Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless, Mobile Computing, and Mobile Commerce

Similar presentations


Presentation on theme: "Wireless, Mobile Computing, and Mobile Commerce"— Presentation transcript:

1 Wireless, Mobile Computing, and Mobile Commerce
Chapter 10 © Oleksiy Makymenko/Alamy Wireless, Mobile Computing, and Mobile Commerce

2 Chapter Outline 10.1 Wireless Technologies 10.2 Wireless Computer Networks and Internet Access 10.3 Mobile Computing and Mobile Commerce 10.4 Pervasive Computing 10.5 Wireless Security

3 Learning Objectives Identify advantages and disadvantages of each of the four main types of wireless transmission media. Explain how businesses can use technology employed by short-range, medium-range, and long-range networks, respectively. Provide a specific example of how each of the five major m-commerce applications can benefit a business. Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one. Explain how the four major threats to wireless networks can damage a business.

4 Introduction Opening Case: Big Wheel Mobile Truck & Square Wireless
Without wires Mobile Something that changes its location over time Not all wireless networks are mobile. © ecco/Shutterstock

5 10.1 Wireless Technologies
How many students carry wireless devices? History of the cell phone What are advantages and disadvantages of wireless devices? Advantages of wireless devices Small enough to easily carry or wear Have sufficient computing power to perform productive tasks Can communicate wirelessly with the Internet and other devices Disadvantages Information system security Privacy issues William Andrew/Photographer’s Choice/Getty Images, Inc.

6 Table 10.1 Advantages and Disadvantages of Wireless Media

7 Wireless Transmission Media
Microwave transmission systems Widely used for high-volume, long-distance, point-to-point communication Require line-of-sight Transmitter and receiver are in view of each other Due to curvature of the earth, microwave towers cannot be spaced more than 30 miles apart Tightly directed transmission from transmitter to receiver Susceptible to environmental interference

8 Wireless Transmission Media
Satellite transmission Compared to microwave systems, satellite has much larger footprint The area of Earth’s surface reached by a satellite’s transmission Receive and transmit data via line-of-sight Utilize broadcast transmission Sending signals to many receivers at one time Subject to propagation delay and environmental influences Three main types Geostationary (GEO) Medium-earth-orbit (MEO) Low-earth-orbit (LEO) Figure 10.1 Comparison of satellite footprints. (Source: Kelly Rainer.)

9 Table 10.2 Three Basic Types of Telecommunications Satellites
Satellite radio GPS around the world European Union GPS China Beidou GPS Russian GLONASS GPS Iridium Global Star

10 Wireless Transmission Media
Radio transmission Uses radio-wave frequencies to send data directly between transmitters and receivers Advantages Signals can travel through objects (no line-of-sight) Require inexpensive devices Support high-speed data transmission Disadvantages Possible electrical interference problems Signal can be intercepted by anyone with similar equipment using the same frequency

11 Wireless Transmission Media
Infrared Utilize infrared light Red light not commonly visible to human eyes Try using your digital camera to “see” it Use for short-distance connections Common uses are in remote control units for TVs, VCRs, DVDs, CD players You can use the digital camera on your cell phone to see if your TV remote control is working. Digital cameras are sensitive to infrared light, so if you point your TV remote control at your cell phone, its digital camera will pick up the infrared beam if the remote is working © Sergej Razvodovskij/Age Fotostock America, Inc.

12 10.2 Wireless Computer Networks and Internet Access
Wireless networks can be categorized by their effective distance Short range Medium range Wide area © STOCKBROKERXTRA/Age Fotostock America, Inc.

13 Short-Range Wireless Networks
Range: 100 feet or less Bluetooth Link up to eight devices within a 30-foot area and transmit up to 2.1 mbps Ultra-wideband (UWB) High-bandwidth wireless technology with transmission speeds in excess of 100 mbps Examples: Timedomain, Parking Near-field communications (NFC) Shortest range of any wireless network Embedded in mobile devices such as cell phones and credit cards

14 Medium-Range Wireless Networks
Wireless fidelity (Wi-Fi) For wireless LANs (WLANs) IEEE Standard a, b, g, n, ac Wi-Fi direct Support peer-to-peer communications similar to Bluetooth MiFi A small, portable wireless device that provides users with a permanent Wi-Fi hotspot wherever they go Super Wi-Fi A wireless network proposal that creates long-distance wireless Internet connections Wireless mesh networks Use multiple Wi-Fi access points to create a wide area network Wireless fidelity (Wi-Fi): used in wireless local area networks Wireless access point: a transmitter with an antenna Hotspot: a geographical perimeter with in which a wireless access point provides wireless access for users Wireless network interface card: enables mobile devices to communicate wirelessly.

15 Wide-Area Wireless Networks
Connect users to each other and to the Internet over geographically dispersed distances Cellular radio network Two-way radio communications over a cellular network of base stations with seamless handoffs Wireless broadband Worldwide Interoperability for Microwave Access (WiMAX) IEEE Standard Provides wireless access range of up to 31 miles

16 Figure 10.5 Cell Phone Communications
The cell phone communicates with radio antennas, or towers, placed within adjacent geographic areas called cells Image Source; © Engine Images-Fotolia.com.

17 10.3 Mobile Computing and Mobile Commerce
Real-time, wireless connection between a mobile device and other computing environments, such as the Internet or an intranet Characteristics Mobility Users can initiate a real-time contact with other systems from anywhere using a mobile device Broad reach Users with a mobile device can be reached instantly

18 Mobile Computing Five value-added attributes: Ubiquity
Connect anywhere regardless of user’s location Convenience and Instant connectivity Easy and fast access to the Web, intranets, and other mobile devices Personalization Information can be customized and sent to individual consumers Localization of products and services Knowing a user’s location helps companies advertise their products and services

19 Mobile Commerce Mobile commerce (m-commerce)
Electronic commerce transactions that are conducted in a wireless environment, especially via the Internet Factors enabling m-commerce Widespread availability of mobile devices Declining prices of wireless devices Bandwidth improvement Mobile commerce refers to electronic commerce transactions that are conducted in a wireless environment, especially via the Internet.

20 Mobile Commerce Applications
Location-based applications and services Location-based advertising Sending user-specific advertising messages concerning nearby shops, malls, and restaurants to consumers’ wireless devices Example: NAVTEQ Location-based services Provide information that is specific to a given location Example : CM-map

21 Mobile Commerce Applications
Financial services Mobile banking Access to financial and account information Wireless payments Make payments for products or services Micropayments Electronic payments for small purchase amounts (generally less than $10) Wireless wallets Make purchases with a single click from mobile devices Bill payment services Allow users to pay bills directly from their cell phones

22 Mobile Commerce Applications
Intrabusiness applications Using wireless technology within an organization Accessing information Mobile portal Aggregates and provides content and services for mobile users Example: Yahoo! Mobile Voice portal A Web site with an audio interface that can also be accessed through a standard phone or cell phone Example: iPing

23 Mobile Commerce Applications
Telemetry applications Wireless transmission and receipt of data gathered from remote sensors Examples: Find my iPhone, OnStar, Sync, Blue Link

24 10.4 Pervasive Computing Also called ubiquitous computing
Invisible “everywhere computing” that is embedded in the objects around us Smart homes, smart appliances, floors, lights, cars, washing machines, microwave ovens, cell phones, clothes, etc. Media Bakery

25 Radio Frequency Identification
Uses tags with microchips containing data and antenna to transmit radio signals over a short distance to a RFID reader RFID: The future market Types of RFID tags: Active tags Passive tags

26 QR Code Quick response codes
A two-dimensional code, readable by dedicated QR readers and camera phones Improvements over traditional bar code Example: QRStuff Pervasive Computing (Ubiquitous computing) is invisible “everywhere computing” that is embedded in the objects around us – the floors, the lights, our cars, washing machine, microwave oven, cell phones, clothes, and so on. (e.g., smart home, smart appliances) Radio frequency identification (RFID) technology allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals. Wireless sensor networks (WSNs) are networks of interconnected, battery-powered, wireless sensors that are placed into the physical environment.

27 Wireless Sensor Networks (WSNs)
Networks of interconnected, battery-powered, wireless sensors (motes) that are placed into the physical environment Each mote activates for a fraction of a second to transmit data to the nearest neighbor mote until they reach the central computer for processing Example: Nest Lab

28 10.5 Wireless Security Major threats to wireless networks
Rogue access point An unauthorized access point to a wireless network Evil twin attack: User connects to a malicious access point where an attacker could intercept confidential information War driving Locating WLANs while driving around a city or elsewhere Eavesdropping Efforts by unauthorized users to try to access data traveling over wireless networks Radio frequency (RF) jamming A person or a device intentionally or unintentionally interferes with your wireless network transmissions NFC security

29 What’s in IT for ME? Accounting
Use wireless applications to count and audit inventory, control costs, and manage prices Finance Wireless financial services could provide competitive advantages Marketing Utilize location-based services, RFID, and pervasive computing for marketing and advertising activities Production/Operations Management Support communication and collaboration regardless of location for production, control, and safety Human Resources Management Use mobile devices and applications for off-site training MIS Provides wireless infrastructure for employees

30 Closing Case 1: The Battle for the Mobile Wallet
The Problem A Variety of Solutions The Results Questions Given that you can lose a cell phone as easily as a wallet, which do you feel is a more secure way of carrying your personal data? Support your answer. If mobile computing is the next wave of technology, would you ever feel comfortable with handing a waiter or waitress your cell phone to make a payment at a restaurant the way you currently hand over your credit or debit card? Why or why not? What happens if you lose your NFC-enabled smart phone or it is stolen? How do you protect your personal information? In your opinion, is the mobile wallet a good idea? Why or why not?

31 Closing Case 2: A Paperless Airport
The Problem The IT Solution The Results Questions What are the possible disadvantages of Quantas’s RFID system? How could Quantas measure the value of the RFID system? Provide specific examples of metrics that the airline could use to justify the cost of the system. Please also provide nonquantifiable measures that Quantas could use to justify its system.


Download ppt "Wireless, Mobile Computing, and Mobile Commerce"

Similar presentations


Ads by Google