SlideShare a Scribd company logo
Anand Kumar
   IT/07/18
7th Semester
People are mobile




            Devices are mobile
 A person who moves


   Between different geographical locations
   Between different networks
   Between different communication devices
   Between different applications


 A device that moves


   Between different geographical locations
   Between different networks
 Offline feature   see…
 Automated
 Predictive
 Use Friendly
 Windows
 Linux
 OS/2
Natural Evolution of Computing
More Flexible Resource Usage




                                                                        Mobile Computing

                                                                 LANs + WSs

                                                          Networking

                                                  Timesharing
                                              Batch
                                        OS
                               Single User


                                             Freedom from Collocation
Research Issues in Mobile Computing
• Wireless Communications

– Quality of connectivity
– Bandwidth limitations

• Mobility

– Location transparency
– Location dependency

• Portability

– Power limitations
– Display, processing, storage limitations
Classes of Mobile Devices
• Display Only

– InfoPad model: limited portable processing
– Constrained to operation within prepared infrastructure,
like a cordless phone
– Advantages with respect to power consumption, upgrade
path, lightweight, impact of lost/broken/stolen device

• Laptop Computer

– ThinkPad model: significant portable processing,
operates independently of wireless infrastructure
– Disadvantages: power consumption, expensive,
significant loss exposure, typically greater than 5 pounds

• Personal Digital Assistant

– Somewhere between these extremes
Wireless C0mmunication
• Harsh communications environment:

– Lower bandwidth/higher latency:
good enough for videoconferencing?
– Higher error rates
– More frequent disconnection
– Performance depends on density of nearby users but inherent
scalability of cellular/frequency reuse architecture helps

• Connection/Disconnection

–   Network failure is common
–   Autonomous operation is highly desirable
»   Caching is a good idea, e.g., web cache
–   Asynchronous/spool-oriented applications, like mail or printing
»   Trickle back data when bandwidth is available
–   Disconnected file systems: CODA (CMU), Ficus (UCLA)
Wireless C0mmunication (contd…)
• Low Bandwidth

– Orders of magnitude differences between wide-area, in building
Wireless

• Variable Bandwidth

– Applications adaptation to changing quality of
connectivity
» High bandwidth, low latency: business as usual
» High bandwidth, high latency: aggressive prefetching
» Low bandwidth, high latency: asynchronous
operation, use caches to hide latency, predict future
references/trickle in, etc. etc.

• Heterogeneous Networks

– “Vertical Handoff” among co-located wireless networks
Security Concerns in
Wireless C0mmunication

 – Authentication is critical
 » Normal network point of attachment is a wall tap
 » Wireless access makes network attachment too easy
 – Exposure to over-the-air wiretapping
 » Any transmitter can also be a receiver!
 » Some wireless networks provide secure air-links
 (e.g., CDPD)
 » Made more difficult by spread spectrum technologies
Mobility
• Address Migration
– Existing applications send packets to a fixed network
address
– Need to support dynamically changing “local” addresses
as mobile device moves through network
– Mobile IP specification: home environment tracks mobile
device’s current location through registration procedure
– Route optimization: exploit local caches of <global
destination node addresses, current care-of address>
– Location updates:
» Forwarding
» Hierarchical mobility agents
– Other routing issues: e.g., multicast
Mobile : IP Routing




                   INTERNET
       Source


    Sockets
                              Server
    TCP/UDP

       IP
   Link Layer

  Physical Layer
Mobility
• Location Dependent Services

– Discovery: What services exist in my local
environment?
e.g., printers, file and compute services, special local
applications, etc.
– Follow me services: “Route calls to my current
location,”
“Migrate my workstation desktop to the nearest
workstation screen”
– Information services:
» Broadcast/“push” information (e.g., “Flight 59 will
depart from Gate 23”)
» “Pull” information (e.g., “What gate will Flight 59
depart from?”)
– Service migration: computations, caches, state, etc.
follow mobile device as it moves through the network
– Privacy: what applications can track user locations?
Portability
• Low Power

– Limited compute performance
– Low quality displays

• Loss of Data

– Easily lost
– Must be conceived as being “network-integrated”

• Small User Interface

– Limited real estate for keyboards
– Icon intensive/handwriting/speech

• Small Local Storage

– Flash memory rather than disk drive
Portability Issues

                        – Weight, volume determine lifetime
                        – Power consumption: CV2ƒ
                                                 Other Battery
                                                 types:
                                                 – Lead Acid
                                                 – Nickel Zinc
                                                 – Rechargeable
                                                   Alkaline
Lighter




                                                   Manganese
                                                 – Zinc Air



              Smaller
Concepts in Mobile Computing
  • Identification

  – Subscriber mobility: 700 phone number
  – Terminal mobility: mobile phone # or IP address
  – Application mobility

  • Registration

  – Authentication: who are you?
  – Authorization: what can you do?
  – Allocation: how much will I give you?
Continued…
• Call/Connection Establishment

– Mobile Routing: Mobile IP, Cellular System HLR/VLR
– Resource Reservations: Reserve channels in advance
– Location Update: forward vs. hierarchy

• Mobility

– Handoff: when to do it, choice of network
– Process Migration: application support infrastructure that
  follows the mobile

• Privacy and Security

– Authentication
– Authorization
– Encryption: over-the-air security
Thank You

More Related Content

What's hot

Mobile computing
Mobile computingMobile computing
Mobile computing
lalit arora
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Jennifer Christy
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
Madhuri Badgujar
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
Rashid Shahariar
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
HABEEB2193
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Tapesh Chalisgaonkar
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
Bhushan Jadhav
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Bhawani Rathore
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Abdul Qadir Pattal
 
Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)
Nikhil Jain
 
Wireless Network
Wireless NetworkWireless Network
Wireless Network
dfg1990
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
Chandrakant Choure
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
Ghaffar Khan
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
vijay_m_chaudhary
 
Edge computing
Edge computingEdge computing
Edge computing
Biddut Hossain
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
priyankpatel2811
 
Mobile Computing
Mobile ComputingMobile Computing
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
Vivek Prasad
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Raga Deepthi
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
Harisankar U K
 

What's hot (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)
 
Wireless Network
Wireless NetworkWireless Network
Wireless Network
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 

Viewers also liked

Ch3
Ch3Ch3
Ch5
Ch5Ch5
Mobile computing seminar
Mobile computing seminarMobile computing seminar
Mobile computing seminar
Meenakshi Devi
 
Ch4
Ch4Ch4
Case study mobile computing
Case study mobile computingCase study mobile computing
Case study mobile computing
kaleeswaran S
 
Ch2
Ch2Ch2
Ch6
Ch6Ch6
Ch7
Ch7Ch7
Ch1
Ch1Ch1
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
gouse_1210
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
RMK ENGINEERING COLLEGE, CHENNAI
 
It6601 mobile computing unit 5
It6601 mobile computing unit 5It6601 mobile computing unit 5
It6601 mobile computing unit 5
RMK ENGINEERING COLLEGE, CHENNAI
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tushar Malhotra
 
Strength of materials by s k mondal
Strength of materials by s k mondalStrength of materials by s k mondal
Strength of materials by s k mondal
Shubhra Saxena
 
10+ Getting to Know You Activities for Teens & Adults
10+ Getting to Know You Activities for Teens & Adults10+ Getting to Know You Activities for Teens & Adults
10+ Getting to Know You Activities for Teens & Adults
Shelly Sanchez Terrell
 
The NEW Way to Win Friends & Influence People (social media in events)
The NEW Way to Win Friends & Influence People (social media in events)The NEW Way to Win Friends & Influence People (social media in events)
The NEW Way to Win Friends & Influence People (social media in events)
Lara McCulloch-Carter
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 

Viewers also liked (18)

Ch3
Ch3Ch3
Ch3
 
Ch5
Ch5Ch5
Ch5
 
Mobile computing seminar
Mobile computing seminarMobile computing seminar
Mobile computing seminar
 
Ch4
Ch4Ch4
Ch4
 
Case study mobile computing
Case study mobile computingCase study mobile computing
Case study mobile computing
 
Ch2
Ch2Ch2
Ch2
 
Ch6
Ch6Ch6
Ch6
 
Ch7
Ch7Ch7
Ch7
 
Ch1
Ch1Ch1
Ch1
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
It6601 mobile computing unit 5
It6601 mobile computing unit 5It6601 mobile computing unit 5
It6601 mobile computing unit 5
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Strength of materials by s k mondal
Strength of materials by s k mondalStrength of materials by s k mondal
Strength of materials by s k mondal
 
10+ Getting to Know You Activities for Teens & Adults
10+ Getting to Know You Activities for Teens & Adults10+ Getting to Know You Activities for Teens & Adults
10+ Getting to Know You Activities for Teens & Adults
 
The NEW Way to Win Friends & Influence People (social media in events)
The NEW Way to Win Friends & Influence People (social media in events)The NEW Way to Win Friends & Influence People (social media in events)
The NEW Way to Win Friends & Influence People (social media in events)
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Similar to Mobile computing

goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
AyuRosyidazain1
 
goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
UntungSuprihadi1
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
Akttripathi
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
Samit Singh
 
Mdm intro-chapter1
Mdm intro-chapter1Mdm intro-chapter1
Mdm intro-chapter1
Mohammad Faizan
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
abhinav2727
 
WAP
WAPWAP
chapter one introduction to computer network maruf.pptx
chapter one  introduction to computer network maruf.pptxchapter one  introduction to computer network maruf.pptx
chapter one introduction to computer network maruf.pptx
MohamedAbdi347025
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
Sanghyeok Park
 
Threats to Mobile Computing
Threats to Mobile ComputingThreats to Mobile Computing
Threats to Mobile Computing
madhurbyheart
 
Chapter4
Chapter4Chapter4
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
bdemchak
 
On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
Coldbeans Software
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Adam Dunkels
 
Msit computer networks 1
Msit computer networks 1Msit computer networks 1
Msit computer networks 1
Sridhar Baithi
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
KavinD11
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
NANDIKHATHARANIKUMAR1
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
mlrbrown
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
Rick G. Garibay
 

Similar to Mobile computing (20)

goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
 
goldman11.ppt
goldman11.pptgoldman11.ppt
goldman11.ppt
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Mdm intro-chapter1
Mdm intro-chapter1Mdm intro-chapter1
Mdm intro-chapter1
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
WAP
WAPWAP
WAP
 
chapter one introduction to computer network maruf.pptx
chapter one  introduction to computer network maruf.pptxchapter one  introduction to computer network maruf.pptx
chapter one introduction to computer network maruf.pptx
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
Threats to Mobile Computing
Threats to Mobile ComputingThreats to Mobile Computing
Threats to Mobile Computing
 
Chapter4
Chapter4Chapter4
Chapter4
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
 
Msit computer networks 1
Msit computer networks 1Msit computer networks 1
Msit computer networks 1
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Mobile computing

  • 1. Anand Kumar IT/07/18 7th Semester
  • 2. People are mobile Devices are mobile
  • 3.  A person who moves  Between different geographical locations  Between different networks  Between different communication devices  Between different applications  A device that moves  Between different geographical locations  Between different networks
  • 4.
  • 5.
  • 6.  Offline feature see…  Automated  Predictive  Use Friendly  Windows  Linux  OS/2
  • 7. Natural Evolution of Computing More Flexible Resource Usage Mobile Computing LANs + WSs Networking Timesharing Batch OS Single User Freedom from Collocation
  • 8. Research Issues in Mobile Computing • Wireless Communications – Quality of connectivity – Bandwidth limitations • Mobility – Location transparency – Location dependency • Portability – Power limitations – Display, processing, storage limitations
  • 9. Classes of Mobile Devices • Display Only – InfoPad model: limited portable processing – Constrained to operation within prepared infrastructure, like a cordless phone – Advantages with respect to power consumption, upgrade path, lightweight, impact of lost/broken/stolen device • Laptop Computer – ThinkPad model: significant portable processing, operates independently of wireless infrastructure – Disadvantages: power consumption, expensive, significant loss exposure, typically greater than 5 pounds • Personal Digital Assistant – Somewhere between these extremes
  • 10. Wireless C0mmunication • Harsh communications environment: – Lower bandwidth/higher latency: good enough for videoconferencing? – Higher error rates – More frequent disconnection – Performance depends on density of nearby users but inherent scalability of cellular/frequency reuse architecture helps • Connection/Disconnection – Network failure is common – Autonomous operation is highly desirable » Caching is a good idea, e.g., web cache – Asynchronous/spool-oriented applications, like mail or printing » Trickle back data when bandwidth is available – Disconnected file systems: CODA (CMU), Ficus (UCLA)
  • 11. Wireless C0mmunication (contd…) • Low Bandwidth – Orders of magnitude differences between wide-area, in building Wireless • Variable Bandwidth – Applications adaptation to changing quality of connectivity » High bandwidth, low latency: business as usual » High bandwidth, high latency: aggressive prefetching » Low bandwidth, high latency: asynchronous operation, use caches to hide latency, predict future references/trickle in, etc. etc. • Heterogeneous Networks – “Vertical Handoff” among co-located wireless networks
  • 12. Security Concerns in Wireless C0mmunication – Authentication is critical » Normal network point of attachment is a wall tap » Wireless access makes network attachment too easy – Exposure to over-the-air wiretapping » Any transmitter can also be a receiver! » Some wireless networks provide secure air-links (e.g., CDPD) » Made more difficult by spread spectrum technologies
  • 13. Mobility • Address Migration – Existing applications send packets to a fixed network address – Need to support dynamically changing “local” addresses as mobile device moves through network – Mobile IP specification: home environment tracks mobile device’s current location through registration procedure – Route optimization: exploit local caches of <global destination node addresses, current care-of address> – Location updates: » Forwarding » Hierarchical mobility agents – Other routing issues: e.g., multicast
  • 14. Mobile : IP Routing INTERNET Source Sockets Server TCP/UDP IP Link Layer Physical Layer
  • 15. Mobility • Location Dependent Services – Discovery: What services exist in my local environment? e.g., printers, file and compute services, special local applications, etc. – Follow me services: “Route calls to my current location,” “Migrate my workstation desktop to the nearest workstation screen” – Information services: » Broadcast/“push” information (e.g., “Flight 59 will depart from Gate 23”) » “Pull” information (e.g., “What gate will Flight 59 depart from?”) – Service migration: computations, caches, state, etc. follow mobile device as it moves through the network – Privacy: what applications can track user locations?
  • 16. Portability • Low Power – Limited compute performance – Low quality displays • Loss of Data – Easily lost – Must be conceived as being “network-integrated” • Small User Interface – Limited real estate for keyboards – Icon intensive/handwriting/speech • Small Local Storage – Flash memory rather than disk drive
  • 17. Portability Issues – Weight, volume determine lifetime – Power consumption: CV2ƒ Other Battery types: – Lead Acid – Nickel Zinc – Rechargeable Alkaline Lighter Manganese – Zinc Air Smaller
  • 18. Concepts in Mobile Computing • Identification – Subscriber mobility: 700 phone number – Terminal mobility: mobile phone # or IP address – Application mobility • Registration – Authentication: who are you? – Authorization: what can you do? – Allocation: how much will I give you?
  • 19. Continued… • Call/Connection Establishment – Mobile Routing: Mobile IP, Cellular System HLR/VLR – Resource Reservations: Reserve channels in advance – Location Update: forward vs. hierarchy • Mobility – Handoff: when to do it, choice of network – Process Migration: application support infrastructure that follows the mobile • Privacy and Security – Authentication – Authorization – Encryption: over-the-air security