Professional Documents
Culture Documents
Mobile Computing SW (Sadun)
Mobile Computing SW (Sadun)
Computing
Sandun Wijayarathne
mail@thesandun.com
Introduction to Mobile Computing
Sandun Wijayarathne
Overview
Introduction
Mobility?
Features
Devices
Limitations
Sandun Wijayarathne
Introduction
Mobile Computing =
Mobile (moving) +
Computing (using computer)
Human-Computer interaction
Expected to be transported during
normal usage
Introduction to Mobile Computing
Sandun Wijayarathne
Mobility?
A device that moves between different,
geographical locations
networks
applications
Ex: palmtop, laptop, smart phones etc.
Sandun Wijayarathne
Features
Mobile,
Hardware
Software
Communication
Sandun Wijayarathne
Devices
Categories
Portable computers
Mobile phones
Wearable computers
Sandun Wijayarathne
Portable Computers
Compacted, lightweight
units
Mostly including a full
character set keyboard
Software that may be
parameterized
Ex: laptops, notebooks,
notepads, etc.
Introduction to Mobile Computing
Sandun Wijayarathne
Mobile Phones
Restricted key set
Primarily intended
vocal communications
But not restricted to it
Ex: feature-phones,
smart phones,
phonepads, etc.
Introduction to Mobile Computing
Sandun Wijayarathne
Wearable Computers
Worn by the bearer under,
with or on top of clothing
Mostly limited to functional
keys
Primarily intended as
incorporation of software
agents
Ex: watches, wristbands,
keyless implants, etc.
Introduction to Mobile Computing
Sandun Wijayarathne
Limitations
Range & Bandwidth
Slower than direct cable
connections
GPRS and EDGE, and more
recently HSDPA and HSUPA 3G
and 4G LTE
Available within range of
commercial cell phone towers
Hi-speed LANs are inexpensive
but have very limited range
Introduction to Mobile Computing
Sandun Wijayarathne
10
Limitations
Security standards
Dependent on public networks,
requiring careful use of VPN
Security is a major concern while
concerning the mobile computing
standards on the fleet
Can easily attack the VPN through
a huge number of networks
interconnected through the line
Introduction to Mobile Computing
Sandun Wijayarathne
11
Limitations
Application-Based Threats
Ex: Malware, Spyware, Privacy, Malicious apps etc.
Web-based Threats
Ex: Phishing, Drive-by downloads, Browser exploits
etc.
Network Threats
Ex: Network exploits, Wi-Fi sniffing etc.
Physical Threats
Ex: Lost or stolen devices etc.
Introduction to Mobile Computing
Sandun Wijayarathne
12
Limitations
Security and privacy solutions
Enforced password protection
Encryption
Secure web browsing
Secure internet transactions
Firewalls, Virus guard software
Etc.
Introduction to Mobile Computing
Sandun Wijayarathne
13
Limitations
Power consumption
Rely entirely on battery
power
Compact size means
unusually expensive batteries
must be used to obtain the
necessary battery life
Introduction to Mobile Computing
Sandun Wijayarathne
14
Limitations
Transmission interferences
Weather, terrain, and the
range from the nearest signal
point can all interfere with
signal reception
Reception in tunnels, some
buildings, and rural areas is
often poor
Introduction to Mobile Computing
Sandun Wijayarathne
15
Limitations
Potential health hazards
Use mobile devices while
driving are often distracted
from driving and more likely to
be involved in traffic accidents
May interfere with sensitive
medical devices
Mobile phone radiation and
health?
Introduction to Mobile Computing
Sandun Wijayarathne
16
Limitations
Human interface with device
Small screens and keyboards
means hard to use
Alternate input methods
require training
speech recognition
handwriting recognition
Gestures
Introduction to Mobile Computing
Sandun Wijayarathne
17
Questions?
Sandun Wijayarathne
18
Thank You!
Sandun Wijayarathne
19