You are on page 1of 14

Yarmouk University

Department of Computer Information Systems

CIS 103: Introduction to Information Technology

Topic 9

Mobile, Wireless, and Pervasive Computing (Chapter 6)


Chapter 6 1

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Chapter 6 2

Chapter Outline
Mobile Computing and Commerce : Overview Benefits, and Drivers. Wireless Local Area Networks, Wi-Fi, and Voice Portals. Mobile Personal Service Applications Mobile Applications in Financial Services. Mobile Shopping, Advertising, and Customer Service Mobile Intrabusiness Applications. Location- Based Computing. Inhibitors and Barriers of Mobile Computing.
Copyright 2005 John Wiley & Sons Inc.
Chapter 6 3

Learning Objectives
Discuss the characteristic, attributes, and drivers of mobile computing and m-commerce . Describe personal service application of m-commerce. Describe the emergence of Wi-Fi and voice portals. Discuss m-commerce application in financial service. Describe m-commerce applications in shopping, advertising, and customer service. Describe the use of mobile computing in enterprise and supply chain applications. Describe location- based commerce (l-commerce). Discuss the key characteristics and current uses of pervasive computing. Describe the major inhibitors and barriers of mobile computing and m-commerce.
Copyright 2005 John Wiley & Sons Inc.
Chapter 6 4

6.1 Mobile Computing and Commerce: Overview, Benefits, and Drivers


Mobile computing. A computing model

designed for workers who travel outside the boundaries of their organizations or homes. Mobile Devices. Portable computers such as PDAs and other handhelds. Wireless mobile computing. The combination of mobile devices used in a wireless environment.

Copyright 2005 John Wiley & Sons Inc.

Chapter 6

Mobile commerce ( m-commerce)


Any e-commerce done in wireless environment, especially via the

Internet. Personal Digital Assistant (PDA): A handheld wireless computer. Short Messaging Service (SMS): Technology that allows for sending of short text message on some cell phone. Global Positioning System (GPS): A satellite- based tracking system that enables the determination of GPS devices location. Bluetooth: Chip technology that enables temporary, short- range connection ( data and voice) between wireless devices. Wireless Application Protocol ( WAP): A set of communication protocols designed to enable different kinds of wireless devices to talk to a server installed on a mobile network, so users can access the Internet. Smartphone: Internet- enabled cell phone that can support mobile application
Chapter 6 6

Copyright 2005 John Wiley & Sons Inc.

The Attributes of M-computing and M-commerce


Mobility implies portability: user can carry a

mobile device with them Broad reach: people can be reached at any time. These two characteristics create five valueadded attributes that break the barriers of geography and time, ubiquity, convenience, instant connectivity, personalization , and localization of products and services.
Copyright 2005 John Wiley & Sons Inc.
Chapter 6 7

The Attributes of M-computing cont


Ubiquity: fill the need for real- time information and

communication , independent of the users location. Convenience and instant connectivity: easy and fast access the web, intranets, and other mobile devices without booting up a PC or placing a call via a modem. Customization: Information can be customized and sent to individual consumers as an SMS. Localization: knowing where a user is physically at any particular moment is key to offering relevant products and services.
Copyright 2005 John Wiley & Sons Inc.
Chapter 6 8

Drivers of M-computing and Mcommerce


Widespread availability of mobile devices. No Need for a PC. The Cell Phone Culture. Vendor Marketing. Declining Prices and Increasing.

Functionalities. Improvement of Bandwidth.

Copyright 2005 John Wiley & Sons Inc.

Chapter 6

6.2 Wireless Local Area Networks, WI-FI, and Voice Portals A local Wireless LAN(WLAN):

area network (LAN) without the cables; used to transmit and receive data over the airwaves. Wireless access point: An antenna connecting a mobile device ( Laptop or PDA) to a wired local area network. Hotspot: A small geographical perimeter within which a wireless access point provides service to a number of users. 802.11b: Technical standard developed by the IEEE, on which most of todays WLANs run; WLANs employing this standard have communication speed of 11 mbps. (Wi-Fi): wireless fidelity. Another name for the 802.11b standard on which most WLANs run.
Chapter 6 10

Copyright 2005 John Wiley & Sons Inc.

6.9 Pervasive Computing


The term pervasive computing also goes by

the names ubiquitous computing, embedded computing or augmented computing. Pervasive computing: invisible, everywhere computing that is embedded in the objects around us. (RFID) radio frequency identification. Generic term for technologies that use radio waves to automatically identify individual items.

Copyright 2005 John Wiley & Sons Inc.

Chapter 6

11

Contextual Computing and Context Awareness


Context awareness. Capturing a broad rang

of contextual attributes to better understand what the consumer needs and what products or service might be interest. Contextual computing. Active adaptation of the contextual environment for each user, at each point of computing.

Copyright 2005 John Wiley & Sons Inc.

Chapter 6

12

Applications of Pervasive Computing


Smart homes Smart applications Smart cars Smart Things Large Scale Pervasive Systems

Copyright 2005 John Wiley & Sons Inc.

Chapter 6

13

All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the United States Copyright Act without express permission of the copyright owner is unlawful. Request for information should be addressed to the permission department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The publisher assumes no responsibility for error, omissions, or damages caused by the use of these programs or from the use of the information herein.

Copyright 2005 John Wiley & Sons Inc.

Chapter 6

14

You might also like