310 likes | 446 Views
CHAPTER 7. Wireless, Mobile Computing and Mobile Commerce. LEARNING OBJECTIVES. Discuss the various types of wireless devices and wireless transmission media. Describe wireless networks according to their effective distance. Define mobile computing and mobile commerce.
E N D
CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce
LEARNING OBJECTIVES • Discuss the various types of wireless devices and wireless transmission media. • Describe wireless networks according to their effective distance. • Define mobile computing and mobile commerce.
LEARNING OBJECTIVES (continued) • Discuss the major m-commerce applications. • Define pervasive computing and describe two technologies that underlie this technology. • Discuss the four major threats to wireless networks.
Wireless Technologies • Wireless devices – without wires • Mobile devices – location changes over time • Benefits? • Problems?
Capabilities of Wireless Devices Cellular telephony E-mail access Bluetooth Short message service Wi-Fi Instant messaging Digital camera Text messaging Global positioning system Organizer MP3 music player Scheduler Video player Address book Internet access Calculator QWERTY keyboard
Wireless Transmission Media • Infrared • Signals sent through air as light waves • Devices can be easily moved, relocated without wiring changes • Must have a line of site, objects can block transmission
Wireless Transmission Media (continued) • Radio • High bandwidth • Signals may pass through walls • Not Secure (anyone can hear or get signal) • Satellite Radio
Wireless Transmission Methods • Microwave transmission • Towers transmit data through air waves • No physical barriers, don’t need cable or wire • High bandwidth (fast) and relatively inexpensive • Must be within line of site – a direct path from tower to tower must be unblocked. Due to the curve of the earth, towers can’t be more then 30 miles apart. • Like sound and light, can bounce, be reflected, etc. • Could be impacted by weather and/or environment • Not secure!
Wireless Transmission Media • Satellite transmission • Can carry signal around the world • High bandwidth • One satellite can have one upload of data, but many downloads • Also restricted to line of sight • Expensive • Time lag - propagation delay (can be over 22,300 miles up and 22,300 miles down)
Wireless Transmission Media • Satellite transmission • Geostationary Orbit (GEO) • Medium Earth Orbit (MEO) • Low Earth Orbit (LEO) • Global Positioning System (GPS) • Internet Over Satellite (IOS)
Wireless Computer Networks and Internet Access • Short range wireless networks • Medium range wireless networks • Wide area wireless networks
Short Range Wireless Networks • Bluetooth • Ultra-wideband • Near-field Communications
Medium Range Wireless Networks • Wireless fidelity (Wi-Fi) • Wireless access point • Hotspot • Wireless network interface card • Benefits? • Problems?
Mobile Computing • Refers to real-time, wireless connection between a mobile device and other computing environments, such as the Internet and an intranet.
Mobile Computing • Value-added attributes that break the barriers of geography and time: • Ubiquity • Convenience • Instant connectivity • Personalization • Localization of products and services
Mobile Commerce (m-Commerce) • Refers to electronic commerce transactions that are conducted in a wireless environment, especially via the Internet.
Mobile Commerce (m-Commerce) • Driven by the following factors: • Widespread availability of mobile devices • No need for a PC • The “Cell phone culture” • Declining prices • Bandwidth improvement
Example of mobile commerce Car key and the Speedpass
Pervasive Computing • Ubiquitous/Pervasive Computing is invisible “everywhere computing” that is embedded in the objects around us – the floors, the lights, our cars, washing machine, microwave oven, cell phones, clothes, and so on. (e.g., smart home, smart appliances)
Anatomy of a Bar Code Radio frequency identification (RFID)
RFID Dust by Hitachi Human hair
Product with bar code and RFID tag RFID tag Bar code
Wireless Security • Four major threats • Rogue access point • War driving • Eavesdropping • RF (Radio frequency) jamming