Professional Documents
Culture Documents
communication Network
BTCS- 703
1
Next Generation Network
2
Objectives of subject
networks.
Mobile Computing
4
What Is Mobile Computing?
(Cont.)
6
What Is Mobile Computing? (Cont.)
7
Why Go Mobile?
Enable anywhere/anytime connectivity
Bring computer communications to areas
without pre-existing infrastructure
Enable mobility
Enable new applications
An exciting new research area
8
Advantages
Today many peoples use mobile computing for different purposes
1 Advances in technology
• More computing power in smaller devices ,Flat, lightweight displays
with low power consumption
• New user interfaces due to small dimensions
• More bandwidth (per second? per space?)
• Multiple wireless techniques
2. Technology in the background
• Device location awareness: computers adapt to their environment
• User location awareness: computers recognize the location of the
• user and react appropriately (call forwarding)
3. Computers” evolve Small, cheap, portable, replaceable Integration
or disintegration
9
Advantages of Mobile Computing
Ease of Research: Research has been made easier, since users earlier
were required to go to the field and search for facts and feed them back
into the system. It has also made it easier for field officers and
researchers to collect and feed data from wherever they are without
making unnecessary trips to and from the office to the field.
Entertainment
Video and audio recordings can now be streamed on-the-go using mobile
computing. It's easy to access a wide variety of movies, educational and
informative material
11
Conti……
considerable cost, one is able to get all the entertainment they want as
they browse the internet for streamed data. One is able to watch news,
movies, and documentaries among other entertainment offers over the
internet. This was not possible before mobile computing dawned on the
computing world.
Streamlining of Business Processes: Business processes are now
easily available through secured connections. Looking into security
issues, adequate measures have been put in place to ensure
authentication and authorization of the user accessing the services.
Some business functions can be run over secure links and sharing of
information between business partners can also take place. Meetings,
seminars and other informative services can be conducted using video
and voice conferencing. Travel time and expenditure is also
considerably reduced.
12
• There are 2 aspects of mobile computing
13
Mobile Computing Functions
User mobility
Network mobility
Device Mobility
Bearer Mobility
Session Mobility
14
User Mobility
User should be able to move from one physical location
to another location and use the same service.
15
Network Mobility
16
Device Mobility
17
Bearer Mobility
18
Session Mobility
Mobile communication
Mobile hardware
Mobile software
20
Mobile communication
The mobile communication refers to the use of technology
that allows us to communicate with others in different
locations. The wireless networks carry the data where it
needs to go. Traditionally, data was routed through cell
towers in a particular provider’s physical network to
another user’s phone. With modern mobile computing,
data is also often delivered onto the Internet via the
provider’s telecom network. where users can access
individual Internet sites over their smart phones.
21
Since the media is unguided/ unbounded, the overlaying
infrastructure is basically radio wave-oriented. That means
the signals which help in sending and receiving similar kind
of signals are carried by air to those devices.
22
Mobile communication can be of one of the
following form as mentioned below.
23
Mobile and Wired : In this configuration, Some of the devices are
wired and some are mobile in nature. For Example : Laptops.
24
Mobile Hardware
Mobile hardware includes mobile devices or device components capable
of operating, executing and providing services that receive or access the
service of mobility. They would range from portable laptops, smart
phones, tablet Pc's, Personal Digital Assistants. Above mentioned devices
use an existing and established network to operate on. In most cases, it
would be a wireless network.
25
Mobile software
Mobile software is an operating system that allows smart phones, tablet
PCs, and other devices to run applications and programs. It is the
actual program that runs on the mobile hardware. It deals with the
characteristics and requirements of mobile applications. This is the
engine of the mobile device. It is considered as the heart of the device
that operates the mobile device.
26
Applications of Mobile Computing
27
Figure shows a typical scenario for mobile
communications with many wireless devices.
28
Networks with a fixed infrastructure like cellular phones (GSM,
UMTS) will be interconnected with trunked radio systems
(TETRA) and wireless LANs (WLAN).
The networks between cars and inside each car will more likely
work in an ad-hoc fashion
29
Emergencies
30
Business
etc.
31
Figure shows what may happen when
employees try to communicate off
base.
32
At home, the laptop connects via a WLAN or LAN
and DSL to the Internet.
33
Credit Card Verification
34
Replacement of Wired Networks
35
Infotainment
36
Challenges
Disconnection
Low bandwidth
Low power and resources
Security risks
Wide variety terminals and devices with
different capabilities
Device attributes
Fit more functionality into single, smaller
device
37
Limitations and disadvantages of MC
Resource constraints: Battery needs and recharge requirements
are the biggest constraints of mobile computing.
38
Continue
Network Issues Due to the ad hoc networks some issues
relating discovery of connection, service to destination, and
connection stability.
39
Disadvantages of MC
One of the disadvantages is that the mobile devices will need either
WiFi connectivity or mobile network connectivity such as GPRS, 3G
and in some countries even 4G connectivity that is why this is a
disadvantage because if you are not near any of these connections
your access to the internet is very limited.
Security Concerns
Mobile VPNs are unsafe to connect to, and also syncing devices
might also lead to security concerns. Accessing a WiFi network can
also be risky because WPA and WEP security can be bypassed easily.
Power Consumption
Due to the use of batteries in these devices, these do not tend to last
long, if in a situation where there is no source of power for charging
then that will certainly be a letdown. 40
EVOLUTION OF MOBILE COMPUTING
Mobile computing first came into the lights in the year 1990. The
devices which were first implemented on mobile computing technology
were two-way radios. These two-way radios were used to communicate
with the computers which were three inches long with the help of large
antennas. These three-inch-long computers were able to perform all
those tasks a normal person.
41
The advent of portable computers and laptops, Personal Digital
Assistants (PDA), PC tablets and smart phones, has made mobile
computing very convenient. Mobile devices have now become the
personal command centers for all other wearable and connected
devices.
The portability of these devices ensure and help the users to access all
the services as if they were working in the internal network of their
company. For example consider the use of Tablet PC and iPads. This
new technology helps the users to update documents, surf the internet,
send and receive e-mail, stream live video files, take photographs and
also support video and voice conferencing where it is easy for the
people to access. 42
Evaluation of devices
43
Future of Mobile Computing
44
Architecture for mobile computing
2) Application Tiers
3) Data Tiers
45
46
3 Tiers Architecture
47
48
In three tier architecture, the first layer is User Interface or
Presentation Tier.
This layer deal with user facing device handling and rendering.
this tier includes a user system interface where user service
reside.
layer of agent application and system.
These applications run on the client device and offer
all the user interface.
Middleware frame work is defined as a layer of software , which
sits in middle between the operating system and the user facing
software.
1) Message –oriented Middle war
2) Transaction processing Middleware.
3) Database Middleware
4) Communication Middleware
5) Distributed Object and Components.
6) Transcoding Middleware.
The Data Tier is used to store data needed by the
application and acts as a repository for both
temporary and permanent data.