0% found this document useful (0 votes)
7 views22 pages

WCMC CH2

The document provides an overview of wireless communication and mobile computing, covering topics such as mobile networks, operating systems, security, and applications. It discusses the evolution of mobile computing, the characteristics and challenges of wireless networks, and the various types of mobile devices and operating systems. Additionally, it highlights the advantages and disadvantages of mobile computing, as well as future trends and development challenges in mobile applications.

Uploaded by

Ayni Gech Getnet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views22 pages

WCMC CH2

The document provides an overview of wireless communication and mobile computing, covering topics such as mobile networks, operating systems, security, and applications. It discusses the evolution of mobile computing, the characteristics and challenges of wireless networks, and the various types of mobile devices and operating systems. Additionally, it highlights the advantages and disadvantages of mobile computing, as well as future trends and development challenges in mobile applications.

Uploaded by

Ayni Gech Getnet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Wireless Communication and Mobile Computing

Aynishet Alemu
Introduction
AGENDA

AGENDA
Mobile Networks and Technologies

Mobile operating system

Mobile security

Mobile Applications
Introduction

• The history of mobile computing can be traced back to the early days of computing, when large,
mainframe computers were used to process data. As technology advanced, smaller and more portable
computers were developed, such as minicomputers and microcomputers. These early computers were
used primarily for business and scientific applications, but as they became more affordable and easier to
use, they began to be used for personal purposes as well.
• The development of mobile computing has been driven by the increasing demand for access to
information and services from anywhere at any time. Mobile devices have become increasingly
powerful and capable, and they are now used for a wide variety of tasks, including communication,
entertainment, and productivity.
Introduction

• Different types of mobile devices and their characteristics:


• There are many different types of mobile devices available, each with its own unique features and
capabilities.
• Some of the most common types of mobile devices include:
- Smartphones: Smartphones are mobile phones that are capable of running a variety of applications,
such as web browsers, email clients, and games.
- Tablets: Tablets are portable computers that are typically larger than smartphones but smaller than
laptops. Tablets are often used for reading, watching videos, and playing games.
- Laptops: Laptops are portable computers that are typically larger than tablets but smaller than
Introduction

• Advantages and disadvantages of mobile computing:


• There are many advantages to mobile computing, including:
- Convenience: Mobile devices are small and lightweight, making them easy to carry around and use
anywhere.
- Connectivity: Mobile devices can connect to the internet and other networks, allowing users to
access information and services from anywhere.
- Flexibility: Mobile devices can be used for a wide variety of tasks, making them a versatile tool for
both personal and professional use.
Introduction

• However, there are also some disadvantages to mobile computing, including:


- Security: Mobile devices are more vulnerable to security threats than traditional computers,
such as malware and phishing attacks.
- Power consumption: Mobile devices have limited battery life, which can be a problem for users
who need to use their devices for extended periods of time.
- Cost: Mobile devices can be expensive to purchase and maintain, especially for high-end
models.
Mobile Networks and Technologies

• Some of the most common types of wireless networks include:


• Wi-Fi: Wi-Fi is a wireless local area network (WLAN) that allows devices to connect to the
internet using radio waves. Wi-Fi networks are typically found in homes, offices, and public places,
such as coffee shops and libraries.
• Cellular networks: Cellular networks are the most common type of mobile wireless network. They
use a system of cell towers to transmit data between devices.
• Bluetooth networks: Bluetooth networks are short-range wireless networks that are used to
connect devices such as keyboards, mice, and headphones to computers.
• Near field communication (NFC) networks: short-range wireless networks that are used to transmit
Mobile Networks and Technologies

• Characteristics of wireless networks (e.g., bandwidth, latency, reliability):


• There are many different characteristics that can be used to describe a wireless network, including:
- Bandwidth: Bandwidth is the amount of data that can be transmitted over a network in a given
amount of time.
- Latency: Latency is the amount of time it takes for a packet of data to travel from one point to
another.
- Reliability: Reliability is the percentage of packets that are successfully delivered to their
destination.
Mobile Networks and Technologies

• Challenges in wireless networks (e.g., interference, fading, security):


• There are many challenges that can affect the performance of a wireless network, including:
- Interference: Interference is when two or more signals overlap, which can cause errors in data
transmission.
- Fading: Fading is when the strength of a signal decreases as it travels through a medium, such as air
or water.
- Security: Security is a major concern for wireless networks, as they are often used to transmit
sensitive data.
Mobile Networks and Technologies

• Technologies for improving wireless network performance (e.g., MIMO, OFDMA, beamforming):
• There are a number of technologies that can be used to improve the performance of wireless networks,
including:
- MIMO (Multiple-Input Multiple-Output): MIMO is a technology that uses multiple antennas to
transmit and receive data, which can increase the speed and reliability of wireless connections.
- OFDMA (Orthogonal Frequency-Division Multiple Access): OFDMA is a technology that divides
the available spectrum into multiple subcarriers, which can be used to transmit data to multiple users
simultaneously.
- Beamforming: Beamforming is a technology that focuses the signal from a wireless transmitter in a
Mobile Networks and Technologies

• Technologies for improving wireless network performance (e.g., MIMO, OFDMA, beamforming):
• There are a number of technologies that can be used to improve the performance of wireless networks,
including:
- MIMO (Multiple-Input Multiple-Output): MIMO is a technology that uses multiple antennas to
transmit and receive data, which can increase the speed and reliability of wireless connections.
- OFDMA (Orthogonal Frequency-Division Multiple Access): OFDMA is a technology that divides
the available spectrum into multiple subcarriers, which can be used to transmit data to multiple users
simultaneously.
- Beamforming: Beamforming is a technology that focuses the signal from a wireless transmitter in a
Mobile Networks and Technologies

• Future trends in wireless networks (e.g., 6G, Wi-Fi 6, CBRS):


• There are a number of emerging technologies that are expected to have a significant impact on
wireless networks in the future, including:
- 6G: 6G is the next generation of wireless technology, which is expected to provide even faster data
speeds, lower latency, and increased capacity than 5G.
- Wi-Fi 6: Wi-Fi 6 is the latest generation of Wi-Fi technology, which is expected to provide faster
speeds, lower latency, and increased capacity than previous generations of Wi-Fi.
- CBRS (Citizens Broadband Radio Service): CBRS is a new spectrum band that is being made
available for use by wireless networks, which is expected to provide additional capacity for wireless
Mobile operating system

• Different types of mobile operating systems (e.g., Android, iOS, Windows Phone):
• There are many different types of mobile operating systems available, each with its own unique
features and capabilities.
• Some of the most common types of mobile operating systems include:
- Android: Android is a mobile operating system that is developed by Google. Android is open-
source, which means that it is free for anyone to use and modify. Android is the most popular mobile
operating system in the world, and it is used on a wide variety of devices, including smartphones,
tablets, and smartwatches.
- iOS: iOS is a mobile operating system that is developed by Apple. iOS is closed-source, which
Mobile operating system

• Different types of mobile operating systems (e.g., Android, iOS, Windows Phone):
• There are many different types of mobile operating systems available, each with its own unique
features and capabilities.
• Some of the most common types of mobile operating systems include:
- Android: Android is a mobile operating system that is developed by Google. Android is open-
source, which means that it is free for anyone to use and modify.
- iOS: iOS is a mobile operating system that is developed by Apple. iOS is closed-source, which
means that it is not free for anyone to use or modify.
Windows Phone: Windows Phone is a mobile operating system that is developed by Microsoft.
Mobile operating system

• Different types of mobile operating systems (e.g., Android, iOS, Windows Phone):
• There are many different types of mobile operating systems available, each with its own unique
features and capabilities.
• Some of the most common types of mobile operating systems include:
- Android: Android is a mobile operating system that is developed by Google. Android is open-
source, which means that it is free for anyone to use and modify. Android is the most popular mobile
operating system in the world, and it is used on a wide variety of devices, including smartphones,
tablets, and smartwatches.
- iOS: iOS is a mobile operating system that is developed by Apple. iOS is closed-source, which
Mobile operating system

• Features and capabilities of mobile operating systems:


Mobile operating systems typically include a variety of features and capabilities, such as:
- A user interface that allows users to interact with the device.
- A set of applications that can be installed and used on the device.
- A way to connect to the internet and other networks.
- A way to store data on the device.
- A way to manage the device's settings and preferences.
Mobile operating system

• Features and capabilities of mobile operating systems:


Mobile operating systems typically include a variety of features and capabilities, such as:
- A user interface that allows users to interact with the device.
- A set of applications that can be installed and used on the device.
- A way to connect to the internet and other networks.
- A way to store data on the device.
- A way to manage the device's settings and preferences.
Mobile security

• There are a number of steps that can be taken to protect mobile devices from security threats, such as:
- Using a strong password or PIN.
- Installing security updates.
- Being careful about what applications you install.
- Only downloading applications from trusted sources.
- Being careful about what links you click on.
- Backing up your data regularly.
Mobile Applications

• There are many different types of mobile applications available, each with its own unique advantages
and disadvantages. Some of the most common types of mobile applications include:
- Native apps: Native apps are applications that are developed specifically for a particular mobile
platform, such as Android or iOS. Native apps are typically faster and more responsive than other
types of mobile applications. However, native apps can be more expensive to develop and distribute.
Web apps: Web apps are applications that are developed using web technologies, such as HTML,
CSS, and JavaScript. Web apps can be accessed from any device with a web browser.
- Hybrid apps: Hybrid apps are applications that are developed using a combination of native and
web technologies. Hybrid apps can be faster and more responsive than web apps, but they can be more
Mobile Applications

• Mobile computing applications are software programs designed specifically for mobile devices. They
span various categories, including communication apps, social networking apps, entertainment apps,
productivity apps, travel and navigation apps, e-commerce apps, health and fitness apps, banking and
financial apps, education apps, and AR/VR apps.
Mobile Applications

• Development tools and platforms for mobile applications:


• There are a variety of tools and platforms available for developing mobile applications. Some of the
most popular tools and platforms include:
- Android Studio: Android Studio is an integrated development environment (IDE) for developing
Android applications.
- Xcode: Xcode is an IDE for developing iOS applications.
- Visual Studio: Visual Studio is an IDE for developing Windows Phone applications.
- Unity: Unity is a game engine that can be used to develop mobile games.
- PhoneGap: PhoneGap is a framework that allows developers to build mobile applications using
Mobile Applications

• Challenges in developing mobile applications:


• There are a number of challenges that can be faced when developing mobile applications, such as:
- The diversity of mobile devices: There are a wide variety of mobile devices available, each with its
own unique screen size, resolution, and operating system. This can make it difficult to develop mobile
applications that work well on all devices.
- The need for fast and responsive applications: Mobile users expect applications to be fast and
responsive. This can be a challenge to achieve, especially on older or less powerful devices.
- The need for secure applications: Mobile applications are a target for a variety of security threats

You might also like