2
Most read
7
Most read
20
Most read
An Seminar By  …  Gaurav koriya I T  II YEAR
Table  Of  Contents
Mobile Computing Mobile (Moving) + Computing ( using  computer ) .  Mobile Computing   is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere Introduction
Mobile computing In recent years, distributed computer  has become the norm, especially after the advent of the internet. Today, technological advances are shaping a new computing environment where the user is free from the need to work at a specific location, and is even enabled to work while on the move.  This new paradigm is often called  MOBILE COMPUTING.
A device that moves Between different geographical locations Between different networks Between different applications Such as Palm-top, laptop,  Cell phones A device due to which mobile communication is possible  Modems. What  Is  Mobility ?
 
Mobile Computing Devices Display Only Info Pad model: limited portable processing Like a cordless phone. Laptop Computer ThinkPad model: significant portable processing, operates independently of wireless infrastructure. Personal Digital Assistant  [PDA] : Somewhere between these extremes .  a handheld  device  that combines computing, telephone/ fax , Internet and  networking features .  
 
Wireless  Network Technology : Inside It   “ Wireless Overlay” Network
Mobile  IP
Wireless  Networks
 
Security and Privacy  Security and privacy Threats:  Wi-Fi networks are a shared network that makes it easier for others to eavesdrop on your communication. Devices are Stolen and tampered. Cryptography. Connection.
Security and privacy Solutions:  Secure Web Browsing Use secure, encrypted sessions.  Secure Internet Transactions Use UCI’s VPN to encrypt your network traffic. Always use a Personal Firewall Set the firewall to deny ALL incoming connections.
Detecting man in the middle trying to steal information Each device displays the hash of its public key. The keys are exchanged by Diffie-Hellman protocol. The two hashes of the keys are compared. If the two match then there is no man in the middle. If the two don’t match it’s assumed there is a man in the middle. Never store Sensitive Data on mobile  devices unless absolutely necessary.
Disconnected  Operations  AND  Various  Challenges
Disconnected Operations   Low bandwidth  High bandwidth  variability  Low power and resources  Security risks  Wide variety terminals and devices with different capabilities Fit more functionality into single, smaller device Disconnection
LIMITATIONS  Insufficient bandwidth   If the user needs access to a network they must resort to slow wireless WAN systems primarily intended for telephone use. Higher speed wireless LANs are only available in specific sites Security standards   When working mobile one is dependent on public networks, requiring careful use of VPNs. Power consumption   Mobile computers must rely entirely on battery power. Combined with compact size, this means unusually expensive batteries be used Transmission interferences   Weather and terrain problems as well as distance-limited connection exist with some technologies. Reception in tunnels and some buildings is poor . Potential health hazards   Potential health damage from cellular radio frequency emission is not known yet. However, more car accidents are related to drivers who were talking through a mobile device. Also, cell phones may interfere with sensitive medical devices . Human interface with device   As, screens are often too small. Keyboards are impractical, especially one-handed, and alternate methods such as speech or handwriting recognition require training.
Future Aspects Track your friends on a map by picking up GPS signals from other Android phones,  so you can search for nearby parties.  Geolife This app will send you reminders based on location instead of time. For example, as you approach a grocery store, it will remind you to pick up milk.
Mobile computing has severe limitations - however, it is far from impossible, and technology improves all the time Lots of challenges - some have (good) solutions, many others are still   waiting to be solved Conclusion
Thank You…………

More Related Content

PPTX
Mobile computing
PPTX
Computer architecture
PPTX
Mobile computing
PPTX
presentation on hacking
PPTX
Chemistry of Alkali Metals MANIK
PPTX
Artificial passenger
PPTX
Mobile computing
PPT
Data Structure and Algorithms
Mobile computing
Computer architecture
Mobile computing
presentation on hacking
Chemistry of Alkali Metals MANIK
Artificial passenger
Mobile computing
Data Structure and Algorithms

What's hot (20)

PPTX
Introduction To Mobile Computing
PPT
Mobile computing -- Introduction
DOCX
Computer science seminar topics
PPTX
Mobile computing
PPT
Mobile computing
PPTX
Seminar presentation on 5G
PPT
Internet of Things and its applications
PPTX
Introduction to computer network
PPTX
Mobile Computing (Part-1)
PPT
THE INTERNET OF THINGS
PPTX
5G Wireless Technology
PPTX
Internet of things startup basic
PDF
Internet of Things (IoT) - We Are at the Tip of An Iceberg
PDF
20 Latest Computer Science Seminar Topics on Emerging Technologies
PPTX
A basic PPT on Internet Of Things(IOT)
PPTX
IoT presentation
PPTX
Internet of Things (IoT) - Seminar ppt
PPTX
Internet of Things (IoT) - IK
PPTX
Presentation mobile computing
Introduction To Mobile Computing
Mobile computing -- Introduction
Computer science seminar topics
Mobile computing
Mobile computing
Seminar presentation on 5G
Internet of Things and its applications
Introduction to computer network
Mobile Computing (Part-1)
THE INTERNET OF THINGS
5G Wireless Technology
Internet of things startup basic
Internet of Things (IoT) - We Are at the Tip of An Iceberg
20 Latest Computer Science Seminar Topics on Emerging Technologies
A basic PPT on Internet Of Things(IOT)
IoT presentation
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - IK
Presentation mobile computing
Ad

Viewers also liked (20)

PPT
Architecture of Mobile Computing
PDF
IT6601 MOBILE COMPUTING
PDF
Mobile revolution presentation
PPT
Mobile computing
PPT
Mobile computing
DOC
Mobile Computing I-Unit Notes
PPTX
Mobile Cloud Computing
PPS
PDF
Mobile Communications Sajay K R
PDF
Mobile revolution powerpoint pdf
PPTX
Mobile communication
PDF
Module1 Mobile Computing Architecture
PDF
Simplify Internet of Things with an Intelligent Gateway
PPT
Mobile Computing UNIT-I TO III
PPTX
Wireless communication
PDF
W-LAN (Wireless Local Area Network)
PPTX
Generation of mobile communication systems
PPT
Wireless networking
PPTX
Wireless communication
PPTX
Wireless technology
Architecture of Mobile Computing
IT6601 MOBILE COMPUTING
Mobile revolution presentation
Mobile computing
Mobile computing
Mobile Computing I-Unit Notes
Mobile Cloud Computing
Mobile Communications Sajay K R
Mobile revolution powerpoint pdf
Mobile communication
Module1 Mobile Computing Architecture
Simplify Internet of Things with an Intelligent Gateway
Mobile Computing UNIT-I TO III
Wireless communication
W-LAN (Wireless Local Area Network)
Generation of mobile communication systems
Wireless networking
Wireless communication
Wireless technology
Ad

Similar to Mobile Computing (20)

PPT
Mobile computing
PPTX
Mobile computing
PPT
Mobile computing
PPT
MOBILE COMPUTING
PPTX
Mobile computing-Unit 1,GSM
PDF
mobilecomputing2s-17080915542656 (2).pdf
PDF
mobilecomputing2s-176787808098142656.pdf
PDF
mobile computing - Unit 1 Material.pdf
PPTX
Presentation1
PPTX
Presentation1
PPTX
Mobile computing
PPT
Mobile com 21 3 2020
DOCX
Mobile Computing by Tapesh Chalisgaonkar
PPTX
PDF
Basics of telecommunication and networking
PPTX
COMPUTER NETWORKING.pptx
PPTX
Subhacloud computing ppt presentationand cloud computing
PPTX
Mobile computing atif azmio
PDF
A Study Mobile Computing
PDF
Small computing & Mobile Computing
Mobile computing
Mobile computing
Mobile computing
MOBILE COMPUTING
Mobile computing-Unit 1,GSM
mobilecomputing2s-17080915542656 (2).pdf
mobilecomputing2s-176787808098142656.pdf
mobile computing - Unit 1 Material.pdf
Presentation1
Presentation1
Mobile computing
Mobile com 21 3 2020
Mobile Computing by Tapesh Chalisgaonkar
Basics of telecommunication and networking
COMPUTER NETWORKING.pptx
Subhacloud computing ppt presentationand cloud computing
Mobile computing atif azmio
A Study Mobile Computing
Small computing & Mobile Computing

More from gaurav koriya (8)

PPSX
Intrusion detection system
PDF
Hacking techniques
PPS
pointers 1
PPT
ALL ABOUT SQL AND RDBMS
PPT
INDIA N heritage -THE PUNJAB
PPT
ip address
PPT
About ip address
PPT
Katrin Aand Shruti Pps
Intrusion detection system
Hacking techniques
pointers 1
ALL ABOUT SQL AND RDBMS
INDIA N heritage -THE PUNJAB
ip address
About ip address
Katrin Aand Shruti Pps

Recently uploaded (20)

PPTX
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Altius execution marketplace concept.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
NewMind AI Journal Monthly Chronicles - August 2025
PDF
Streamline Vulnerability Management From Minimal Images to SBOMs
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Blending method and technology for hydrogen.pptx
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Presentation - Principles of Instructional Design.pptx
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
The AI Revolution in Customer Service - 2025
A symptom-driven medical diagnosis support model based on machine learning te...
Rapid Prototyping: A lecture on prototyping techniques for interface design
NewMind AI Weekly Chronicles – August ’25 Week IV
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Build automations faster and more reliably with UiPath ScreenPlay
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Altius execution marketplace concept.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
NewMind AI Journal Monthly Chronicles - August 2025
Streamline Vulnerability Management From Minimal Images to SBOMs
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Blending method and technology for hydrogen.pptx

Mobile Computing

  • 1. An Seminar By … Gaurav koriya I T II YEAR
  • 2. Table Of Contents
  • 3. Mobile Computing Mobile (Moving) + Computing ( using computer ) . Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere Introduction
  • 4. Mobile computing In recent years, distributed computer has become the norm, especially after the advent of the internet. Today, technological advances are shaping a new computing environment where the user is free from the need to work at a specific location, and is even enabled to work while on the move. This new paradigm is often called MOBILE COMPUTING.
  • 5. A device that moves Between different geographical locations Between different networks Between different applications Such as Palm-top, laptop, Cell phones A device due to which mobile communication is possible Modems. What Is Mobility ?
  • 6.  
  • 7. Mobile Computing Devices Display Only Info Pad model: limited portable processing Like a cordless phone. Laptop Computer ThinkPad model: significant portable processing, operates independently of wireless infrastructure. Personal Digital Assistant [PDA] : Somewhere between these extremes . a handheld  device  that combines computing, telephone/ fax , Internet and  networking features .  
  • 8.  
  • 9. Wireless Network Technology : Inside It “ Wireless Overlay” Network
  • 12.  
  • 13. Security and Privacy Security and privacy Threats: Wi-Fi networks are a shared network that makes it easier for others to eavesdrop on your communication. Devices are Stolen and tampered. Cryptography. Connection.
  • 14. Security and privacy Solutions: Secure Web Browsing Use secure, encrypted sessions. Secure Internet Transactions Use UCI’s VPN to encrypt your network traffic. Always use a Personal Firewall Set the firewall to deny ALL incoming connections.
  • 15. Detecting man in the middle trying to steal information Each device displays the hash of its public key. The keys are exchanged by Diffie-Hellman protocol. The two hashes of the keys are compared. If the two match then there is no man in the middle. If the two don’t match it’s assumed there is a man in the middle. Never store Sensitive Data on mobile devices unless absolutely necessary.
  • 16. Disconnected Operations AND Various Challenges
  • 17. Disconnected Operations Low bandwidth High bandwidth variability Low power and resources Security risks Wide variety terminals and devices with different capabilities Fit more functionality into single, smaller device Disconnection
  • 18. LIMITATIONS Insufficient bandwidth If the user needs access to a network they must resort to slow wireless WAN systems primarily intended for telephone use. Higher speed wireless LANs are only available in specific sites Security standards When working mobile one is dependent on public networks, requiring careful use of VPNs. Power consumption Mobile computers must rely entirely on battery power. Combined with compact size, this means unusually expensive batteries be used Transmission interferences Weather and terrain problems as well as distance-limited connection exist with some technologies. Reception in tunnels and some buildings is poor . Potential health hazards Potential health damage from cellular radio frequency emission is not known yet. However, more car accidents are related to drivers who were talking through a mobile device. Also, cell phones may interfere with sensitive medical devices . Human interface with device As, screens are often too small. Keyboards are impractical, especially one-handed, and alternate methods such as speech or handwriting recognition require training.
  • 19. Future Aspects Track your friends on a map by picking up GPS signals from other Android phones, so you can search for nearby parties. Geolife This app will send you reminders based on location instead of time. For example, as you approach a grocery store, it will remind you to pick up milk.
  • 20. Mobile computing has severe limitations - however, it is far from impossible, and technology improves all the time Lots of challenges - some have (good) solutions, many others are still waiting to be solved Conclusion