Sie sind auf Seite 1von 19

SSSSSSSSSSSSSSSS

Introduction
History
Mobile computing devices
Functions of mobile computing
Wireless network
Security & privacy
Future mobile & wireless network
Advantage and Disadvantage
Conclusion
Mobile computing is a
technology that allows
transmission of data,
voice and video via a
computer or any other
wireless enabled
device without having
to be connected to a
fixed physical link.
Developments in mobile
technology have led to many
different types of mobile
computing. Though mobile
computing technology has
existed since the 1980s,it was in
the late 1990s and 2000s that
advances in the technology put
it into the hands of numerous
consumers.
A mobile computing
device is any device that is
created
using mobile components,
such as mobile hardware
and software. Mobile
computing
devices are portable
devices capable of
operating, executing and
providing services and
applications like a
typical computing device
•User mobility
•Network mobility
•Device mobility
User mobility refers to a user who has
access to the same or similar
telecommunication service at different
place.

Network mobility is the mobility of


an entire network that changes its
point of attachment to internet as a
single unit.
Device mobility is a new feature
of CUCM allows CUCM
endpoint to be dynamically
reconfigured based on their
actual location as determine by
the IP address that is used by
the device.
Wireless network is
a network set up by using
radio signal frequency to
communicate among
computers and
othernetwork devices.
Sometimes it's also
referred to as WiFi
network or WLAN.
This network is getting
popular nowadays due to
easy to setup feature and
no cabling involved.
WiFi The most commonly
used and least expensive
wireless access service is
WiFi . WiFi uses radio waves
to broadcast an internet
signal from a wireless router
to the immediate
surrounding area.S If the
wireless network is not
encrypted,anyone can jump
on. WiFi is commonly used in
public places to create
hotspots.
An alternative to WiFi is cellular
broadband . • This type of mobile
computing technology utilizes a
cellular modern or air card to connect
to cell towers for internet access. •
The air card fits into the PC card or
Express card slot of a notebook or
laptop,delivering internet access on
the go.
Cloud computing
provides access to a
network-like
environment with
various applications and
virtually unlimited
resources so that field
representatives , can
utilize website resource
rather than being
supplied with company
software and data.
Keep data as secured by
protecting data .
 optional biometric
fingerprint scanners.
 optional smart card
locking systems
 Tracking and Recovery
service
• Improved radio technology and
antennas
▫ smart antennas, beam forming
▫ dynamic spectrum allocation
• Core network convergence
▫ IP-based, quality of service,
mobile IP
• Ad-hoc technologies
▫ spontaneous communication,
power saving, redundancy
• Simple and open service
platform
▫ more service providers, not
network operators only
• Matching a device with your mobile
business should be easy.
You can choose from:
• Ultra-portables
• Mobile engineering workstation
• Easily expandable memory
• Disk space
• Fast processors for optimum
performance
 Battery consumption hindrance.
 Inefficient bandwidth in transmission.
 Network stability.
 Interoperability problem.
 Protection constraints.
With mobile computing, people can
work from the comfort of any location
they wish to as long as the connection
and the security concerns are properly
factored. In the same light, the presence
of high speed connections has also
promoted the use of mobile
computing.

Das könnte Ihnen auch gefallen