SlideShare a Scribd company logo
Mobile simply describes computing device that is not restricted to a
desktop.
Taking a computer and all necessary files and software out into the
field.
Being able to use a computing device even when being mobile and
therefore changing location. Portability is one aspect of mobile
computing.
A variety of wireless devices that has the mobility to allow people
to connect to the internet, providing wireless transmission to
access data and information from where ever location they may be.
New technology grwoing up withmobile communication, internet,
database, distributed computing.
Computing on move
Users with portable computers still have network connections while they
move
Many other names/overlapping computing paradigms:
Pervasive Computing
Ubiquitous Computing
Wireless Computing
Embedded Computing
Motivations :
Availability of wireless network at reducing communication cost
Integration of communication and computing devices
Making use of wireless network to access information and perform data
processing, resource sharing at high capacity servers.
Extend the ability and usefulness of handheld devices.
Goal :
Access to information anywhere, anytime, anyway.
LAPTOP
PDA WEARABLE COMPUTERCARPUTER
E-READER NETBOOK
WHY GO MOBILE?
Enable anywhere/anytime
connectivity
Enable mobility
An exciting new research
area
Provide any clients at any
time in any location with
useful, accurate and
timely information
Enable anywhere/anytime
connectivity
Enable mobility
An exciting new research
area
Provide any clients at any
time in any location with
useful, accurate and
timely information
Fixed network can be dedicated proprietary network for
the
mobile system.
Fixed network can also be the Internet or Intranet.
Infrastructured Systems
MSS (mobile support station, or base station) +
MU (Mobile unit, mobile station, mobile client)
WLAN, Cellular Net., etc.
Ad hoc systems
Mobile nodes + mobile nodes
MANET, WSN, VANET, etc.
Wireless computing
computing without a wire.
the most primitive form, e.g. using 802.11b, 802.11g or
bluetooth.
Nomadic computing
computing on the move.
clients or users are moving.
physically mobile computing, perhaps prolonged disconnection.
Ubiquitous computing
a term coined by Mark Weiser in 1991.
invisible computing or subconscious computing.
computers and their functionality available to users without
being noticed.
Pervasive computing
immersive computing.
use of wearable computers.
a current name for ubiquitous computing.
COMPARISON TO WIRED
NETWORK
WIRED NETWORK
• high bandwidth
• low bandwidth variability
• can listen on wire
• high power machines
• high resource machines
• need physical
access(security)
• low delay
• connected operation
MOBILE NETWORK(WIRELESS)
• low bandwidth
• high bandwidth variability
• hidden terminal problem
• low power machines
• low resource machines
• need proximity
• higher delay
• disconnected operation
Vehicles
transmission of news, road condition, weather, music via
DAB
personal communication using GSM
local ad-hoc network with vehicles close-by to prevent
accidents, guidance system, redundancy
position via GPS
Medical
Nurses/Doctors in Medical offices are now using Wireless
Tablet PCs/WLA to
collect and share patient information.
Emergencies
early transmission of patient data to hospital
ad-hoc network in case of earthquakes
M - Need For Mobility
O - Need To Improve Operations
B - Need To Break Business Barriers
I - Need To Improve Information Quality
L – Need To Decrease Transaction Lag
E – Need To Improve Efficiency
M - Need For Mobility
O - Need To Improve Operations
B - Need To Break Business Barriers
I - Need To Improve Information Quality
L – Need To Decrease Transaction Lag
E – Need To Improve Efficiency
Mobility means changes
Hardware
Lighter, smaller, energy management, user interface
Low bandwidth, high bandwidth variability
Kbit/s to Mbit/s, bandwidth fluctuation
Security risk
Devices more vulnerable, endpoint authentication harder
Heterogeneous network
Different devices, interfaces and protocols
Location awareness
Locality adaptation
Higher loss-rates, higher delays, more jitter
Connection setup time, hand-off
Mobility means changes
Hardware
Lighter, smaller, energy management, user interface
Low bandwidth, high bandwidth variability
Kbit/s to Mbit/s, bandwidth fluctuation
Security risk
Devices more vulnerable, endpoint authentication harder
Heterogeneous network
Different devices, interfaces and protocols
Location awareness
Locality adaptation
Higher loss-rates, higher delays, more jitter
Connection setup time, hand-off
DEMERITS OF MOBILE COMPUTINGDEMERITS OF MOBILE COMPUTING
Cell Phones
Unsafe Driving
Lack of Etiquette
Security
Rogue Wireless Networks
Personal Theft
WEP easy to crack
Bluetooth Hacks
GPS Navigation
Vehicle Tracking for Companies
Cell Phones
Unsafe Driving
Lack of Etiquette
Security
Rogue Wireless Networks
Personal Theft
WEP easy to crack
Bluetooth Hacks
GPS Navigation
Vehicle Tracking for Companies
Use of Artificial
Intelligence
Integrated Circuitry
-> Compact Size
Increases in
Computer Processor
speeds .
Mobile computing is rapidly becoming popular, and
user demand for useful wireless applications is
increasing
Mobile computing has severe limitations
However, it is far from impossible, and technology
improves all the time
Lots of challenges
Some have (good) solutions, many others are still
waiting to be solved
Mobile computing is rapidly becoming popular, and
user demand for useful wireless applications is
increasing
Mobile computing has severe limitations
However, it is far from impossible, and technology
improves all the time
Lots of challenges
Some have (good) solutions, many others are still
waiting to be solved
MOBILE COMPUTING
MOBILE COMPUTING

More Related Content

What's hot

INTRODUCTION TO MOBILE COMPUTING.pptx
INTRODUCTION TO MOBILE COMPUTING.pptxINTRODUCTION TO MOBILE COMPUTING.pptx
INTRODUCTION TO MOBILE COMPUTING.pptx
BhuvanaR13
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
Rashid Shahariar
 
Mobile computing
Mobile computingMobile computing
Mobile computing
kalyani reddy
 
Mobile Computing | Computer Science
Mobile Computing | Computer ScienceMobile Computing | Computer Science
Mobile Computing | Computer Science
Transweb Global Inc
 
Mobile computing
Mobile computingMobile computing
Mobile computing
lalit arora
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile computing
Mobile computingMobile computing
Mobile computing
Khushboo Shaukat
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
Komal Gandhi
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
OECLIB Odisha Electronics Control Library
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologies
Akhil Sabu
 
Daknet Technology
Daknet TechnologyDaknet Technology
Daknet Technology
Aranta Chatterjee
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
Seminar Links
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
vijay_m_chaudhary
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
Liton Ahmed
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
balu008
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
priyankpatel2811
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technology
Dipjyoti Deka
 

What's hot (20)

INTRODUCTION TO MOBILE COMPUTING.pptx
INTRODUCTION TO MOBILE COMPUTING.pptxINTRODUCTION TO MOBILE COMPUTING.pptx
INTRODUCTION TO MOBILE COMPUTING.pptx
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile Computing | Computer Science
Mobile Computing | Computer ScienceMobile Computing | Computer Science
Mobile Computing | Computer Science
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologies
 
Daknet Technology
Daknet TechnologyDaknet Technology
Daknet Technology
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technology
 

Viewers also liked

Automatic Drusen Classification
Automatic Drusen ClassificationAutomatic Drusen Classification
Automatic Drusen Classification
Darshan Shah
 
Android Effective UI: Tips, Tricks and Patterns
Android Effective UI: Tips, Tricks and PatternsAndroid Effective UI: Tips, Tricks and Patterns
Android Effective UI: Tips, Tricks and Patterns
Adham Enaya
 
Big Media: Multimedia goes Big Data
Big Media: Multimedia goes Big DataBig Media: Multimedia goes Big Data
Big Media: Multimedia goes Big Data
Förderverein Technische Fakultät
 
Cloud software engineering
Cloud software engineeringCloud software engineering
Cloud software engineering
Ian Sommerville
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
Yahoo Developer Network
 
Cloud computing and software engineering
Cloud computing and software engineeringCloud computing and software engineering
Cloud computing and software engineering
Ravindra Dastikop
 
Multimedia big data 140619
Multimedia big data 140619Multimedia big data 140619
Multimedia big data 140619
Ramesh Jain
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
Ram Kumar K R
 
Go Language presentation
Go Language presentationGo Language presentation
Go Language presentation
Gh-Mohammed Eldadah
 
7 stack and vector
7 stack and vector7 stack and vector
7 stack and vector
Mahmoud Alfarra
 
Plagiarism - السطو العلمي
Plagiarism  -  السطو العلميPlagiarism  -  السطو العلمي
Plagiarism - السطو العلمي
Ahmed-Refat Refat
 
Intelligent computer aided diagnosis system for liver fibrosis
Intelligent computer aided diagnosis system for liver fibrosisIntelligent computer aided diagnosis system for liver fibrosis
Intelligent computer aided diagnosis system for liver fibrosis
Aboul Ella Hassanien
 
Effective Testing Practices in an Agile Environment
Effective Testing Practices in an Agile EnvironmentEffective Testing Practices in an Agile Environment
Effective Testing Practices in an Agile Environment
Raj Indugula
 
Agile methodology in cloud computing
Agile methodology in cloud computingAgile methodology in cloud computing
Agile methodology in cloud computingAhmed M. Abed
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
Zachariah Pabi
 
User story mapping workshop slideshare
User story mapping workshop slideshareUser story mapping workshop slideshare
User story mapping workshop slideshare
Pankaj Kanchankar
 
Agile stories, estimating and planning
Agile stories, estimating and planningAgile stories, estimating and planning
Agile stories, estimating and planningDimitri Ponomareff
 
Social Media Analytics Demystified
Social Media Analytics DemystifiedSocial Media Analytics Demystified
Social Media Analytics Demystified
Debra Askanase
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
Andry Alamsyah
 
كتابة التقارير والمراسلات الإدارية
كتابة التقارير والمراسلات الإداريةكتابة التقارير والمراسلات الإدارية
كتابة التقارير والمراسلات الإدارية
Islamic University of Lebanon
 

Viewers also liked (20)

Automatic Drusen Classification
Automatic Drusen ClassificationAutomatic Drusen Classification
Automatic Drusen Classification
 
Android Effective UI: Tips, Tricks and Patterns
Android Effective UI: Tips, Tricks and PatternsAndroid Effective UI: Tips, Tricks and Patterns
Android Effective UI: Tips, Tricks and Patterns
 
Big Media: Multimedia goes Big Data
Big Media: Multimedia goes Big DataBig Media: Multimedia goes Big Data
Big Media: Multimedia goes Big Data
 
Cloud software engineering
Cloud software engineeringCloud software engineering
Cloud software engineering
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
 
Cloud computing and software engineering
Cloud computing and software engineeringCloud computing and software engineering
Cloud computing and software engineering
 
Multimedia big data 140619
Multimedia big data 140619Multimedia big data 140619
Multimedia big data 140619
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
 
Go Language presentation
Go Language presentationGo Language presentation
Go Language presentation
 
7 stack and vector
7 stack and vector7 stack and vector
7 stack and vector
 
Plagiarism - السطو العلمي
Plagiarism  -  السطو العلميPlagiarism  -  السطو العلمي
Plagiarism - السطو العلمي
 
Intelligent computer aided diagnosis system for liver fibrosis
Intelligent computer aided diagnosis system for liver fibrosisIntelligent computer aided diagnosis system for liver fibrosis
Intelligent computer aided diagnosis system for liver fibrosis
 
Effective Testing Practices in an Agile Environment
Effective Testing Practices in an Agile EnvironmentEffective Testing Practices in an Agile Environment
Effective Testing Practices in an Agile Environment
 
Agile methodology in cloud computing
Agile methodology in cloud computingAgile methodology in cloud computing
Agile methodology in cloud computing
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
User story mapping workshop slideshare
User story mapping workshop slideshareUser story mapping workshop slideshare
User story mapping workshop slideshare
 
Agile stories, estimating and planning
Agile stories, estimating and planningAgile stories, estimating and planning
Agile stories, estimating and planning
 
Social Media Analytics Demystified
Social Media Analytics DemystifiedSocial Media Analytics Demystified
Social Media Analytics Demystified
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
 
كتابة التقارير والمراسلات الإدارية
كتابة التقارير والمراسلات الإداريةكتابة التقارير والمراسلات الإدارية
كتابة التقارير والمراسلات الإدارية
 

Similar to MOBILE COMPUTING

Mobile computing
Mobile computingMobile computing
Mobile computing
Ashish Singh
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdf
khajapasha5978
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdf
khajapasha5978
 
Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
Pallepati Vasavi
 
Wir eless tren dz..
Wir eless tren dz..Wir eless tren dz..
Wir eless tren dz..
Anish Raj Goyal
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
Akttripathi
 
cellular communications-1
   cellular communications-1   cellular communications-1
cellular communications-1Jaya Prakash
 
Mobile computing atif azmio
Mobile computing atif azmioMobile computing atif azmio
Mobile computing atif azmioAtif Azmi
 
Wir e less trends..
Wir e less trends..Wir e less trends..
Wir e less trends..
Anish Raj Goyal
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Eeshasri97
 
MIS
MISMIS
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdfwirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
MohanVeerabomala
 
5gwirelesstechnology 121010092151-phpapp02
5gwirelesstechnology 121010092151-phpapp025gwirelesstechnology 121010092151-phpapp02
5gwirelesstechnology 121010092151-phpapp02Nikhil Kshirsagar
 
Wireless
Wireless Wireless
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
Chandrakant Choure
 

Similar to MOBILE COMPUTING (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdf
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdf
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Wir eless tren dz..
Wir eless tren dz..Wir eless tren dz..
Wir eless tren dz..
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
 
Mdm intro-chapter1
Mdm intro-chapter1Mdm intro-chapter1
Mdm intro-chapter1
 
cellular communications-1
   cellular communications-1   cellular communications-1
cellular communications-1
 
Mobile computing atif azmio
Mobile computing atif azmioMobile computing atif azmio
Mobile computing atif azmio
 
Wir e less trends..
Wir e less trends..Wir e less trends..
Wir e less trends..
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
MIS
MISMIS
MIS
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdfwirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
 
5gwirelesstechnology 121010092151-phpapp02
5gwirelesstechnology 121010092151-phpapp025gwirelesstechnology 121010092151-phpapp02
5gwirelesstechnology 121010092151-phpapp02
 
Wireless
Wireless Wireless
Wireless
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 

MOBILE COMPUTING

  • 1.
  • 2.
  • 3. Mobile simply describes computing device that is not restricted to a desktop. Taking a computer and all necessary files and software out into the field. Being able to use a computing device even when being mobile and therefore changing location. Portability is one aspect of mobile computing. A variety of wireless devices that has the mobility to allow people to connect to the internet, providing wireless transmission to access data and information from where ever location they may be. New technology grwoing up withmobile communication, internet, database, distributed computing.
  • 4.
  • 5. Computing on move Users with portable computers still have network connections while they move Many other names/overlapping computing paradigms: Pervasive Computing Ubiquitous Computing Wireless Computing Embedded Computing Motivations : Availability of wireless network at reducing communication cost Integration of communication and computing devices Making use of wireless network to access information and perform data processing, resource sharing at high capacity servers. Extend the ability and usefulness of handheld devices. Goal : Access to information anywhere, anytime, anyway.
  • 6.
  • 8. WHY GO MOBILE? Enable anywhere/anytime connectivity Enable mobility An exciting new research area Provide any clients at any time in any location with useful, accurate and timely information Enable anywhere/anytime connectivity Enable mobility An exciting new research area Provide any clients at any time in any location with useful, accurate and timely information
  • 9.
  • 10. Fixed network can be dedicated proprietary network for the mobile system. Fixed network can also be the Internet or Intranet. Infrastructured Systems MSS (mobile support station, or base station) + MU (Mobile unit, mobile station, mobile client) WLAN, Cellular Net., etc. Ad hoc systems Mobile nodes + mobile nodes MANET, WSN, VANET, etc.
  • 11.
  • 12. Wireless computing computing without a wire. the most primitive form, e.g. using 802.11b, 802.11g or bluetooth. Nomadic computing computing on the move. clients or users are moving. physically mobile computing, perhaps prolonged disconnection. Ubiquitous computing a term coined by Mark Weiser in 1991. invisible computing or subconscious computing. computers and their functionality available to users without being noticed. Pervasive computing immersive computing. use of wearable computers. a current name for ubiquitous computing.
  • 13. COMPARISON TO WIRED NETWORK WIRED NETWORK • high bandwidth • low bandwidth variability • can listen on wire • high power machines • high resource machines • need physical access(security) • low delay • connected operation MOBILE NETWORK(WIRELESS) • low bandwidth • high bandwidth variability • hidden terminal problem • low power machines • low resource machines • need proximity • higher delay • disconnected operation
  • 14. Vehicles transmission of news, road condition, weather, music via DAB personal communication using GSM local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy position via GPS Medical Nurses/Doctors in Medical offices are now using Wireless Tablet PCs/WLA to collect and share patient information. Emergencies early transmission of patient data to hospital ad-hoc network in case of earthquakes
  • 15.
  • 16.
  • 17. M - Need For Mobility O - Need To Improve Operations B - Need To Break Business Barriers I - Need To Improve Information Quality L – Need To Decrease Transaction Lag E – Need To Improve Efficiency M - Need For Mobility O - Need To Improve Operations B - Need To Break Business Barriers I - Need To Improve Information Quality L – Need To Decrease Transaction Lag E – Need To Improve Efficiency
  • 18. Mobility means changes Hardware Lighter, smaller, energy management, user interface Low bandwidth, high bandwidth variability Kbit/s to Mbit/s, bandwidth fluctuation Security risk Devices more vulnerable, endpoint authentication harder Heterogeneous network Different devices, interfaces and protocols Location awareness Locality adaptation Higher loss-rates, higher delays, more jitter Connection setup time, hand-off Mobility means changes Hardware Lighter, smaller, energy management, user interface Low bandwidth, high bandwidth variability Kbit/s to Mbit/s, bandwidth fluctuation Security risk Devices more vulnerable, endpoint authentication harder Heterogeneous network Different devices, interfaces and protocols Location awareness Locality adaptation Higher loss-rates, higher delays, more jitter Connection setup time, hand-off
  • 19.
  • 20. DEMERITS OF MOBILE COMPUTINGDEMERITS OF MOBILE COMPUTING Cell Phones Unsafe Driving Lack of Etiquette Security Rogue Wireless Networks Personal Theft WEP easy to crack Bluetooth Hacks GPS Navigation Vehicle Tracking for Companies Cell Phones Unsafe Driving Lack of Etiquette Security Rogue Wireless Networks Personal Theft WEP easy to crack Bluetooth Hacks GPS Navigation Vehicle Tracking for Companies
  • 21. Use of Artificial Intelligence Integrated Circuitry -> Compact Size Increases in Computer Processor speeds .
  • 22. Mobile computing is rapidly becoming popular, and user demand for useful wireless applications is increasing Mobile computing has severe limitations However, it is far from impossible, and technology improves all the time Lots of challenges Some have (good) solutions, many others are still waiting to be solved Mobile computing is rapidly becoming popular, and user demand for useful wireless applications is increasing Mobile computing has severe limitations However, it is far from impossible, and technology improves all the time Lots of challenges Some have (good) solutions, many others are still waiting to be solved