1 / 25

CHAPTER 7

CHAPTER 7. Wireless Technologies and the Modern Organization. CHAPTER OUTLINE. 7.1 Wireless Technologies 7.2 Wireless Computer Networks and Internet Access 7.3 Mobile Computing and Mobile Commerce 7.4 Pervasive Computing 7.5 Wireless Security. LEARNING OBJECTIVES.

Download Presentation

CHAPTER 7

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CHAPTER 7 Wireless Technologies and the Modern Organization

  2. CHAPTER OUTLINE 7.1 Wireless Technologies 7.2 Wireless Computer Networks and Internet Access 7.3 Mobile Computing and Mobile Commerce 7.4 Pervasive Computing 7.5 Wireless Security

  3. LEARNING OBJECTIVES • Discuss the various types of wireless devices and wireless transmission media. • Describe wireless networks according to their effective distance. • Define mobile computing and mobile commerce.

  4. LEARNING OBJECTIVES (continued) • Discuss the major m-commerce applications. • Define pervasive computing and describe two technologies that underlie this technology. • Discuss the four major threats to wireless networks.

  5. 7.1 Wireless Technologies Wireless devices Wireless Application Protocol (WAP) - Microbrowsers - Wireless transmission media

  6. Capabilities of Wireless Devices Cellular telephony E-mail access Bluetooth Short message service Wi-Fi Instant messaging Digital camera Text messaging Global positioning system Organizer MP2 music player Scheduler Video player Address book Internet access Calculator QWERTY keyboard

  7. Examples of today’s wireless devices Blackberry Curve 8900 Sony Mylo T-Mobile MyTouch 3G T-Mobile G1 and G2 Helio Ocean

  8. Wireless Transmission Media • Microwave Transmission • Satellite transmission • Geostationary Orbit (GEO) • Middle Earth Orbit (MEO) • Low Earth Orbit (LEO) • Global Positioning System (GPS) • Internet Over Satellite (IOS)

  9. Wireless Transmission Media (continued) Radio Satellite Radio

  10. Infrared Infrared -

  11. 7.2 Wireless Computer Networks and Internet Access Short range wireless networks Medium range wireless networks Wide area wireless networks

  12. Short Range Wireless Networks Bluetooth Ultra-wideband Near-field Communications

  13. Near-Field Communications in action Near-field Communications (NFC) -

  14. Medium Range Wireless Networks Wireless fidelity (Wi-Fi) Wireless access point Hotspot Wireless network interface card

  15. Wireless Mesh Networks Wireless Mesh Networks -

  16. Wide-Area Wireless Networks • Cellular Radio • 1st Generation • 2nd Generation • 2.5 Generation • 3rd Generation • Wireless Broadband or WiMax

  17. 7.3 Mobile Computing and Mobile Commerce Mobile computing Mobility Broad reach

  18. Mobile Computing • The characteristics, mobility and broad reach, create five value-added attributes that break the barriers of geography and time: • Ubiquity • Convenience • Instant connectivity • Personalization • Localization of products and services

  19. Mobile Commerce • Mobile Commerce • The development of m-commerce is driven by the following factors:

  20. Mobile Commerce Applications Financial Services Mobile Banking Wireless Electronic Payment Systems Micropayments Mobile (Wireless) Wallets Wireless Bill Payments

  21. Intrabusiness Applications Accessing Information • Mobile Portal • Voice Portal

  22. Location-Based Applications Shopping from Wireless Devices Location-based Advertising Location-based Services

  23. Telemetry Applications • Technicians can use telemetry to identify maintenance problems in equipment; Doctors can monitor patients and control medical equipment from a distance; Car manufacturers use telemetry for remote vehicle diagnosis and preventive maintenance. • Medical • Automotive

  24. 7.4 Pervasive Computing • Pervasive Computing (Ubiquitous Computing • Radio Frequency Identification (RFID) • Wireless Sensor Networks (WSNs)

  25. 7.5 Wireless Security Four major threats Rogue access point War driving Eavesdropping RF (Radio frequency) jamming

More Related