Wireless devices: small enough to easily carry or wear, have sufficient computing power to
perform productive tasks and can communicate wirelessly with the Internet and other devices.
Thewireless application protocol (WAP) is the standard that enables wireless devices to
access Web-based information and services.
WAP-compliant devices contain microbrowsers, which are Internet browsers with a small file
size that can work within the confines of small screen sizes on wireless devices and the
relatively low bandwidths of wireless networks.
7.2 Wireless Computer Networks and Internet Access:
Short-range wireless networks generally have a range of 100 feet or less.
Medium-range wireless networks are the familiar wireless local area networks (WLANs).
The most common type of medium-range wireless network is Wireless Fidelity (Wi-Fi).
Wide-area wireless networks connect users to each other and to the Internet over
geographically dispersed distances.
7.3 Mobile Computing and Mobile Commerce :
Mobile computing: refers to real-time, wireless connection between a mobile device
Mobility:users carry a mobile device and can initiate a real-time contact with other systems from wherever they happen to be.
Broad reach:users can be reached instantly when they carry an open mobile device.
Mobile Computing:
*The characteristics, mobility and broad reach, create five value-added attributes that break the barriers of geography and time:
*Ubiquity
*Convenience
*Instant connectivity
*Personalization
*Localization of products and services
Intrabusiness Applications:
Accessing Information
*Mobile Portal
* Voice Portal
7.4 Pervasive Computing :
Pervasive Computing (Ubiquitous computing) is invisible“everywhere computing” that is
oven, cell phones, clothes, and so on. (e.g., smart home, smart appliances)
Radio frequency identification (RFID) technology allows manufacturers to attach tags with
antennas and computer chips on goods and then track their movement through radio
signals.
Wireless sensor networks (WSNs) are networks of interconnected, battery-powered, wireless
sensors that are placed into the physical environment.
7.5 Wireless Security:
Four major threats
Rogue access point
War driving
Eavesdropping
RF (Radio frequency) jamming
No comments:
Post a Comment