2. INTRODUCTION
• mobile operator face the challenge of managing
a dramatic rise in mobile data traffic
• mobile broadband continues to rise in popularity
and usage
• Attackers see mobile devices and networks as
new ground for attacks
3. HISTORY
• Mobile infrastructure will require plan for OSI
layer
to send and receive data
• First generation:
before 1990’s
no security to data just mobile was invented
• Second generation(1990’s):
customer is not satisfied with mobile services
• Third generation(after 1990’s):
deals with mobile traffic on network
5. WORKING PROCESS
• Arbor's Peak flow SP solution allows mobile
network operators to optimize and protect their
mobile infrastructure and services.
• Mobile infrastructure protection
• Mobile service protection
6.
7. TECHNOLOGIES
1)java
• Mobile infrastructure uses Java run time
environment in cell phones.
2)Database
• database store data when communications are
done
• brings the applications that were once limited
to the world where they are most needed.
8. 3)Xml
XML (Extensible Markup Language) is used
for integration of software running in mobile
9. APPLICATIONS
1)SAP Mobile Infrastructure :
The SAP MI offers tools for synchronization
It is based on
java
xml
2) Wyse technology:
• provider of cloud-based mobile infrastructure
management technology.
10. ADVANTAGES
Decrease security risk and costs involved with
lost devices.
Users can select the devices that best
meets their needs
get their devices up and running quickly, in just
minutes instead of days.
11. • Users get reliable, secure and easy access to
corporate email and applications
• Use custom attributes to track asset
information
• Benefit from service level guarantees
12. DISADVANTAGES
forced to rely on your chosen vendor’s
capabilities
Some times not accessible from anywhere in
the country
13. CONCLUSION
Mobile Infrastructure serves as the universal
platform for mobilizing your enterprise
applications
provides security to data that is transferred
from one device to other