SlideShare a Scribd company logo
vihangshah
Mobile Computing
Introduction
Mobile computing is a technology that allows transmission of data via computer, without
having to be connected to a fixed physical link. Mobile computing is also refers as that
enable people to access network services anyplace, anytime and anywhere.
Mobile computing provides wireless communication between devices but it is not
necessary that it always communicate. Mobile computing is a technology that allows
transmission of data, voice and video via a computer or any other wireless enabled device
without having to be connected to a fixed physical link.
Wireless Communication
Wireless communication refers as an enable different devices to connect and transfer data
without using physical connection. But we can’t say it is mobile computing.
In mobile communicating wireless communication must use because mobile computing
didn’t use physical connection.
Different Computing
Ubiquitous Computing
Ubiquitous is a concept where computing is made to appear everywhere and anywhere.
Ubiquitous computing occurs using any devices, in any location, and in any format. A user
interacts with the computer, which can exist in many different forms.
vihangshah
Pervasive Computing
Pervasive computing means ‘existing in all parts of a place or thing. IT is a next generation
technology which takes into account the environment in which information and
communication technology is used everywhere by everyone and at all times. So we can say
that mobile computing is pervasive computing.
Mobile Computing-Classification
PDA: -
Personal Digital Assistance term for any small mobile hand-held device that provides
computing and information storage and retrieval capabilities for personal or business use.
Smartphone:-
The kind of a phone which combine the features of PDA with that of a mobile phone or
camera phone. Smartphone have the capability to run multiple programs concurrently.
These phones have high resolution touch enables screens, web browsers that can access
and properly display standard web pages rather than just mobile optimized sites,and high
speed data access.
Tablet and I-Pads:-
This mobile device larger than a mobile phone or personal digital assistance and integrates
into touch screen and operated using touch sensitive motions on the screen.
vihangshah
Advantages of Mobile Computing
 Location Flexibility
 Saves times
 Enhanced productivity
 Ease of research
 Entertainment
Limitations of Mobile Computing
 Resource Constraints
 Interferences
 Bandwidth
 Dynamic changes in communication environment
 Network issues
 Interoperability issues
 Security constraints

More Related Content

What's hot

Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)
cegonsoft1999
 
Evolution of mobile technology
Evolution of mobile technology Evolution of mobile technology
Evolution of mobile technology
Adnan Khan
 
Mobile Computing Introduction
Mobile Computing IntroductionMobile Computing Introduction
Mobile Computing Introduction
Thenraja Vettivelraj
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
Sandeep Singh Saini
 
Mobile computing
Mobile computingMobile computing
Mobile computing
lalit arora
 
Mobile computing
Mobile computingMobile computing
Mobile computing
pooja s p
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
Dr. MAMTA BANSAL
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
Nuth Otanasap
 
Future of mobile technology
Future of mobile technologyFuture of mobile technology
Future of mobile technology
mktgmobile
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
Sudipto Rocksandrules
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
DigitalThinkerHelp
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
nicole_wang
 
ijais13-451015
ijais13-451015ijais13-451015
ijais13-451015
Sathya Bala
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
Rashid Shahariar
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Khushboo Shaukat
 
Providing privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsProviding privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systems
LeMeniz Infotech
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
Pallepati Vasavi
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
Swetha Pallati
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Udara Seneviratne
 
Trends in Wireless Working
Trends in Wireless WorkingTrends in Wireless Working
Trends in Wireless Working
Wheatstone
 

What's hot (20)

Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)
 
Evolution of mobile technology
Evolution of mobile technology Evolution of mobile technology
Evolution of mobile technology
 
Mobile Computing Introduction
Mobile Computing IntroductionMobile Computing Introduction
Mobile Computing Introduction
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Future of mobile technology
Future of mobile technologyFuture of mobile technology
Future of mobile technology
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
ijais13-451015
ijais13-451015ijais13-451015
ijais13-451015
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Providing privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsProviding privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systems
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Trends in Wireless Working
Trends in Wireless WorkingTrends in Wireless Working
Trends in Wireless Working
 

Similar to Mobile Computing

A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
Sara Alvarez
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
Pravallika Reddy
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Pallav Kumar
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdf
deepapriya28
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Valeria Gasik
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
ShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
ShailiPal1
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Abdul Qadir Pattal
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Aashish Jain
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
Sweety Singh
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sanjeev Kumar Jaiswal
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Mobile computing
Mobile computingMobile computing
Mobile computing
kalyani reddy
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdf
khajapasha5978
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdf
khajapasha5978
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 
Chap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingChap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive Computing
ANUSUYA T K
 

Similar to Mobile Computing (20)

A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdf
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdfmobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-17080915542656 (2).pdf
 
mobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdfmobilecomputing2s-176787808098142656.pdf
mobilecomputing2s-176787808098142656.pdf
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Chap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingChap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive Computing
 

Recently uploaded

Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
Brian Pichman
 
July Patch Tuesday
July Patch TuesdayJuly Patch Tuesday
July Patch Tuesday
Ivanti
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
digitalxplive
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Zilliz
 
Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
CEPTES Software Inc
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
aslasdfmkhan4750
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
shyamraj55
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
ssuser1915fe1
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
Jimmy Lai
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
HackersList
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 

Recently uploaded (20)

Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
 
July Patch Tuesday
July Patch TuesdayJuly Patch Tuesday
July Patch Tuesday
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
 
Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 

Mobile Computing

  • 1. vihangshah Mobile Computing Introduction Mobile computing is a technology that allows transmission of data via computer, without having to be connected to a fixed physical link. Mobile computing is also refers as that enable people to access network services anyplace, anytime and anywhere. Mobile computing provides wireless communication between devices but it is not necessary that it always communicate. Mobile computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. Wireless Communication Wireless communication refers as an enable different devices to connect and transfer data without using physical connection. But we can’t say it is mobile computing. In mobile communicating wireless communication must use because mobile computing didn’t use physical connection. Different Computing Ubiquitous Computing Ubiquitous is a concept where computing is made to appear everywhere and anywhere. Ubiquitous computing occurs using any devices, in any location, and in any format. A user interacts with the computer, which can exist in many different forms.
  • 2. vihangshah Pervasive Computing Pervasive computing means ‘existing in all parts of a place or thing. IT is a next generation technology which takes into account the environment in which information and communication technology is used everywhere by everyone and at all times. So we can say that mobile computing is pervasive computing. Mobile Computing-Classification PDA: - Personal Digital Assistance term for any small mobile hand-held device that provides computing and information storage and retrieval capabilities for personal or business use. Smartphone:- The kind of a phone which combine the features of PDA with that of a mobile phone or camera phone. Smartphone have the capability to run multiple programs concurrently. These phones have high resolution touch enables screens, web browsers that can access and properly display standard web pages rather than just mobile optimized sites,and high speed data access. Tablet and I-Pads:- This mobile device larger than a mobile phone or personal digital assistance and integrates into touch screen and operated using touch sensitive motions on the screen.
  • 3. vihangshah Advantages of Mobile Computing  Location Flexibility  Saves times  Enhanced productivity  Ease of research  Entertainment Limitations of Mobile Computing  Resource Constraints  Interferences  Bandwidth  Dynamic changes in communication environment  Network issues  Interoperability issues  Security constraints