Mobile computing: technology, applications, and by Asoke K Talukder New Delhi: Tata McGraw Hill. 2. New York ; Chicago ; San Francisco: McGraw Hill. Results 1 - 20 of 21 Tata McGraw-Hill Education Pvt. Ltd., 2nd edition. Softcover. New. Mobile computing technology addresses challenges that enable the. Results 1 - 7 of 7 Mobile Computing: Technology, Applications, and Service Creation by Asoke K. Published by Tata McGraw-Hill Education Pvt. Ltd. ().
|Language:||English, Spanish, Hindi|
|Genre:||Academic & Education|
|ePub File Size:||21.48 MB|
|PDF File Size:||13.85 MB|
|Distribution:||Free* [*Sign up for free]|
and service creation. Author(S). Aske K. Talukder (Author) Roopa R. Yavagal ( Author). Publication. Data. New Delhi: Tata McGraw-Hill Publishing. Company. Asoke Talukder Mobile portal7.info DOWNLOAD HERE Asoke K. Talukder , Hasan Ahmed, Roopa R Yavagal, Tata McGraw Hill, 3. Title (Units). NE MOBILE AND PERVASIVE COMPUTING Technology, Applications and Service Creation”, 2nd ed, Tata McGraw Hill,
This page intentionally left blank Acknowledgments W e were fortunate enough to be able to talk with a lot of very talented people while preparing this book for you. We spoke not only to people who implemented their own cloud solutions, but also those who help develop cloud solutions, as well as officers of several major cloud solution providers. He told us how he was able to build a virtualized environment for the clients on his network, allowing us to summarize his experiences for you. Steve Fisher, senior vice president of AppExchange at Salesforce. Charles Babcock, our Technical Editor, helped us keep the facts straight and the overall content aligned with your expectations. We appreciate every edit and suggestion and know that it is a better book because of his input.
The required infrastructure for mobile computing are wireless communication, mobility and easily portable. These infrastructure raises number of problems they are Disconnection, bandwidth and interface variability and different types of networks present.
In mobile network the available band width will be low. While accessing through wireless network or through switching from one mechanism to other mechanism may produce the problems. Similarly for the mobile networks, it is not homogenous, it is heterogeneous. Mobility also introduces some problems like address migration, location dependent information and privacy. Portability will also introduces some problems like low power which effects portability, even the transactions may end in the middle due to disconnection, risk to data like physical damage and unauthorized access.
Number of security issues addressed in mobile computing like authentication, confidentiality, accountability, integrity, availability etc. All these issues should take care of so that the system will be secure enough. Out of all the issues confidentiality and authentication is given more importance where the user should be secured from unauthorized eavesdropping. Whenever if a user wants to access the information of the other person, before providing that either the network or the devices has to check his identity to prevent the unauthorized access.
To take care of this kind of issues network security protocols has to be used which uses the computational power and the available bandwidth.
Whenever if a protocol is used, it should be thoroughly designed in such a way that it should not use more computational resources. Jang, J. Jee, Y. We acknowledge all of them and appreciate their efforts. Cloud computing has become a hot topic in recent years, and people at different levels in your organization need to understand cloud computing in different ways.
This book is also for C-level executives, managers, analysts, and all manner of IT professionals. The goals of the book range from just wanting to be able to cut through the hype, to evaluating cloud-based solutions against the time, energy, and expense required to leverage them.
We have attempted to fill this book with a broad range of resources and information. This book explains some of the nuts and bolts of cloud computing and how companies can use cloud computing tools. On the front lines, workers may find this book helpful when seeking to understand cloud computing. Moving from a traditional network infrastructure to a cloud solution might be a tough sell for some workers. Understanding the players, the pieces, and why the move is necessary will help with the transition.
What This Book Covers Cloud computing is the biggest buzz in the computer world these days—maybe too big of a buzz. Cloud computing means different things to different people, and if you are trying to wrap your brain around the topic, asking one question will lead to ten more. This book aims to make the issues more understandable.
Cloud computing is not a small, undeveloped branch of IT. Gartner Inc. Big names that you know are jockeying for position in the cloud.
Google has also put a xiv Introduction number of applications online. At a basic level they are free, but more robust applications can be accessed with a subscription. Microsoft is betting big with massive new data centers to service millions of cloud users. Think about when the World Wide Web was just picking up in popularity.
Every web page had the same HTML look and when frames came along, that was heralded as an innovation. But look where we have come since then. Web pages are exciting, dynamic things that do not look anything like they used to in We are in that same stage of development with cloud computing.
In 10 or 15 years from now, cloud computing is not going to look anything like it does now. But that does not mean that the cloud of today is not useful. In fact, quite the opposite is true. You can do a lot on the cloud. You can do everything from running applications to storing data off-site. You can run entire operating systems on the cloud. In this book, we will talk about the sorts of things that cloud computing allows you to do.
But for all the usefulness the cloud provides, there are also things you do not want to turn to the cloud for. There are simply some applications that you want to run locally.
For instance, mission-critical business processes may best be maintained locally.
There is also an issue of security and regulation. Because of government regulations, you simply may not be allowed to store some data on the cloud. This book covers the range of challenges, too. Security is as much of an issue in the cloud as it is anywhere else. People come to the cloud computing topic from different points of view. Some believe the cloud to be an unsafe place.
After all, once you send your data to the cloud, you lose complete control over it and it runs a greater risk of being compromised.
But the other side of that coin is that cloud vendors go out of their way to ensure security. Many cloud vendors have teams dedicated to ensuring that their clouds are secure. This only makes sense—all it takes is for one breach to occur before clients start jumping ship.
We will talk about security and its cloud considerations in more depth later in this book. Cloud Computing service providers are those companies that you turn to for cloud services.
There are big names like site and Microsoft offering cloud services, and there are smaller companies too. They are all striving to offer cutting-edge, innovative solutions that are compelling enough that you will consider making your move to the cloud. Consider Salesforce. We introduce you to a number of cloud computing solutions providers in this book and talk about some innovative partnerships that are helping the cloud evolve. We also talk about cloud infrastructure and how it is built.
Chapter 2: Your Organization and Cloud Computing Are your organization and its functions suited for the cloud? While you can do an awful xv xvi Cloud Computing: A Practical Approach lot on the cloud, there are issues you need to consider before making the move.
In this chapter we talk about such issues as when you can use a cloud solution, the benefits to your organization mostly financial, but there are others, too , security issues, regulatory concerns, and limitations. Honestly, the point of this chapter is not to scare you off, but just to present the counterpoint to the issue. Chapter 3: Cloud Computing with the Titans Some well-known companies have joined the cloud computing party with their own offerings.
While there are hundreds of vendors offering cloud computing solutions, there are some big names like Google, Microsoft, site, Yahoo, and Salesforce. We are not pushing these big companies over smaller ones, but wanted to share what prominent names are doing.
In this chapter we will look at what the big dogs offer and the direction they would like to take the cloud. What is the business benefit for making the move? In this chapter we will talk not only about some of the monetary savings, but some of the operational and organizational benefits you will realize by putting some of your business functions on the cloud. We will also talk about deleting your datacenter and what you should get rid of and what you should keep.
Part II: Cloud Computing Technology Chapter 5: Hardware and Infrastructure In this chapter we roll up our sleeves and take a closer look at the components used to build your cloud solution.