You are on page 1of 24

WELCOME

TO
SEMINOR

SEMINAR
ON
MOBILE COMPUTING

INTRODUCTION
Mobile simply describes computing device that is not restricted to a
desktop.
A mobile device may be a PDA ,a small cell phone or web phone ,a
laptop Computer, or any one of numerous other devices that allow the
user to complete computing tasks without being tethered ,or
connected.

What Is Mobile Computing?


What is computing?
Operation of computers (according to
oxfords advance learners dictionary).
What is the mobile?
That someone /something can move
or be moved easily and quickly from
place to place .
What is mobile computing?
Users with portable computers still
have network connections while they
move.

Why mobile computing?


Mobile data communications has become a hotly debated issue.
Interest surrounding paging, circuit-switched and packet switching
networks has lit the fir for the debate and the announcement of
new-technology networks is adding fuel to the fire.
Voice telecommunication has been introduced by the mobile phone
and is spreading around all over the world like a contagious virus.

Where mobile computing?


Mobile phones
Cellular networks

Mobile phones
The fixed PSTN severely limits communications by forcing people
to be present at particular location for connection to be established

The need of new networks that provide the ability of mobile


communications is met

Cellular networks
The number of cellular subscribers world wide has been increased
to 40 million in only twelve years.

Each cell has a number of channels assigned to it which can


then be used by a subscriber.

Data communications And


mobility
Circuit switching
Packet switching
The
The
The
The

sender
receiver
position of the packet in the message
actual message

CDPD technology
oThere are other alternatives to this technology namely circuit
switched cellular,specialised mobile radio and wireless data
Networks.

oCDPD networks allow fixed or mobile users to connect to the


network across a fixed link and a packet switched system
respectively.

CDPD overview
The hierarchy consists of the following levels.

Mobile data intermediate

systems. Mobile end user


interface.
Mobile data base station.

CDPD NETWORK
RELIABILITY
User Authentication
User Anonymity
Fraud prevention
Protection of user data

User
Au
thentication:

The procedure which checks if the identify of the subscriber


Transferred over the radio path corresponds with the details held in the
network.

User
Anonymity:
Instead of the actual directory telephone number, the international
mobile subscriber identity number is used with in the network to uniquely
identify a mobile subscriber.

Fraud Prevention:
Protection against impersonation of authorized users and fraudulent
use of the network is required.

Protection of user
data:

All the signals within the network are encrypted and the identification key is
never transmitted through the air. This ensures maximum network and data
security.

Mobile Devices
Giga Information Group suggests a categorization of five different types of
mobile devices:

Laptop computers
PDAs and handheld PCs
Pagers
Smart phones and cellular phones
Task devices, such as bar code scanners

Mobile Users

Telecommuters who work away from the office but connect directly to
the office from a remote location.
Casual telecommuters and other workers who work a few days per
month outside the office.
Predominantly mobile employees

APPLICATIONS OF MOBILE
COMPUTING
For Estate Agents
Emergency Services
In courts
In companies

For Estate
Agents
Estate agents can work either at home or out in the field. With mobile
computers they can be more productive.
They can obtain current real estate information by accessing multiple listing
services, which they can do from home, office or car when out with clients .

Emergency
Services
Ability to receive information on the move services are involved.
Information regarding the address, type and other details of an
incident can be dispatched quickly, via a CDPD system using
mobile computers, to one or several appropriate mobile units
which are in the vicinity of the incident.

In courts
Defense counsels can take mobile computers in court. When the
opposing counsel references a case which they are not familiar, they
can use the computer to get direct, real-time access to on-line legal
database services, where they can gather information on the case
and related precedents.

In companies
Managers can use mobile computers in, say, critical presentations to
major customers.
They can access the latest market share information.
At a small recess, they can revise the presentation to take advantage of
this information.

Conclusion
Mobile computing is rapidly becoming popular, and user demand for
useful wireless applications is increasing. Additionally, this paper
shows how these behavioral extensions serve as a powerful
abstraction for practical systems

You might also like