0% found this document useful (0 votes)
56 views3 pages

Mobile & Pervasive Computing Course

Vivekanandha College of Engineering for Women offers a course on Mobile and Pervasive Computing in the Information Technology department. The course is offered in the second semester with 3 credits. It covers topics like wireless networks and architectures, mobility models and protocols, pervasive computing principles and services, mobile computing environment and architecture, context-aware mobile services, and context-aware security. The course has a total of 30 periods.

Uploaded by

Brinda BM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views3 pages

Mobile & Pervasive Computing Course

Vivekanandha College of Engineering for Women offers a course on Mobile and Pervasive Computing in the Information Technology department. The course is offered in the second semester with 3 credits. It covers topics like wireless networks and architectures, mobility models and protocols, pervasive computing principles and services, mobile computing environment and architecture, context-aware mobile services, and context-aware security. The course has a total of 30 periods.

Uploaded by

Brinda BM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

VIVEKANANDHA COLLEGE OF ENGINEERING FOR WOMEN (Autonomous Institution, Affiliated to Anna University ,Chennai) Elayampalayam, Tiruchengode 6 !

! "#$ %rogramme +epartment Course code &'TEC( %rogramme code Information Technolog Course name MO'ILE ( #ERVA)IVE COM#*TING IT )egulation ,emester Credit C "#* II

%eriods per -ee. 0 T % # #

&a/imum &ar.s CA E,E Total $# $# *##

!"#IT$%&

To understand the -ireless net-or.s and -ireless architectures 123ective To study the various mo2ility models 4 protocols To understand the concept of pervasive computing 4 services Unit I INTROD*CTION %eriods 5 6ireless net-or.s7 emerging technologies7 8lue tooth, 6i9i, 6i&A:, ; ,6AT&'7&o2ile I% protocols 76A% push architecture76ml scripts and applications' Unit 7 II MO'ILE COM#*TING %eriods 5 &o2ile computing environment<functions7architecture7design considerations ,content architecture 7CC=%% e/change protocol ,conte/t manager' +ata management in 6AECoda file system7 caching schemes7 &o2ility >1,' ,ecurity in mo2ile computing' Unit 7 III MO'ILIT+ MODEL) %eriods 5 (andoff in -ireless mo2ile net-or.s7reference model7handoff schemes' 0ocation management in cellular net-or.s 7 &o2ility models7 location and [Link] management schemes7 time, movement ,profile and distance 2ased update strategies' A0I technologies' Unit I? #ERVA)IVE COM#*TING %eriods 5 %ervasive Computing7 %rinciples, Characteristics7 interaction transparency, conte/t a-are, automated e/perience capture' Architecture for pervasive computing7 %ervasive devices7em2edded controls'7 smart sensors and actuators 7Conte/t communication and access services Unit 7 ? #ROTOCOL) ( )ERVICE) %eriods 5 1pen protocols7 ,ervice discovery technologies7 ,+%, @ini, ,0%, Upn% protocolsdata synchroniAation7 ,ync&0 frame-or. 7 Conte/t a-are mo2ile services 7Conte/t a-are sensor net-or.s, addressing and communications' Conte/t a-are security' Total %eriods B$ Reference,Ivan ,to3menovic , (and2oo. of 6ireless Cet-or.s and &o2ile Computing, @ohn 6iley 4 sons Inc, *' Canada, "##"' "' Aso.e D [Link],)oopa ) Eavagal,&o2ile Computing, Tata &c;ra- (ill %u2 Co' , Ce- +elhi, "##$' [Link] Rea/ing,*' ,eng 0o.e, Conte/t7A-are Computing %ervasive ,ystems, Auer2ach %u2', Ce- Eor., "##!' "' U-e (ansmann etl , %ervasive Computing, ,pringer, Ce- Eor.,"##*'

TEXT BOOKS:

1. Jochen Burkhardt, Horst Henn, Stefan Hepper, Thomas Schaec & Klaus

!ndtorff. """

#er$as!$e %omput!n& Technolo&' and (rch!tecture of )o*!le +nternet (ppl!cat!ons, (dd!s!on ,esle', ead!n&, -..-.

-. /0e Ha nsman, 1othat )erk, )art!n S 2!cklous & Thomas Sto*er: #r!nc!ples of )o*!le %omput!n&, Second Ed!t!on, Spr!n&er" 3erla&, 2e0 4elh!, -..5. E6E E2%E BOOKS: 1. ahul Baner7ee: +nternet0ork!n& Technolo&!es: (n En&!neer!n& #erspect!$e, #rent!ce 8Hall of

+nd!a, 2e0 4elh!, -..5. 9+SB2 :1"-.5"-1:;";< -. ahul Baner7ee: 1ecture 2otes !n #er$as!$e %omput!n&, Outl!ne 2otes,

B+TS"#!lan!, -..5. TEXT BOOKS: 1. Jochen Sch!ller, =)o*!le %ommun!cat!ons>, #H+, Second Ed!t!on, -..5. -. Jochen Burkhardt, #er$as!$e %omput!n&: Technolo&' and (rch!tecture of )o*!le +nternet (ppl!cat!ons, (dd!son",esle' #rofess!onal? 5rd ed!t!on, -..@ E6E E2%ES: 1. 6rank (delste!n, Sandeep KS Aupta, Aolden !chard, 6undamentals of )o*!le and #er$as!$e %omput!n&, )cAra0"H!ll -..; -. 4e*ash!s Saha, 2et0ork!n& +nfrastructure for #er$as!$e %omput!n&: Ena*l!n& Technolo&!es, Klu0er (cadem!c #u*l!sher, Spr!n&er? 6!rst ed!t!on, -..5. +ntroduct!on to ,!reless and )o*!le S'stems *' (&ra0al and Ben&, BrooksC %ole 9Thomson 1earn!n&<, 6!rst ed!t!on, -..D. /0e Hansmann, 1othar )erk, )art!n S. 2!cklons and Thomas Sto*er, #r!nc!ples of )o*!le %omput!n&, Spr!n&er, 2e0 Eork, -..5. 1. [Link]!ller, =)o*!le %ommun!cat!on>, (dd!son ,esle', -.... - .+$an Sto7meno$!c , Hand*ook of ,!reless 2et0orks and )o*!le %omput!n&, John ,!le' & sons +nc, %anada, -..-. 5. (soke K Taukder, oopa Ea$a&al, )o*!le %omput!n&, Tata )cAra0 H!ll #u*

%o. , 2e0 4elh!, -..;. D. ,!ll!am Stall!n&s, =,!reless %ommun!cat!on and 2et0orks>, #earson Educat!on, -..5. 1. Sen& 1oke, %onteFt"(0are %omput!n& #er$as!$e S'stems, (uer*ach #u*., 2e0 Eork, -..@. -. /0e Hansmann etl , #er$as!$e %omput!n&, Spr!n&er, 2e0 Eork,-..1. 5. Jochen Burkhardt, , Stefan Hepper, Klaus !ndtorff, Thomas Schaeck >#er$as!$e %omput!n&"Technolo&' and (rch!tecture of )o*!le +nternet (ppl!cat!on>,#earson Educat!on,s!Fth Ed!t!on -..G.

You might also like