____________ are computing systems that may be easily moved physically and whose computing capabilities may be used while they are being moved. Examples are laptops, personal digital assistants (PDAs), and mobile phones.
Mobile computing systems
One of the very first computing machines, the _______, which was used as far back as 500 B.C., was, in effect, a mobile computing system because of its small size and portability.
abacus
(T/F) A mobile computing system, as with any other type of computing system, can be connected to a network. Connectivity to the network, however, is not a prerequisite for being a mobile computing system.
True
Dating from the late _____, networking two or more computers together allowed computers to talk to each other through wired networks.
1960s
By the 1960s, the military developed wireless communication through _______: If there were no obstacles between point A and point B, you could send and receive electromagnetic waves
line of sight
By the 1970s, ________ began to be commercialized.
communication satellites
In the _____ cellular telephony technologies became commercially viable and the _____ were witness to advances in cellular technologies that made wireless data communication financially feasible in a pervasive way.
1980s, 1990s
(T/F) Mobile computing devices need not be wireless. Laptop computers, calculators, electronic watches, and many other devices are all mobile computing devices. None of them use any sort of wireless communication means to connect to a network.
True
(T/F) Wireless communication systems are a type of communication system. What distinguishes a wireless communication system from others is that the communication channel is space itself.
True
_______ is the set of properties that distinguishes the mobile user from the user of a typical, stationary computing system.
Mobile condition
________ are the set of properties that distinguishes the mobile computing system from the stationary computing system.
Dimensions of mobility
Dimensions of mobility:
location awareness
network connectivity quality of service (QOS)
limited device capabilities (particularly storage and CPU)
limited power supply
support for a wide variety of user interfaces
platform proliferation
active transactions
_________ is the mere ability of the architecture of the mobile application to accommodate logic that allows the selection of different business logic, level of work flow, and interfaces based on a given set of location information commonly referred to as locales.
Localization
_________ is the ability of the device and the software application to first obtain location information while being used and then to take advantage of this location information in offering features and functionality
Location sensitivity
_________ relies on age-old geometric methods that allow calculation of the location of a point that lies in the middle of three other points whose exact locations are known.
Triangulation
based methods measure the relative position of the unknown point to some known point.
Proximity
_________ relies on image processing and topographical techniques to calculate the location of the unknown point based on a view of the unknown point from a known point.
Scene analysis
The most well-known location sensing system today is ____-enabled devices can obtain latitude and longitude with accuracy of about 1–5 m.
GPS
____________ promises to be one of the biggest drivers of mobile applications as it allows for the introduction of new business models and fundamentally new methods of adding productivity to business systems.
Location information
means loss of network connectivity reliability.
Mobility
Moving from one physical location to another creates physical barriers that nearly guarantee some disconnected time from the network.
Quality of Service
The mobile device’s physical size limitation imposes boundaries on volatile storage, nonvolatile storage, and CPU on mobile devices.
Limited Device Storage and CPU
(T/F) When it comes to mobile systems and devices, smaller is nearly always better.
True
(T/F) Mobile applications must be designed to optimize the use of data storage and processing power of the device in terms of the application use by the user.
True
_______ are the primary power source for mobile devices.
Batteries
This constraint must be balanced with the processing power, storage, and size constraints; the battery is typically the largest single source of weight in the mobile device.
Limited Power Supply
Stationary users use nonmobile applications while working on a PC or a similar device. The keyboard, mouse, and monitor have proved to be fairly efficient user interfaces for such applications.
Varying User Interfaces
_________ are systems that use multiple types of user interfaces for input and output such as text, voice, and video.
Multichannel systems
Because mobile devices are small and there is much less hardware in them than in a PC, they are typically less costly to assemble for a manufacturer. This means that more manufacturers can compete in producing these devices.
Platform Proliferation
Most of today’s stationary applications have a restriction that can reduce the benefits of a mobile application system enormously: The user of the system must initiate all interactions with the system.
Active Transactions
they are in a passive state, waiting for some external signal from the user to tell them to start doing some particular thing.
Passive systems
In the _________ of communication, an information producer announces the availability of certain types of information, an interested consumer subscribes to this information, and the producer periodically publishes the information.
push model
_________, by definition, are active systems.
Push systems
(T/F) All active transactions are initiated by the system.
True
________ are time-dependent transactions
Synchronous transactions
______ is used in data storage and other systems to indicate boundaries for roll-back and committing of a series of actions that must be successfully executed.
transaction
__________ is a sequence of interactions between the user and the computing system.
transaction
___________ are not time-dependent
Asynchronous transactions
Mobile conditions:
Changing Location
Lack of Focus
Immediacy
Abrupt Changes in Tasks
Anytime, Anywhere
Mobile users are often in a situation where they need to quickly perform one or more computing tasks, such as retrieving contact information, sending a voice or e-mail message, or triggering some remote process. They don’t have the time to go through a long boot sequence or long application setup times.
Immediacy
The primary focus of the mobile user is seldom on the computing task (although, obviously, there are exceptions to this, but we are talking about the majority of time when the user has a device and is mobile). This is the primary reason for the necessity of active transactions.
Lack of Focus
It may seem trivial to state that a mobile user is always, or at least frequently, moving.
Changing Location
The mobile user needs to be able to stop performing some computing task abruptly, do something that may be completely unrelated, then return to the application after some unknown period of time, and, without much effort to remember what he or she had been doing, continue the computing task.
Abrupt Changes in Tasks
The mobile user expects to be able to retrieve data and do computing at any given moment and any given time.
Anytime, Anywhere
(T/F) The mobile condition of the mobile user should be the primary guiding tool in architecting, designing, and implementing the mobile application.
True
(T/F) The first step in building a software application, after the process of gathering requirements, is to lay down a high-level plan of what the application will be like when it is finished.
True
Mobile applications, like any other software application, require such a high-level plan. We call this high-level plan of the mobile application a ________________.
“mobile software architecture”
__________ are particular high-level abstraction of the system and how its components collaborate.
Software architecture
these are patterns that are recognizable once they are used prevalently in some architectures.