Chapter 8

Chapter 8

10 CHAPTER Wireless, Mobile Computing, and Mobile Commerce 1 1. Wireless Technologies 2. Wireless Computer Networks and Internet Access

3. Mobile Computing and Mobile Commerce 4. Pervasive Computing 5. Wireless Security Pay more attention to the following slides and corresponding book pages: 9-11; 18;21-25; 35-39; 42; 46-49; 5156; 57 2 >>> 1. Identify advantages and disadvantages of each of the four main types of wireless transmission

media. 2. Explain how businesses can use short-range, medium-range, and long-range wireless networks, respectively. 3. Provide a specific example of how each of the five major m-commerce applications can benefit a business. 3 >>> 4. Describe technologies that underlie pervasive computing, providing examples of how

businesses can utilize each one. 5. Explain how the four major threats to wireless networks can damage a business. 4 OPENING > Mobile Commerce via Telemedicine at the

Miami Childrens Hospital 1. Describe the advantages and the disadvantages of the iPad mobile app for patients. Do the same thing for medical carts and medical kiosks. 2. Describe the advantages and the disadvantages of the iPad mobile app for Miami Childrens Hospital. Do the same thing for medical carts and medical kiosks. 5 10.

1 Wireless Technologies Wireless Devices Dematerialization: Doing more w less Wireless Transmission Media 6

Figure 10.1: Dematerialization with Smartphones 7 Wireless Devices Wireless Devices Provide Three Major Advantages: 1. Small enough to easily carry or wear 2. Sufficient computing power to perform productive tasks. 3. Can communicate wirelessly with the

Internet and other devices. 8 Table 10.1 Advantages & Disadvantages of Wireless Media 9 Wireless Transmission Media: Microwave Advantages of Microware High bandwidth

Relatively inexpensive Disadvantages of Microwave Must have unobstructed line of sight Susceptible to environmental interference 10 Wireless Transmission Media: Satellite Advantages of Satellite High bandwidth

Large coverage area Disadvantages of Satellite Expensive Must have unobstructed line of sight Signals experience propagation delay Must use encryption for security 11 Satellites Three Types of Satellites Circling Earth 1. Geostationary-Earth-Orbit (GEO)

22,300 miles 2. Medium-Earth-Orbit (MEO) 3. Low-Earth-Orbit (LEO) 111 miles to 1,243 miles Footprint Propagation Delay

Internet over Satellite (IoS) 12 Table 10.2: Three Basic Types of Telecommunications Satellites 13 Satellites: GeostationaryEarth-Orbit (GEO)

22,300 miles above earth Stationary relative to a point on Earth Transmission delay (.25 seconds) Longest orbital life (many years) Few Needed for Global Coverage Used for Television Signals Most Expensive to Build and Launch

14 Satellites: Medium-EarthOrbit (MEO) 6,434 miles above earth Satellites moves relative to a point on Earth Negligible transmission delay

Moderate orbital life (6-12 years) Moderate number needed for global coverage Used for Global Positioning Systems Less Expensive to Build and Launch 15 Satellites: Low-Earth-Orbit (LEO) 400-700 miles above earth Move rapidly in relation to a point on Earth

Negligible transmission delay Shortest orbital life (low as 5 years) Large Number Needed for Global Coverage Least Expensive to Build and Launch 16 S ABOUT BUSINESS 10.1 Skybox Imaging Provides Commercial Images from Earths Orbit 1. Describe other applications of Skybox Imaging

(not mentioned in the case). 2. Why might the U.S. government object to Skybox Imagings business? Provide specific examples in your answer. 3. Might other nations object to Skybox Imagings business? If so, which ones, and why? 17 Wireless Transmission Media: Radio Advantages of Radio High bandwidth

Signals pass through walls Inexpensive and easy to install Disadvantages of Radio Creates electrical interference problems Susceptible to snooping unless encrypted 18 Wireless Transmission Media: Infrared Advantages of Infrared Low to medium bandwidth

Disadvantages of Infrared Must have unobstructed line of sight Used only for short distances 19 10. 2 Wireless Computer Networks and Internet Access

Short-Range Wireless Networks Medium-Range Wireless Networks Wide-Area Wireless Networks 20 Short-Range Wireless Networks Bluetooth Bluetooth 1.0 Bluetooth 4.0

Personal Area Network Ultra-Wideband Near-Field Communications 21 Medium-Range Wireless Networks Wireless Fidelity (Wi-Fi) Wireless Mesh Networks 22

Wireless Fidelity (Wi-Fi) Wireless Access Point

Hotspot IEEE Wi-Fi Standards Major Benefits of Wi-Fi Wi-Fi Direct MiFi Super Wi-Fi Wireless Mesh Networks 23 IEEE Wi-Fi Standards Institute of Electrical and Electronics Engineers (IEEE) WiFI Standards

802.11a 802.11b 802.11g 802.11n (b/g/n) 802.11ac 802.11 ad 24 Major Benefits of Wi-Fi Low cost Ability to provide simple Internet access

25 Three Factors Preventing Commercial Wi-Fi Market from Expanding: Roaming Security Cost 26

S ABOUT BUSINESS 10.2 A Wi-Fi Network Provides Communications at the 2014 Winter Olympic Games 1. Describe why wireless communications were critical to the success of the 2014 Winter Olympic Games. Provide specific examples to support your answer. 2. What other potential problems did Avaya have to consider that were not mentioned in this case? Provide specific examples to support your answer.

27 Wide-Area Wireless Networks Cellular Radio Generations of Cellular Technology Evolution Wireless Broadband or WiMAX 28 Figure 10.5: Smart Phone &

GPS system 29 Generations of Cellular Technology Evolution

(1G) First generation (2G) Second generation 2.5G (3G) Third generation (4G) Fourth generation (5G) Fifth generation 30 Wireless Broadband or WiMAX Worldwide Interoperability for

Microwave Access (WiMAX) WiMAX = IEEE Standard 802.16 Wireless access range of up to 31 miles Data transfer rate of up to 75 Mbps A secure system offering voice and video 31 S ABOUT BUSINESS 10.3 A Tiny Cellular Network for a Remote Tribe in Indonesia 1. Describe several advantages of the network

for the villagers. 2. Describe several advantages of the network for the Indonesian government. 32 Wireless and Mobile What the GSM3GHSDPA14GLTE??? 33 10.

3 Mobile Computing and Mobile Commerce Mobile Computing, Mobility, and Broad Reach Mobile Commerce Mobile Commerce Applications 34

Mobility and Broad Reach Mobility and Broad Reach Create Five Value-added Attributes: 1. 2. 3. 4. 5. Ubiquity Convenience Instant connectivity

Personalization Localization of products and services 35 Mobile Commerce Development of M-Commerce is Driven by: Widespread availability of mobile devices Declining prices Bandwidth improvement

36 Mobile Commerce Applications Location-Based Applications and Services Financial Services Intrabusiness Applications Accessing Information Telemetry Applications 37

Location-Based Applications and Services Location-Based Commerce (L-Commerce) Benefits of Location-Based Services for Users Benefits of Location-Based Services for Service Providers 38 Benefits of Location-Based

Services for Users: Request the nearest business or service Receive alerts Find a friend Locating taxis, service personnel, doctors, and rental equipment Tracking objects such as packages and train

boxcars Find information such as navigation, weather, traffic, and room schedules 39 S ABOUT BUSINESS 10.4 Apples iBeacons 1. What other uses for iBeacon can you think of? 2. Other than privacy concerns, what are

other possible disadvantages of the iBeacon app? Provide specific examples to support your answer. 40 Mobile Commerce Applications: Financial Services

Banking Micropayments Money Transfers Wireless Mobile Wallets (M-Wallets) Bill Payment Services 41 Intrabusiness Applications Mobile Computing For Employee

Support: Workflow Applications Dispatch Functions 42 Target Areas for Mobile Delivery and Dispatch Services:

Employee job assignment Transportation Utilities Field service Healthcare Security 43

Accessing Information Mobile Portals Voice Portals 44 Mobile Computing Applications: Telemetry Identify maintenance problems in equipment Monitor medical patients Control medical equipment

remotely Remote vehicle diagnosis & preventive maintenance Find My iPhone 45 10. 4 Pervasive Computing

Radio-Frequency Identification (RFID) Wireless Sensor Networks The Internet of Things 46 Radio-Frequency Identification (RFID) RFID Bar Codes

QR Codes 47 RFID RFID Systems Two Basic Types of RFID Tags Active RFID Tags Passive RFID Tags Compared w bar codes: Bar codes requires line of sight from

scanning device Paper bar codes are easily damaged Identifies the manufacturer and product but not the actual item 48 QR Codes: Advantages Over Bar Codes Store more information Data types stored include numbers, text, URLs, and even Japanese

characters. Smaller because they store information both horizontally and vertically. Read from any direction or angle More resistant to damage 49 S ABOUT BUSINESS 10.5 Marks & Spencer Embraces RFID 1. Describe how RFID technology can generate increased customer satisfaction.

2. What are potential disadvantages to implementing RFID technology in a retailer such as Marks & Spencer? 3. Why did Marks & Spencer initially deploy RFID technology on a limited basis? In your opinion, was this the correct strategy? Why or why not? Be specific. 50 Wireless Sensor Networks Motes Capability of Wireless Sensor

Networks Applications of Wireless Sensor Networks 51 Capability of Wireless Sensor Networks If one mote fails the gap is covered by nearby motes Provides data on activities from different angles

Determine direction of movement Weight of a vehicle Amount of rainfall over a field of crops 52 Applications of Wireless Sensor Networks Digital thermostats for energy efficiency Repair alerts on bridges and oil rigs Real time operating performance reporting in jet engines Warning of produce spoilage

Improve a citys use of utilities Smart/digital water meters Smart electrical meters 53 The Internet of Things (IoT) Capabilities of IoT Examples of IoT Use 54 Capabilities of IoT

Reducing waste, loss, and cost Identifying the need for repair, replacement, or recall Tracking expiration data on perishable items 55 Examples of IoT Use Coke machines A heart monitor implant A farm animal with a biochip

transmitter An automobile tire pressure 56 10. 5 Wireless Security Four Major Threats to Wireless Networks

Rogue Access Point (Evil Twin) War Driving Eavesdropping Radio Frequency Jamming 57

Recently Viewed Presentations

  • Programming Models for Petascale - People

    Programming Models for Petascale - People

    We consider Map Reduce computations where: A map function produces a set of outputs Each of a set of reduce functions, gated by per element predicates, produces a set of outputs SVM Classification Results Average ~100x speedup (180x max) Map...
  • Chapter 7 Non-linear Conduction Problems

    Chapter 7 Non-linear Conduction Problems

    CHAPTER 7 NON-LINEAR CONDUCTION PROBLEMS 7.1 Introduction Non-linearity is due to: · Temperature dependent properties · Radiation effect · Free convection at boundary · Phase change 7.2 Sources of Non-linearity 7.2.1 Non-linear Differential Equations · Temperature dependent properties (7.1)
  • Chapter 15

    Chapter 15

    However, 150,000 did manage to migrate to the New World, and many to the English colonies. Exploring the Mississippi Valley Jean Nicolet: 1643, travels all the way to modern-day Green Bay, Wisconsin. Joilet and Marquette: 1673, explore the upper Mississippi...
  • National Quality Improvement Center for Adoption/Guardianship ...

    National Quality Improvement Center for Adoption/Guardianship ...

    The QIC-AG will develop evidence-based models of support and intervention that can be replicated or adapted in other child welfare systems to achieve long-term, stable permanency in adoptive and guardianship homes for waiting children as well as for children and...
  • Food Crediting Update Sheila Chastain, MSE, RD, LD

    Food Crediting Update Sheila Chastain, MSE, RD, LD

    Where We Came From…. Each School Mailed a Copy in Spring 2013 . These changes were based on the January 2012 Meal Pattern changes for the National School Lunch and School Breakfast Programs.
  • LSA.303 Introduction to Computational Linguistics

    LSA.303 Introduction to Computational Linguistics

    Start on Chapter 5 So for each component in the product replace with the approximation (assuming a prefix of N) Bigram version World knowledge Syntax Discourse * * Slides from Sandiway Fong S A B A,B Note: P(A,B)=P(A|B) · P(B)...
  • RELATRIO II NAVIO PESQUEIRO DE ARRASTE PANATUNA ESTUDANTE:

    RELATRIO II NAVIO PESQUEIRO DE ARRASTE PANATUNA ESTUDANTE:

    SEAKEEPING Os movimentos que a estrutura sofre quando opera devido a influência do meio devem ser considerados no conforto da tripulação, e navegação da embarcação. Este estudo pode ser feito pela análise do RAO (Response Amplitude Operator), que são as...
  • ING PP Example Reference 16x9 - June 2015

    ING PP Example Reference 16x9 - June 2015

    IT Chapter Lead within the Fraud & Cybersecuritydepartment, based in Amsterdam. Before ING implemented Enterprise Software,mainlyknowledge management and CRM related