0% found this document useful (0 votes)
1 views

Mobile Computing

Uploaded by

tulipsnote
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Mobile Computing

Uploaded by

tulipsnote
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Information Assurance and Security 2

4 pics, 1-2

GA
words

Play
Who’s playing?

Iya Paula Kaye Rose

Start
How To Play

No. 1 No. 2 No. 3

Each item will depicts 4 The goal is to figure out Those who will quickly
pictures, the player will what will be the answer get the correct answer
then guess what is it based on the hint which will be the winner.
portraying. is length of the word and
the picture.
GA
ME

_____E
________G
GA
ME

MOBILE
COMPUTING
GA
ME

___M_________
GA
ME

COMMUNICATION
GA
ME

_____O____
GA
ME

TECHNOLOGY
MOBILE
COMPUTI
LECT
URE

object
#1
To define what is Mobile Computing

ives
#2

#3
To discuss the Advantage and Disadvantages of Mobile Computing
To identify the concepts of Mobile Computing
#4 To specify the application of Mobile Computing

Start
DEFIN
ITION

MOBILE
COMPUTIN
Mobile Computing is a technology that provides an environment that enables
users to transmit data from one device to another device without the use of any
physical link or cables.

G
It is a technology that allows transmission of data, voice and video via computer
or any other wireless enabled device without having to be connected to a fixed
physical link. It is the use of portable computing devices (such as laptop and
handheld computers) in conjunction with mobile communications technologies
to enable users to access the Internet and data on their home or work
computers from anywhere in the world.
DEFIN
ITION
MOBILE
is a generic term describing ability to use

COMPUTI
the technology to wirelessly connect to and
use centrally located information and/or
application software through the application

NG
of small, portable, and wireless computing
and communication devices. It provides
decentralized (distributed) computations on
diversified devices, systems, and networks,
which are mobile, synchronized, and
interconnected via mobile communication
standards and protocols.
MAIN CONCEPT OF
MOBILE COMPUTING

Mobile Communication Mobile Hardware Mobile Software


CON
CEPT

MOBILE
COMMUNICA
specifies a framework that is responsible for the
working of mobile computing technology. In this case,
mobile communication refers to an infrastructure that
TION
ensures seamless and reliable communication among
wireless devices.

Nex
t
CON
CEPT

MOBILE
COMMUNICA
framework consists
communication devices such as
of

protocols, services, bandwidth, and


TION
portals necessary to facilitate and
support the stated services. These
devices are responsible for
delivering a smooth communication
process.
MOBILE COMMUNICATION
CAN BE DIVIDED IN THE
FOLLOWING FOUR TYPES:
#1
Fixed and Wired

#2
Fixed and Wireless

#3
Mobile and Wired

#4
Mobile and Wireless
TY
PE
S four types of mobile
communication
TY
PE

fixed and
S

In Fixed and Wired configuration, the devices are fixed at a

wired
position, and they are connected through a physical link to
communicate with other devices.

Example: Desktop Computer.

Nex
t
TY
PE

fixed and
S

In Fixed and Wireless configuration, the

wireless
devices are fixed at a position, and they
are connected through a wireless link to
make communication with other
devices.

Example: Communication Towers,


WiFi router

Nex
t
TY
PE

mobile and
S

In Mobile and Wired configuration,

wired
some devices are wired, and some
are mobile. They altogether make
communication with other devices.

Example: Laptops

Nex
t
TY
PE

mobile and
S

In Mobile and Wireless configuration, the

wireless
devices can communicate with each other
irrespective of their position. They can also
connect to any network without the use of
any wired device.

Example: WiFi Dongle

Nex
t
CON
CEPT

MOBILE
HARDWARE
consists of mobile devices or device components that can be used
to receive or access the service of mobility.

devices are inbuilt with a receptor medium that can send and
receive signals. These devices are capable of operating in full-
duplex. It means they can send and receive signals at the same
time. They don't have to wait until one device has finished
communicating for the other device to initiate communications.cess
the service of mobility.
CON
CEPT

MOBILE
HARDWA
Examples of mobile hardware can
be smartphones, laptops, portable
PCs, tablet PCs, Personal Digital

RE
Assistants, etc.

They don’t have to wait until one


device has finished
communicating for the other
device to initiate communications.
CON
CEPT

MOBILE
a program that runs on mobile hardware. This is designed to

SOFTWARE
deal capably with the characteristics and requirements of
mobile applications. This is the operating system for the
appliance of mobile devices.

This is an essential component that operates the mobile device.


CON
CEPT

MOBILE
SOFTWAR
Since portability is the main factor
of this concept, this type of
computing ensures that users are

E
not tied or pinned to a single
physical location, but are able to
operate from anywhere. It
incorporates all aspects of
wireless communications.
APPLICATIONS OF
MOBILE COMPUTING
#1 Web or Internet #4 Entertainment
Access Services

#2 Global Position System #5 Educational Services


(GPS)

#3
Emergency Services
ADVANTAGES
MOBILE
COMPUTING
ADVANTAGES OF
MOBILE COMPUTING
#1 Location Flexibility #4 Ease of Research

#2 Saves Time #5 Entertainment

#3
Enhanced Productivity #6 Streamlining of
Business Processes
ADVAN
TAGES
location
flexibility
This has enabled users to work
from anywhere as long as there is
a connection established. A user
can work without being in a fixed
position. Their mobility ensures
that they are able to carry out
numerous tasks at the same time
and perform their stated jobs.
ADVAN
TAGES

saves time
The time consumed or wasted
while travelling from different
locations or to the office and back,
has been slashed. One can now
access all the important
documents and files over a secure
channel or portal and work as if
they were on their computer.
ADVAN
TAGES

enhanced
productivity
Users can work efficiently
and effectively from
whichever location they find
comfortable. This in turn
enhances productivity level.
ADVAN
TAGES

ease of
Research has been made easier, since
research
users earlier were required to go to
field and research for facts and feed
the

them back into the system. It has also


made it easier for field officers and
researchers to collect and feed data
from wherever they are without making
unnecessary trips to and from the office
of the field.
ADVAN
TAGES
entertainment
Video and audio recordings can now be
streamed on-the-go using mobile
computing. It’s easy to access a wide
variety of movies, educational and
informative material. With the improvement
and availability of high speed data
connections at considerable cost, one is
able to get all the entertainment they want
as they browse the internet for streamed
data.
ADVAN
TAGES
streamlining of
business processes
Business processes are now easily
available through secured connections.
Looking into security issues, adequate
measures have been put in place to ensure
authentication of the user accessing the
services. Some business functions can be
run over secure links and sharing of
information between business partners can
also take place.
DISADVANTAGES
MOBILE
COMPUTING
DISADVANTAGES OF
MOBILE COMPUTING
#1 Location Flexibility

#2
Saves Time

#3 Enhanced Productivity
DISADVA
NTAGES

quality of
connectivity
One of the disadvantages is that the
mobile devices will need either WiFi
connectivity or mobile netowrk
connectivity such as GPRS, 3G and in
some countries even 4G connectivity that
is why this is a disadvantage because if
you are not near any of these connections
your access to the Internet is very limited.
DISADVA
NTAGES

security concerns
Mobile VPNs are unsafe to connect
to, and also syncing devices might
also lead to security concerns,
accessing a WiFi network can also
be risky becasue WPA and WEP
security can be bypassed easily.
DISADVA
NTAGES

power consumption
Due to the use of batteries in
these devices, these do not tend
to last long, if in a situation where
there is no source of power for
charging then that will certainly
be a let down.
QUES
TIONS
THAN
K YOU

thank

You might also like