Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 31

INT-418

Lecture 0
Course details
LTP – 3 0 0 [Three lectures]

Text Book
 FUNDAMENTALS OF MOBILE AND PERVASIVE COMPUTING -
MCGRAW HILL EDUCATION - ADELSTEIN FRANK, SANDEEP K.
S. GUPTA, GOLDEN G. RICHARD III, LOREN SCHWIEBERT

 Prerequisite - Computer Networks (CSE306).

© LPU :: INT418 - Mobile Computing


Text Book
Detail of Academic Tasks
INT418

AT1:
AT2:
AT3:
Course Objectives

CO1 :: Evaluate sensor and adhoc networks to develop mobile


computing environment

Mobile adhoc network


CO2 :: identify the working of software mobile
agents over long distances and under different
network conditions

CO3 :: summarize the security aspects in mobile


and wireless networks

CO4 :: classify between types of mobility and


examine theory research in mobility
What is Mobile Computing?
Aspects of mobility

– User mobility: users communicate “anytime,


anywhere, with anyone”
(example: read/write email on web browser)
– Device portability: devices can be connected anytime,
anywhere to the network
What is Mobile Computing?
Mobile means to move from one place to another.

Computing is activity that uses the computer to manage ,


process and communicate the information.

Mobile Computing : A technology that allows


transmission of data, via a computer, without having to
be connected to a fixed physical link.

Mobile computing system are distributed system with


network to communicate between different machines.
Why we are studying this course?
An extension of this technology is the ability to send and
receive data across these cellular networks. This is the
principle of mobile computing.
Cellular Network is formed of some cells, cell covers a geographical region, has a
base station 
Mobile data communication has become a very
important and rapidly evolving technology as it
allows users to transmit data from remote
locations to other remote or fixed locations.

This proves to be the solution to the biggest


problem of business people on the move -
mobility.
Application Areas
Vehicles
Nomadic User
Smart mobile phone
Intelligent house or office
Meeting room/conference
Disaster relief and Disaster alarm
Military / Security
Nomadic Computing
Nomadic computing is the use of mobile computing
technology to connect to the global Internet or use
specific data resources from a stored location while
moving around from one place to another.
Course overview: Networking
Bottom – Up Approach
Unit 1
Adaptive computing and management :
Chapter 1 - Mobile Adaptive Computing
Mobile computing
Adaptability – Transparency, constraints to mobile
computing, Application aware adaptation
Mechanism for adaptation- Adaptation functionality,
Adapting data
Adaptation in applications- How and where can
adaptation be performed ?
Chapter 2- Mobility Management
Mobility management
Location management principles and Techniques-
registration area based location management
Location management Case Studies-Signals and
Antennas
Modulation and Multiplexing
Unit 2
Data dissemination and Context-aware :
Chapter 3- Data dissemination and Management
Chapter 4
Context Aware Computing
Unit 3
Chapter 5 Mobile Middleware
Chapter 7- Finding needed
service
Unit 4
Pervasive Computing :
Chapter 8- Introduction to Adhoc and Sensor
Networks
Chapter 9- Challenges
Chapter 10 protocols
Unit 5
Pervasive approaches and solutions :
 Deployment and configuration,
 Routing - Event driven, periodic, directional, group
communication and synchronization,
Fault Tolerance, reliability and energy efficiency,
Adhoc Routing and routing algorithm,
TinyOS
Chapter 11-
Unit 6
Chapter 12 :Wireless Security
Chapter 14-
Chapter 15- Security in Local Area Network
Chapter 16- Security in Metropolitan Area Network
Chapter 17- Security in Wide Area Networks

You might also like