Mata Kuliah: M0014 / Konsep Sistem Informasi Tahun : 2008 Pertemuan 21 - 22 Chapter 07 : Wireless, Mobile Computing, and Mobile Commerce.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Computers Are Your Future © 2005 Prentice-Hall, Inc.
Telecommunications and Mobile Commerce
Chapter 7 Mobile Commerce Information Technology for Management Improving Performance in the Digital Economy 7 th edition John Wiley & Sons, Inc. Slides.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Chapter 61 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Chapter 61 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 41 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Mobile Commerce and Ubiquitous Computing
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
Wireless, Mobile Computing, and Mobile Commerce
1 Part 4 Wireless Network Wireless Technologies Wireless Networks Wireless Computer Networks Personal Mobile Networks Industry Use Wireless Networks.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND WIRELESS COMPUTING.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin BUSINESS PLUG-IN B20 Mobile Technology.
Mobile Computing and Commerce
Wireless, Mobile Computing and Mobile Commerce
Information Technology Foundations-BIT 112 CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce.
Wireless, Mobile Computing, and Mobile Commerce
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Basic Data Communication
Communications & Networks
Wireless, Mobile Computing and Mobile Commerce
1 CHAPTER 18 Creating a Wireless Organization. 2 Learning Outcomes Explain how a wireless device helps an organization conduct business anytime, anywhere,
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
Copyright 2007 John Wiley & Sons, Inc. Chapter 71 Introduction to Information Systems HTM Management Information Systems College of Business Administration.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 6-1 Introduction to Information Technology.
Wireless Technologies and the Modern Organization
CHAPTER 7 Wireless Technologies and the Modern Organization.
POKOK BAHASAN Pertemuan 14 Matakuliah: Sistem Informasi Manajemen Tahun: 2008.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
Computers Are Your Future Eleventh Edition Chapter 8: Wired & Wireless Communication Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 9 Mobile Computing and Commerce and Pervasive Computing.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Data Communications & Computer Networks, Second Edition1 Chapter 3 The Media: Conducted and Wireless.
Mobile Computing and Commerce Mata kuliah: M Konsep E-Business Tahun: 2010.
Wireless, Mobile Computing today’s wireless devices and wireless transmission media wireless networks according to their effective distance Define mobile.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
BBA (Hons) (Mobile Commerce and Ubiquitous Computing) By: Farhan Mir
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Mobile Commerce and Ubiquitous Computing. Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce.
C HAPTER 6 Mobile Commerce and Ubiquitous Computing.
CHAPTER 7 1 Wireless, Mobile Computing and Mobile Commerce.
Wireless, Mobile Computing, and Mobile Commerce
Chapter 61 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Wireless, Mobile Computing and Mobile Commerce
Introduction to Information Technology Turban, Rainer and Potter
Networking: Discovery, Communication, Collaboration
Wireless, Mobile Computing and Mobile Commerce
Mobile Commerce and Ubiquitous Computing
Computers Are Your Future
Mobile Commerce and Ubiquitous Computing
Presentation transcript:

Mata Kuliah: M0014 / Konsep Sistem Informasi Tahun : 2008 Pertemuan Chapter 07 : Wireless, Mobile Computing, and Mobile Commerce

Bina Nusantara Mahasiswa dapat menerangkan teknologi nirkabel, jaringan komputer nirkabel dan akses internet. (C2) Mahasiswa dapat memberikan contoh tentang mobile computing, mobile commerce dan keamanan nirkabel. (C2) Learning Outcomes

Bina Nusantara Wireless Technologies Wireless Computer Networks and Internet Access Mobile Computing and Mobile Commerce Pervasive Computing Wireless Security Membahas kasus dari buku halaman “Philadelphia Adopts a Mesh Network “ Rincian Materi

Introduction to Information Technology  Authors: Turban, Rainer and Potter  Publisher: John Wiley & Sons, Inc.  Slides by: Hellene Bankowski, Professor, Philadelphia University Copyright 2007 John Wiley & Sons, Inc Chapter 74

Wireless, Mobile Computing and Mobile Commerce Copyright 2007 John Wiley & Sons, Inc Chapter 75

Chapter Outline  7.1 Wireless Technologies  7.2 Wireless Computer Networks and Internet Access  7.3 Mobile Computing and Mobile commerce  7.4 Pervasive Computing  7.5 Wireless Security Copyright 2007 John Wiley & Sons, Inc Chapter 76

Learning Objectives  Discuss the various types of wireless devices and wireless transmission media.  Describe Bluetooth, Zigbee, Wi-Fiand WiMax.  Discuss the major M-commerce applications.  Define pervasive computing.  Describe the two technologies underlying pervasive computing. Copyright 2007 John Wiley & Sons, Inc Chapter 77

7.1 Wireless Technologies  Wireless devices are small enough to easily carry or wear, have sufficient computing power to perform productive tasks and can communicate wirelessly with the Internet and other devices. Include PDAs, cellular phones, smart phones. Wireless Application Protocol (WAP) is the standard that enables wireless devices with tiny display screens, low bandwidth connections and minimal memory to access Web-based information and services. Copyright 2007 John Wiley & Sons, Inc Chapter 78

Wireless Technologies (Continued)  Microbrowsers are Internet browsers with a small file size that can work within low- memory constraints of wireless devices and the low bandwidths of wireless networks.  Pager is a one-way, wireless messaging system; it alerts the user when it receives an incoming message. Copyright 2007 John Wiley & Sons, Inc Chapter 79

Wireless Transmission Media  Microwave transmission systems are widely used for high-volume, long-distance, point-to-point communication. Point-to-point has two characteristics: first, the transmitter and receiver must be in view of each other (called line-of-sight); and second, the transmission itself must be tightly directed from transmitter to receiver. Copyright 2007 John Wiley & Sons, Inc Chapter 710

Wireless Transmission Media (Continued)  Satellite transmission systems make use of communication satellites; three types of satellites, each in a different orbit: Geostationary (GEO) Medium-earth-orbit (MEO) Low-earth-orbit (LEO) Copyright 2007 John Wiley & Sons, Inc Chapter 711

Wireless Transmission Media (Continued)  Footprint is the area of earth’s surface reached by a satellite’s transmission – overcomes the limitations of microwave data relay stations.  Broadcast transmission allows satellites to send signals to many receivers at one time.  Propagation delay is a brief pause in transmissions from GEO satellites which make two-way telephone conversations difficult. Copyright 2007 John Wiley & Sons, Inc Chapter 712

Types of Orbits  Geostationary earth orbit (GEO) orbits 22,300 miles directly above the equator and maintains a fixed position; excellent for TV signals.  Medium earth orbit (MEO) are located 6,000 miles above the earth’s surface and move; used for GPS and are less expensive.  Low earth orbit (LEO) are 400 to 700 miles above the surface and move much quicker so they require many to have adequate coverage; use for telephone. Copyright 2007 John Wiley & Sons, Inc Chapter 713

Global Positioning Systems  GPS is a wireless system that uses satellites to enable users to determine their position anywhere on the earth; supported by 24 shared satellites worldwide. Copyright 2007 John Wiley & Sons, Inc Chapter 714

Internet over Satellite (IOS)  IOS allows users to access the Internet via GEO satellites from a dish mounted on the side of their homes. Only option available in some areas. Can have a propagation delay or be disrupted by environmental conditions. Copyright 2007 John Wiley & Sons, Inc Chapter 715

Radio  Radio transmission uses radio-wave frequencies to send data directly between transmitters and receivers.  Satellite radio (digital radio) offers uninterrupted, near CD-quality music that is beamed to your radio from space. (XM satellite radio uses GEO; Sirius uses MEO)  Infrared light is red light that is not commonly visible to human eyes; common uses in remote control units for TVs, VCRs, DVDs, CD players. Copyright 2007 John Wiley & Sons, Inc Chapter 716

7.2 Wireless Computer Networks and Internet Access  IEEE standards for wireless computer networks include: IEEE (Bluetooth) for wireless personal area networks (PANs) and (Zigbee). IEEE (Wi-Fi) for wireless local area networks (WLANs) IEEE (Wi-Max) for wireless metropolitan area networks (WMANs) IEEE (proposed) for wireless wide area networks (WWANs). Copyright 2007 John Wiley & Sons, Inc Chapter 717

Bluetooth  Bluetooth is used to create small PANs: can link up to 8 devices within a 10-meter area; uses low-power, radio-based communications; can transmit up to 1 Mbps.  Personal area network (PAN) is a computer network used for communication among computer devices (e.g., telephones, PDAs, smart phones) close to one person. Copyright 2007 John Wiley & Sons, Inc Chapter 718

Zigbee  Zigbee targets applications that need low data transmission rates and low power consumption: moves data only one-fourth as fast as Bluetooth; Can handle hundreds of devices at once; most promising application is meter reading.  Current focus is to wirelessly link sensors that are embedded into industrial controls, medical devices, smoke and intruder alarms and building and home automaton. Copyright 2007 John Wiley & Sons, Inc Chapter 719

Wireless Local Area Networks (WLANs)  WLAN requires a transmitter with an antenna, called a wireless access point, that connects to a wired LAN or to satellite dishes that provide an Internet connection. Wireless network interface card (NIC) is needed to communicate wirelessly and has a built-in radio and antenna. Hotspot a wireless access point that provides service to a number of users within a small geographical perimeter (up to a couple hundred feet). Copyright 2007 John Wiley & Sons, Inc Chapter 720

WLANs (Continued)  IEEE standard for WLANs is the family, known as Wi-Fi, for Wireless Fidelity a can transmit up to 54 Mbps within 30 meters; b can transmit up to 11 Mbps within meters; g – 54 Mbps, 50 meters. Benefits are low cost and simple Internet access. Copyright 2007 John Wiley & Sons, Inc Chapter 721

Problems with Wi-Fi  Roaming – users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services.  Security – because Wi-Fi uses radio waves, it is difficult to protect.  Cost – commercial Wi-Fi services are low cost but not free and each service has its own fees and separate accounts for users to logon. Copyright 2007 John Wiley & Sons, Inc Chapter 722

WiMax  Worldwide Interoperability for Microwave Access, popularly known as WiMax, is the name for IEEE standard Wireless access range of up to 31 miles; Data transfer rate of 75 Mbps; Secure system that offers voice and video. Copyright 2007 John Wiley & Sons, Inc Chapter 723

7.3 Mobile Computing and Mobile Commerce  Mobile computing refers to real-time, wireless connection between a mobile device and other computing environments, such as the Internet or an intranet and have 2 major characteristics that differentiate it from other forms of computing. 1 Mobility – users carry a mobile device and can initiate a real-time contact with other systems from wherever they happen to be. 2 Broad reach – users can be reached instantly when they carry an open mobile device. Copyright 2007 John Wiley & Sons, Inc Chapter 724

Mobile Computing (Continued)  The 2 characteristics, mobility and broad reach, create five value-added attributes that break the barriers of geography and time: Ubiquity; Convenience; Instant connectivity; Personalization; Localizations of products and services. Copyright 2007 John Wiley & Sons, Inc Chapter 725

Mobile Commerce  M-commerce refers to e-commerce (EC) transactions that are conducted in a wireless environment especially via the Internet.  The development of m-commerce is driven by the following factors: Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement Copyright 2007 John Wiley & Sons, Inc Chapter 726

Mobile Commerce Applications  Financial Services  Mobile Banking  Wireless Electronic Payment Systems  Micropayments  Mobile (Wireless) Wallets  Wireless Bill Payments Copyright 2007 John Wiley & Sons, Inc Chapter 727

Intrabusiness Applications  Accessing Information Mobile Portal aggregates and provides content and services for mobile users that include news, sports, , entertainment, travel and restaurant information; community services; and stock trading. Voice Portal is a Web site with an audio interface and can also be accessed through a standard or cell phone. Copyright 2007 John Wiley & Sons, Inc Chapter 728

Location-based Applications  Shopping from Wireless Devices – online vendors allow customers to shop from wireless devices.  Location-based Advertising is when marketers know the current locations and preferences of mobile users, they can send user-specific advertising messages to wireless devices about nearby shops, malls and restaurants.  Location-based Services provide information to customers about local services and conditions via cell phones. Copyright 2007 John Wiley & Sons, Inc Chapter 729

Wireless Telemedicine  Telemedicine is the use of modern telecommunications and information technologies for the provision of clinical care to individuals located at a distance and for the transmission of information to provide that care. Copyright 2007 John Wiley & Sons, Inc Chapter 730

Telemedicine Applications  Storing and transferring digital images from one location to another.  Allowing a patient in one location to consult with a medical specialist in another in real time through videoconferencing.  Using robots to perform remote surgery, in most cases, the patient is in a rural area and the specialist is in an urban area. Copyright 2007 John Wiley & Sons, Inc Chapter 731

Wireless Telemedicine (Continued)  Wireless technology has advanced the ways in which prescriptions are filled.  Mobile communications has provided a valuable telemedicine application for emergency situations that arise during airplane flights. Copyright 2007 John Wiley & Sons, Inc Chapter 732

Telemetry Applications  Telemetry is the wireless transmission and receipt of data gathered from remote sensors. Technicians can use telemetry to identify maintenance problems in equipment; Doctors can monitor patients and control medical equipment from a distance; Car manufacturers use telemetry for remote vehicle diagnosis and preventive maintenance. Copyright 2007 John Wiley & Sons, Inc Chapter 733

7.4 Pervasive Computing  Pervasive Computing (Ubiquitous computing) is invisible “everywhere computing” that is embedded in the objects around us – the floors, the lights, our cars, washing machine, microwave oven, cell phones, clothes, and so on. (e.g., smart home, smart appliances) Copyright 2007 John Wiley & Sons, Inc Chapter 734

Radio Frequency Identification  RFID Technology allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.  Auto-ID create a network that connects computers to objects, an Internet of “things”.  This Internet of things will provide the ability to track individual items as they move from factories to store shelves to recycling facilities.  The problem with RFID has been the expense. Copyright 2007 John Wiley & Sons, Inc Chapter 735

Wireless Sensor Networks (WSNs)  Wireless Sensor Networks are networks of interconnected, battery-powered, wireless sensors called motes that are placed into the physical environment. Motes collect data from many points over an extended space. Each mote contains processing, storage, and radio frequency sensors and antennaes. Motes provide information that enables a central computer to integrate reports of the same activity from different angles within the network. Copyright 2007 John Wiley & Sons, Inc Chapter 736

Wireless Sensor Networks (Continued)  Mesh Network is composed of motes, where each mote wakes up for a fraction of a second when it has data to transmit and then relays that data to its nearest neighbor.  An advantage is if one mote fails, another one can pick up the data.  Very efficient and reliable. Copyright 2007 John Wiley & Sons, Inc Chapter 737

7.5 Wireless Security  Four major threats Rogue access point is an unauthorized access point to a wireless network. War driving is the act of locating WLANs while driving around a city or elsewhere. Eavesdropping refers to efforts by unauthorized users to try to access data traveling over wireless networks. RF (Radio frequency) jamming is when a person or a device intentionally or unintentionally interferes with your wireless network transmissions. Copyright 2007 John Wiley & Sons, Inc Chapter 738

Wireless Security (Continued)  To avoid those previously mentioned threats implement the following solutions: Detect unauthorized access points with devices from NetStumbler; Block your SSIDs; Encrypt wireless transmissions with Wi-Fi Protected Access (WPA); Know who is using your network and what they are doing on it; Automatically shift to a different wireless channel when there is interference. Copyright 2007 John Wiley & Sons, Inc Chapter 739

Copyright 2007 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for error, omissions, or damages caused by the use of these programs or from the use of the information herein. Copyright 2007 John Wiley & Sons, Inc Chapter 740

Bina Nusantara Berlanjut ke Pertemuan 23 Terima Kasih