Unformatted text preview:

CHAPTER 8CHAPTER OUTLINELEARNING OBJECTIVESLEARNING OBJECTIVES (continued)Chapter Opening Case: The Battle for the Mobile Wallet8.1 Wireless TechnologiesCapabilities of Wireless DevicesHistory of the Cell PhoneWireless Transmission MediaSatellite Footprint ComparisonHow the Global Positioning System WorksGPS SystemsOther GPSWireless Transmission Media (continued)Infrared8.2 Wireless Computer Networks and Internet AccessShort Range Wireless NetworksBluetoothUltra-Wideband (UWB)Near-Field Communications in actionMedium Range Wireless NetworksA Wi-Fi HotspotWi-Fi at StarbucksWireless Mesh NetworksWide-Area Wireless NetworksCellular Radio Network8.3 Mobile Computing and Mobile CommerceMobile ComputingMobile CommerceMobile Commerce ApplicationsLocation-Based ApplicationsShopping from Wireless DevicesUsing Google Earth for Location-Based ServicesSlide 34Financial Services (continued)Intrabusiness ApplicationsTelemetryTelemedicineAutomotive Telemetry8.4 Pervasive ComputingAnatomy of a Bar CodeQR CodesVarious RFID TagsSmall RFID Reader and Tag8.5 Wireless SecurityChapter Closing CaseCHAPTER 8Wireless, Mobile Computing and Mobile CommerceCHAPTER OUTLINE8.1 Wireless Technologies8.2 Wireless Computer Networks and InternetAccess8.3 Mobile Computing and Mobile Commerce8.4 Pervasive Computing8.5 Wireless SecurityLEARNING OBJECTIVES1. Describe the four main types of wireless transmission media, and identify at least one advantage and one disadvantage of each type. 2. Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network.LEARNING OBJECTIVES (continued)3. Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business.4. Define pervasive computing, describe two technologies that underlie this technology, and provide at least one example of how a business can utilize each one.5. Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business.Chapter Opening Case: The Battle for the Mobile WalletSource: Slavoljub Pantelic/ Shutterstock8.1 Wireless Technologies© Oleksiy Makymenko/Alamy© ecco/Shutterstock© PhotoEdit/Alamy© Såndor Kelemen/iStockphotoCapabilities of Wireless DevicesCellular telephony E-mail accessBluetooth Short message serviceWi-Fi Instant messagingDigital camera Text messagingGlobal positioning systemOrganizer MP2 music playerScheduler Video playerAddress book Internet accessCalculator QWERTY keyboardHistory of the Cell PhoneCheck out the history of the cell phone in imagesWireless Transmission MediaMicrowave TransmissionSatellite transmissionGeostationary Orbit (GEO)Middle Earth Orbit (MEO)Low Earth Orbit (LEO)Global Positioning System (GPS)Internet Over Satellite (IOS)Source: © Pearl Bucknall/Age Fotostock America, Inc.)Satellite Footprint ComparisonSource: Drawn by Kelly RainerHow the Global Positioning System Works© Toh Kheng Ho/Age Fotostock America, Inc.GPS SystemsSmart phone and GPS systemIn-dash GPS systemOther GPS Russian GLONASSEuropean Union GPSChina Beidou GPS© Toh Kheng Ho/Age Fotostock America, Inc.Wireless Transmission Media (continued) Radio Satellite Radio© lim cheng en/Age Fotostock America, Inc.InfraredA test to see if your TV remote control is working© Sergej Razvodovskij/Age Fotostock America, Inc.8.2 Wireless Computer Networks and Internet AccessShort range wireless networksMedium range wireless networksWide area wireless networksShort Range Wireless NetworksBluetoothUltra-widebandNear-field CommunicationsSource: © Pearl Bucknall/Age Fotostock America, Inc.)Bluetooth© ZOONAR GMBH LBRF/Age Fotostock America, Inc.Ultra-Wideband (UWB) Ultra-wideband has many uses as you can see at the TimeDomain Web site. This article discusses the use of UWB in fire-fighting.Near-Field Communications in actionFrederic Lucano/Stone/Getty Images, Inc.Medium Range Wireless NetworksWireless fidelity (Wi-Fi)Wireless access pointHotspotWireless network interface cardSource: Lane Oatey/Getty Images,Inc.A Wi-Fi Hotspot© STOCKBROKERXTRA/Age Fotostock America, Inc.Wi-Fi at Starbucks@ Marianna Day Massey/Zuma PressWireless Mesh NetworksWide-Area Wireless NetworksCellular Radio 1st Generation 2nd Generation 2.5 Generation 3rd Generation (3G) 4th Generation (4G)Wireless Broadband or WiMaxCellular Radio Network8.3 Mobile Computing and Mobile CommerceMobile computing MobilityBroad reach© Såndor Kelemen/iStockphotoMobile ComputingFive value-added attributes of mobile computing:UbiquityConvenienceInstant connectivityPersonalizationLocalization of products and servicesMobile CommerceThe development of m-commerce is driven by the following factors:Widespread availability of mobile devicesNo need for a PCThe “Cell phone culture”Declining pricesBandwidth improvementMobile Commerce ApplicationsLocation-Based Applications and ServicesFinancial ServicesIntrabusiness ApplicationsAccessing InformationTelemetry ApplicationsLocation-Based ApplicationsShopping from Wireless Devices Location-based AdvertisingLocation-based ServicesShopping from Wireless DevicesSource: Don Farrall/Photodisc/Getty Images, Inc.Using Google Earth for Location-Based Services© Adam Radosavljevic/Age Fotostock America, Inc.Mobile Commerce ApplicationsFinancial ServicesMobile BankingWireless Electronic Payment SystemFrederic Lucano/Stone/Getty Images, Inc.Financial Services (continued)MicropaymentsMobile WalletWireless Bill PaymentsSource: Mike Clarke/AFP/GettyImages/NewsComIntrabusiness Applications Accessing Information Mobile PortalVoice Portal© Sergey/Age Fotostock America, Inc.TelemetryExamples of Telemetry Applications Medicine Automobiles Find My iPhoneTelemedicineTelemedicine predicted in 1924Automotive TelemetrySource: Media Bakery8.4 Pervasive Computing Radio frequency identification (RFID) Wireless sensor networks (WSNs)Anatomy of a Bar CodeSource: Media BakeryQR Codes© Patrick Duinkerke/iStockphotoVarious RFID Tags© raphotography/iStockphotoSmall RFID Reader and TagComing soon to a supermarket near youSee video© Ecken, Dominique/ Keystone Pressedienst/Zuma Press8.5 Wireless Security Four major threatsRogue access pointWar drivingEavesdroppingRF (Radio frequency) jamming© Sebastian/AgeFotostock America, Inc.Chapter Closing Case •The Problem•The Solution•The


View Full Document

UNCW MIS 213 - Wireless Mobile Computing and Mobile Commerce

Download Wireless Mobile Computing and Mobile Commerce
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Wireless Mobile Computing and Mobile Commerce and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Wireless Mobile Computing and Mobile Commerce 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?