Saturday 14 April 2012

What Are The Technologies Involve In The Decision?

Mobile User Interface and mobile Web/Widgets are a foundation of application that people need in their mobile phone and PDA phone. Because of everything in society change rapidly. We need fast and convergence to serve oursatisfaction.So browser and any widgets are the factor that people looking for.

Mobile technology is exactly what the name implies - technology that is portable. Examples of mobile IT devices include:
laptop and netbook computers, palmtop computers or personal digital assistants, mobile phones and 'smart phones', global positioning system (GPS) devices, wireless debit/credit card payment terminals.

Mobile devices can be enabled to use a variety of communications technologies such as Wireless fidelity (Wi-Fi) - a type of wireless local area network technology, Bluetooth - connects mobile devices wirelessly, 'third generation' (3G), global system for mobile communications (GSM) and general packet radio service (GPRS)

data services - data networking services for mobile phones
dial-up services - data networking services using modems and telephone lines
virtual private networks - secure access to a private network
It is therefore possible to network the mobile device to a home office or the internet while travelling.

Generations of mobile communications
The first generation (1G) of mobile communications was introduced in the late 1970s; it was primarily used for voice transfer. In the early 1990s, second generation (2G) systems came into existence and was further developed to 2.5G, which includes GSM, TDMA and CDMA. These were used for voice and data.
The next generation of mobile communications is 3G and this delivers data speeds from 384 kbps to 2 Mbps and over wireless interfaces such as GSM, TDMA and CDMA.

Mobile phone access technologies
Frequency division multiple access (FDMA)The first-generation analog mobile access method; FDMA uses separate frequencies for each call. For example if there are four stations, each will receive their own frequency. Thus there is no interference between them. This reduces interference, but limits the number of users.
Time division multiple access (TDMA)TDMA allocates unique time slots to each user within each channel, thus allowing many users to access the radio frequency without anyone's interference. Each mobile conversation uses only a particular frequency slot of the time. 
Code division multiple access (CDMA)

Commercially introduced in 1995 by Qualcomm, CDMA quickly became one of the world's fastest-growing wireless technologies. 3G CDMA networks provide more capacity for voice traffic, along with high-speed data capabilities, hence many cellular service providers are now building or upgrading to it.
CDMA is used in both 2G and 3G wireless technologies. Indian Cell operators like Reliance IndiaMobile, TATA Indicom, BSNL and MTNL's Garuda all use CDMA2000 technology and its variant CDMA1x. 
Global system for mobile communications (GSM)
Developed on TDMA protocol in Europe, GSM is now the worldwide standard technology for mobile communications. The advantage of GSM is that it provides a high level of security, globally accepted technology standards and superior sound quality.
For any GSM phone to work, it requires a Subscriber Identity Module (SIM), a card that contains your telephone account information. Thus, an Indian GSM phone can be used in USA and other countries too.
Wireless technology platforms: GPRS, EDGE and WAP
What is GPRS?

GPRS, short for General Packet Radio Services, is an enhancement to GSM technology that integrates GSM and IP technology. GPRS offers an always-on, high speed connectivity to the Net. Thus you can check your email on the move and surf the Web at high speeds. Currently BPL Mobile and Hutch (Orange in Mumbai) offer GPRS services in India.
What is WAP?

In this hi-tech age, people on the move need any-time access to the Net. This is where WAP comes in. It provides Internet access to cell phones. It is an open standard for wireless protocols that is independent of the service providers. To display Web content, the cell phone must have a WAP browser. Nowadays, cell phones often come with WAP and GPRS technology.
WAP and GPRS also allows you to download games, send mail and even transfer your messages to your PC.
What is EDGE?
The new EDGE ((Enhanced Data GSM Environment) interface has been developed specifically to meet the bandwidth needs of 3G. Promoted by Ericsson, it offers high-speed data transfers over GSM networks with just a software upgrade to the handset. EDGE allows speeds up to 384 kbps.


Benefits
Mobile computing can improve the service you offer your customers. For example, when meeting with customers you could access your customer relationship management system - over the internet - allowing you to update customer details whilst away from the office. Alternatively, you can enable customers to pay for services or goods without having to go to the till. For example, by using a wireless payment terminal diners can pay for their meal without leaving their table.
More powerful solutions can link you directly into the office network while working off site, for instance to access your database or accounting systems. For example, you could set up a new customer's account, check prices and stock availability, place an order online
This leads to great flexibility in working - for example, enabling home working, or working while travelling. Increasingly, networking 'hot spots' are being provided in public areas that allow connection back to the office network or the internet. The growth of cloud computing has also impacted positively on the use of mobile devices, supporting more flexible working practices by providing services over the internet. For more information see our guide on cloud computing.

Drawbacks
There are costs involved in setting up the equipment and training required to make use of mobile devices. Mobile IT devices can expose valuable data to unauthorised people if the proper precautions are not taken to ensure that the devices, and the data they can access, are kept safe. See our guide on securing your wireless systems.



No comments:

Post a Comment