Title: Week 10 and Week 11
1Week 10 and Week 11
- Mobile Technologies,
- Mobile Commerce,
- Pervasive Computing, and
- RFID
2Learning Objectives
- Introduce mobile technologies
- Define mobile commerce and understand its
relationship to e-commerce. - Understand the mobile computing environment that
supports m-commerce. - Describe the four major types of wireless
telecommunications networks. - Discuss the value-added attributes and
fundamental drivers of m-commerce. - Discuss m-commerce applications.
- Introduce pervasive computing and RFID
3Why Wireless?
- Human freedom
- Portability v. Mobility
- Objective anything, anytime, anywhere
- Mobility
- Size, weight, power
- Functionality
- Content
- Infrastructure required
- Cost
- Capital, operational
4Components of cellular network architecture
5Worldwide Mobile Subscribers
SOURCE CTIA, iGillottResearch, 2001
6Electromagnetic Spectrum
LIGHT
HARMFUL RADIATION
RADIO
SOUND
VHF VERY HIGH FREQUENCY UHF ULTRA HIGH
FREQUENCY SHF SUPER HIGH FREQUENCY EHF EXTRA
HIGH FREQUENCY
UWB 3.1-10.6 GHz
SOURCE JSC.MIL
7Mobile Computing
- Overview of Mobile Commerce
- mobile commerce (m-commerce, m-business)
- Any business activity conducted over a wireless
telecommunications network
8Exhibit 9.1 The Mobile Commerce Landscape
9Mobile Computing
- Mobile Computing Devices
- personal digital assistant (PDA)
- A handheld computer principally used for
personal information management - smartphone
- Internet-enabled cell phones that can support
mobile applications - blackberry
- A handheld device principally used for e-mail
10Mobile Computing
- Mobile Computing Devices
- wireless mobile computing (mobile computing)
- Computing that connects a mobile device to a
network or another computing device, anytime,
anywhere - synchronization
- The exchange of updated information with other
computing devices
11Exhibit 9.2 The Wireless Mobile Environment
12Mobile Computing
- Mobile Computing Software
- microbrowser
- Wireless Web browser designed to operate with
small screens and limited bandwidth and memory
requirements - Wireless Application Protocol (WAP)
- A suite of network protocols designed to enable
different kinds of wireless devices to access
WAPreadable files on an Internet-connected Web
server
13Mobile Computing
- Wireless Markup Language (WML)
- A scripting language used to create content in
the WAP environment based on XML, minus
unnecessary content to increase speed - Compact Hypertext Markup Language (cHTML)
- A scripting language used to create content in
i-mode
14Mobile Computing
- Extensible Hypertext Markup Language (xHTML)
- A general scripting language compatible with
HTML set by W3 Consortium - Voice XML (VXML)
- An extension of XML designed to accommodate voice
15Wireless Application Support
- WAP (Wireless Application Protocol) and iMode
- High-level protocols that use cellular transport
- WAP
- Uses WML (Wireless Markup Language)
- Divides content into cards equal to one
telephone screen - Simplified but incompatible form of HTML
- To send to a WAP phone, must broadcast WML content
16Mobile Computing
- Mobile Computing Services
- Short Message Service (SMS)
- A service that supports the sending and
receiving of short text messages on mobile phones - Enhanced Messaging Service (EMS)
- An extension of SMS that can send simple
animation, tiny pictures, sounds, and formatted
text - Multimedia Messaging Service (MMS)
- The next generation of wireless messaging MMS
will be able to deliver rich media
17SMS Short Message Service
- Integral part of GSM standard
- Added to other standards as well
- Uses control channel of phone
- Send/Receive short text messages
- Sender pays (if from mobile phone)
- Phone has "email" address
- SMTP Interface
- Only in the US, not the rest of the world
- Allows messages to be sent for free!
- 1 BILLION SMS/day worldwide
SOURCE GEMBROOK SYSTEMS
18Mobile Computing
- Mobile Computing Services
- micropayments
- Electronic payments for small-purchase amounts
(generally less than 10) - global positioning system (GPS)
- A worldwide satellite-based tracking system that
enables users to determine their position
anywhere on the earth
19Mobile Computing
- Mobile Computing Services
- interactive voice response (IVR)
- A computer voice system that enables users to
request and receive information and to enter and
change data through a telephone - voice portal
- A Web site with an audio interface that can be
accessed through a telephone call
20Wireless Telecommunications Networks
- Personal Area Networks
- personal area network (PAN)
- A wireless telecommunications network for
device-to-device connections within a small range - Bluetooth
- A set of telecommunications standards that
enables wireless devices to communicate with each
other over short distances
21Bluetooth
- A standard permitting for wireless connection
of - Personal computers
- Printers
- Mobile phones
- Handsfree headsets
- LCD projectors
- Modems
- Wireless LAN devices
- Notebooks
- Desktop PCs
- PDAs
22Bluetooth Characteristics
- Operates in the 2.4 GHz Industrial-Scientific-Me
dical (ISM) (unlicensed)! band. Packet
switched. 1 milliwatt (as opposed to 500 mW
cellphone. Low cost. - 10m to 100m range
- Uses Frequency Hop (FH) spread spectrum, which
divides the frequency band into a number of hop
channels. During connection, devices hop from
one channel to another 1600 times per second - Bandwidth 1-2 megabits/second
- Supports up to 8 devices in a piconet (two or
more Bluetooth units sharing a channel). - Built-in security.
- Non line-of-sight transmission through walls
and briefcases. - Easy integration of TCP/IP for networking.
23Bluetooth Devices
ALCATEL One TouchTM 700 GPRS, WAP
ERICSSON R520 GSM 900/1800/1900
ERICSSON BLUETOOTH CELLPHONE HEADSET
NOKIA 9110 FUJI DIGITAL CAMERA
ERICSSON COMMUNICATOR
24Bluetooth Piconets
- Piconet small area network
- Ad hoc network no predefined structure
- Based on available nodes and their locations
- Formed (and changed) in real time
25Wireless Telecommunications Networks
- Wireless Local Area Networks
- wireless local area network (WLAN)
- A telecommunications network that enables users
to make medium-range wireless connections to the
Internet or another network - Wi-Fi (wireless fidelity)
- The common name used to describe the IEEE 802.11
standard used on most WLANs
26Wireless Telecommunications Networks
- Wireless Local Area Networks
- 802.11b
- The most popular Wi-Fi standard it is
inexpensive and offers sufficient speed for most
devices however, interference can be a problem - 802.11a
- This Wi-Fi standard is faster than 802.11b but
has a smaller range - 802.11g
- This fast but expensive Wi-Fi standard is mostly
used in businesses
27Wireless Telecommunications Networks
- Wireless Local Area Networks
- wireless access point
- An antenna that connects a mobile device to a
wired LAN - hotspot
- An area or point where a wireless laptop or PDA
can make a connection to a wireless local area
network
28Exhibit 9.5 How Wi-Fi Works
29Wireless Telecommunications Networks
- Wireless Metropolitan Area Networks
- WiMax
- A wireless standard (IEEE 802.16) for making
broadband network connections over a large area - wireless metropolitan area network (WMAN)
- A telecommunications network that enables users
to make long-range wireless connections to the
Internet or another network
30Wireless Telecommunications Networks
- Wireless Wide Area Networks
- wireless wide area network (WWAN)
- A telecommunications network that offers
wireless coverage over a large geographical area,
typically over a cellular phone network
31Wireless Telecommunications Networks
- Wireless Wide Area Networks
- Physical Topology of a WWAN
- subscriber identification module (SIM) card
- An extractable storage card used for
identification, customer location information,
transaction processing, secure communications,
and the like
32WAP Applications
Web Content Server
Non Mobile Internet User
WAP Gateway
Mobile Terminal
iNexware
Database Server
WAP simulator
SOURCE DANET
33WAP Protocol Stack
Internet
Wireless Network
WAP Gateway
Radio tower
WAE WML WMLScript
HTML XML
WAE - Wireless Application Environment WML -
Wireless Markup Language WSP - Wireless Session
Protocol WTP - Wireless Transaction Protocol
WTLS - Wireless Transport Layer Security WDP -
Wireless Datagram Protocol
WSP
HTTP
WTP
SSL (TLS)
WTLS
WDP
UDP
TCP
SMS/GPRS UMTS
IP
34WAP Protocol Stack
- WDP is an adaptation layer that makes every data
network look like UDP to the upper layers. - WTLS provides a public-key cryptography-based
security mechanism similar to TLS. Its use is
optional. - WTP provides transaction support (reliable
request/response) that is adapted to the wireless
world. - WSP is best thought of on first approach as a
compressed version of HTTP. - WAE specifies an environment that allows
operators and service providers to build
applications and services that can reach a wide
variety of different platforms. - The primary language of the WAE is WML, the
Wireless Markup Language, which is designed for
handheld devices with phone-specific features.
35WML Example
lt?xml version"1.0"?gt lt!DOCTYPE wml PUBLIC
"-//PHONE.COM//DTD WML 1.1//EN"
"http//www.phone.com/dtd/wml11.dtd" gt ltwmlgt
ltcard id"main" title"First Card"gt
ltp mode"wrap"gtThis is a sample WML page.lt/pgt
lt/cardgt lt/wmlgt
36Wireless Telecommunications Networks
- WWAN Communication Bandwidths
- 1G. The first generation of wireless technology,
which was analog based - 2G. The second generation of digital wireless
technology accommodates voice and text - 2.5G. An interim wireless technology that can
accommodate voice, text, and, limited graphics - 3G. The third generation of digital wireless
technology supports rich media such as video - 4G. The expected next generation of wireless
technology that will provide faster display of
multimedia
37Wireless Telecommunications Networks
- Wireless Wide Area Networks
- WWAN Communication Protocols
- Many users sharing a resource at the same time,
needed because user must share cells - FDMA (frequency division)
- Use different frequencies
- TDMA (time division)
- Use same frequency, different times
- CDMA (code division)
- Use same frequency, same time, different codes
- WWAN Network Systems
- Global System for Mobile Communications (GSM)
- An open, nonproprietary standard for mobile
voice and data communications
38Frequency Division Multiplexing (FDMA)
Each channel gets a band (range) of
frequencies Used in traditional radio, TV, 1G
cellular
- Advantages
- No dynamic coordination
- Disadvantages
- Inflexible inefficient if channel load is
dynamic and uneven
EACH CHANNEL OCCUPIES SAME FREQUENCY AT ALL TIMES
SOURCE NORMAN SADEH
39Time Division Multiplexing (TDMA)
Each channel gets entire spectrum for a certain
(rotating) time period
Advantage Can assign more time to senders with
heavier loads 3X capacity of FDMA, 1/3 of
power consumption Disadvantage Requires precise
synchronization
SOURCE NORMAN SADEH
40Combining TDMA and FDMA
Each channel gets a certain frequency band for a
certain amount of time. Example GSM
- Advantages
- More robust against frequency- selective
interference - Much greater capacity with time compression
- Inherent tapping protection
- Disadvantages
- Frequency changes must be coordinated
SOURCE NORMAN SADEH
41Code Division Multiplexing (CDMA)
- Each channel has uniquecode
- All channels use same spectrumat same time but
orthogonal codes - Advantages
- bandwidth efficient code space is huge
- no coordination or synchronizationbetween
different channels - resists interference and tapping
- 3X capacity of TDMA, 1/25 power consumption
- Disadvantages
- more complex signal regeneration
- Implemented using spread spectrum
42Space Division Multiple Access (SDMA)
MANY CELLS CAN SHARE SAME FREQUENCIES
IF SEPARATED IN SPACE
PATTERN CAN BE REPLICATED OVER THE ENTIRE EARTH
200 FREQUENCIES IN ONE CELL TOTAL NUM BER
OFFREQUENCIES 1400 WORLDWIDE
43iMode
- Telephone, pager, email, browser, location
tracking, banking, airline tickets, entertainment
tickets, games - NTT DoCoMo (??? means anywhere)
- Japan is the wireless Internet leader
iMode FAQ
SOURCE EUROTECHNOLOGY JAPAN K.K.
44iMode
- Sits on top of packet voice/data transport
- As of July 31, 2003, gt 39 million subscribers
- 28,000 new ones per day
- 26 of Japan
- gt3000 official sites
- gt1000 application partners
- gt40,000 unofficial sites
- Fee based on amountof data transmitted
SOURCES XML.COM, EUROTECHNOLOGY.COM
45iMode
- Phonetic text input (better for Japanese)
- SLOW 9.6 Kbps, but 3G will raise to 384 K
- Uses cHTML (compact HTML)
- same rendering model as HTML (whole page at a
time) - low memory footprint (no tables or frames)
- Standby time 400 min., device weight 2.4 oz.
(74g)
SOURCES XML.COM, NTT
46iMode Operation
DoCoMo Packet Network (PDC-P)
iMode Servers
HTTP
PACKET DATA
SOURCE SAITO SHIN
47Mobile Commerce
- Attributes of M-Commerce
- Ubiquity
- Convenience
- Interactivity
- Personalization
- Localization
48Mobile Financial Applications
- Mobile Banking
- Wireless Electronic Payment Systems
- Wireless Wallets
- m-wallet (mobile wallet)
- Technologies that enable cardholders to make
purchases with a single click from their wireless
device - Wireless Bill Payments
- A number of companies now provide the option of
paying bills directly from a cell phone
49Mobile Shopping, Advertising, and Content
Provision
- Wireless Shopping
- An increasing number of online vendors allow
customers to shop from wireless devices - Enables customers to use cell phones or wireless
PDAs to - Perform quick searches
- Compare prices
- Use a shopping cart
- Order
- View the status of their order
50Mobile Shopping, Advertising, and Content
Provision
- Targeted Advertising
- Marketers send user-specific advertising messages
to wireless devices - Location-sensitive advertising informs buyers
about shops, malls, and restaurants close to
where the mobile device owner is located - mobile portal
- A customer interaction channel that aggregates
content and services for mobile users
51Mobile Intrabusiness Applications
- Support of Mobile Employees
- sales force mobilization
- The process of equipping sales force employees
with wireless computing devices - Job Dispatch
- wearable devices
- Mobile wireless computing devices for employees
who work on buildings and other climbable
workplaces
52Mobile Intrabusiness Applications
- Customer Support
- Mobile access extends the reach of CRM to both
employees and business partners on a 24/7 basis,
to any place where recipients are located
53Mobile Intrabusiness Applications
- Non-Internet Intrabusiness Applications
- Wireless networking, used to pick items out of
storage in warehouses - Delivery-status updates
- Collection of data
- Monthly pay slips sent as SMS messages sent to
employees mobile phones - Property adjusters report from the scene of an
accident - Sales representatives check orders and
inventories during their visits to customers
54B2B M-Commerce and Supply Chain Management
- Use of wireless communication to share
information along the supply chain and to
collaborate with partners - By integrating the mobile computing device into
supply chain communications, it is possible to - Make mobile reservations of goods
- Remotely check availability of a particular item
in the warehouse - Order a customized product from the manufacturing
department - Provide secure access to confidential financial
data from a management information system
55Pervasive Computing
- Overview of Pervasive Computing
- pervasive computing
- Invisible, everywhere computing that is embedded
in the objects around us - Principles of Pervasive Computing
- Decentralization
- Diversification
- Connectivity
- Simplicity
56Pervasive Computing
- Overview of Pervasive Computing
- contextual computing
- The enhancement of a users interactions by
understanding the user, the context, and the
applications and information required
57Pervasive Computing
- Pervasive Computing Initiatives
- radio frequency identification (RFID)
- Technology that uses radio waves to identify
items - electronic product code (EPC)
- An RFID code that identifies the manufacturer,
producer, version, and serial number of
individual consumer products
58Pervasive Computing
- Pervasive Computing Initiatives
- Smart Homes
- Lighting
- Energy management
- Water control
- Home security and communications
- Home entertainment
- Smart Appliances
- Smart Cars
- Smart Clothes
59Pervasive Computing
- Pervasive Computing Initiatives
- sensor network
- A series of interconnected sensors that monitor
the environment in which they are placed - Sensor networks can
- Protect the environment
- Public safety
- Monitor business and agricultural areas
60RFID Basics
- RFID Radio Frequency IDentification
- RFID is a relatively new technology to the supply
chain, although it has been around since the 50s - RFID utilizes non contact / non line of sight
methods to collect data - RFID tags can be used in different configurations
- Active/Passive
- Read-only
- Write once / read many (WORM)
- Read / Write
61RFID Tags
IC Chip
32mm and 23mm capsule transponder
Antenna
62How RFID Works
Antenna
- Tag enters RF field
- RF signal powers tag
- Tag transmits ID, plus data
- Reader captures data
- Reader sends data to computer
- Computer determines action
- Computer instructs reader
- Reader transmits data to tag
Tag
Computer
RFID Reader
SOURCE PHILIPS
63Any Device
64What makes RFID relevant now?
- After decades of technology refinement these
radio tags have now become very small and
inexpensive - A great deal of innovation has brought us to the
point where the silicon core of an radio tag is
now 0.4mm - The antenna can be printed onto a products
packaging at time of manufacture - Currently radio tags can be purchased for less
that 0.25 in quantity. - gt RFID is small enough, fast enough, and cheap
enough to do real work with
today.
65Benefits of RFID
- RFID technology has the ability to send
relatively large amounts of data with the product
as it travels through the supply chain. - Read / write RFID tags can be updated through the
manufacturing steps of a product. - By lowering the error rate of goods moved through
the supply chain, vendors can share in the
savings realized by RFID technology
66RFID advantages over traditional data collection
via barcode
- No line of sight required
- Multiple items can be read with a single scan
- Portable database of information for each tag
- Hidden data source
- Passive tags have a virtually unlimited lifetime
- Active tags can be read from great distances
- Can be combined with current barcode technology
67RFID Advantages (cont.)
- Ability to survive in harsh conditions
- Data on the tag can be modified through the life
of the product - Data on the tag can also be locked or partially
locked leaving the rest of the tag for other uses - A unique permanent ID is embedded in each tag
68RFID Disadvantages
- Cost
- Tags run from .50 to 250.00
- Additive Cost . . . . . . . .
- Limited read/write range for passive tags
- 4 inches to 20 feet
- Current lack of standards, although that is being
addressed rapidly
69Two Main Types of RFID Tags
- Two main types of tags
- Active tags (battery powered)
- Read/write possible
- Battery powered memory, radio circuitry
- High read range (300 feet)
- Up to 1mb of memory
- Passive tags (powered by the interrogator)
- Read/write possible
- Smaller memory capacity
- Shorter read range (4 inches up to 20 feet)
70Type 1 - Transmitter Tags
- Also known as active
- Typically Battery Powered
- Longer Read Range then passive tags
- Higher Cost
- Typically More Data Storage than Passive Tags
- Application Examples
- Toll Tags
- Rail/Truck Car
- Asset Tracking
- Etc. . .
71Type 2 - Backscatter Tags
- Also known as passive tags
- No battery on the tag, powered by the RFID
interrogator - Read range dependent on many variables
- RF environment and interference
- Material being read
- Frequency being used
- Virtually unlimited lifespan
- Limited memory available
- Lower cost per tag
72RFID Tag Memory
- Read-only tags
- Tag ID is assigned at the factory during
manufacturing - Can never be changed
- No additional data can be assigned to the tag
- Write once, read many (WORM) tags
- Data written once, e.g., during packing or
manufacturing - Tag is locked once data is written
- Similar to a compact disc or DVD
- Read/Write
- Tag data can be changed over time
- Part or all of the data section can be locked
73RFID Interrogators and Antennas
- Provide communications between the RFID tags and
the host system - Can be fixed or mobile devices
- Can be mounted as a Portal to track movements
through a warehouse or facility - Active tag interrogators receive transmission
from the tags and pass them on to the host system - Passive tag interrogators both provide power to
activate the tag as well as read the tag contents
and then communicate the information to the host
system
74RFID and EPC
RFID Tags
ReadersAntennas
ALE/Savant Server
Standards Body
EPC Name Service (ONS) EPC Information Service
(EPC IS)
75What is EPC and how does it relate to RFID?
- EPC Stands for Electronic Product Code
- It is an extension of the concept of the
universal product code (UPC) - The major difference between a UPC and an EPC is
that each EPC is unique even if the product is
the same - Allows for the identification of any item in the
supply chain through the use of the EPC network
76The EPC Network
- Part of a total solution designed to allow a
product to be identified at any point in the
supply chain - Via the EPC number encoded on the RFID tag
- The EPC network is designed to create an
internet of things - Will allow for real or near real-time visibility
of item, case, or pallet-level info
77How RFID and EPC Work
78Euro Banknotes
- European Central Bank has announced plans to
implant RFID tags in banknotes
- Uses
- Anti-counterfeiting
- Tracking money flows
79PAYMENT ON A KEYCHAIN
SMALL AND CHEAP
80Automated Toll Collection