This document provides an overview of mobile computing. It defines mobile computing as technologies that allow people to access network services from anywhere at any time. It discusses how mobile computing devices have evolved from simple display devices to laptops and personal digital assistants. The document also covers wireless network technologies like mobile IP that enable connectivity. It discusses challenges like low bandwidth, security risks, and power consumption for mobile devices and disconnected operations. The document concludes that while mobile computing faces limitations, technology is constantly improving and many challenges either have or are working towards solutions.
3. Mobile Computing
Mobile (Moving)
+
Computing ( using
computer)
. Mobile Computing
is an umbrella term used to describe
technologies that enable people to
access network services anyplace,
anytime, and anywhere
IntroductionIntroduction
4. Mobile computingMobile computing
In recent years, distributed computer has become
the norm, especially after the advent of the internet.
Today, technological advances are shaping a new
computing environment where the user is free from
the need to work at a specific location, and is even
enabled to work while on the move.
This new paradigm is often called MOBILE
COMPUTING.
5. A device that moves
Between different
geographical locations
Between different
networks
Between different
applications
Such as Palm-top,
laptop, Cell phonesCell phones
A device due to which
mobile communication is
possible
Modems.
What Is Mobility ?What Is Mobility ?
7. Mobile Computing DevicesMobile Computing Devices
Display Only
Info Pad model: limited
portable processing
Like a cordless phone.
Laptop Computer
ThinkPad model: significant
portable processing, operates
independently of wireless
infrastructure.
Personal Digital Assistant
[PDA] :Somewhere between these
extremes. a handheld device that combines
computing, telephone/fax, Internet and networking
features.
13. Security and PrivacySecurity and Privacy
Security and privacy
Threats:
Wi-Fi networks are a shared
network that makes it easier for
others to eavesdrop on your
communication.
Devices are Stolen and
tampered.
Cryptography.
Connection.
14. Security and privacy
Solutions:
Secure Web Browsing
Use secure, encrypted
sessions.
Secure Internet Transactions
Use UCI’s VPN to
encrypt your network
traffic.
Always use a Personal Firewall
Set the firewall to deny
ALL incoming
connections.
15. Detecting man in the middle
trying to steal information
Each device displays the
hash of its public key.
The keys are exchanged by
Diffie-Hellman protocol.
The two hashes of the keys
are compared.
If the two match then there
is no man in the middle.
If the two don’t match it’s
assumed there is a man in
the middle.
Never store Sensitive Data on mobile
devices unless absolutely necessary.
17. Disconnected OperationsDisconnected Operations
Low bandwidth
High bandwidth
variability
Low power and
resources
Security risks
Wide variety
terminals and
devices with different
capabilities
Fit more
functionality into
single, smaller
device
Disconnection
18. LIMITATIONS
Insufficient bandwidth
If the user needs access to a network they must resort to slow wireless WAN systems primarily
intended for telephone use. Higher speed wireless LANs are only available in specific sites
Security standards
When working mobile one is dependent on public networks, requiring careful use ofVPNs.
Power consumption
Mobile computers must rely entirely on battery power. Combined with compact size, this means
unusually expensive batteries be used
Transmission interferences
Weather and terrain problems as well as distance-limited connection exist with some technologies.
Reception in tunnels and some buildings is poor.
Potential health hazards
Potential health damage from cellular radio frequency emission is not known yet. However, more car
accidents are related to drivers who were talking through a mobile device. Also, cell phones may
interfere with sensitive medical devices.
Human interface with device
As, screens are often too small. Keyboards are impractical, especially one-handed, and alternate
methods such as speech or handwriting recognition require training.
19. Future AspectsFuture Aspects
Track your friends on a
map by picking up GPS signals
from other Android phones,
so you can search for nearby
parties.
Geolife
This app will send you
reminders based on location
instead of time. For example,
as you approach a grocery
store, it will remind you to
pick up milk.
20. Mobile computing has severe limitations
- however, it is far from impossible, and
technology improves all the time
Lots of challenges
- some have (good) solutions, many others are
still waiting to be solved
Conclusion