7
Wireless, Mobile
Computing, and Mobile
Commerce
LEARNING OBJECTIVES
1. Identify advantages and disadvantages of each of the four
main types of wireless transmission media.
2. Explain how businesses can use technology employed by
short-range, medium-range, and long-range networks,
respectively.
3. Provide a specific example of how each of the five major
m-commerce applications can benefit a business.
4. Describe technologies that underlie pervasive computing,
providing examples of how businesses can utilize each one.
5. Explain how the four major threats to wireless networks can
damage a business.
CHAPTER OUTLINE
1. Wireless Technologies
2. Wireless Computer Networks and Internet
Access
3. Mobile Computing and Mobile Commerce
4. Pervasive Computing
5. Wireless Security
[ Retailer Gains Many Benefits with RFID Item ]
• The Problem
• The IT Solution
• The Results
• What We Learned from This Case
8.1 Wireless Technologies
Wireless Devices
Smartphones
Wireless
Wireless Devices
• Three Major Advantages for Users
– Small enough to easily carry or wear.
– Sufficient computing power to perform
productive tasks.
– Communicate wirelessly with the Internet &
other devices.
• One Major Disadvantage for Business
– Workers can capture and transmit sensitive
proprietary information
Modern Smartphone Capabilities
• Cellular telephony • E-mail
• Bluetooth • Short Message Service (SMS,
• Wi-Fi sending and receiving short
text messages up to 160
• Digital camera for images & characters in length)
video
• Instant Messaging
• Global Positioning System • Text messaging
(GPS)
• MP3 music player
• Organizer
• Video player
• Scheduler • Internet access with full-
• Address book function browser
• Calculator • QWERTY keyboard
[about business]
Cell Phones
Revolutionize
Healthcare in Uganda
8.2 Wireless Transmission
Media (WTM)
Wireless Media (aka, broadcast media)
transmit signals without wires
Major Types of Wireless Media Channels:
Microwave
Satellite
Radio
Infrared
WTM: Microwave
Advantages Disadvantages
• High bandwidth • Requires an
• Relatively unobstructed line of
Inexpensive sight
• Susceptible to
environmental
interference
WTM: Satellite
Advantages Disadvantages
• High bandwidth • Expensive
• Large coverage area • Requires unobstructed
line of sight
• Signals experience
propagation delay
• Requires the use of
encryption for security
Three Basic Types of Telecommunications
Satellites
• Geostationary Earth Orbit (GEO)
• Middle Earth Orbit (MEO)
• Low Earth Orbit (LEO)
Geostationary Earth Orbit (GEO)
Orbit: 22,300 miles
Number of Satellites: 8
Use: TV Signal
Characteristics: • Satellites stationary relative to point
A on Earth
A • Few satellites needed for global
A coverage
A • Transmission delay
(approximately .25 second)
A
• Most expensive to build and launch
A
• Longest orbital life (many years)
a
Internet over Satellite (IoS)
Disadvantages Advantages
• Provides Internet • Propagation delay
services to remote • Disrupted by
areas of Earth environmental
conditions
Middle Earth Orbit (MEO)
Orbit: 6,434 miles
Number of Satellites: 10 - 12
Use: Global Positioning Systems (GPS)
Characteristics: • Satellites move relative to point on
Earth
A
• Moderate number needed for global
A coverage
A • Requires medium-powered transmitters
A • Negligible transmission delay
A • Less expensive to build and launch
A • Moderate orbital life (6–12 years)
a
Global Positioning Systems (GPS)
• A wireless system that utilizes satellites to enable users
to determine their position anywhere on Earth.
• Supported by 24 MEO Satellites
• Uses of GPS
– Navigating, Mapping, Surveying, 911 location
• Three additional GPS Systems
– GLONASS, Russia 2005
– Galileo, European Union 2015
– Beidou, China 2020
Low Earth Orbit (LEO)
Orbit: 400 - 700 miles
Number of Satellites: Many
Use: Telephone, Internet
Characteristics: • Satellites move rapidly relative to point
A on Earth
A • Large number needed for global
A coverage
A • Requires only low-power transmitters
A • Negligible transmission delay
A • Least expensive to build and launch
a • Shortest orbital life (as low as 5 years)
WTM: Radio
Advantages Disadvantages
• High bandwidth • Creates electrical
• Signals pass through interference
walls problems
• Inexpensive and easy • Susceptible to
to install ‘snooping’ unless
encrypted
WTM: Infrared
Advantages Disadvantages
• Low to medium • Requires an
bandwidth unobstructed line of
• Used only for short sight
distances
8.2 Wireless Computer
Networks & Internet Access
Short-Range
Wireless
Networks
Short-Range Wireless Networks
• Bluetooth
• Ultra-Wideband
• Near-Field Communications
[about business]
Near-Field
Communications Helps
Travelers in Japan
Medium-Range Wireless Networks
• Wireless Fidelity (Wi-Fi)
– Wireless Local Area Networks (WLAN)
– Wi-Fi Direct
– MiFi
– Super Wi-Fi
• Wireless Mesh Networks
Wide-Area Wireless Networks
• Cellular Radio (Cellular telephones)
– 1G
– 2G
– 3G
• CDMA
– EV-DO
• GSM
– 4G
• Wireless Broadband (or WiMax)
8.3 Mobile Computing and
Mobile Commerce
Mobile Computing
Refers to a real-time connection between a
mobile device and other computing
environments, such as the Internet or an
Intranet.
Mobile Commerce
Electronic commerce (EC) transactions
conducted in a wireless environment, especially
via the Internet.
Mobile Computing
• Two Major Characteristics
– Mobility
– Broad Reach
• Mobility & Broad Reach Create 5 value-added attributes
1. Ubiquity
2. Convenience
3. Instant connectivity
4. Personalization
5. Localization of Products and Services
Mobile Commerce
• Also known as “M-commerce”
• Drivers of M-commerce
– Widespread availability of mobile devices
– Declining prices
– Bandwidth improvement
Mobile Commerce (continued)
• Mobile Commerce Applications Include:
– Location-Based Applications and Services
– Financial Services
– Intrabusiness Applications
– Accessing Information
– Telemetry Applications
8.4 Pervasive Computing
Invisible “everywhere computing” that
is embedded in the objects around us.
Radio-Frequency Identification (RFID)
Versus bar codes
Versus QR codes
Wireless Sensor Networks
[about business]
Brazil Uses Smart
Meters
8.5 Wireless Security
Four Major
Threats
Rogue access