Ch8: Wireless, Mobile Computing, and Mobile Commerce

Ace your homework & exams now with Quizwiz!

Wireless Sensor Networks (WSNs)

networks of interconnected, battery powered, wireless sensors called motes that are placed into the physical environment

Wide-Area wireless networks (generations of cellular tech)

First generation (1G): cellular networks used analog signals and had low bandwidth (capacity). Second generation (2G): uses digital signals primarily for voice communication; it provides data communication up to 10 Kbps. 2.5G: uses digital signals and provides voice and data communication up to 144 Kbps. Third generation (3G): uses digital signals and can transmit voice and data up to 384 Kbps when the device is moving at a walking pace, 128 Kbps when it is moving in a car, and up to 2 Mbps when it is in a fixed location. It supports video, Web browsing, and instant messaging. Fourth generation (4G): is not one defined technology or standard. The International Telecommunications Union (ITU) has specified speed requirements for 4G: 100 Mbps (million bits per second) for high-mobility communications such as cars and trains, and 1 Gbps (billion bits per second) for low-mobility communications such as pedestrians. A 4G system is expected to provide a secure all-IP-based mobile broadband system to all types of mobile devices. Fifth Generation (5G): expected to be deployed by 2020, 5G networks are predicted to be faster and more intelligent than previous generations of cellular networks. With 5G, wearable computers (e.g., Fitbit), smartphones, tablets, and other devices with sensors that are location- and context-aware will work together with apps and services that you use. Wireless Broadband or WiMAX: Worldwide Interoperability for Microwave Access (WiMAX) is the name for IEEE Standard 802.16 which has a wireless access range of up to 31 miles and a data transfer rate of up to 75 Mbps. It is a secure system, and it offers features such as voice and video.

Four major threats to wireless networks

Rogue access Point: an unauthorized access point connected to a wireless network Evil Twin Attack: the attacker is in a vicinity with a Wi-Fi enabled computer and a separate connection to the internet. Using a hospotteer—a device that detects wireless networks and provides information on them the attacker simulates a wireless access point with the same wireless network name, or SSID, as the one that authorized users expect. If the signal is strong enough, users will connect to the attacker's system instead of the real access point. War Driving: the act of locating WLANs while driving (or walking) around a city or elsewhere Eavesdropping: efforts by unauthorized users to access data that are traveling over wireless networks Radio-Frequency (RF) Jamming: a person or a device intentionally or unintentionally interferes with your wireless network transmissions

Low Earth Orbit (Leo)

Satellites move rapidly relative to point on Earth; large number needed for global coverage, requires only low-power transmitters; negligible transmission delay; least expensive to build and launch; shortest orbital life (as low as 5 years)

Middle Earth Orbit (MEO)

Satellites move relative to point on Earth; Moderate number needed for global coverage; requires medium-powered transmitters; negligible transmission delay; less expensive to build and launch; moderate orbital life (6-12 rears) *GPS is supported by 24 MEO satelites

Geostationary Earth Orbit (GEO) Satellite

Satellites stationary relative to point on earth; few satellites needed for global coverage; transmission delay of 25 seconds; most expensive to build and launch; longest orbital life

Dematerialization

a phenomenon that occurs when the functions of many physical devices are included in one other physical device. Consider that your smartphone includes the functions of digital cameras for images and video, radios, televisions, Internet access via Web browsers, recording studios, editing suites, movie theaters, GPS navigators, word processors, spreadsheets, stereos, flashlights, board games, card games, video games, an entire range of medical devices, maps, atlases, encyclopedias, dictionaries, translators, textbooks, watches, alarm clocks, books, calculators, address books, credit card swipers, magnifying glasses, money and credit cards, car keys, hotel keys, cellular telephony, Wi-Fi, e-mail access, text messaging, a full QWERTY keyboard, and many, many others.

QR code

a two dimensional code, readable by dedicated QR readers and camera phones

Universal Product Code (UPC)

a typical bar code made up of 12 digit that are batched in various groups. The first digit identifies the item type, the next five digits identify the manufacturer and the next 5 identify the product. The last digit is a check did for error detection

Short Range Wireless Networks

have a range of 100 feet or less Short-Range Wireless Networks: have a range of 100 feet or less (e.g., Bluetooth, ultra-wideband (UWB), and near-field communications (NFC)). Bluetooth: an industry specification used to create small personal area networks. Bluetooth 1.0: can link up to eight devices within a 10-meter area (about 30 feet) with a bandwidth of 700 kilobits per second (Kbps) using low-power, radio-based communication. Bluetooth 4.0: can transmit up to approximately 25 megabits per second (Mbps) up to 100 meters (roughly 300 feet). Personal Area Network: a computer network used for communication among computer devices (e.g., telephones, personal digital assistants, and smartphones) located close to one person. Ultra-Wideband: a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps which makes UWB a good choice for applications such as streaming multimedia from a personal computer to a television. Near-Field Communications: has the smallest range of any short-range wireless networks, and is designed to be embedded in mobile devices such as cell phones and credit cards.

Internet of Things

scenario in which objects, animals, and people are provided with unique identifiers and the ability to automatically transfer data over a network without requiring human to human or human to computer interaction

Radio-Frequency Identification (RFID)

tech that allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals; developed to replace barcodes two types of tags: active (tags that use internal batteries for power, and they broadcast radio waves to a reader) and Passive (tags rely entirely on readers for their power, less expensive than active tags, and can be read only up to 20 feet)

Medium range wireless networks

the familiar wireless local area networks (WLANs) and the most common type of Medium-range network is Wi-Fi Wireless Mesh Networks: networks using multiple Wi-Fi access points to create a wide area network that can be quite large and are essentially a series of interconnected local area networks.

Pervasive/Ubiquitous Computing

visually every object has processing power with either wireless or wired connections too a global network

Satellite

wireless transmission media Advantages: high bandwidth, large coverage area Disadvantages: expensive, requires unobstructed line sight, signals experience propagation delay, requires the use of encryption for security 3 basic types: GEO, MEO, LEO

Radio

wireless transmission media Advantages: high bandwidth, signals pass through walls, inexpensive and easy to install Disadvantages: creates electrical interference problems; susceptible to "snooping" unless encrypted

Infrared

wireless transmission media Advantages: low to medium bandwidth; used only for short distances Disadvantages: requires an unobstructed line of sight

Microwave

wireless transmission media advantages: bandwidth, inexpensive disadvantages: requires an unobstructed line of sight, susceptible to environmental interference


Related study sets

9. Nervous System (Brain) Lecture Questions

View Set

грамматика 3 4 5 6 глава

View Set

Wordly Wise Lesson 2 words with defenitions

View Set

ISNS 2367 The Oceans Chapter 13 & 14

View Set

Add and Subtract Fractions Word Problems

View Set

Lesson 1 - Greeting, Introduction and Leave-Taking

View Set

GB310 Supplemental Learning Assessment

View Set

The Developing Person- Chapter 1 Quiz

View Set

Logic - The Syntax of Predicate Logic

View Set

Econ module 25, module 24 econ, module 23 econ, Module 21, Module 20 Econ, Economics Module 19, Econ test 3

View Set

337: Describe the mechanisms by which viruses cause cancer

View Set