SlideShare una empresa de Scribd logo
1 de 24
1
ANURAG COLLEGE OF ENGINEERING
Aushapur(V), Ghatkesar(M), Medchal(D),T.S
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
MOBILE COMPUTING
Under the guidance of :-
Mr. S. Vijay Kumar
Assistant Professor.
Presented by:
Mr. P. ESHWAR 19PQ1A0560
CONTENTS
1. What is mobile computing?
2. Comparison to wired networks
3. Why go mobile?
4. Types of wireless devices
5. Mobile objects
6. Security & Privacy
7. Applications of mobile computing
8. Challenges
9. Future of mobile computing
10. Conclusion
11. References
2
What Is Mobile Computing?
What is computing?
Operation of computers (according to oxfords advance
learner’s dictionary)
What is the mobile?
That someone /something can move or be moved easily and
quickly from place to place
What is mobile computing?
Users with portable computers still have network
connections while they move
3
What Is Mobile Computing?
(Cont.)
 Mobile Computing is an umbrella term used to describe
technologies that enable people to access network services
anyplace, anytime, and anywhere.
4
Comparison to Wired Net.
Wired Networks
-high bandwidth
-low bandwidth variability
-can listen on wire
-high power machines
-high resource machines
-need physical access(security)
-low delay
-connected operation
Mobile Networks
-low bandwidth
-high bandwidth variability
-hidden terminal problem
-low power machines
-low resource machines
-need proximity
-higher delay
-disconnected operation
5
Why Go Mobile?
• Enable anywhere/anytime connectivity
• Bring computer communications to areas without
pre-existing infrastructure
• Enable mobility
• Enable new applications
• An exciting new research area
6
Types of Wireless Devices
 Laptops
 Palmtops
 PDAs
 Cell phones
 Pagers
 Sensors
7
Mobile Objects
1. A mobile object is
some code that
carries a state
8
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. that lives on a host
9
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
10
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
11
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
5. and barred when
untrusted
12
Mobile Objects (Cont.)
1. A mobile object is some
code that carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
5. and barred when
untrusted
6. and will refuse to go to
untrustworthy places
13
Mobile Objects (Cont.)
7. Mobile objects can
talk to their friends
14
Mobile Objects (Cont.)
7. Mobile objects can
talk to their friends
8. but only by co-
operation of the hosts
15
Security & Privacy
Threats:
 Wi-Fi networks are a shared network that makes it easier
for others to eavesdrop on your communication.
 Devices are Stolen and tampered.
 Cryptography.
 Connection
16
Security & Privacy
Solutions:
 Secure Web Browsing
 Use secure, encrypted sessions.
 Secure Internet Transactions
 Use UCI’s VPN to encrypt your network traffic.
 Always use a Personal Firewall.
 Set the firewall to deny.
 ALL incoming connections.
17
Applications of Mobile
Computing (Cont.)
 For Estate Agents
 In courts
 In companies
 Stock Information Collection/Control
 Credit Card Verification
 Taxi/Truck Dispatch
 Electronic Mail/Paging
18
Challenges
 Disconnection
 Low bandwidth
 High bandwidth variability
 Low power and resources
 Security risks
 Wide variety terminals and devices with different
capabilities
 Device attributes
 Fit more functionality into single, smaller device
19
Future of Mobile Computing
 Use of Artificial Intelligence
 Integrated Circuitry -> Compact Size
 Increases in Computer Processor speeds
20
Conclusion
Mobile computing has severe limitations
- however, it is far from impossible, and technology improves
all the time
Lots of challenges
- some have (good) solutions, many others are still waiting to
be solved
21
References
http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/
vk5/report.html
http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol1/vk5/art
icle1.html
http://www.cs.ucsb.edu/~ebelding/courses/284/w04/slides/int
ro.pdf
http://www.ansa.co.uk/ANSATech/ANSAhtml/98-
ansa/external/9807tb/9807mose.pdf
http://www.danishtechnology.dk/it/9238
22
23
QURIES ?
24
THANK YOU…

Más contenido relacionado

Similar a Mobile-Computing ppt.ppt

Mobile computing
Mobile computingMobile computing
Mobile computing
najwa92
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Anuja Mane
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
John Intindolo
 

Similar a Mobile-Computing ppt.ppt (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
G011123539
G011123539G011123539
G011123539
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Iot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampIot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCamp
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
MobileComputing by Mudasir
MobileComputing by MudasirMobileComputing by Mudasir
MobileComputing by Mudasir
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 
7 (1)
7 (1)7 (1)
7 (1)
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Internet Of Things(IoT).pptx
Internet Of Things(IoT).pptxInternet Of Things(IoT).pptx
Internet Of Things(IoT).pptx
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Mobile-Computing ppt.ppt

  • 1. 1 ANURAG COLLEGE OF ENGINEERING Aushapur(V), Ghatkesar(M), Medchal(D),T.S DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MOBILE COMPUTING Under the guidance of :- Mr. S. Vijay Kumar Assistant Professor. Presented by: Mr. P. ESHWAR 19PQ1A0560
  • 2. CONTENTS 1. What is mobile computing? 2. Comparison to wired networks 3. Why go mobile? 4. Types of wireless devices 5. Mobile objects 6. Security & Privacy 7. Applications of mobile computing 8. Challenges 9. Future of mobile computing 10. Conclusion 11. References 2
  • 3. What Is Mobile Computing? What is computing? Operation of computers (according to oxfords advance learner’s dictionary) What is the mobile? That someone /something can move or be moved easily and quickly from place to place What is mobile computing? Users with portable computers still have network connections while they move 3
  • 4. What Is Mobile Computing? (Cont.)  Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. 4
  • 5. Comparison to Wired Net. Wired Networks -high bandwidth -low bandwidth variability -can listen on wire -high power machines -high resource machines -need physical access(security) -low delay -connected operation Mobile Networks -low bandwidth -high bandwidth variability -hidden terminal problem -low power machines -low resource machines -need proximity -higher delay -disconnected operation 5
  • 6. Why Go Mobile? • Enable anywhere/anytime connectivity • Bring computer communications to areas without pre-existing infrastructure • Enable mobility • Enable new applications • An exciting new research area 6
  • 7. Types of Wireless Devices  Laptops  Palmtops  PDAs  Cell phones  Pagers  Sensors 7
  • 8. Mobile Objects 1. A mobile object is some code that carries a state 8
  • 9. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. that lives on a host 9
  • 10. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 10
  • 11. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 11
  • 12. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 5. and barred when untrusted 12
  • 13. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 5. and barred when untrusted 6. and will refuse to go to untrustworthy places 13
  • 14. Mobile Objects (Cont.) 7. Mobile objects can talk to their friends 14
  • 15. Mobile Objects (Cont.) 7. Mobile objects can talk to their friends 8. but only by co- operation of the hosts 15
  • 16. Security & Privacy Threats:  Wi-Fi networks are a shared network that makes it easier for others to eavesdrop on your communication.  Devices are Stolen and tampered.  Cryptography.  Connection 16
  • 17. Security & Privacy Solutions:  Secure Web Browsing  Use secure, encrypted sessions.  Secure Internet Transactions  Use UCI’s VPN to encrypt your network traffic.  Always use a Personal Firewall.  Set the firewall to deny.  ALL incoming connections. 17
  • 18. Applications of Mobile Computing (Cont.)  For Estate Agents  In courts  In companies  Stock Information Collection/Control  Credit Card Verification  Taxi/Truck Dispatch  Electronic Mail/Paging 18
  • 19. Challenges  Disconnection  Low bandwidth  High bandwidth variability  Low power and resources  Security risks  Wide variety terminals and devices with different capabilities  Device attributes  Fit more functionality into single, smaller device 19
  • 20. Future of Mobile Computing  Use of Artificial Intelligence  Integrated Circuitry -> Compact Size  Increases in Computer Processor speeds 20
  • 21. Conclusion Mobile computing has severe limitations - however, it is far from impossible, and technology improves all the time Lots of challenges - some have (good) solutions, many others are still waiting to be solved 21