and at
anytime.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 11 / 30
Cont..
Mobile Computing basic components
Networks: communication
Devices and computing units :mobile
Applications : Computation
Mobile Computing = Mobile + (Communications) +
Computation
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 12 / 30
Cont..
A computing environment is defined as mobile if it supports one
or more of these characteristics:
User Mobility:
User should be able to move from one physical location to another
location and use the same service.
The service may be from home network or remote network
Network Mobility:
Moving from one network to another network and use the same
service.
Bearer Mobility:
User should be able to move from one bearer to another and use the
same service
Device Mobility:
User should be able to move from one device to another use the
same service.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 13 / 30
Cont..
Session Mobility:
A user session should be able to move from one user agent
environment to another.
Service Mobility:
User should be able to move from one service to another.
Host Mobility:
The user device can be either a client or server.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 14 / 30
Cont...
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 15 / 30
Cont..
The mobile computing functions can be logically divided into
following major segments
User with device:
The user device, this could be fixed device like desktop computer in
office or a portable device like mobile phone.
Network:
Whenever a user is mobile, he will be using different networks at
different places at different time
Gateways:
This is required to interface different transport bearers.
MiddleWare:
This is more of a function rather than a separate visible node.
In the present context middleware handles the presentation and
rendering of the context on a particular device.
It will also handle the security and personalization for different
users.
Content: This is the domain where the origin server and content
could be an application, system.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 16 / 30
Mobile Computing vs. Wireless Networking
Mobile computing essentially denotes accessing information and
remote computational services while on the move.
Wireless networking provides the basic communication
infrastructure necessary to make this possible.
Mobile computing is based on wireless networking and helps one
to invoke computing services on remote servers while on the
move.
Wireless networking is an important ingredient of mobile
computing, but forms only one of the necessary ingredients of
mobile computing.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 17 / 30
Mobile devices and Mobile OS
Mobile device refers to any electronic device that be easily moved
from one location to another.
Mobile Devices means tablets and smartphones running mobile
operating systems.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 18 / 30
Cont..
Laptop:
Notebook
Netbook
Ultra-Mobile PC
Communication
devices:
pager
Smartphone
PDA and Pocket
PC
cell phone
Cordless phone
Tablet PC
E-book readers:
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 19 / 30
Mobile OS
A mobile OS is a type of software that performs the basic
operations required by a modern phone.
It is the operating system that controls a mobile device similar in
principle to an operating system
such as Windows,
Mac OS, or
Linux that controls a desktop computer or laptop.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 20 / 30
Cont...
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 21 / 30
Cont...
Symbian
Market share(2010): 37.6
License : open source
Company: Nokia.
CPU Architecture: ARM
Programmed in: C++
Application store: Symbian Horizon,Ovistore(10000+)
Package manager: Nokia Ovi Suite
Other: multi-touch, easily affordable cost
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 22 / 30
Cont...
Android
Market share(2010): 22.7
License : open source
Company: Open Handset Alliance(Google).
CPU Architecture: ARM, x86
Programmed in: C, C++, Java
Application store: Google play (700,000+)
Package manager: APK
Other: multi-touch, Linux
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 23 / 30
Cont...
BlackBerry RIM OS
Market share(2010): 16.0
License : Proprietary
Company: Research in motion (RIM).
CPU Architecture: ARM
Programmed in: Java
Application store: Blackberry App World(30000+)
Package manager: Blackberry Desktop Manager
Other: not multi-touch, push email service
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 24 / 30
Cont...
Apple iOS
Market share(2010): 15.7
License : Proprietary
Company: Apple.
CPU Architecture: ARM
Programmed in: C, C++, Objective-C
Application store: Apple App Store(300,000+)
Package manager: iTunes
Other: multi-touch, for iphone ,ipod touch ipad, Apple Tv only
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 25 / 30
Cont...
Mobile computing issues and Challenges
Security
There are several security concerns associated with the increased
popularity of mobile computing devices.
Keeping a device constantly connected to the internet makes it
vulnerable to threats.
Issues with Connectivity
Most applications don’t function without internet connectivity, and
the lack of it makes devices very limited.
Device Size Limitations
Power Consumption
Dependency
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 26 / 30
Mobile Computing Characteristics
Ubiquity
Anywhere.
Anytime.
Location Awareness:
Current location of the user can be found out using GPS (Global
positioning system)
Ex: Personalized application to find car maintaining service,
Traffic control application, and Fleet management application
when travelling by car.
Adaptation
Adjust the bandwidth fluctuation automatically without disturbing
the user
Personalization:
Services can be personalized according to the user need. Some
type of information can be obtained from the specific source.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 27 / 30
Mobile Computing Technologies
Types of Mobile Technologies
SMS
It is now the most widely used and oldest text messaging service.
Messages can usually be up to 140 characters long.
SMS was originally developed for GSM phones, although it is now
supported by all major cellular phone networks.
GSM
Global System for Mobile technology is a cellular technology that
is open and digital and is used for mobile communication.
It operates on the 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz
frequency ranges.
It employs a hybrid of FDMA and TDMA.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 28 / 30
Cont..
CDMA
It is a channel access mechanism that also serves as an example of
multiple access.
Multiple access simply means that data from multiple transmitters
can be delivered onto a single communication channel at the same
time.
Wi-Fi
Wi-Fi is a wireless networking technology that allows us to
connect to a network or to other computers or mobile devices
across a wireless channel.
Data is delivered in a circular region over radio frequencies in
Wi-Fi.
Wi-Fi (Wireless Fidelity) is a generic acronym for a
communication standard for a wireless network that functions as a
Local Area Network without the use of cables or other types of
cabling.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 29 / 30
MOBILE COMPUTING APPLICATIONS
Vehicles
Emergencies
Traveling Salesman
Entertainment
Education
Location Dependent Services etc.
Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 30 / 30

More Related Content

Similar to Chapter Two.pdf

EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Fog computing scheduling algorithm for smart city
Fog computing scheduling algorithm for smart city Fog computing scheduling algorithm for smart city
Fog computing scheduling algorithm for smart city IJECEIAES
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdf
1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdf1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdf
1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdfKarla Long
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingTahmin Aysha Murshed
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant guptaPrashant Gupta
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issuesRezgar Mohammad
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
 
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...AlAtfat
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxaudeleypearl
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityJohn Paul Prassanna
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 

Similar to Chapter Two.pdf (20)

EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Fog computing scheduling algorithm for smart city
Fog computing scheduling algorithm for smart city Fog computing scheduling algorithm for smart city
Fog computing scheduling algorithm for smart city
 
Fog security
Fog securityFog security
Fog security
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 
1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdf
1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdf1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdf
1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdf
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
40120130405016
4012013040501640120130405016
40120130405016
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
 
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart...
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
 
50120140502004
5012014050200450120140502004
50120140502004
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Cloud Basics.pptx
Cloud Basics.pptxCloud Basics.pptx
Cloud Basics.pptx
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 

Recently uploaded

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理apekaom
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样Fi
 
一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书A
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理A
 
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...Model Neeha Mumbai
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsrahman018755
 
一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理A
 
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样AS
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfe-Market Hub
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...Varun Mithran
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理SS
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodierahman018755
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样A
 
Beyond Inbound: Unlocking the Secrets of API Egress Traffic Management
Beyond Inbound: Unlocking the Secrets of API Egress Traffic ManagementBeyond Inbound: Unlocking the Secrets of API Egress Traffic Management
Beyond Inbound: Unlocking the Secrets of API Egress Traffic Managementseank14
 
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...musaddumba454
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书B
 
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书AS
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理Fir
 
一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书A
 
一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书A
 

Recently uploaded (20)

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
 
一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
 
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理
 
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
 
Beyond Inbound: Unlocking the Secrets of API Egress Traffic Management
Beyond Inbound: Unlocking the Secrets of API Egress Traffic ManagementBeyond Inbound: Unlocking the Secrets of API Egress Traffic Management
Beyond Inbound: Unlocking the Secrets of API Egress Traffic Management
 
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
 
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
 
一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书
 
一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书
 

Chapter Two.pdf

  • 1. Wolkite University College of Computing and Informatics Department of Computer Science Chapter Two : Mobile Computing Prepared by Adem (MSc.) April 3, 2022 Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 1 / 30
  • 2. Lesson Objective At the end of this lesson students will able to Define what is Mobile computing Understand the function of Mobile computing Describe the different types of Mobil device Describe the different types of Mobil os Understand the challenges of Mobile computing Describe the application of Mobile computing Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 2 / 30
  • 3. Outline 1 Introduction 2 mobile computing functions 3 Mobile Computing vs. Wireless Networking 4 Mobile devices and Mobile OS 5 Mobile Computing Characteristics 6 Mobile Computing Technologies 7 MOBILE COMPUTING APPLICATIONS Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 3 / 30
  • 4. Introduction computing The activity of performing computations The activity of using computer hardware and software for some purpose. Computing denotes the capability to automatically carry out certain processing related to service invocations on a remote computer. Mobility , on the other hand, provides the capability to change location while communicating to invoke computing services at some remote computers. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 4 / 30
  • 5. Cont.. Existing computing paradigms Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 5 / 30
  • 6. Cont.. Personal computing system refers to the use of personal computers for Computation. Characterized by Local software installation, Local system maintenance Customizable to user needs Very low utilization Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 6 / 30
  • 7. Cont.. Distributed computing : refers to the use of distributed systems to solve computational problems. It is a collection of multiple autonomous/independent computers that appears to its users as a single coherent system. Characteristics of Distributed Systems Differences between the computers and the ways they communicate are hidden from users Users and applications can interact with a distributed system in a consistent and uniform way regardless of location (e.g. atomatic transactions) Distributed systems should be easy to expand and scale (Scalability, Extensibility ) Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 7 / 30
  • 8. Cont.. Parallel Computing Calculations of large problems are divided into smaller parts and carried out simultaneously /concurrently on different processors. Characterized by In parallel computing, all processors have access to a shared memory. Shared memory can be used to exchange information between processors. Information is exchanged by passing messages between the processors. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 8 / 30
  • 9. Cont.. Cloud Computing Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services.” Cloud computing relies on shared computing resource rather than having local server or personal device for application. The services are delivered and used over the internet and are paid by customer based on pay-per-use business model. Cloud computing characteristics: Liveliness, Reduced Cost, Device and Location Independence, On-demand service, Scalability and High Performance Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 9 / 30
  • 10. Cont.. Pervasive/ Ubiquitous computing A computing environment, which is pervasive in nature and can be made available in any environment. Characterized by :- Context Awareness is an environment in which applications can discover and take advantage of users’ contextual information. Invisibility is about a complete disappearance of pervasive computing technology from a user’s Ad-hoc Networks is a self-configuring (wireless) network of (mobile) nodes without the presence of static infrastructure. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 10 / 30
  • 11. Cont.. Mobile computing It is a technology that allows us to transmit data, audio, and video via devices that are not connected with any physical link. It can be defined as a computing environment over physical mobility. It is using a computer (of one kind or another) while on the move The ability to compute remotely while on the move. It can be defined as to access information from anywhere and at anytime. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 11 / 30
  • 12. Cont.. Mobile Computing basic components Networks: communication Devices and computing units :mobile Applications : Computation Mobile Computing = Mobile + (Communications) + Computation Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 12 / 30
  • 13. Cont.. A computing environment is defined as mobile if it supports one or more of these characteristics: User Mobility: User should be able to move from one physical location to another location and use the same service. The service may be from home network or remote network Network Mobility: Moving from one network to another network and use the same service. Bearer Mobility: User should be able to move from one bearer to another and use the same service Device Mobility: User should be able to move from one device to another use the same service. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 13 / 30
  • 14. Cont.. Session Mobility: A user session should be able to move from one user agent environment to another. Service Mobility: User should be able to move from one service to another. Host Mobility: The user device can be either a client or server. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 14 / 30
  • 15. Cont... Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 15 / 30
  • 16. Cont.. The mobile computing functions can be logically divided into following major segments User with device: The user device, this could be fixed device like desktop computer in office or a portable device like mobile phone. Network: Whenever a user is mobile, he will be using different networks at different places at different time Gateways: This is required to interface different transport bearers. MiddleWare: This is more of a function rather than a separate visible node. In the present context middleware handles the presentation and rendering of the context on a particular device. It will also handle the security and personalization for different users. Content: This is the domain where the origin server and content could be an application, system. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 16 / 30
  • 17. Mobile Computing vs. Wireless Networking Mobile computing essentially denotes accessing information and remote computational services while on the move. Wireless networking provides the basic communication infrastructure necessary to make this possible. Mobile computing is based on wireless networking and helps one to invoke computing services on remote servers while on the move. Wireless networking is an important ingredient of mobile computing, but forms only one of the necessary ingredients of mobile computing. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 17 / 30
  • 18. Mobile devices and Mobile OS Mobile device refers to any electronic device that be easily moved from one location to another. Mobile Devices means tablets and smartphones running mobile operating systems. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 18 / 30
  • 19. Cont.. Laptop: Notebook Netbook Ultra-Mobile PC Communication devices: pager Smartphone PDA and Pocket PC cell phone Cordless phone Tablet PC E-book readers: Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 19 / 30
  • 20. Mobile OS A mobile OS is a type of software that performs the basic operations required by a modern phone. It is the operating system that controls a mobile device similar in principle to an operating system such as Windows, Mac OS, or Linux that controls a desktop computer or laptop. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 20 / 30
  • 21. Cont... Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 21 / 30
  • 22. Cont... Symbian Market share(2010): 37.6 License : open source Company: Nokia. CPU Architecture: ARM Programmed in: C++ Application store: Symbian Horizon,Ovistore(10000+) Package manager: Nokia Ovi Suite Other: multi-touch, easily affordable cost Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 22 / 30
  • 23. Cont... Android Market share(2010): 22.7 License : open source Company: Open Handset Alliance(Google). CPU Architecture: ARM, x86 Programmed in: C, C++, Java Application store: Google play (700,000+) Package manager: APK Other: multi-touch, Linux Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 23 / 30
  • 24. Cont... BlackBerry RIM OS Market share(2010): 16.0 License : Proprietary Company: Research in motion (RIM). CPU Architecture: ARM Programmed in: Java Application store: Blackberry App World(30000+) Package manager: Blackberry Desktop Manager Other: not multi-touch, push email service Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 24 / 30
  • 25. Cont... Apple iOS Market share(2010): 15.7 License : Proprietary Company: Apple. CPU Architecture: ARM Programmed in: C, C++, Objective-C Application store: Apple App Store(300,000+) Package manager: iTunes Other: multi-touch, for iphone ,ipod touch ipad, Apple Tv only Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 25 / 30
  • 26. Cont... Mobile computing issues and Challenges Security There are several security concerns associated with the increased popularity of mobile computing devices. Keeping a device constantly connected to the internet makes it vulnerable to threats. Issues with Connectivity Most applications don’t function without internet connectivity, and the lack of it makes devices very limited. Device Size Limitations Power Consumption Dependency Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 26 / 30
  • 27. Mobile Computing Characteristics Ubiquity Anywhere. Anytime. Location Awareness: Current location of the user can be found out using GPS (Global positioning system) Ex: Personalized application to find car maintaining service, Traffic control application, and Fleet management application when travelling by car. Adaptation Adjust the bandwidth fluctuation automatically without disturbing the user Personalization: Services can be personalized according to the user need. Some type of information can be obtained from the specific source. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 27 / 30
  • 28. Mobile Computing Technologies Types of Mobile Technologies SMS It is now the most widely used and oldest text messaging service. Messages can usually be up to 140 characters long. SMS was originally developed for GSM phones, although it is now supported by all major cellular phone networks. GSM Global System for Mobile technology is a cellular technology that is open and digital and is used for mobile communication. It operates on the 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz frequency ranges. It employs a hybrid of FDMA and TDMA. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 28 / 30
  • 29. Cont.. CDMA It is a channel access mechanism that also serves as an example of multiple access. Multiple access simply means that data from multiple transmitters can be delivered onto a single communication channel at the same time. Wi-Fi Wi-Fi is a wireless networking technology that allows us to connect to a network or to other computers or mobile devices across a wireless channel. Data is delivered in a circular region over radio frequencies in Wi-Fi. Wi-Fi (Wireless Fidelity) is a generic acronym for a communication standard for a wireless network that functions as a Local Area Network without the use of cables or other types of cabling. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 29 / 30
  • 30. MOBILE COMPUTING APPLICATIONS Vehicles Emergencies Traveling Salesman Entertainment Education Location Dependent Services etc. Prepared by Adem (MSc.) Wireless Communication and Mobile Computing April 3, 2022 30 / 30