Download presentation
Presentation is loading. Please wait.
Published byMervyn Montgomery Modified over 8 years ago
1
CHAPTER 7 1 Wireless, Mobile Computing and Mobile Commerce
2
Opening Case 2 Wireless in the developing world Neither corruption nor coups nor kidnappings can prevent Denis O’Brien from expanding his cell phone business, Digicel, in the developing world. Digicel does business in 27 countries and territories, and it dominates the mobile business in many of them. The company spends millions on its network and yet cuts other costs so that it can offer deep discounts to customers—charging up to 80 percent less than competitors for the phones and 50 percent for calls. The Business Problem How does Digicel successfully start and grow mobile telephone businesses in such dangerous places?
3
Opening Case Discussion 1. Is it appropriate for organizations such as Digicel to establish infrastructures for communication systems without local regulatory approval? Why or why not? 2. Provide additional examples of how use of wireless technology could improve the quality of life of residents of Papua New Guinea or Haiti. 3
4
Opening Case What we learned from this case? Wireless is a term that is used to describe telecommunications in which electromagnetic waves, rather than some form of wire or cable, carry the signal between communicating devices (for example, computers, personal digital assistants, cell phones, and so on). The opening case describes the huge impacts that one wireless technology, cellular telephones, can have on people’s lives. The term wireless means exactly what it says: without wires. The term mobile refers to something that changes its location over time. Wireless networks can be mobile or fixed. 4
5
Agenda 7.1 Wireless Technologies 7.1.1 Wireless devices 7.1.2 Wireless transmission media 7.2 Wireless Computer Networks and Internet Access 7.2.1 Short-range wireless networks 7.2.2 Medium-range wireless networks 7.2.3 Wide-area wireless networks 5
6
7.3 Mobile Computing and Mobile Commerce 7.3.1 Mobile computing 7.3.2 Mobile commerce 7.3.3 Mobile commerce applications 7.4 Pervasive Computing 7.4.1 Definition 7.4.2 Radio-Frequency Identification (RFID) 7.4.3 Wireless sensor networks(WSNS) 7.5 Wireless Security 6 Agenda
7
CHAPTER OVERVIEW 7
8
LEARNING OBJECTIVES 1. Discuss today’s wireless devices and wireless transmission media. (7.1) 2. Describe wireless networks according to their effective distance.(7.2) 3. Define mobile computing and mobile commerce and describe m-commerce applications. (7.3) 4. Define pervasive computing and its underlying technologies.(7.4) 5. Examine threats to wireless networks.(7.5) 8
9
7.1 Wireless Technologies 7.1.1 Wireless devices 7.1.2 Wireless transmission media 9
10
7.1.1 Wireless devices Wireless devices: are small enough to carry or wear, have sufficient computing power to perform productive tasks and can communicate wirelessly with the Internet and other devices. Wireless Application Protocol (WAP) is the standard that enables wireless devices to access Web- based information and services. 10
11
11 Blackberry Curve Treo 750 Motorola Q Apple iPhone Examples of today’s wireless devices
12
One downside of smart phones is that people can use them to copy and pass on confidential information. For example, if you were an executive at Intel, would you want workers snapping pictures of their colleagues with your secret new technology in the background? Unfortunately, managers think of these devices as phones, not as digital cameras that can transmit wirelessly. 12
13
7.1.2 Wireless transmission media Major types of wireless media: ◦ microwave ◦ satellite ◦ radio ◦ infrared 13
14
14 Microwave Transmission Microwave transmission systems are widely used for high-volume, long-distance, point-to-point communication. Point-to-point has two characteristics: first, the transmitter and receiver must be in view of each other (called line-of-sight); and second, the transmission itself must be tightly directed from transmitter to receiver.
15
Satellite transmission systems make use of communication satellites; three types of satellites, each in a different orbit. Satellite radio (digital radio) offers uninterrupted, near CD- quality music that is beamed to your radio from space. XM satellite radio and Sirius have agreed to merge as of mid-2007. 15
16
Global Positioning System: a wireless system that uses MEO satellites to enable users to determine their position anywhere on the earth. 16 How the Global Positioning System Works
17
Radio transmission uses radio-wave frequencies to send data directly between transmitters and receivers. Infrared light is red light that is not commonly visible to human eyes; common uses are in remote control units for TVs, VCRs, DVDs, CD players, or communications between mobile phones (PDA’s) or PC’s communicating to peripherals like printers. 17
18
7.2 Wireless Computer Networks and Internet Access 7.2.1 Short-range wireless networks 7.2.2 Medium-range wireless networks 7.2.3 Wide-area wireless networks 18
19
7.2.1 Short-range wireless networks Short-range wireless networks generally have a range of 100 feet or less. Bluetooth Ultra-wideband Near-field Communications 19
20
Bluetooth: Can link up to eight devices within a 30-foot area and transmit up to 2.1 megabits per second. Ultra-wideband: high-bandwidth wireless technology with transmission speeds in excess of 100 megabits per second. Near-field Communications: shortest range of any wireless network; designed to be embedded in mobile devices such as cell phones and credit cards. Near-field communications (NFC) is the enabling technology behind (a) contactless payments with credit cards and (b) the substitution of a cell phone for a credit card (the wave of the future). 20
21
7.2.2 Medium-range wireless networks Medium-range wireless networks are the familiar wireless local area networks (WLANs).The most common type of medium-range wireless network is Wireless Fidelity (Wi-Fi). Wireless access point Hotspot Wireless network interface card 21
22
Wireless fidelity (Wi-Fi): used in wireless local area networks Wireless access point: a transmitter with an antenna Hotspot: a geographical perimeter within which a wireless access point provides wireless access for users Wireless network interface card: enables mobile devices to communicate wirelessly. 22
23
23 Diagram of wireless hotspot A Wi-Fi Hotspot
24
7.2.3 Wide-area wireless networks Wide-area wireless networks connect users to each other and to the Internet over geographically dispersed distances. Cellular Radio ◦ 1st Generation ◦ 2nd Generation ◦ 2.5 Generation ◦ 3rd Generation (3G) ◦ 4 th Generation (4G) Wireless Broadband or WiMax 24
25
Cellular Radio: use radio waves to provide two-way communication ◦ 1 st Generation: analog signals and low bandwidth ◦ 2 nd Generation: digital signals for voice and data communication up to 10 Kbps ◦ 2.5 Generation: digital voice and data communication up to 144 Kbps ◦ 3 rd Generation: digital voice and data communication up to 384 Kbps when device is moving at walking pace; 128 Kbps when moving in car; and 2Mbps when device is stationary ◦ 4th generation (4G) is still under development and does not fall under one defined technology or standard. Wireless Broadband or WiMax: access range up to 31 miles and data-transfer rate up to 75 Mbps 25
26
26 Cellular Radio Network
27
27 Golden Gate bridge A Wi-Max Hotspot
28
7.3 Mobile Computing and Mobile Commerce 7.3.1 Mobile computing 7.3.2 Mobile commerce 7.3.3 Mobile commerce applications 28
29
7.3.1 Mobile computing Mobile computing: refers to real-time, wireless connection between a mobile device and other computing environments, such as the Internet and an intranet. Two characteristics 1.mobility 2.broad reach Five value-added attributes that break the barriers of geography and time. 1.Ubiquity 2.Convenience 3.Instant connectivity 4.Personalization 5.Localization of products and services 29
30
Mobility: users carry a mobile device and can initiate a real-time contact with other systems from wherever they happen to be. Broad reach: users can be reached instantly when they carry an open mobile device. 30
31
Ubiquity: mobile device can provide information and communications regardless of user’s location. Convenience and Instant Connectivity: Internet-enabled mobile device makes it easy and fast to access the Web, intranets, and other mobile devices without booting up a PC or placing a call. Personalization: information can be customized and sent to individual consumers (e.g., as a short message service). Localization of products and services: knowing a user’s location helps companies advertise their products and services. 31
32
7.3.2 Mobile commerce Mobile commerce refers to electronic commerce transactions that are conducted in a wireless environment, especially via the Internet. The development of m-commerce is driven by the following factors: ◦ Widespread availability of mobile devices ◦ No need for a PC ◦ The “Cell phone culture” ◦ Declining prices ◦ Bandwidth improvement 32
33
33 Examples of Mobile Commerce Car key and the ESSO Speedpass The E-Zpass process for gated toll roads
34
7.3.3 Mobile commerce applications Financial services Intra-business applications Location-based applications Telemetry applications 34
35
Financial Services ◦ Mobile Banking ◦ Wireless Electronic Payment Systems ◦ Micropayments ◦ Mobile (Wireless) Wallets ◦ Wireless Bill Payments 35
36
Mobile Banking: Many banks now offer access to financial & account information, the ability to transfer funds, and receive alerts on digital cell phones, smart phones, and PDAs. Wireless Electronic Payment Systems: these systems transfer mobile phones into secure, self-contained purchasing tools capable of instantly authorizing payments over the cellular network. Micropayments: electronic payments for small purchase amounts (generally less than $10). Mobile (Wireless) Wallets: technologies that allow cardholders to make purchases with a single click from their mobile devices. Wireless Bill Payments: Services provided by banking institutions that allow customers to pay their bills directly from their cell phones. 36
37
Intra-business applications: ◦ Mobile Portal: aggregates and provides content and services for mobile users that include news, sports, email, entertainment, travel and restaurant information; community services; and stock trading. ◦ Voice Portal: is a Web site with an audio interface and can also be accessed through a standard phone or cell phone. 37
38
Location-Based Applications ◦ Shopping from Wireless Devices ◦ Location-based Advertising ◦ Location-based Services 38
39
Shopping from Wireless Devices – online vendors allow customers to shop from wireless devices. Location-based Advertising is when marketers know the current locations and preferences of mobile users, they can send user-specific advertising messages to wireless devices about nearby shops, malls and restaurants. Location-based Services provide information to customers about local services and conditions via cell phones. 39
40
Telemetry is the wireless transmission and receipt of data gathered from remote sensors. ◦ Technicians can use telemetry to identify maintenance problems in equipment; ◦ Doctors can monitor patients and control medical equipment from a distance; ◦ Car manufacturers use telemetry for remote vehicle diagnosis and preventive maintenance. 40 Automotive Telemetry: The On Star system from GM
41
7.4 Pervasive Computing 7.4.1 Definition 7.4.2 Radio-Frequency Identification (RFID) 7.4.3 Wireless sensor networks(WSNS) 41
42
7.4.1 Definition Pervasive Computing (Ubiquitous computing) is invisible “everywhere computing” that embedded in the objects around us – the floors, the lights, our cars, washing machine, microwave oven, cell phones, clothes, and so on. (e.g., smart home, smart appliances) 42
43
7.4.2 Radio-Frequency Identification Radio frequency identification (RFID) technology allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals. 43 Various RFID Tags RFID tracking tag from the movie “Mission Impossible”
44
7.4.3 Wireless sensor networks(WSNS) Wireless sensor networks (WSNs) are networks of interconnected, battery-powered, wireless sensors that are placed into the physical environment. 44
45
7.5 Wireless Security Four major threats ◦ Rogue access point ◦ War driving ◦ Eavesdropping ◦ RF (Radio frequency) jamming 45
46
Rogue access point: is an unauthorized access point to a wireless network. War driving: is the act of locating WLANs while driving around a city or elsewhere. Eavesdropping: refers to efforts by unauthorized users to try to access data traveling over wireless networks. RF (Radio frequency) jamming: is when a person or a device intentionally or unintentionally interferes with your wireless network transmissions. 46
47
Closing Case Hats off to Top Hat for learning There are many different types of software and hardware available that all converge in the classroom. Students come with different types of devices, such as notebooks, laptops, and cellular telephones, from many suppliers, with different capabilities. Students like to search the Internet for materials and work with different products or reference material. Universities, colleges, and other educational organizations have fixed budgets for education, and are looking at ways to further engage their students. Teaching faculty use videos, web-based media, as well as other types of material in the classroom. The Business Problem How can the schools take advantage of the existing technology in use by their students, without investing in further hardware and software themselves? 47
48
Closing Case Discussion Think about the last few courses that you have taken and the type of work that you completed. How could it have been done using your smart phone, laptop, or an e- book reader? What underlying infrastructure, hardware, and software would be needed to effectively use monocleCat or Liquid Textbooks? 48
49
Closing Case The Results It is still too early to tell the impact of monocleCAT and Liquid Textbooks—perhaps you can get your school to field test these products. However, these products may be useful at schools such as Blyth Academy, a Toronto-based school that has decided to use readers rather than textbooks. Commencing in September 2009, the school provided students with Kindle readers from Amazon. The school also purchased licences for textbooks so that students could access the textbooks from the school’s central server. It (and other schools) could also purchase licences for customized on-line texts such as those provided by Symtext. This would result in less use of paper, more tailored educational products, and the ability to use both readers and smart phones that already belong to students. 49
50
Copyright © 2011 John Wiley & Sons Canada, Ltd. All rights reserved. Reproduction or translation of this work beyond that permitted by Access Copyright (the Canadian copyright licensing agency) is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons Canada, Ltd. The purchaser may make back-up copies for his or her own use only and not for distribution or resale. The author and the publisher assume no responsibility for errors, omissions, or damages caused by the use of these files or programs or from the use of the information contained herein. Copyright 50
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.