You are on page 1of 30

m 

  






Old Days >> Mobile Computing

Introduction

Mobile Computing Device

Wireless Network

Security and Privacy

Disconnected Operations

Future Aspects
m 
O à    
O„    
  
 

O „     

O „    
 
  

O à
     
O„  

  
  
 

O „     

] Y
    
    



 

]     
 

]        x

m  m


m  m

Y  
m  m

à  



    

 

   
 
  

 
 
 
Movement of a host in physical space

 
Movement of a unit of mobility among
hosts
 Concerned with mechanisms to discover
who is around
 ˜ g Use of Registries in CORBA
 Passing around acquaintances in Gnutella
 Mechanisms to exchange Info
 Mechanisms to synchronize actions
 Mechanisms for coordination are supplied
by
 Middleware
 Underlying operating system
 Remember ´«Mobile computing is context-
aware computingµ
 Determined by (but different from) current
location of unit of mobility
 ˜ g Two Mobile units may be in the same location
but perceive different contexts due to different
administrative domains
 Context may include resources, services and
other system components
 Location changes may lead to sudden context
changes and are likely to be abrupt
 ˜ g A mobile agent on different servers has access
to different sets of services
 Focus on context is to
 Detect change of context
 React to change (often in a timely manner)
 Distinction between
 ˜vent Based Systems
 State Based Systems
 ˜vent Based Systems
 Consider the occurrence of events that are filtered
through a given specification
 The corresponding reaction is usually guaranteed to
eventually execute
 State Based Systems
 ˜nabling condition is a particular state of the system
 Reaction is completed before any other state
change is performed
Nomadic Computing

Ad Hoc Computing


A Wired core network with a wireless periphery
Opportunistic temporary networks where all the
hosts are wireless mobile devices
The main goal of
mobile computing
is to work toward
true computing
freedom from
anywhere ,
anytime and
operate as if they
were sitting in the
´HOM˜µ or
´OFFIC˜µ
   

 
è receive only è voice, data
è fully functional
è tiny displays è simple graphical displays
è standard applications
è simple text
messages


  è graphical displays

 , è human wearable
embedded è character recognition
è non standard I/O
controllers

  

 For ˜state Agents
 ˜mergency Services
 Courts
 Companies
 Stock Information
Control
 Credit Card
Verification
 ˜lectronic Mail
 Improved Decision Making
 Increased Productivity
 Improved Customer Relations
 Improved Information Quality
 Improved Information Accessibility
 Increased Operational ˜fficiency
 Increased Management ˜ffectiveness
 2


 
2


 
   
   
 
 
 
  
 
 

  

2
  


2
  

 
 

   
 


2
   
2
   
  
   
 
 
 !"#
 !"#„$ "%&
  m m

Techniques Used For ˜fficient Bandwidth
Management

] Compression Techniques

] Logging
'&($&' #
&'„!('%$ )

 !%*„'$ $%
 %$!*
 ('&„$
 '+$ #Y'%
 Minimize power consumption - larger
battery life,
 Smaller battery size - lesser weight
 Smaller user interface - handwriting,
voice recognition, pens,
 Virtual reality screens
 Small storage capacity - Compressed
file systems
r % ,
 
  
-,   #Y  


 $

 

,
   
 -,
 
r #

%   ,

  -  

 

 
 
 .   
,
 
   
 ,

  ,

 
 
At last we can say that
today, in all fields like
business,
medical , engineering
travelling professions
mobile computing is too
beneficial for people
near
and far , with the
advancement of
internet technologies
à
 !"###

You might also like