SlideShare a Scribd company logo
SUBMITTED TO:           SUBMITTED BY :
Ms. Rupali Malviya   Suneel Kumar Keshari
                       Roll No.-0934213030
                                I.T. 3rd Year
 A technology that allows transmission of data, via a
computer, without having to be connected to a fixed
physical link.
Mobile voice communication is widely established
throughout the world and has had a very rapid
increase in the number of subscribers to the various
cellular networks over the last few years.
An extension of this technology is the ability to send
and receive data across these cellular networks.
Define Mobile Computing and look at
 current trends.
Distinguish between types of
Mobility.
Examine Theory Research in
Mobility.
Examine Systems Research in
Mobility
The process of computation on a mobile device
 In mobile computing, a set of distributed
computing systems or service provider servers
participate, connect, And synchronise through
mobile communication Protocols
Nomadic Computing:
   A wired core network with a wireless
   periphery.
Ad Hoc Computing:
  Opportunistic temporary networks
  where all hosts are wireless mobile
  devices.
 Enable precise description of
  existing language/system semantics.
 Allow formal reasoning about
   correctness of such semantics.
 Used to highlight parallels and
  differences among various forms of
   mobility.
Models are concerned with the
 formulation of proper abstractions
 useful in specification and evaluation
 of mobile systems.
 They focus on three aspects
   Who is allowed to move (Unit of
   Mobility).
  Where it can go (Location).
  Handling context changes (Context).
Security:
   Who is allowed to access what?
   The security in IEEE 802.11b is very lax
   in most cases anyone with a wireless
   card can access corporate Intranets.
Authentication:
     How do mobile devices in ad hoc
      networks verify each others
      credentials
Creating a general specification that
  allows devices to offer rich services.
Creating the right level of middle-
 ware that addresses the needs of
  mobile computing such as location
  and signal strength that is not
  difficult to program.
 Identification of the position of a
  mobile unit in space.
Location semantics dependent on
 choice of mobility unit.
Current representations include
  Cartesian coordinates(e.g. for mobile
    devices)
  Host addresses (e.g. for mobile agents)
  Process Identifiers (e.g. for code
   fragments)
Systems research in mobile
 computing focused increasingly on
 the end user requirements for ease
 of use and dependability.
 Also focused on performance
Current trends include manufacturing
 of increasingly smaller, more powerful,
 portable computing devices.
Application uses relate to
  Non interaction with outside sources e.g.
    Coda File system
  Accessing remote resources e.g Oracle 8i Lite
  Tracking Devices e.g Active Badges.
User perception of application with
 respect to degree of exposure of
 mobility at application level (e.g. Coda
  File System).
Variable Quality of Service
   Need to provide adaptability
Security Policies and security demands
   Movement between administrative
     domains.
Environmental capabilities
 Power availability (PDA Vs Notebooks)
 Connectivity patterns (Base Stations Vs
   Ad Hoc environment).
Adds mechanisms and services that
 are much more specialized than those
  provided by OS within the context of
  established languages, without
  modifying syntax or semantics.
Enhances level of abstraction
   associated with programming effort.
Most fertile area of systems research
  in mobility.
Systems research distinguishable into
   Middleware for Physical Mobility
   Middleware for Logical Mobility
 Example─ Apple iPods enables listening
  to one’s favourite tunes anytime and
  anywhere.
 View photo albums
Slide shows
Video clips
Selling a product or service in
  quicker time.
reducing transaction cost from one
 a/c to another.
 streamline business processes.
competitive pricing.
reducing time to order for any
  products. Everything can be done
  through mobile internet.
Resource constraints: Battery.
Interference: the quality of service (QoS).
Bandwidth: connection latency.
Dynamic changes in communication
 environment: variations in signal power
 within a region, thus link delays and
 connection losses.
Network Issues: discovery of the
 connection-service to destination and
 connection stability.
Interoperability issues: the varying
  protocol standards.
Security constraints: Protocols
 conserving privacy of communication.
Advances in wireless technology,
 extensive investments in telephony,
 and the Internet’s ability to provide
 ubiquitous access to information are
 the main forces shaping the emergent
 field of mobile computing.
Mobility challenges old assumptions and
  demands new kinds of solutions.

More Related Content

What's hot

An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...
Tal Lavian Ph.D.
 
Mobile Web Services for Distributed In-Network Communications and Computations
Mobile Web Services for Distributed In-Network Communications and ComputationsMobile Web Services for Distributed In-Network Communications and Computations
Mobile Web Services for Distributed In-Network Communications and ComputationsDr. Fahad Aijaz
 
Telecommunications
TelecommunicationsTelecommunications
Telecommunications
Noha Mohamad
 
9.references
9.references9.references
9.references
Basil John
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
IJCSIS Research Publications
 
Ijwcs
IjwcsIjwcs
UPDATED_RUPENDRA_NATH_MITRA_CV
UPDATED_RUPENDRA_NATH_MITRA_CVUPDATED_RUPENDRA_NATH_MITRA_CV
UPDATED_RUPENDRA_NATH_MITRA_CVRupen Mitra
 
Ijwcs
IjwcsIjwcs
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
 
Ijwcs
IjwcsIjwcs
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
VENNILAV6
 
Perfil y resumen de ekram hossain
Perfil y resumen de ekram hossainPerfil y resumen de ekram hossain
Perfil y resumen de ekram hossain
Armando Mejía Gonzales
 
Ijwcs
IjwcsIjwcs
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
ijsptm
 
A New Data Offloading Framework Between Mobile Network and Campus
A New Data Offloading Framework Between Mobile Network and CampusA New Data Offloading Framework Between Mobile Network and Campus
A New Data Offloading Framework Between Mobile Network and Campus
ijsrd.com
 
Published Papers PhD
Published Papers PhDPublished Papers PhD
Published Papers PhDBai Li
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
iosrjce
 
International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)
arpublication
 

What's hot (20)

Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...
 
Mobile Web Services for Distributed In-Network Communications and Computations
Mobile Web Services for Distributed In-Network Communications and ComputationsMobile Web Services for Distributed In-Network Communications and Computations
Mobile Web Services for Distributed In-Network Communications and Computations
 
Telecommunications
TelecommunicationsTelecommunications
Telecommunications
 
Nomadic Computing
Nomadic ComputingNomadic Computing
Nomadic Computing
 
9.references
9.references9.references
9.references
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
Ijwcs
IjwcsIjwcs
Ijwcs
 
UPDATED_RUPENDRA_NATH_MITRA_CV
UPDATED_RUPENDRA_NATH_MITRA_CVUPDATED_RUPENDRA_NATH_MITRA_CV
UPDATED_RUPENDRA_NATH_MITRA_CV
 
Ijwcs
IjwcsIjwcs
Ijwcs
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Ijwcs
IjwcsIjwcs
Ijwcs
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
Perfil y resumen de ekram hossain
Perfil y resumen de ekram hossainPerfil y resumen de ekram hossain
Perfil y resumen de ekram hossain
 
Ijwcs
IjwcsIjwcs
Ijwcs
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
A New Data Offloading Framework Between Mobile Network and Campus
A New Data Offloading Framework Between Mobile Network and CampusA New Data Offloading Framework Between Mobile Network and Campus
A New Data Offloading Framework Between Mobile Network and Campus
 
Published Papers PhD
Published Papers PhDPublished Papers PhD
Published Papers PhD
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)International Journal of Computer Networking and Communication (IJCNAC)
International Journal of Computer Networking and Communication (IJCNAC)
 

Viewers also liked

Забруднене озеро - Віть
Забруднене озеро - ВітьЗабруднене озеро - Віть
Забруднене озеро - Віть
Vasyliuk Oleksij
 
Teori probabilitas memberikan peranan yang sangat penting dalam membuat
Teori probabilitas memberikan peranan yang sangat penting dalam membuatTeori probabilitas memberikan peranan yang sangat penting dalam membuat
Teori probabilitas memberikan peranan yang sangat penting dalam membuat
Juni Zagoan Neon
 
Липа Максимовича
Липа МаксимовичаЛипа Максимовича
Липа Максимовича
Vasyliuk Oleksij
 
媒介发展在公共事件“脱敏”进程中的作用
媒介发展在公共事件“脱敏”进程中的作用媒介发展在公共事件“脱敏”进程中的作用
媒介发展在公共事件“脱敏”进程中的作用
Baorong Zhang
 
IntelliJ IDEA - Gems you can find inside
IntelliJ IDEA - Gems you can find insideIntelliJ IDEA - Gems you can find inside
IntelliJ IDEA - Gems you can find inside
Milan Krystek
 
Растіслав Ласак. Методи моніторингу, організаційна та інформаційна системи ка...
Растіслав Ласак. Методи моніторингу, організаційна та інформаційна системи ка...Растіслав Ласак. Методи моніторингу, організаційна та інформаційна системи ка...
Растіслав Ласак. Методи моніторингу, організаційна та інформаційна системи ка...
Vasyliuk Oleksij
 
Actividad 8 tics
Actividad 8 ticsActividad 8 tics
Actividad 8 tics
Viviana Garcia
 
додаток 3
додаток 3додаток 3
додаток 3
Vasyliuk Oleksij
 
Забруднене озеро - Віть
Забруднене озеро - ВітьЗабруднене озеро - Віть
Забруднене озеро - Віть
Vasyliuk Oleksij
 
Збереження пам'яток природи
Збереження пам'яток природиЗбереження пам'яток природи
Збереження пам'яток природи
Vasyliuk Oleksij
 
Divider folio
Divider folioDivider folio
Divider folio
alexbaru
 
робота конкурсу частина 3
робота конкурсу частина 3робота конкурсу частина 3
робота конкурсу частина 3
Vasyliuk Oleksij
 
Дендропарк Мліївського Інституту помології НААН України
Дендропарк Мліївського Інституту помології НААН УкраїниДендропарк Мліївського Інституту помології НААН України
Дендропарк Мліївського Інституту помології НААН України
Vasyliuk Oleksij
 
Tilia cordata в межах заказника
Tilia cordata в межах заказникаTilia cordata в межах заказника
Tilia cordata в межах заказникаVasyliuk Oleksij
 
Вас вітає заповідник "Єланецький степ"
Вас вітає заповідник "Єланецький степ"Вас вітає заповідник "Єланецький степ"
Вас вітає заповідник "Єланецький степ"
Vasyliuk Oleksij
 
Pembuatan monosodium glutamat
Pembuatan monosodium glutamatPembuatan monosodium glutamat
Pembuatan monosodium glutamatLaLa AmoCi
 
зелені перлини миронівський цдют
зелені перлини миронівський цдютзелені перлини миронівський цдют
зелені перлини миронівський цдютVasyliuk Oleksij
 

Viewers also liked (19)

Забруднене озеро - Віть
Забруднене озеро - ВітьЗабруднене озеро - Віть
Забруднене озеро - Віть
 
Teori probabilitas memberikan peranan yang sangat penting dalam membuat
Teori probabilitas memberikan peranan yang sangat penting dalam membuatTeori probabilitas memberikan peranan yang sangat penting dalam membuat
Teori probabilitas memberikan peranan yang sangat penting dalam membuat
 
Липа Максимовича
Липа МаксимовичаЛипа Максимовича
Липа Максимовича
 
媒介发展在公共事件“脱敏”进程中的作用
媒介发展在公共事件“脱敏”进程中的作用媒介发展在公共事件“脱敏”进程中的作用
媒介发展在公共事件“脱敏”进程中的作用
 
Jenny
JennyJenny
Jenny
 
IntelliJ IDEA - Gems you can find inside
IntelliJ IDEA - Gems you can find insideIntelliJ IDEA - Gems you can find inside
IntelliJ IDEA - Gems you can find inside
 
Растіслав Ласак. Методи моніторингу, організаційна та інформаційна системи ка...
Растіслав Ласак. Методи моніторингу, організаційна та інформаційна системи ка...Растіслав Ласак. Методи моніторингу, організаційна та інформаційна системи ка...
Растіслав Ласак. Методи моніторингу, організаційна та інформаційна системи ка...
 
Actividad 8 tics
Actividad 8 ticsActividad 8 tics
Actividad 8 tics
 
додаток 3
додаток 3додаток 3
додаток 3
 
Забруднене озеро - Віть
Забруднене озеро - ВітьЗабруднене озеро - Віть
Забруднене озеро - Віть
 
Збереження пам'яток природи
Збереження пам'яток природиЗбереження пам'яток природи
Збереження пам'яток природи
 
Divider folio
Divider folioDivider folio
Divider folio
 
робота конкурсу частина 3
робота конкурсу частина 3робота конкурсу частина 3
робота конкурсу частина 3
 
Дендропарк Мліївського Інституту помології НААН України
Дендропарк Мліївського Інституту помології НААН УкраїниДендропарк Мліївського Інституту помології НААН України
Дендропарк Мліївського Інституту помології НААН України
 
Tilia cordata в межах заказника
Tilia cordata в межах заказникаTilia cordata в межах заказника
Tilia cordata в межах заказника
 
Вас вітає заповідник "Єланецький степ"
Вас вітає заповідник "Єланецький степ"Вас вітає заповідник "Єланецький степ"
Вас вітає заповідник "Єланецький степ"
 
Pembuatan monosodium glutamat
Pembuatan monosodium glutamatPembuatan monosodium glutamat
Pembuatan monosodium glutamat
 
зелені перлини миронівський цдют
зелені перлини миронівський цдютзелені перлини миронівський цдют
зелені перлини миронівський цдют
 
Depressão e Suicício
Depressão e SuicícioDepressão e Suicício
Depressão e Suicício
 

Similar to Suneel

Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingKeynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Sayed Chhattan Shah
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
AkshayIngole17
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
eSAT Publishing House
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
eSAT Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
H1075460
H1075460H1075460
H1075460
IJERD Editor
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
Kuldeep Pathak
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
Alokeparna Choudhury
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
ijceronline
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
IJAEMSJORNAL
 
7.chapter
7.chapter7.chapter
7.chapter
Basil John
 
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
ActionForyou
 
Computer-Networks-PPT.pptx
Computer-Networks-PPT.pptxComputer-Networks-PPT.pptx
Computer-Networks-PPT.pptx
DebaComedyClub
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 

Similar to Suneel (20)

Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingKeynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
H1075460
H1075460H1075460
H1075460
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
7.chapter
7.chapter7.chapter
7.chapter
 
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
 
Computer-Networks-PPT.pptx
Computer-Networks-PPT.pptxComputer-Networks-PPT.pptx
Computer-Networks-PPT.pptx
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 

Recently uploaded

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

Suneel

  • 1.
  • 2. SUBMITTED TO: SUBMITTED BY : Ms. Rupali Malviya Suneel Kumar Keshari Roll No.-0934213030 I.T. 3rd Year
  • 3.
  • 4.  A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks.
  • 5. Define Mobile Computing and look at current trends. Distinguish between types of Mobility. Examine Theory Research in Mobility. Examine Systems Research in Mobility
  • 6. The process of computation on a mobile device  In mobile computing, a set of distributed computing systems or service provider servers participate, connect, And synchronise through mobile communication Protocols
  • 7.
  • 8. Nomadic Computing: A wired core network with a wireless periphery. Ad Hoc Computing: Opportunistic temporary networks where all hosts are wireless mobile devices.
  • 9.  Enable precise description of existing language/system semantics.  Allow formal reasoning about correctness of such semantics.  Used to highlight parallels and differences among various forms of mobility.
  • 10. Models are concerned with the formulation of proper abstractions useful in specification and evaluation of mobile systems.  They focus on three aspects  Who is allowed to move (Unit of Mobility). Where it can go (Location). Handling context changes (Context).
  • 11. Security:  Who is allowed to access what?  The security in IEEE 802.11b is very lax in most cases anyone with a wireless card can access corporate Intranets. Authentication:  How do mobile devices in ad hoc networks verify each others credentials
  • 12. Creating a general specification that allows devices to offer rich services. Creating the right level of middle- ware that addresses the needs of mobile computing such as location and signal strength that is not difficult to program.
  • 13.  Identification of the position of a mobile unit in space. Location semantics dependent on choice of mobility unit. Current representations include Cartesian coordinates(e.g. for mobile devices) Host addresses (e.g. for mobile agents) Process Identifiers (e.g. for code fragments)
  • 14. Systems research in mobile computing focused increasingly on the end user requirements for ease of use and dependability.  Also focused on performance
  • 15.
  • 16. Current trends include manufacturing of increasingly smaller, more powerful, portable computing devices. Application uses relate to Non interaction with outside sources e.g. Coda File system Accessing remote resources e.g Oracle 8i Lite Tracking Devices e.g Active Badges.
  • 17. User perception of application with respect to degree of exposure of mobility at application level (e.g. Coda File System). Variable Quality of Service  Need to provide adaptability
  • 18. Security Policies and security demands  Movement between administrative domains. Environmental capabilities Power availability (PDA Vs Notebooks) Connectivity patterns (Base Stations Vs Ad Hoc environment).
  • 19. Adds mechanisms and services that are much more specialized than those provided by OS within the context of established languages, without modifying syntax or semantics. Enhances level of abstraction associated with programming effort.
  • 20. Most fertile area of systems research in mobility. Systems research distinguishable into  Middleware for Physical Mobility  Middleware for Logical Mobility
  • 21.
  • 22.  Example─ Apple iPods enables listening to one’s favourite tunes anytime and anywhere.  View photo albums Slide shows Video clips
  • 23.
  • 24. Selling a product or service in quicker time. reducing transaction cost from one a/c to another.  streamline business processes.
  • 25. competitive pricing. reducing time to order for any products. Everything can be done through mobile internet.
  • 26. Resource constraints: Battery. Interference: the quality of service (QoS). Bandwidth: connection latency. Dynamic changes in communication environment: variations in signal power within a region, thus link delays and connection losses.
  • 27. Network Issues: discovery of the connection-service to destination and connection stability. Interoperability issues: the varying protocol standards. Security constraints: Protocols conserving privacy of communication.
  • 28. Advances in wireless technology, extensive investments in telephony, and the Internet’s ability to provide ubiquitous access to information are the main forces shaping the emergent field of mobile computing. Mobility challenges old assumptions and demands new kinds of solutions.