SlideShare ist ein Scribd-Unternehmen logo
1 von 24
1
ANURAG COLLEGE OF ENGINEERING
Aushapur(V), Ghatkesar(M), Medchal(D),T.S
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
MOBILE COMPUTING
Under the guidance of :-
Mr. S. Vijay Kumar
Assistant Professor.
Presented by:
Mr. P. ESHWAR 19PQ1A0560
CONTENTS
1. What is mobile computing?
2. Comparison to wired networks
3. Why go mobile?
4. Types of wireless devices
5. Mobile objects
6. Security & Privacy
7. Applications of mobile computing
8. Challenges
9. Future of mobile computing
10. Conclusion
11. References
2
What Is Mobile Computing?
What is computing?
Operation of computers (according to oxfords advance
learner’s dictionary)
What is the mobile?
That someone /something can move or be moved easily and
quickly from place to place
What is mobile computing?
Users with portable computers still have network
connections while they move
3
What Is Mobile Computing?
(Cont.)
 Mobile Computing is an umbrella term used to describe
technologies that enable people to access network services
anyplace, anytime, and anywhere.
4
Comparison to Wired Net.
Wired Networks
-high bandwidth
-low bandwidth variability
-can listen on wire
-high power machines
-high resource machines
-need physical access(security)
-low delay
-connected operation
Mobile Networks
-low bandwidth
-high bandwidth variability
-hidden terminal problem
-low power machines
-low resource machines
-need proximity
-higher delay
-disconnected operation
5
Why Go Mobile?
• Enable anywhere/anytime connectivity
• Bring computer communications to areas without
pre-existing infrastructure
• Enable mobility
• Enable new applications
• An exciting new research area
6
Types of Wireless Devices
 Laptops
 Palmtops
 PDAs
 Cell phones
 Pagers
 Sensors
7
Mobile Objects
1. A mobile object is
some code that
carries a state
8
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. that lives on a host
9
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
10
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
11
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
5. and barred when
untrusted
12
Mobile Objects (Cont.)
1. A mobile object is some
code that carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
5. and barred when
untrusted
6. and will refuse to go to
untrustworthy places
13
Mobile Objects (Cont.)
7. Mobile objects can
talk to their friends
14
Mobile Objects (Cont.)
7. Mobile objects can
talk to their friends
8. but only by co-
operation of the hosts
15
Security & Privacy
Threats:
 Wi-Fi networks are a shared network that makes it easier
for others to eavesdrop on your communication.
 Devices are Stolen and tampered.
 Cryptography.
 Connection
16
Security & Privacy
Solutions:
 Secure Web Browsing
 Use secure, encrypted sessions.
 Secure Internet Transactions
 Use UCI’s VPN to encrypt your network traffic.
 Always use a Personal Firewall.
 Set the firewall to deny.
 ALL incoming connections.
17
Applications of Mobile
Computing (Cont.)
 For Estate Agents
 In courts
 In companies
 Stock Information Collection/Control
 Credit Card Verification
 Taxi/Truck Dispatch
 Electronic Mail/Paging
18
Challenges
 Disconnection
 Low bandwidth
 High bandwidth variability
 Low power and resources
 Security risks
 Wide variety terminals and devices with different
capabilities
 Device attributes
 Fit more functionality into single, smaller device
19
Future of Mobile Computing
 Use of Artificial Intelligence
 Integrated Circuitry -> Compact Size
 Increases in Computer Processor speeds
20
Conclusion
Mobile computing has severe limitations
- however, it is far from impossible, and technology improves
all the time
Lots of challenges
- some have (good) solutions, many others are still waiting to
be solved
21
References
http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/
vk5/report.html
http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol1/vk5/art
icle1.html
http://www.cs.ucsb.edu/~ebelding/courses/284/w04/slides/int
ro.pdf
http://www.ansa.co.uk/ANSATech/ANSAhtml/98-
ansa/external/9807tb/9807mose.pdf
http://www.danishtechnology.dk/it/9238
22
23
QURIES ?
24
THANK YOU…

Weitere ähnliche Inhalte

Ähnlich wie Mobile-Computing ppt.ppt

presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computingBalakumar232
 
Mobile computing
Mobile computingMobile computing
Mobile computingnajwa92
 
Mobile computing
Mobile computingMobile computing
Mobile computingAnuja Mane
 
Mobile computing
Mobile computingMobile computing
Mobile computingKelly Zhang
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Infomanjjb
 
Iot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampIot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampYogesh Ojha
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkIOSR Journals
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computingBhupesh Rawat
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESIJNSA Journal
 

Ähnlich wie Mobile-Computing ppt.ppt (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
G011123539
G011123539G011123539
G011123539
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Iot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampIot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCamp
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
MobileComputing by Mudasir
MobileComputing by MudasirMobileComputing by Mudasir
MobileComputing by Mudasir
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 
7 (1)
7 (1)7 (1)
7 (1)
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Internet Of Things(IoT).pptx
Internet Of Things(IoT).pptxInternet Of Things(IoT).pptx
Internet Of Things(IoT).pptx
 

Kürzlich hochgeladen

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Mobile-Computing ppt.ppt

  • 1. 1 ANURAG COLLEGE OF ENGINEERING Aushapur(V), Ghatkesar(M), Medchal(D),T.S DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MOBILE COMPUTING Under the guidance of :- Mr. S. Vijay Kumar Assistant Professor. Presented by: Mr. P. ESHWAR 19PQ1A0560
  • 2. CONTENTS 1. What is mobile computing? 2. Comparison to wired networks 3. Why go mobile? 4. Types of wireless devices 5. Mobile objects 6. Security & Privacy 7. Applications of mobile computing 8. Challenges 9. Future of mobile computing 10. Conclusion 11. References 2
  • 3. What Is Mobile Computing? What is computing? Operation of computers (according to oxfords advance learner’s dictionary) What is the mobile? That someone /something can move or be moved easily and quickly from place to place What is mobile computing? Users with portable computers still have network connections while they move 3
  • 4. What Is Mobile Computing? (Cont.)  Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. 4
  • 5. Comparison to Wired Net. Wired Networks -high bandwidth -low bandwidth variability -can listen on wire -high power machines -high resource machines -need physical access(security) -low delay -connected operation Mobile Networks -low bandwidth -high bandwidth variability -hidden terminal problem -low power machines -low resource machines -need proximity -higher delay -disconnected operation 5
  • 6. Why Go Mobile? • Enable anywhere/anytime connectivity • Bring computer communications to areas without pre-existing infrastructure • Enable mobility • Enable new applications • An exciting new research area 6
  • 7. Types of Wireless Devices  Laptops  Palmtops  PDAs  Cell phones  Pagers  Sensors 7
  • 8. Mobile Objects 1. A mobile object is some code that carries a state 8
  • 9. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. that lives on a host 9
  • 10. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 10
  • 11. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 11
  • 12. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 5. and barred when untrusted 12
  • 13. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 5. and barred when untrusted 6. and will refuse to go to untrustworthy places 13
  • 14. Mobile Objects (Cont.) 7. Mobile objects can talk to their friends 14
  • 15. Mobile Objects (Cont.) 7. Mobile objects can talk to their friends 8. but only by co- operation of the hosts 15
  • 16. Security & Privacy Threats:  Wi-Fi networks are a shared network that makes it easier for others to eavesdrop on your communication.  Devices are Stolen and tampered.  Cryptography.  Connection 16
  • 17. Security & Privacy Solutions:  Secure Web Browsing  Use secure, encrypted sessions.  Secure Internet Transactions  Use UCI’s VPN to encrypt your network traffic.  Always use a Personal Firewall.  Set the firewall to deny.  ALL incoming connections. 17
  • 18. Applications of Mobile Computing (Cont.)  For Estate Agents  In courts  In companies  Stock Information Collection/Control  Credit Card Verification  Taxi/Truck Dispatch  Electronic Mail/Paging 18
  • 19. Challenges  Disconnection  Low bandwidth  High bandwidth variability  Low power and resources  Security risks  Wide variety terminals and devices with different capabilities  Device attributes  Fit more functionality into single, smaller device 19
  • 20. Future of Mobile Computing  Use of Artificial Intelligence  Integrated Circuitry -> Compact Size  Increases in Computer Processor speeds 20
  • 21. Conclusion Mobile computing has severe limitations - however, it is far from impossible, and technology improves all the time Lots of challenges - some have (good) solutions, many others are still waiting to be solved 21