SlideShare a Scribd company logo
lightspeedteam
Mobile Computing
Content
• Introduction to Mobile Computing
• Mobile Communication
• Mobile OS
• Applications of Mobile Computing
• Challenges Faced
• Current trends & Future
What is Mobile Computing?
• Computing?
– The use or operation of computers
• Mobile?
– Able to move or be moved freely or easily
What is Mobile Computing? Contd.
• Mobile Computing is using a computer (of one
kind or another) while on the move
What is Mobile Computing? Contd.
• Being able to use a computing device even
when being mobile and therefore changing
location (Portability is one aspect of mobile
computing)
What is Mobile Computing? Contd.
• Mobile computing is the ability to use
computing capability without a pre-defined
location and/or connection to a network to
publish and/or subscribe to information
What is Mobile Computing? Contd.
• Mobile Computing is an umbrella term used
to describe technologies that enable people to
access network services anyplace, anytime,
and anywhere
How it all started
• 2400 BC in Babylon – the Abacus
• 1936 – Z1 Computer (Konrad Zuse)
• 1942 – ABC Computer
• 1968 – HP 9100A
• 1974 – Xerox Alto
• 1975 – Altair 8800
• 1975 – IBM 5100
Where does Mobile Computing come
in?
• The concept came around 1990s
• Can be divided into a number of eras:
– Portability
– Miniaturization
– Connectivity
– Convergence
– Divergence
– Apps
– Digital Ecosystem
1971 - Busicom LE-120A
'Handy-LE' Calculator
1981 – Osborne 1 Portable Computer
1982 - Grid Compass 1100 Clamshell Laptop
1983 - DynaTAC 8000x
1999 - Apple iBook G3 Wi-Fi-Enabled Laptop
2002 - Acer TravelMate TM-100 Laptop/Tablet
Hybrid
2007 - Apple iPhone
Why go Mobile?
• No location barriers
• Increase in productivity
• Cloud computing
• Future prospects
Mobile Communications
What is Mobile Communication?
• Communication network that does not involve
a wire connection between two entities
Three Types
Communication
Methods
Cellular
Data
Services
Wireless
Satellites
Cellular Data Services
1G
• First Generation Networks
2G
• Second Generation Networks
3G
• Third Generation Networks
First Generation Networks
Used Analog
Signals
Called “Brick
Phones” and
“Bag Phones”
They were first
introduced for
cellular
industry
Second Generation Networks
• First digital cellular network
• Improved sound quality
• Better security
There are three common technologies used
CDMA
FDMA
TDMA
Frequency division multiple access(FDMA)
Time division multiple access (TDMA)
Code division multiple access (CDMA)
GSM Network?
• Global System for Mobile communication
• Standard set developed by “European
Telecommunications Standards Institute”(ETSI)
Third Generation Networks
• High-speed transmission
• Advanced multimedia access
• Global roaming
How is 3G Better?
• Several times higher data speed;
• Enhanced audio and video streaming;
• Video-conferencing support;
• Web and WAP browsing at higher speeds;
• IPTV (TV through the Internet) support.
3G has the following enhancements over 2.5G and previous
networks:
Wireless Technology
• the transfer of information between two or
more points that are not connected by an
electrical conductor.
• Wi-Fi is a very common wireless technology
that was developed in the 1990s
technically referred to as the 802.11 protocol
Beyond 3G Networks
Conclusion
Fourth generation of mobile
wireless services
Applications of Mobile Computing
APPLICATIONS OF MOBILE COMPUTING
Emergency
services
In companies
In courts
Credit card
verification
Stock
Information
Control
For Estate
Agents
Taxi/Truck
Dispatch
Electronic
Mail/Paging
Vehicles
Mobile
Banking
Emergency services
CDPD (cellular digital packet data)
Police Incident Information Screen
In companies
Credit card verification
For Legal Purposes
(In courts)
Stock Information
Collation/Control
For Estate Agents
Taxi/Truck Dispatch
Travelling Salesmen
Web Access
• Outdoor internet access
Vehicles
Location Aware Services
Entertainment
Mobile Banking and
Financial Services
Electronic Mail
/Paging
Challenges faced in mobile
Computing
Challenges faced
1. Security & Privacy risks
2. Unreliable & Unpredictable wireless links
3. Mobility
4. Limited Resources
5. Potential Health Hazards
6. Transmission interference
1. Privacy and Security risks
 Authentication
 Encryption
 User anonymity
 Instead of the actual directory telephone number, the international
mobile subscriber identity number is used within the network to uniquely
identify a mobile subscriber.
 Threats
 Wi-Fi networks are a shared network that makes it easier for others to
eavesdrop on your communication
• Devices are stolen and tampered
• Cryptography
• Connection
Solutions…
• Secure web browsing
Use secure encrypted sessions.
• Secure Internet Transactions
Use UCI’ s VPN to encrypt your network traffic.
• Always use a personal firewall
Set the firewall to deny ALL incoming connections.
2. Unreliable & unpredictable wireless links
• Wireless links are not reliable.
• They may vary over time and space.
3. Mobility
• This causes poor quality wireless links
• And also causes intermittent connection
– Under intermittent connected networks, traditional routing,
TCP, Application break.
• This changes context
4. Limited Resources
• Insufficient Bandwidth
• High bandwidth variability
• Low bandwidth
• Limited battery power
 Mobile computers must rely entirely on battery power. Combined
with compact size, this means unusually expensive batteries be used.
• Limited processing, display & storage
5. Potential health hazards
• Potential health damages from cellular radio frequencies is not known
yet. However, more car accidents are related drivers who use mobile
devices like mobile phones….etc.
6. Human interface with device
• As screens are often too small. Keyboards are impractical especially one-
handed & alternate methods such as speech or handwriting recognition
require training.
Conclusion
• Mobile Computing has severe limitations & it’s
far from impossible & technology improves all
the time……
• Lots of challenges……
• Some have (good) solutions and many others are still
waiting to be solved.
Future of mobile computing
Artificial Inteligence
Integrated Circuitry
Increase in the processing speed
Smart phones
Google glasses
Netbooks Vs Notebooks
What do they have to say about
future of mobile computing?
Micheal Dell(Chairman and CEO in Dell Inc)
I think if you look at the small mobile devices that
we have today, whether we hold them in our hand
or otherwise, they are in fact personal computers.
We don't think of them as personal computers. We
think of them as smartphones
Richard Edelman(President and CEO in Edelman)
I am fascinated by the “always-on” kids, the
presence of tablets
Lee Rainie(Director Pew Research center’s Internet
and American life project)
So it's giving more power to people to be their
own economic agents. It's also obviously extending
their voices

More Related Content

What's hot

Mobile computing
Mobile computingMobile computing
Mobile computing
Ashish Singh
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
DigitalThinkerHelp
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
Swetha Pallati
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introductionnicole_wang
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
vijay_m_chaudhary
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Udara Seneviratne
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Mohit Sharma
 
Mobile computing
Mobile computingMobile computing
Mobile computing
lalit arora
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Jennifer Christy
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computingcegonsoft1999
 
introduction-to_mobile_computing 1
 introduction-to_mobile_computing 1 introduction-to_mobile_computing 1
introduction-to_mobile_computing 1
Shahid Riaz
 
Wir e less trends..
Wir e less trends..Wir e less trends..
Wir e less trends..
Anish Raj Goyal
 
Wireless Trends
Wireless TrendsWireless Trends
Wireless Trends
sahilyadav902
 
Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)
cegonsoft1999
 
Wir eless tren dz..
Wir eless tren dz..Wir eless tren dz..
Wir eless tren dz..
Anish Raj Goyal
 
trends in wireless computing
trends in wireless computingtrends in wireless computing
trends in wireless computing
modukuri niharika
 
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHATRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
Harshitha Ediga
 

What's hot (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
 
introduction-to_mobile_computing 1
 introduction-to_mobile_computing 1 introduction-to_mobile_computing 1
introduction-to_mobile_computing 1
 
Wir e less trends..
Wir e less trends..Wir e less trends..
Wir e less trends..
 
Wireless Trends
Wireless TrendsWireless Trends
Wireless Trends
 
Trends in wireless computing
Trends in wireless computingTrends in wireless computing
Trends in wireless computing
 
Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)
 
Nomadic Computing
Nomadic ComputingNomadic Computing
Nomadic Computing
 
Wir eless tren dz..
Wir eless tren dz..Wir eless tren dz..
Wir eless tren dz..
 
trends in wireless computing
trends in wireless computingtrends in wireless computing
trends in wireless computing
 
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHATRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
 

Viewers also liked

Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
Zachariah Pabi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Ravikumar Natarajan
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
Eldos Kuriakose
 

Viewers also liked (6)

Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 

Similar to Mobile computing

Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
AsyathShahina
 
Mobile computing
Mobile computingMobile computing
Mobile computing atif azmio
Mobile computing atif azmioMobile computing atif azmio
Mobile computing atif azmioAtif Azmi
 
Mobile Computing00
Mobile Computing00Mobile Computing00
Mobile Computing00
Joe
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
karthiksmart21
 
Evolution_In_Mobile_Technology
Evolution_In_Mobile_TechnologyEvolution_In_Mobile_Technology
Evolution_In_Mobile_Technology
Prabal Chauhan
 
MIS
MISMIS
Mobile computing
Mobile computingMobile computing
Mobile computing
sadia Afrose
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
Dr. MAMTA BANSAL
 
Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 
Small computing & Mobile Computing
Small computing & Mobile ComputingSmall computing & Mobile Computing
Small computing & Mobile Computing
Paul Kahoro
 
Mobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxMobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptx
DiptimayeeTripathy1
 
Ch1
Ch1Ch1
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
guestc37919f
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
Simeon Oriko
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
Bhupesh Rawat
 
Mobile Era & Mobility
Mobile Era & MobilityMobile Era & Mobility
Mobile Era & Mobility
Jaffna IT Week
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
Madhuri Badgujar
 

Similar to Mobile computing (20)

Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Mobile Computing By Naveen
Mobile Computing By NaveenMobile Computing By Naveen
Mobile Computing By Naveen
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing atif azmio
Mobile computing atif azmioMobile computing atif azmio
Mobile computing atif azmio
 
Mobile Computing00
Mobile Computing00Mobile Computing00
Mobile Computing00
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
 
Evolution_In_Mobile_Technology
Evolution_In_Mobile_TechnologyEvolution_In_Mobile_Technology
Evolution_In_Mobile_Technology
 
MIS
MISMIS
MIS
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Small computing & Mobile Computing
Small computing & Mobile ComputingSmall computing & Mobile Computing
Small computing & Mobile Computing
 
Mobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxMobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptx
 
Ch1
Ch1Ch1
Ch1
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
Mobile Era & Mobility
Mobile Era & MobilityMobile Era & Mobility
Mobile Era & Mobility
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Mobile computing

  • 3. Content • Introduction to Mobile Computing • Mobile Communication • Mobile OS • Applications of Mobile Computing • Challenges Faced • Current trends & Future
  • 4. What is Mobile Computing? • Computing? – The use or operation of computers • Mobile? – Able to move or be moved freely or easily
  • 5. What is Mobile Computing? Contd. • Mobile Computing is using a computer (of one kind or another) while on the move
  • 6. What is Mobile Computing? Contd. • Being able to use a computing device even when being mobile and therefore changing location (Portability is one aspect of mobile computing)
  • 7. What is Mobile Computing? Contd. • Mobile computing is the ability to use computing capability without a pre-defined location and/or connection to a network to publish and/or subscribe to information
  • 8. What is Mobile Computing? Contd. • Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere
  • 9. How it all started • 2400 BC in Babylon – the Abacus • 1936 – Z1 Computer (Konrad Zuse) • 1942 – ABC Computer • 1968 – HP 9100A • 1974 – Xerox Alto • 1975 – Altair 8800 • 1975 – IBM 5100
  • 10. Where does Mobile Computing come in? • The concept came around 1990s • Can be divided into a number of eras: – Portability – Miniaturization – Connectivity – Convergence – Divergence – Apps – Digital Ecosystem
  • 11. 1971 - Busicom LE-120A 'Handy-LE' Calculator
  • 12. 1981 – Osborne 1 Portable Computer
  • 13. 1982 - Grid Compass 1100 Clamshell Laptop
  • 14. 1983 - DynaTAC 8000x
  • 15. 1999 - Apple iBook G3 Wi-Fi-Enabled Laptop
  • 16. 2002 - Acer TravelMate TM-100 Laptop/Tablet Hybrid
  • 17. 2007 - Apple iPhone
  • 18. Why go Mobile? • No location barriers • Increase in productivity • Cloud computing • Future prospects
  • 20. What is Mobile Communication? • Communication network that does not involve a wire connection between two entities
  • 22. Cellular Data Services 1G • First Generation Networks 2G • Second Generation Networks 3G • Third Generation Networks
  • 23. First Generation Networks Used Analog Signals Called “Brick Phones” and “Bag Phones” They were first introduced for cellular industry
  • 24. Second Generation Networks • First digital cellular network • Improved sound quality • Better security
  • 25. There are three common technologies used CDMA FDMA TDMA Frequency division multiple access(FDMA) Time division multiple access (TDMA) Code division multiple access (CDMA)
  • 26. GSM Network? • Global System for Mobile communication • Standard set developed by “European Telecommunications Standards Institute”(ETSI)
  • 27. Third Generation Networks • High-speed transmission • Advanced multimedia access • Global roaming
  • 28. How is 3G Better? • Several times higher data speed; • Enhanced audio and video streaming; • Video-conferencing support; • Web and WAP browsing at higher speeds; • IPTV (TV through the Internet) support. 3G has the following enhancements over 2.5G and previous networks:
  • 29. Wireless Technology • the transfer of information between two or more points that are not connected by an electrical conductor.
  • 30. • Wi-Fi is a very common wireless technology that was developed in the 1990s technically referred to as the 802.11 protocol
  • 31. Beyond 3G Networks Conclusion Fourth generation of mobile wireless services
  • 34. Emergency services In companies In courts Credit card verification Stock Information Control For Estate Agents Taxi/Truck Dispatch Electronic Mail/Paging Vehicles Mobile Banking
  • 36. CDPD (cellular digital packet data) Police Incident Information Screen
  • 44. Web Access • Outdoor internet access
  • 50. Challenges faced in mobile Computing
  • 51. Challenges faced 1. Security & Privacy risks 2. Unreliable & Unpredictable wireless links 3. Mobility 4. Limited Resources 5. Potential Health Hazards 6. Transmission interference
  • 52. 1. Privacy and Security risks  Authentication  Encryption  User anonymity  Instead of the actual directory telephone number, the international mobile subscriber identity number is used within the network to uniquely identify a mobile subscriber.  Threats  Wi-Fi networks are a shared network that makes it easier for others to eavesdrop on your communication • Devices are stolen and tampered • Cryptography • Connection
  • 53. Solutions… • Secure web browsing Use secure encrypted sessions. • Secure Internet Transactions Use UCI’ s VPN to encrypt your network traffic. • Always use a personal firewall Set the firewall to deny ALL incoming connections.
  • 54. 2. Unreliable & unpredictable wireless links • Wireless links are not reliable. • They may vary over time and space.
  • 55. 3. Mobility • This causes poor quality wireless links • And also causes intermittent connection – Under intermittent connected networks, traditional routing, TCP, Application break. • This changes context
  • 56. 4. Limited Resources • Insufficient Bandwidth • High bandwidth variability • Low bandwidth • Limited battery power  Mobile computers must rely entirely on battery power. Combined with compact size, this means unusually expensive batteries be used. • Limited processing, display & storage
  • 57. 5. Potential health hazards • Potential health damages from cellular radio frequencies is not known yet. However, more car accidents are related drivers who use mobile devices like mobile phones….etc.
  • 58. 6. Human interface with device • As screens are often too small. Keyboards are impractical especially one- handed & alternate methods such as speech or handwriting recognition require training.
  • 59. Conclusion • Mobile Computing has severe limitations & it’s far from impossible & technology improves all the time…… • Lots of challenges…… • Some have (good) solutions and many others are still waiting to be solved.
  • 60. Future of mobile computing
  • 63. Increase in the processing speed
  • 67. What do they have to say about future of mobile computing? Micheal Dell(Chairman and CEO in Dell Inc) I think if you look at the small mobile devices that we have today, whether we hold them in our hand or otherwise, they are in fact personal computers. We don't think of them as personal computers. We think of them as smartphones
  • 68. Richard Edelman(President and CEO in Edelman) I am fascinated by the “always-on” kids, the presence of tablets Lee Rainie(Director Pew Research center’s Internet and American life project) So it's giving more power to people to be their own economic agents. It's also obviously extending their voices