SlideShare a Scribd company logo
Sk MOHAMED KASIM
Mobile computing
Mobile Computing
 A simple definition could be: Mobile Computing is using a computer (of one
kind or another) while on the move
 Another definition could be: Mobile Computing is when a work process is
moved from a normal fixed position to a more dynamic position
 A third definition could be: Mobile Computing is when a work process is
carried out somewhere where it was not previously possible
 Mobile Computing is an umbrella term used to describe technologies that
enable people to access services anytime and anywhere
Mobile Computing
 Many other names/overlapping computing paradigms:
 Pervasive Computing
 Ubiquitous Computing
 Wireless Systems
 Internet of Things (IoT)
 Embedded Computing
 Nomadic Computing
 Wireless Sensor Networks
 (Mobile) Ad-Hoc Networks
 Mesh Networks
 Vehicular Networks
 …
Mobile Computing
• Applications
• Location-awareness
• Mobility Support
• Security
• Resource Management
• Network Protocols
• Broadcast
• Technologies
• Standards
• Wireless Medium
Wireless Communication
Mobile Computing
Wired vs Wireless
 Wired Networks
 high bandwidth
 low bandwidth variability
 can listen on wire
 high power machines
 high resource machines
 need physical access (security)
 low delay
 connected operation
 Mobile Networks
 low bandwidth
 high bandwidth variability
 hidden terminal problem
 low power machines
 low resource machines
 need proximity
 higher delay
 disconnected operation
Why Go Mobile?
 Enable anywhere/anytime connectivity
 Bring computer communications to areas without pre-existing infrastructure
 Enable mobility
 Enable new applications
 An exciting new research area
Evolution
 Mobile computing can be categorized into seven major categories of focus
 These categories are the basis for the technology that is used today in
research and design of mobile computing
 Each category or section is a different area that was focused on making
mobile computing what it is today
 These seven categories are: Portability, Miniaturization, Connectivity,
Convergence, Divergence, Apps, Digital Ecosystems
Portability
 Reducing the size of hardware to enable the creation of computers that could
be physically moved around relatively easily
Miniaturization
 Creating new and significantly smaller mobile form factors that allowed the
use of personal mobile devices while on the move
Connectivity
 Developing devices and applications that allowed users to be online and
communicate via wireless data networks while on the move
Convergence
 Integrating emerging types of digital mobile devices, such as Personal Digital
Assistants (PDAs), mobile phones, music players, cameras, games, etc., into
hybrid devices
Applications (Apps)
 The latest wave of applications (apps) is about developing matter and
substance for use and consumption on mobile devices, and making access to
this fun or functional interactive application content easy and enjoyable
Mobile IP - Motivation
 An IP address not only identifies a host but also a point-of-attachment
 A host cannot change its IP address without terminating on-going sessions
 Mobility is the ability of a node to change its point-of-attachment while
maintaining all existing communications and using the same IP address
15-849E Wireless Networking 13
Mobile IP – The Gory Details
 Mobile node can use 2 IP addresses
 Static Home Address (identifies TCP connections)
 Dynamic Care-of-Address (current point of attachment on the network)
15-849E Wireless Networking 14
Mobile IP – Details (Contd.)
 Mobile IP is a cooperation of 3 mechanisms
 Discovering the care-of-address
 Registering the care-of-address
 Tunneling to the care-of-address
15-849E Wireless Networking 15
Mobile IP – Details (Contd.)
15-849E Wireless Networking 16
FA
FA Advertises Service
FA
FA
HA
Remote Redirect
Mobile IP – Details (Contd.)
 Recap (Remote Redirect)
 MH requests service from FA
 FA relays request to HA
 HA accepts the request (if possible) and its modifies routing table
 FA relays this to ths MH
 See anything missing?
 Malicious node could cause HA to alter its routing table with erroneous COA
(DOS Attack?)
15-849E Wireless Networking 17
Mobile IP – Details (Contd.)
 Solution?
 Digitally signed Remote Redirect (RR) messages
 Would it work now?
 What about replay attacks?
 Solution?
 RR messages could be made unique – How?
 Timestamps with each message
 Pseudorandom number with each message
15-849E Wireless Networking 18
How will Mobile IP change with IPv6?
 Stateless Address Autoconfiguration and Neighbor
Discovery precludes the need for Foreign Agents
 Security
 All IPv6 nodes implement strong authentication and
encryption features
 Source Routing
 Correspondent nodes no longer tunnel packets to MHs
 Instead they use IPv6 routing headers (variation of IPv4
source routing option)
 More …
15-849E Wireless Networking 19
Ongoing Work and Open Questions
 Routing inefficiencies
 Triangle Routing
 Security Issues
 Ingress Filtering
 Slow Growth in the Wireless LAN Market
 Competition from other protocols
15-849E Wireless Networking 20

More Related Content

What's hot

Common protocols
Common protocolsCommon protocols
Common protocolsMr SMAK
 
Mobile Computing | Computer Science
Mobile Computing | Computer ScienceMobile Computing | Computer Science
Mobile Computing | Computer Science
Transweb Global Inc
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Jennifer Christy
 
Introduction To Computer Networks
Introduction To Computer NetworksIntroduction To Computer Networks
Introduction To Computer Networks
adil raja
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
Pallepati Vasavi
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introductionnicole_wang
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
Md. Saddam Hossain Noyon
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Network
yusufd
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)Sajid Marwat
 
WIRELESS COMMUNICATIONS
WIRELESS COMMUNICATIONSWIRELESS COMMUNICATIONS
WIRELESS COMMUNICATIONS
c2mtech
 
Mobile computing
Mobile computingMobile computing
Mobile computing
kalyani reddy
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Khushboo Shaukat
 
Digital Cellular Technologies
Digital Cellular TechnologiesDigital Cellular Technologies
Digital Cellular Technologies
T. L. Singal
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
aroosa khan
 
Mobile Computing
Mobile ComputingMobile Computing
Ultra Wide Band (UWB)
Ultra Wide Band (UWB)Ultra Wide Band (UWB)
Ultra Wide Band (UWB)
Mohammad Dayeh
 
Mobile computing
Mobile computingMobile computing
Mobile computing
lalit arora
 
Mobile computing
Mobile computing Mobile computing

What's hot (20)

Common protocols
Common protocolsCommon protocols
Common protocols
 
Mobile Computing | Computer Science
Mobile Computing | Computer ScienceMobile Computing | Computer Science
Mobile Computing | Computer Science
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Introduction To Computer Networks
Introduction To Computer NetworksIntroduction To Computer Networks
Introduction To Computer Networks
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Network
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
WIRELESS COMMUNICATIONS
WIRELESS COMMUNICATIONSWIRELESS COMMUNICATIONS
WIRELESS COMMUNICATIONS
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Digital Cellular Technologies
Digital Cellular TechnologiesDigital Cellular Technologies
Digital Cellular Technologies
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Ultra Wide Band (UWB)
Ultra Wide Band (UWB)Ultra Wide Band (UWB)
Ultra Wide Band (UWB)
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 

Similar to Mobile computing

Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IP
Ashish Chandurkar
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
Nuth Otanasap
 
Seminar technical
Seminar technicalSeminar technical
Seminar technical
t4cashish
 
Seminar report
Seminar reportSeminar report
Seminar report
archana lisbon
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdf
khajapasha5978
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdf
khajapasha5978
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless laniaemedu
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessiaemedu
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
Santhosh Krishna
 
Sonu mobile computing
Sonu mobile computingSonu mobile computing
Sonu mobile computingstudentgita
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
RMK ENGINEERING COLLEGE, CHENNAI
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
Akttripathi
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Vivek Garhewal
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 

Similar to Mobile computing (20)

Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IP
 
MobileComputing by Mudasir
MobileComputing by MudasirMobileComputing by Mudasir
MobileComputing by Mudasir
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Seminar technical
Seminar technicalSeminar technical
Seminar technical
 
Seminar report
Seminar reportSeminar report
Seminar report
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdf
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdf
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lan
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wireless
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Sonu mobile computing
Sonu mobile computingSonu mobile computing
Sonu mobile computing
 
Mdm intro-chapter1
Mdm intro-chapter1Mdm intro-chapter1
Mdm intro-chapter1
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 

More from SKMohamedKasim

Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
SKMohamedKasim
 
Blockchain types architecture
Blockchain types architectureBlockchain types architecture
Blockchain types architecture
SKMohamedKasim
 
UNIT testing
UNIT testingUNIT testing
UNIT testing
SKMohamedKasim
 
Three way handshake
Three way handshakeThree way handshake
Three way handshake
SKMohamedKasim
 
Bitcoin
BitcoinBitcoin
Handling digital crime scene
Handling digital crime sceneHandling digital crime scene
Handling digital crime scene
SKMohamedKasim
 
Mac memory overview
Mac memory overviewMac memory overview
Mac memory overview
SKMohamedKasim
 
Java database connecticity steps
Java database connecticity stepsJava database connecticity steps
Java database connecticity steps
SKMohamedKasim
 
Operating system
Operating systemOperating system
Operating system
SKMohamedKasim
 
Mind map of computer science
Mind map of computer scienceMind map of computer science
Mind map of computer science
SKMohamedKasim
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms
SKMohamedKasim
 

More from SKMohamedKasim (11)

Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Blockchain types architecture
Blockchain types architectureBlockchain types architecture
Blockchain types architecture
 
UNIT testing
UNIT testingUNIT testing
UNIT testing
 
Three way handshake
Three way handshakeThree way handshake
Three way handshake
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Handling digital crime scene
Handling digital crime sceneHandling digital crime scene
Handling digital crime scene
 
Mac memory overview
Mac memory overviewMac memory overview
Mac memory overview
 
Java database connecticity steps
Java database connecticity stepsJava database connecticity steps
Java database connecticity steps
 
Operating system
Operating systemOperating system
Operating system
 
Mind map of computer science
Mind map of computer scienceMind map of computer science
Mind map of computer science
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms
 

Recently uploaded

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Mobile computing

  • 2. Mobile Computing  A simple definition could be: Mobile Computing is using a computer (of one kind or another) while on the move  Another definition could be: Mobile Computing is when a work process is moved from a normal fixed position to a more dynamic position  A third definition could be: Mobile Computing is when a work process is carried out somewhere where it was not previously possible  Mobile Computing is an umbrella term used to describe technologies that enable people to access services anytime and anywhere
  • 3. Mobile Computing  Many other names/overlapping computing paradigms:  Pervasive Computing  Ubiquitous Computing  Wireless Systems  Internet of Things (IoT)  Embedded Computing  Nomadic Computing  Wireless Sensor Networks  (Mobile) Ad-Hoc Networks  Mesh Networks  Vehicular Networks  …
  • 4. Mobile Computing • Applications • Location-awareness • Mobility Support • Security • Resource Management • Network Protocols • Broadcast • Technologies • Standards • Wireless Medium Wireless Communication Mobile Computing
  • 5. Wired vs Wireless  Wired Networks  high bandwidth  low bandwidth variability  can listen on wire  high power machines  high resource machines  need physical access (security)  low delay  connected operation  Mobile Networks  low bandwidth  high bandwidth variability  hidden terminal problem  low power machines  low resource machines  need proximity  higher delay  disconnected operation
  • 6. Why Go Mobile?  Enable anywhere/anytime connectivity  Bring computer communications to areas without pre-existing infrastructure  Enable mobility  Enable new applications  An exciting new research area
  • 7. Evolution  Mobile computing can be categorized into seven major categories of focus  These categories are the basis for the technology that is used today in research and design of mobile computing  Each category or section is a different area that was focused on making mobile computing what it is today  These seven categories are: Portability, Miniaturization, Connectivity, Convergence, Divergence, Apps, Digital Ecosystems
  • 8. Portability  Reducing the size of hardware to enable the creation of computers that could be physically moved around relatively easily
  • 9. Miniaturization  Creating new and significantly smaller mobile form factors that allowed the use of personal mobile devices while on the move
  • 10. Connectivity  Developing devices and applications that allowed users to be online and communicate via wireless data networks while on the move
  • 11. Convergence  Integrating emerging types of digital mobile devices, such as Personal Digital Assistants (PDAs), mobile phones, music players, cameras, games, etc., into hybrid devices
  • 12. Applications (Apps)  The latest wave of applications (apps) is about developing matter and substance for use and consumption on mobile devices, and making access to this fun or functional interactive application content easy and enjoyable
  • 13. Mobile IP - Motivation  An IP address not only identifies a host but also a point-of-attachment  A host cannot change its IP address without terminating on-going sessions  Mobility is the ability of a node to change its point-of-attachment while maintaining all existing communications and using the same IP address 15-849E Wireless Networking 13
  • 14. Mobile IP – The Gory Details  Mobile node can use 2 IP addresses  Static Home Address (identifies TCP connections)  Dynamic Care-of-Address (current point of attachment on the network) 15-849E Wireless Networking 14
  • 15. Mobile IP – Details (Contd.)  Mobile IP is a cooperation of 3 mechanisms  Discovering the care-of-address  Registering the care-of-address  Tunneling to the care-of-address 15-849E Wireless Networking 15
  • 16. Mobile IP – Details (Contd.) 15-849E Wireless Networking 16 FA FA Advertises Service FA FA HA Remote Redirect
  • 17. Mobile IP – Details (Contd.)  Recap (Remote Redirect)  MH requests service from FA  FA relays request to HA  HA accepts the request (if possible) and its modifies routing table  FA relays this to ths MH  See anything missing?  Malicious node could cause HA to alter its routing table with erroneous COA (DOS Attack?) 15-849E Wireless Networking 17
  • 18. Mobile IP – Details (Contd.)  Solution?  Digitally signed Remote Redirect (RR) messages  Would it work now?  What about replay attacks?  Solution?  RR messages could be made unique – How?  Timestamps with each message  Pseudorandom number with each message 15-849E Wireless Networking 18
  • 19. How will Mobile IP change with IPv6?  Stateless Address Autoconfiguration and Neighbor Discovery precludes the need for Foreign Agents  Security  All IPv6 nodes implement strong authentication and encryption features  Source Routing  Correspondent nodes no longer tunnel packets to MHs  Instead they use IPv6 routing headers (variation of IPv4 source routing option)  More … 15-849E Wireless Networking 19
  • 20. Ongoing Work and Open Questions  Routing inefficiencies  Triangle Routing  Security Issues  Ingress Filtering  Slow Growth in the Wireless LAN Market  Competition from other protocols 15-849E Wireless Networking 20