You are on page 1of 18

by:
ANkit luharuka
INTRODUCTION
DEFINING MOBILE

M the need for mobility

O the need to improve operations

B the need to break business barriers

I the need to improve information quality

L the need to decrease transaction lag

E the need to improve efficiency


DEFINING MOBILE COMPUTING

 Mobile Computing:
Mobile (Moving)
+
Computing ( using computer)
 Ubiquitous computing and nomadic
computing are synonymous with
mobile computing.
 Mobile computing is an umbrella
term used to describe
technologies that enable people
to access network services
anyplace, anytime, and anywhere
WHY MOBILE COMPUTING?
 In recent years, distributed computer has become the norm, especially
after the advent of the internet.
 Today, technological advances are shaping a new computing
environment where the user is free from the need to work at a specific
location, and is even enabled to work while on the move.
 New style of computer access emerging at the intersection of the two
currently dominant trends: producing portable computers in computer
industry and wireless communications in telecommunication industry.
 Desire to have continuous network connectivity to the Internet
irrespective of the physical location of the node.
Mobile Computing Devices
Wearable computer

Personal digital assistant

Smartphone

Tablet PC

Laptops
WEARABLE COMPUTERS

 Are computers that are worn on the body.

 Used in behavioral modeling, health monitoring systems, information


technologies and media development.

 Useful for applications that require computational support while the user's
hands, voice, eyes, arms or attention are actively engaged with the physical
environment.
Personal Digital Assistant(PDA)
 Also known as a palmtop computer, or personal data assistant, is a mobile
device that functions as a personal information manager.

 Often have the ability to connect to the Internet.

 Generally employs touchscreen technology.


SMART PHONES
 A mobile phone that offers more advanced computing ability and
connectivity than a contemporary feature phone.

 Smartphones run complete operating system software providing a


platform for application developers. 

 Combines the functions of a camera phone and a Personal digital


assistant (PDA).
TABLET PERSONAL COMPUTER
 Is a portable personal computer equipped with a touchscreen as a
primary input device.

 Have a wireless adapter for Internet and local network connection.

 Software applications for tablet PCs include office suites, web


browsers, games and a variety of applications.
LAPTOPS
 Also known as a notebook, a personal computer designed for mobile
use.
 Integrates most of the typical components of a desktop computer,
including a display, a keyboard, a pointing device (a touchpad, also
known as a trackpad, and/or a pointing stick) and speakers into a
single unit.
 Powered by mains electricity via an AC adapter, and can be used away
from an outlet using a rechargeable battery.
MOBILE IP
Mobile IP (or IP mobility) is an standard
communications protocol  designed to allow mobile
device users to move from one network to another while
maintaining a permanent IP address.
MOBILE IP IMPLEMENTATION
 A mobile node can have two addresses - a permanent home address
and a care-of address (CoA), which is associated with the network the
mobile node is visiting. Two kinds of entities comprise a Mobile IP
implementation:

 A home agent stores information about mobile nodes whose


permanent home address is in the home agent's network.

 A foreign agent stores information about mobile nodes visiting its


network. Foreign agents also advertise care-of addresses, which are
used by Mobile IP.
contd….
 A node wanting to communicate with the mobile node uses the
permanent home address of the mobile node as the destination
address to send packets to.

 IP routing mechanisms forward these packets to the home agent.


Instead of forwarding these packets to a destination that is physically
in the same network as the home agent, the home agent redirects
these packets towards the foreign agent by encapsulating the
datagram with a new IP header using the care of address of the mobile
node.
contd….
 When acting as transmitter, a mobile node sends packets directly to
the other communicating node through the foreign agent, without
sending the packets through the home agent, using its permanent
home address as the source address for the IP packets. This is known
as triangular routing.

 If needed, the foreign agent could send the mobile node's packets to
the home agent, which in turn forwards them to the communicating
node. This is needed in networks whose gateway routers have filtering
enabled and hence the source IP address of the mobile host would
need to belong to the subnet of the foreign network or else the
packets will be discarded by the router.
Security and Privacy

Common security breaches of mobile computing applications


include:

•Wi-Fi networks are a shared network that makes it easier for others to
illegaly penetrate on your communication.Network by criminal elements.

•Devices are Stolen and tampered. Physical breach security at


communication centers mainly unmanned base stations.

•Interception of credit card authorization over wireless network.


.
 Security and privacy Solutions:

 Secure Web Browsing


 Use secure, encrypted sessions.

 Secure Internet Transactions


 Use UCI’s VPN to encrypt your network traffic.

 Always use a Personal Firewall


 Set the firewall to deny ALL incoming connections.
LIMITATIONS
Insufficient bandwidth
If the user needs access to a network they must resort to slow wireless WAN systems primarily
intended for telephone use. Higher speed wireless LANs are only available in specific sites
Security standards
When working mobile one is dependent on public networks, requiring careful use of VPNs.
Power consumption
Mobile computers must rely entirely on battery power. Combined with compact size, this
means unusually expensive batteries be used
Transmission interferences
Weather and terrain problems as well as distance-limited connection exist with some
technologies. Reception in tunnels and some buildings is poor .
Potential health hazards
Potential health damage from cellular radio frequency emission is not known yet. However,
more car accidents are related to drivers who were talking through a mobile device. Also, cell
phones may interfere with sensitive medical devices .
Human interface with device
As, screens are often too small. Keyboards are impractical, especially one-handed, and alternate
methods such as speech or handwriting recognition require training.
Thank You…

You might also like