Title: Mobile, Wireless, and Pervasive Computing
1- Mobile, Wireless, and Pervasive Computing
2Chapter Outline
- Wireless devices
- Wireless Local Area Networks, Wi-Fi, and Voice
Portals - Wireless transmission media
- Mobile Commerce
- Mobile Shopping, Advertising, and Customer
Service - Mobile Intrabusiness Applications.
- Location- Based Computing.
- Pervasive computing
- Security issues
3Learning Objectives
- Discuss the characteristics, attributes, and
drivers of mobile computing and m-commerce. - Discuss m-commerce applications in financial
services. - Describe m-commerce applications in shopping,
advertising, and customer services. - Describe the use of mobile computing in
enterprise and supply chain applications. - Describe location- based commerce (l-commerce).
- Discuss the key characteristics and current uses
of pervasive computing. - Describe the major inhibitors and barriers of
mobile computing and m-commerce.
4Mobile Computing and Commerce Overview,
Benefits, and Drivers
- Mobile computing. A computing model designed for
workers who travel outside the boundaries of
their organizations or homes. - Wireless mobile computing. The combination of
mobile devices used in a wireless environment.
5Wireless Devices
- Wireless devices are small enough to easily carry
or wear, have sufficient computing power to
perform productive tasks and can communicate
wirelessly with the Internet and other devices. - Include PDAs, cellular phones, smart phones.
- Wireless Application Protocol (WAP) is the
standard that enables wireless devices with tiny
display screens, low bandwidth connections and
minimal memory to access Web-based information
and services.
6Wireless Local Area Networks, WI-FI, and Voice
Portals
- Wireless LAN(WLAN) A local area network (LAN)
without the cables used to transmit and receive
data over the airwaves. - Hotspot A small geographical perimeter within
which a wireless access point provides service to
a number of users. - (Wi-Fi) wireless fidelity. Another name for the
802.11b standard on which most WLANs run.
7Wireless Transmission Media
- Microwave transmission systems are widely used
for high-volume, long-distance, point-to-point
communication. - Point-to-point has two characteristics first,
the transmitter and receiver must be in view of
each other (called line-of-sight) and second,
the transmission itself must be tightly directed
from transmitter to receiver.
8Wireless Transmission Media (Continued)
- Satellite transmission systems make use of
communication satellites three types of
satellites, each in a different orbit - Geostationary (GEO)
- Medium-earth-orbit (MEO)
- Low-earth-orbit (LEO)
9Wireless Transmission Media (Continued)
- Footprint is the area of earths surface reached
by a satellites transmission - The higher the sattelite orbit, the larger the
footprint. - The size of the footprint determines how many
sattelites are needed to cover the earth
completely.
10Global Positioning Systems
- GPS is a wireless system that uses satellites to
enable users to determine their position anywhere
on the earth supported by 24 shared satellites
worldwide.
11Internet over Satellite (IOS)
- IOS allows users to access the Internet via GEO
satellites from a dish mounted on the side of
their homes. - Only option available in some areas.
- Can have a propagation delay or be disrupted by
environmental conditions.
12Mobile commerce ( m-commerce) Terminology
- Any e-commerce done in a wireless environment,
especially via the Internet.
13The Attributes of M-computing and M-commerce
- Mobility users can carry a mobile device with
them at all times - Broad reach people can be reached at any time.
- Convenience and instant connectivity easy and
fast access to the web, intranets, and other
mobile devices without booting up a PC or placing
a call via a modem. - Customization Information can be customized and
sent to individual consumers as an SMS. - Localization knowing where a user is physically
at any particular moment is key to offering
relevant products and services.
14Drivers of M-computing and M-commerce
- Widespread availability of mobile devices.
- No Need for a PC.
- The Cell Phone Culture.
- Declining Prices and Increasing Functionalities.
- Improvement of Bandwidth.
15Mobile Personal Service Applications
- Hotel Services Go Wireless
- Wireless Telemedicine
- Mobile Portals
- Applications in Finance
- Mobile Banking
- Wireless Electronic Payment Systems
- Micropayments
- Mobile (Wireless) Wallets
- Wireless Bill Payment
16M-shopping, Advertising, and Customer Service
- Shopping from Wireless Devices
- Location-Based Advertising
- Mobile Support of Consumers
17Mobile Intrabusiness Applications
- Support of mobile workers with wearable devices
such as Screen, Camera, Touch-panel display,
Keyboard, and Speech Translator - Job Dispatch
18Location-Based Commerce
- Location based commerce (l-commerce)M-commerce
transactions targeted to individuals in specific
locations, at specific times.
19L-commerce Technologies
- Providing location- based services requires the
following technologies. - Position- determining equipment (PDE) This
equipment identifies the location of the mobile
device. - Mobile positioning center (MPC) The MPC is a
server that manages the location information sent
from the PDE - Location-based technology The technology consist
of groups of servers that combine the position
information with geographic- and location-
specific content to provide an l-commerce service - Geographic content Geographic content consists
of streets, road map, addresses, routes,
landmarks, land usage , Zip codes and the like. - Location-specific content Location-specific
content is used in conjunction with the
geographic content to provide the location of
particular services. -
20Barriers to L-commerce
- Accuracy
- The cost- benefit justification
- The bandwidth of GSM networks
- Invasion of privacy
21Pervasive Computing
- Pervasive computing invisible, everywhere
computing that is embedded in the objects around
us. - E.g. Walls, floors, appliances
- (RFID) radio frequency identification. Generic
term for technologies that use radio waves to
automatically identify individual items.
22Radio Frequency Identification
- RFID Technology allows manufacturers to attach
tags with antennas and computer chips on goods
and then track their movement through radio
signals. - Auto-ID create a network that connects computers
to objects, an Internet of things. - This Internet of things will provide the ability
to track individual items as they move from
factories to store shelves to recycling
facilities. - The problem with RFID has been the expense at
the individual item level. - Current applications in manufacturing use pallet
level tagging.
23Wireless Sensor Networks (WSNs)
- Wireless Sensor Networks are networks of
interconnected, battery-powered, wireless sensors
called motes that are placed into the physical
environment. - Motes collect data from many points over an
extended space. - Each mote contains processing, storage, and radio
frequency sensors and antennas. - Motes provide information that enables a central
computer to integrate reports of the same
activity from different angles within the network.
24Wireless Sensor Networks (Continued)
- Mesh Network is composed of motes, where each
mote wakes up for a fraction of a second when it
has data to transmit and then relays that data to
its nearest neighbor. - An advantage is if one mote fails, another one
can pick up the data. - Very efficient and reliable.
25Wireless Security
- Four major threats
- Rogue access point is an unauthorized access
point to a wireless network. - War driving is the act of locating WLANs while
driving around a city or elsewhere. - Eavesdropping refers to efforts by unauthorized
users to try to access data traveling over
wireless networks. - RF (Radio frequency) jamming is when a person or
a device intentionally or unintentionally
interferes with your wireless network
transmissions.
26Wireless Security (Continued)
- To avoid those previously mentioned threats
implement the following solutions - Detect unauthorized access points with devices
from NetStumbler - Block your SSIDs
- Encrypt wireless transmissions with Wi-Fi
Protected Access (WPA) - Know who is using your network and what they are
doing on it - Automatically shift to a different wireless
channel when there is interference.
27Inhibitors and barriers of mobile computing
- The usability and other technical problems
- Ethical and legal issues
- Failures in mobile computing and M-Commerce