Mobile simply describes computing device that is not restricted to a
desktop.
Taking a computer and all necessary files and software out into the
field.
Being able to use a computing device even when being mobile and
therefore changing location. Portability is one aspect of mobile
computing.
A variety of wireless devices that has the mobility to allow people
to connect to the internet, providing wireless transmission to
access data and information from where ever location they may be.
New technology grwoing up withmobile communication, internet,
database, distributed computing.
Computing on move
Users with portable computers still have network connections while they
move
Many other names/overlapping computing paradigms:
Pervasive Computing
Ubiquitous Computing
Wireless Computing
Embedded Computing
Motivations :
Availability of wireless network at reducing communication cost
Integration of communication and computing devices
Making use of wireless network to access information and perform data
processing, resource sharing at high capacity servers.
Extend the ability and usefulness of handheld devices.
Goal :
Access to information anywhere, anytime, anyway.
LAPTOP
PDA WEARABLE COMPUTERCARPUTER
E-READER NETBOOK
WHY GO MOBILE?
Enable anywhere/anytime
connectivity
Enable mobility
An exciting new research
area
Provide any clients at any
time in any location with
useful, accurate and
timely information
Enable anywhere/anytime
connectivity
Enable mobility
An exciting new research
area
Provide any clients at any
time in any location with
useful, accurate and
timely information
Fixed network can be dedicated proprietary network for
the
mobile system.
Fixed network can also be the Internet or Intranet.
Infrastructured Systems
MSS (mobile support station, or base station) +
MU (Mobile unit, mobile station, mobile client)
WLAN, Cellular Net., etc.
Ad hoc systems
Mobile nodes + mobile nodes
MANET, WSN, VANET, etc.
Wireless computing
computing without a wire.
the most primitive form, e.g. using 802.11b, 802.11g or
bluetooth.
Nomadic computing
computing on the move.
clients or users are moving.
physically mobile computing, perhaps prolonged disconnection.
Ubiquitous computing
a term coined by Mark Weiser in 1991.
invisible computing or subconscious computing.
computers and their functionality available to users without
being noticed.
Pervasive computing
immersive computing.
use of wearable computers.
a current name for ubiquitous computing.
COMPARISON TO WIRED
NETWORK
WIRED NETWORK
• high bandwidth
• low bandwidth variability
• can listen on wire
• high power machines
• high resource machines
• need physical
access(security)
• low delay
• connected operation
MOBILE NETWORK(WIRELESS)
• low bandwidth
• high bandwidth variability
• hidden terminal problem
• low power machines
• low resource machines
• need proximity
• higher delay
• disconnected operation
Vehicles
transmission of news, road condition, weather, music via
DAB
personal communication using GSM
local ad-hoc network with vehicles close-by to prevent
accidents, guidance system, redundancy
position via GPS
Medical
Nurses/Doctors in Medical offices are now using Wireless
Tablet PCs/WLA to
collect and share patient information.
Emergencies
early transmission of patient data to hospital
ad-hoc network in case of earthquakes
M - Need For Mobility
O - Need To Improve Operations
B - Need To Break Business Barriers
I - Need To Improve Information Quality
L – Need To Decrease Transaction Lag
E – Need To Improve Efficiency
M - Need For Mobility
O - Need To Improve Operations
B - Need To Break Business Barriers
I - Need To Improve Information Quality
L – Need To Decrease Transaction Lag
E – Need To Improve Efficiency
Mobility means changes
Hardware
Lighter, smaller, energy management, user interface
Low bandwidth, high bandwidth variability
Kbit/s to Mbit/s, bandwidth fluctuation
Security risk
Devices more vulnerable, endpoint authentication harder
Heterogeneous network
Different devices, interfaces and protocols
Location awareness
Locality adaptation
Higher loss-rates, higher delays, more jitter
Connection setup time, hand-off
Mobility means changes
Hardware
Lighter, smaller, energy management, user interface
Low bandwidth, high bandwidth variability
Kbit/s to Mbit/s, bandwidth fluctuation
Security risk
Devices more vulnerable, endpoint authentication harder
Heterogeneous network
Different devices, interfaces and protocols
Location awareness
Locality adaptation
Higher loss-rates, higher delays, more jitter
Connection setup time, hand-off
DEMERITS OF MOBILE COMPUTINGDEMERITS OF MOBILE COMPUTING
Cell Phones
Unsafe Driving
Lack of Etiquette
Security
Rogue Wireless Networks
Personal Theft
WEP easy to crack
Bluetooth Hacks
GPS Navigation
Vehicle Tracking for Companies
Cell Phones
Unsafe Driving
Lack of Etiquette
Security
Rogue Wireless Networks
Personal Theft
WEP easy to crack
Bluetooth Hacks
GPS Navigation
Vehicle Tracking for Companies
Use of Artificial
Intelligence
Integrated Circuitry
-> Compact Size
Increases in
Computer Processor
speeds .
Mobile computing is rapidly becoming popular, and
user demand for useful wireless applications is
increasing
Mobile computing has severe limitations
However, it is far from impossible, and technology
improves all the time
Lots of challenges
Some have (good) solutions, many others are still
waiting to be solved
Mobile computing is rapidly becoming popular, and
user demand for useful wireless applications is
increasing
Mobile computing has severe limitations
However, it is far from impossible, and technology
improves all the time
Lots of challenges
Some have (good) solutions, many others are still
waiting to be solved
MOBILE COMPUTING
MOBILE COMPUTING

MOBILE COMPUTING

  • 3.
    Mobile simply describescomputing device that is not restricted to a desktop. Taking a computer and all necessary files and software out into the field. Being able to use a computing device even when being mobile and therefore changing location. Portability is one aspect of mobile computing. A variety of wireless devices that has the mobility to allow people to connect to the internet, providing wireless transmission to access data and information from where ever location they may be. New technology grwoing up withmobile communication, internet, database, distributed computing.
  • 5.
    Computing on move Userswith portable computers still have network connections while they move Many other names/overlapping computing paradigms: Pervasive Computing Ubiquitous Computing Wireless Computing Embedded Computing Motivations : Availability of wireless network at reducing communication cost Integration of communication and computing devices Making use of wireless network to access information and perform data processing, resource sharing at high capacity servers. Extend the ability and usefulness of handheld devices. Goal : Access to information anywhere, anytime, anyway.
  • 7.
  • 8.
    WHY GO MOBILE? Enableanywhere/anytime connectivity Enable mobility An exciting new research area Provide any clients at any time in any location with useful, accurate and timely information Enable anywhere/anytime connectivity Enable mobility An exciting new research area Provide any clients at any time in any location with useful, accurate and timely information
  • 10.
    Fixed network canbe dedicated proprietary network for the mobile system. Fixed network can also be the Internet or Intranet. Infrastructured Systems MSS (mobile support station, or base station) + MU (Mobile unit, mobile station, mobile client) WLAN, Cellular Net., etc. Ad hoc systems Mobile nodes + mobile nodes MANET, WSN, VANET, etc.
  • 12.
    Wireless computing computing withouta wire. the most primitive form, e.g. using 802.11b, 802.11g or bluetooth. Nomadic computing computing on the move. clients or users are moving. physically mobile computing, perhaps prolonged disconnection. Ubiquitous computing a term coined by Mark Weiser in 1991. invisible computing or subconscious computing. computers and their functionality available to users without being noticed. Pervasive computing immersive computing. use of wearable computers. a current name for ubiquitous computing.
  • 13.
    COMPARISON TO WIRED NETWORK WIREDNETWORK • high bandwidth • low bandwidth variability • can listen on wire • high power machines • high resource machines • need physical access(security) • low delay • connected operation MOBILE NETWORK(WIRELESS) • low bandwidth • high bandwidth variability • hidden terminal problem • low power machines • low resource machines • need proximity • higher delay • disconnected operation
  • 14.
    Vehicles transmission of news,road condition, weather, music via DAB personal communication using GSM local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy position via GPS Medical Nurses/Doctors in Medical offices are now using Wireless Tablet PCs/WLA to collect and share patient information. Emergencies early transmission of patient data to hospital ad-hoc network in case of earthquakes
  • 17.
    M - NeedFor Mobility O - Need To Improve Operations B - Need To Break Business Barriers I - Need To Improve Information Quality L – Need To Decrease Transaction Lag E – Need To Improve Efficiency M - Need For Mobility O - Need To Improve Operations B - Need To Break Business Barriers I - Need To Improve Information Quality L – Need To Decrease Transaction Lag E – Need To Improve Efficiency
  • 18.
    Mobility means changes Hardware Lighter,smaller, energy management, user interface Low bandwidth, high bandwidth variability Kbit/s to Mbit/s, bandwidth fluctuation Security risk Devices more vulnerable, endpoint authentication harder Heterogeneous network Different devices, interfaces and protocols Location awareness Locality adaptation Higher loss-rates, higher delays, more jitter Connection setup time, hand-off Mobility means changes Hardware Lighter, smaller, energy management, user interface Low bandwidth, high bandwidth variability Kbit/s to Mbit/s, bandwidth fluctuation Security risk Devices more vulnerable, endpoint authentication harder Heterogeneous network Different devices, interfaces and protocols Location awareness Locality adaptation Higher loss-rates, higher delays, more jitter Connection setup time, hand-off
  • 20.
    DEMERITS OF MOBILECOMPUTINGDEMERITS OF MOBILE COMPUTING Cell Phones Unsafe Driving Lack of Etiquette Security Rogue Wireless Networks Personal Theft WEP easy to crack Bluetooth Hacks GPS Navigation Vehicle Tracking for Companies Cell Phones Unsafe Driving Lack of Etiquette Security Rogue Wireless Networks Personal Theft WEP easy to crack Bluetooth Hacks GPS Navigation Vehicle Tracking for Companies
  • 21.
    Use of Artificial Intelligence IntegratedCircuitry -> Compact Size Increases in Computer Processor speeds .
  • 22.
    Mobile computing israpidly becoming popular, and user demand for useful wireless applications is increasing Mobile computing has severe limitations However, it is far from impossible, and technology improves all the time Lots of challenges Some have (good) solutions, many others are still waiting to be solved Mobile computing is rapidly becoming popular, and user demand for useful wireless applications is increasing Mobile computing has severe limitations However, it is far from impossible, and technology improves all the time Lots of challenges Some have (good) solutions, many others are still waiting to be solved