INTRODUCTION Mobile Computing  A technology that allows transmission of data, via a computer, without having to be connected to a fixed Physical link.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Mobile Computing
Mobile Through Generations-March Towards 5G Anind Gupta 2 nd Year ECE Maharaja Agrasen Institute of Technology.
ConnectionMigration 818L Network Centric Computing Spring 2002 Ishan Banerjee.
Rev A8/8/021 ABC Networks
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Remote Desktop Connection Techniques Wireless Communication Networks.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Wireless Networking WAN Design Module-06
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Computer Networks IGCSE ICT Section 4.
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Chapter 10 Remote Access and Wireless Networking Business Issues Logical & Physical Topology Technology: Hardware & Software, & Wireless Personnel Communication.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Intranet, Extranet, Firewall. Intranet and Extranet.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Lector: Aliyev H.U. Lecture №15: Telecommun ication network software design multimedia services. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES THE DEPARTMENT.
KARTIK DABBIRU Roll # EE
Ch CHAPTER The Internet and the Web Irfan A. Ilyas Lecture 23.
NETWORKS.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
PRESENTATION ON WI-FI TECHNOLOGY
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
MULTIMEDIA OVER WIRELESS BROADBAND NETWORKS BY: NEELIMA PUNJALA.
A Study of Wireless Virtual Network Computing Kiran Erra.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Winning Wireless Applications Corina Moore PrinterOn Corporation
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Client-Server applications Introduction to Java Applets Client-server architectures Why do Applets exist? What can an Applet do?
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
INTRODUCTION:- The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation)
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
Lecture 5: Mobile Computing Part-II By D. Najla Al-Nabhan 1.
5G Wireless Technology.
Chapter 1: Explore the Network
Integration of and Third-Generation Wireless Data Networks
A Study of Wireless Virtual Network Computing
Seminar on…. 5G Wireless Technology By: Niki Upadhyay
Introduction to Networking
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Virtual Private Network
Presentation transcript:

INTRODUCTION Mobile Computing  A technology that allows transmission of data, via a computer, without having to be connected to a fixed Physical link.  These days there is rapid movement towards wireless communication in the Giga Hertz spectrum which allows for new concepts such as “Hidden computing”.  Mobile computing is discussed in terms of the input and output interface methods used to interact with mobile devices.  Where two dimensions, mobility and connectivity, are the continuums used to asses the functionality for mobile devices and clients. Under this comes the area of mobile networks such as WLANS and WWAN.  The two dimensions, mobility and connectivity, are the continuums used to asses the functionality for mobile devices and clients.

WWANS and WLANS

NEED FOR MOBILE COMPUTING  Device independent communications anytime, virtually anywhere:

Information support for "Mobilers"

Gathering external information

Providing external information to Mobilers:

Technical Details  Mobile- www introduces an extension for HTTP which uses an intelligent compression and administration mechanism to save connection time and money.  Mobile -WWW consist of a special web-client which request a Qos for the content; this QoS is defined according to the users preferences, the available bandwidth and the cost of transmission.  A wireless access technology DECT (Digital Enhanced Cordless Telecommunications interface) has been deployed to connect mobile devices to backbone

Architecture " Requirements for mobile services are stability, bandwidth/cost considerations, integration into the familiar environment, application transparency, security and extendibility.”  Connection management including  Caching  Localization management including: Locating required resources in a foreign environment and tracking the user if required.  Authentication and encryption.  Profiling

Architecture:  Mobility services architecture : Common Mobility Services (CMS). Mobility Management Services (MMS). Special Mobility Services (SMS).

 Mobility Environment Architecture: To distinguish from conventional client-server and network tunneling systems we chose the notions front-end for a mobile host, backend for a fixed host that is servicing mobile nodes and relay for an access point to the backbone.

Limitations And Proposed Solutions:  SECURITY Wirelessly connected devices can easily breach two of the most fundamental network security policies:1)confidentiality and 2)authentication. Steps in designing for security in mobile computing networks:  Application and System Assisted Security which is primarily use of user passwords and similar mechanisms.  Dial back as a Security Technique.  Firewalls - Security Servers at the Host.

LIMITED ROAMING:  Once application sessions are established over existing protocols, the network assumes that a device remains attached to that segment for the duration of the session.  Deploying wireless solutions has introduced new issues not found in more traditional network architectures. One of the most difficult issues is the "roaming handoff":

The Solution :  A lot of wireless users today feel that they are using "bleeding edge" technology.  If a mobile device is equipped with more than one wireless card, the software could govern the hardware to automatically switch onto the card that offers the highest bandwidth.  When a mobile device becomes unreachable because it suspends operation, moves out of coverage, or changes its current "point of presence" address (roaming).  Another way of dealing with the problems faced with roaming is to use subnet roaming using IP.

BATTERY RELATED ISSUES IN MOBILE & WIRELESS –An Overview  Mobility and portability inherently requires a source of electricity that does not depend on conventional wired power.  Our requirements for battery power in mobile devices are running ahead of the improvements in battery capacity.  While we are making advances in lower consumption of power for the same.  Security technology like more powerful encryption is demanding on battery power.  Battery runs out rather quickly in most handheld devices.

Trends in Improving Battery Life for Handheld Devices: This progress is centered on following initiatives :  Reducing the power requirements of chips and processors.  Superior power management techniques.  Better batteries based on conventional technology.  New battery technologies like fuel cell are also being explored.

Fuel Cell Technology for Mobile devices: In fuel cells, hydrogen mixes with oxygen to generate electric current through water. Technology problem is that hydrogen is flammable.

APPLICATION PERSISTENCE : Critical applications are still relegated to stationary or desktop systems. When a company tries to deploy these applications to mobile devices, mobile users spend a lot of time getting back on the network after losing their connections. They must login again, re-authenticate, sometimes navigate through multiple screens to find the point where they left off, and then re-enter any lost data. In the end, users are frustrated and less productive.

Solution But by using the server in places where there is the slightest possibility of loss in data the network application sessions would not be terminated even when:  A mobile device suspends operation;  A user disconnects or removes the wireless card from the mobile device  Or a device temporarily moves out of the coverage area.

conclusion Use of Artificial Intelligence may allow mobile units to be the ultimate in personal secretaries, which can receive s and paging messages, understand what they are about, and change the individual’s personal schedule according to the message. Indeed, technologies such as interactive television and video image compression already imply a certain degree of mobility in the home i.e. Home Shopping, etc using the mobile data communication technologies discussed, this mobility maybe pushed to extreme. The future of mobile computing is very promising indeed, although technology may go too far, causing detriment to society.