Mobile, Wireless, and Pervasive Computing - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

Mobile, Wireless, and Pervasive Computing

Description:

Discuss the characteristics, attributes, and drivers of mobile computing and m-commerce. ... Geostationary (GEO) Medium-earth-orbit (MEO) Low-earth-orbit (LEO) 9 ... – PowerPoint PPT presentation

Number of Views:585
Avg rating:3.0/5.0
Slides: 28
Provided by: portal6
Category:

less

Transcript and Presenter's Notes

Title: Mobile, Wireless, and Pervasive Computing


1
  • Mobile, Wireless, and Pervasive Computing

2
Chapter Outline
  • Wireless devices
  • Wireless Local Area Networks, Wi-Fi, and Voice
    Portals
  • Wireless transmission media
  • Mobile Commerce
  • Mobile Shopping, Advertising, and Customer
    Service
  • Mobile Intrabusiness Applications.
  • Location- Based Computing.
  • Pervasive computing
  • Security issues

3
Learning Objectives
  • Discuss the characteristics, attributes, and
    drivers of mobile computing and m-commerce.
  • Discuss m-commerce applications in financial
    services.
  • Describe m-commerce applications in shopping,
    advertising, and customer services.
  • Describe the use of mobile computing in
    enterprise and supply chain applications.
  • Describe location- based commerce (l-commerce).
  • Discuss the key characteristics and current uses
    of pervasive computing.
  • Describe the major inhibitors and barriers of
    mobile computing and m-commerce.

4
Mobile Computing and Commerce Overview,
Benefits, and Drivers
  • Mobile computing. A computing model designed for
    workers who travel outside the boundaries of
    their organizations or homes.
  • Wireless mobile computing. The combination of
    mobile devices used in a wireless environment.

5
Wireless Devices
  • Wireless devices are small enough to easily carry
    or wear, have sufficient computing power to
    perform productive tasks and can communicate
    wirelessly with the Internet and other devices.
  • Include PDAs, cellular phones, smart phones.
  • Wireless Application Protocol (WAP) is the
    standard that enables wireless devices with tiny
    display screens, low bandwidth connections and
    minimal memory to access Web-based information
    and services.

6
Wireless Local Area Networks, WI-FI, and Voice
Portals
  • Wireless LAN(WLAN) A local area network (LAN)
    without the cables used to transmit and receive
    data over the airwaves.
  • Hotspot A small geographical perimeter within
    which a wireless access point provides service to
    a number of users.
  • (Wi-Fi) wireless fidelity. Another name for the
    802.11b standard on which most WLANs run.

7
Wireless Transmission Media
  • Microwave transmission systems are widely used
    for high-volume, long-distance, point-to-point
    communication.
  • Point-to-point has two characteristics first,
    the transmitter and receiver must be in view of
    each other (called line-of-sight) and second,
    the transmission itself must be tightly directed
    from transmitter to receiver.

8
Wireless Transmission Media (Continued)
  • Satellite transmission systems make use of
    communication satellites three types of
    satellites, each in a different orbit
  • Geostationary (GEO)
  • Medium-earth-orbit (MEO)
  • Low-earth-orbit (LEO)

9
Wireless Transmission Media (Continued)
  • Footprint is the area of earths surface reached
    by a satellites transmission
  • The higher the sattelite orbit, the larger the
    footprint.
  • The size of the footprint determines how many
    sattelites are needed to cover the earth
    completely.

10
Global Positioning Systems
  • GPS is a wireless system that uses satellites to
    enable users to determine their position anywhere
    on the earth supported by 24 shared satellites
    worldwide.

11
Internet over Satellite (IOS)
  • IOS allows users to access the Internet via GEO
    satellites from a dish mounted on the side of
    their homes.
  • Only option available in some areas.
  • Can have a propagation delay or be disrupted by
    environmental conditions.

12
Mobile commerce ( m-commerce) Terminology
  • Any e-commerce done in a wireless environment,
    especially via the Internet.

13
The Attributes of M-computing and M-commerce
  • Mobility users can carry a mobile device with
    them at all times
  • Broad reach people can be reached at any time.
  • Convenience and instant connectivity easy and
    fast access to the web, intranets, and other
    mobile devices without booting up a PC or placing
    a call via a modem.
  • Customization Information can be customized and
    sent to individual consumers as an SMS.
  • Localization knowing where a user is physically
    at any particular moment is key to offering
    relevant products and services.

14
Drivers of M-computing and M-commerce
  • Widespread availability of mobile devices.
  • No Need for a PC.
  • The Cell Phone Culture.
  • Declining Prices and Increasing Functionalities.
  • Improvement of Bandwidth.

15
Mobile Personal Service Applications
  • Hotel Services Go Wireless
  • Wireless Telemedicine
  • Mobile Portals
  • Applications in Finance
  • Mobile Banking
  • Wireless Electronic Payment Systems
  • Micropayments
  • Mobile (Wireless) Wallets
  • Wireless Bill Payment

16
M-shopping, Advertising, and Customer Service
  • Shopping from Wireless Devices
  • Location-Based Advertising
  • Mobile Support of Consumers

17
Mobile Intrabusiness Applications
  • Support of mobile workers with wearable devices
    such as Screen, Camera, Touch-panel display,
    Keyboard, and Speech Translator
  • Job Dispatch

18
Location-Based Commerce
  • Location based commerce (l-commerce)M-commerce
    transactions targeted to individuals in specific
    locations, at specific times.

19
L-commerce Technologies
  • Providing location- based services requires the
    following technologies.
  • Position- determining equipment (PDE) This
    equipment identifies the location of the mobile
    device.
  • Mobile positioning center (MPC) The MPC is a
    server that manages the location information sent
    from the PDE
  • Location-based technology The technology consist
    of groups of servers that combine the position
    information with geographic- and location-
    specific content to provide an l-commerce service
  • Geographic content Geographic content consists
    of streets, road map, addresses, routes,
    landmarks, land usage , Zip codes and the like.
  • Location-specific content Location-specific
    content is used in conjunction with the
    geographic content to provide the location of
    particular services.

20
Barriers to L-commerce
  • Accuracy
  • The cost- benefit justification
  • The bandwidth of GSM networks
  • Invasion of privacy

21
Pervasive Computing
  • Pervasive computing invisible, everywhere
    computing that is embedded in the objects around
    us.
  • E.g. Walls, floors, appliances
  • (RFID) radio frequency identification. Generic
    term for technologies that use radio waves to
    automatically identify individual items.

22
Radio Frequency Identification
  • RFID Technology allows manufacturers to attach
    tags with antennas and computer chips on goods
    and then track their movement through radio
    signals.
  • Auto-ID create a network that connects computers
    to objects, an Internet of things.
  • This Internet of things will provide the ability
    to track individual items as they move from
    factories to store shelves to recycling
    facilities.
  • The problem with RFID has been the expense at
    the individual item level.
  • Current applications in manufacturing use pallet
    level tagging.

23
Wireless Sensor Networks (WSNs)
  • Wireless Sensor Networks are networks of
    interconnected, battery-powered, wireless sensors
    called motes that are placed into the physical
    environment.
  • Motes collect data from many points over an
    extended space.
  • Each mote contains processing, storage, and radio
    frequency sensors and antennas.
  • Motes provide information that enables a central
    computer to integrate reports of the same
    activity from different angles within the network.

24
Wireless Sensor Networks (Continued)
  • Mesh Network is composed of motes, where each
    mote wakes up for a fraction of a second when it
    has data to transmit and then relays that data to
    its nearest neighbor.
  • An advantage is if one mote fails, another one
    can pick up the data.
  • Very efficient and reliable.

25
Wireless Security
  • Four major threats
  • Rogue access point is an unauthorized access
    point to a wireless network.
  • War driving is the act of locating WLANs while
    driving around a city or elsewhere.
  • Eavesdropping refers to efforts by unauthorized
    users to try to access data traveling over
    wireless networks.
  • RF (Radio frequency) jamming is when a person or
    a device intentionally or unintentionally
    interferes with your wireless network
    transmissions.

26
Wireless Security (Continued)
  • To avoid those previously mentioned threats
    implement the following solutions
  • Detect unauthorized access points with devices
    from NetStumbler
  • Block your SSIDs
  • Encrypt wireless transmissions with Wi-Fi
    Protected Access (WPA)
  • Know who is using your network and what they are
    doing on it
  • Automatically shift to a different wireless
    channel when there is interference.

27
Inhibitors and barriers of mobile computing
  • The usability and other technical problems
  • Ethical and legal issues
  • Failures in mobile computing and M-Commerce
Write a Comment
User Comments (0)
About PowerShow.com