Download presentation
Presentation is loading. Please wait.
Published byJanice Conley Modified over 9 years ago
1
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce
2
Announcements Business Week – Tuesday Class Cancelled (Attend a session) - RegisterRegister Project 4 (Excel Refresher) due Tonight by midnight Project 5 (Scenario Manager) due next Thursday by midnight
3
Review – Chapter 7 E-Commerce Pure vs. Partial B2B, B2C, C2C Mechanisms Benefits/Limitations Issues in E-Tailing Disintermediation Order Fulfillment Ethical/Legal Issus
4
CHAPTER OUTLINE 8.1 Wireless Technologies 8.2 Wireless Computer Networks and Internet Access 8.3 Mobile Computing 8.4 Mobile Commerce 8.5 Pervasive Computing 8.6 Wireless Security
5
Chapter Opening Case: The Battle for the Mobile Wallet Source: Slavoljub Pantelic/ Shutterstock
6
8.1 Wireless Technologies © Oleksiy Makymenko/Alamy © ecco/Shutterstock © PhotoEdit/Alamy© Såndor Kelemen/iStockphoto How many smart phones are now being used worldwide?
7
Capabilities of Wireless Devices Cellular telephonyE-mail access BluetoothShort message service Wi-FiInstant messaging Digital cameraText messaging Global positioning systemOrganize MP3 music player Video player Address bookInternet access What problems might companies have with personal smartphones?
8
Wireless Transmission Media Microwave Transmission Satellite transmission Geostationary Orbit (GEO) Internet over Satellite Middle Earth Orbit (MEO) Global Positioning System Low Earth Orbit (LEO) Satellite Communications
9
How the Global Positioning System Works © Toh Kheng Ho/Age Fotostock America, Inc.
10
Wireless Transmission Media (continued) Radio Satellite Radio Infrared
11
8.2 Wireless Computer Networks and Internet Access 1. Short range wireless networks 2. Medium range wireless networks 3. Wide area wireless networks
12
8.2.1 Short Range Wireless Networks Bluetooth Near-field Communications © ZOONAR GMBH LBRF/Age Fotostock America, Inc.
13
8.2.2 Medium Range Wireless Networks Wireless fidelity (Wi-Fi) Wireless access point Hotspot Wireless network interface card
14
8.2.2 Medium Range Networks: Wireless Mesh Networks
15
8.2.3 Wide-Area Wireless Networks Cellular Radio 1st Generation 2nd Generation 3rd Generation (3G) 4 th Generation (4G) Wireless Broadband or WiMax (WiFi on steroids)
16
8.3 Mobile Computing Basis of mobile computing: Mobility Broad reach Five value-added mobile computing attributes: 1.Ubiquity 2.Convenience 3.Instant connectivity 4.Personalization 5.Localization of products and services
17
8.4 Mobile Commerce The development of m-commerce is driven by the following factors: Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement
18
Mobile Commerce Applications Location-Based Applications and Services Financial Services Intrabusiness Applications Accessing Information Telemetry Applications
19
Location-Based Applications Shopping from Wireless Devices Location-based Advertising Location-based Services
20
Financial Services Frederic Lucano/Stone/Getty Images, Inc. Wireless Electronic Payment System Mobile Banking Wireless Bill Payments Mobile Wallet Micropayments
21
Intrabusiness Applications Example: UPS
22
Accessing Information Mobile Internet Apps vs. Web Browser: who’s winning? http://responsivedesignchecker.com/
23
Telemetry Examples of Telemetry Applications Medicine Automobiles Find My iPhone Telemedicine predicted in 1924
24
8.5 Pervasive Computing Radio frequency identification (RFID) Wireless Sensor Networks (WSNs)
25
Bar Code, QR Code, RFID Source: Media Bakery
26
Small RFID Reader and Tag Coming soon to a supermarket near you See videovideo © Ecken, Dominique/ Keystone Pressedienst/Zuma Press
27
8.6 Wireless Security Four major threats 1. Rogue access point 2. War driving 3. Eavesdropping 4. RF (Radio frequency) jamming © Sebastian/AgeFotostock America, Inc.
28
Chapter Review Describe the four main types of wireless transmission media. Microwave Satellite Radio Infrared
29
Chapter Review Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Short-range: near field communications Medium-range: WiFi technologies Long-range: Cellular networks
30
Chapter Review (continued) Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Location-Based Applications and Services Financial Services Intrabusiness Applications Accessing Information Telemetry Applications
31
Chapter Review (continued) Define pervasive computing, describe one technologies that underlies this technology, and provide at least one example of how a business can utilize each one. Radio Frequency Identification
32
Chapter Review (continued) Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. 1. Rogue access point 2. War driving 3. Eavesdropping 4. RF (Radio frequency) jamming
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.