Mobile Computing Chk

Embed Size (px)

Citation preview

  • 8/2/2019 Mobile Computing Chk

    1/7

    Mobile computing

    Introduction

    Mobile computing is a form of humancomputer interaction by which a computer is

    expected to be transported during normal usage. Mobile computing has three aspects:mobile communication, mobile hardware, and mobile software.

    The first aspect addresses Communication issues in ad-hoc and infrastructure networks

    as well as communication properties, protocols, data formats and concrete technologies.

    The second aspect is on the hardware, e.g., mobile devices or device components. The

    third aspect deals with the characteristics and requirements of mobile applications.

    Definitions

    Mobile computing is "taking a computer and all necessary files and software out into the field.

    "Mobile computing: being able to use a computing device even when being mobile and therefore changing

    location. Portability is one aspect of mobile computing.

    "Mobile computing is the ability to use computing capability without a pre-defined location and/or connection to a

    network to publish and/or subscribe to information." Uwe Vieille, ACM.org

    Mobile Computing is a variety of wireless devices that has the mobility to allow people to connect to the internet,

    providing wireless transmission to access data and information from where ever location they may be.

    Devices

    Many types of mobile computers have been introduced since the 1990s including the:

    Carputer Personal digital assistant/enterprise digital assistant Smartphone Tablet computer Ultra-Mobile PC Wearable computer

    http://en.wikipedia.org/wiki/Human%E2%80%93computer_interactionhttp://en.wikipedia.org/wiki/Human%E2%80%93computer_interactionhttp://en.wikipedia.org/wiki/Human%E2%80%93computer_interactionhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/1990http://en.wikipedia.org/wiki/Carputerhttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Enterprise_digital_assistanthttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Ultra-Mobile_PChttp://en.wikipedia.org/wiki/Wearable_computerhttp://en.wikipedia.org/wiki/Wearable_computerhttp://en.wikipedia.org/wiki/Ultra-Mobile_PChttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Enterprise_digital_assistanthttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Carputerhttp://en.wikipedia.org/wiki/1990http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Human%E2%80%93computer_interaction
  • 8/2/2019 Mobile Computing Chk

    2/7

    Limitations

    Insufficient bandwidth: Mobile Internet access is generally slower than direct cable connections, usingtechnologies such as GPRS and EDGE, and more recently HSDPA and HSUPA 3G networks. These networks

    are usually available within range of commercial cell phone towers. Higher speed wireless LANs are

    inexpensive but have very limited range.

    Security standards: When working mobile, one is dependent on public networks, requiring careful use ofVPN. Security is a major concern while concerning the mobile computing standards on the fleet. One can

    easily attack the VPN through a huge number of networks interconnected through the line.

    Power consumption: When a power outlet or portable generator is not available, mobile computers mustrely entirely on battery power. Combined with the compact size of many mobile devices, this often means

    unusually expensive batteries must be used to obtain the necessary battery life.

    Transmission interferences: Weather, terrain, and the range from the nearest signal point can allinterfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.

    Potential health hazards: People who use mobile devices while driving are often distracted from drivingand are thus assumed more likely to be involved in traffic accidents. (While this may seem obvious, there

    is considerable discussion about whether banning mobile device use while driving reduces accidents or

    not.) Cell phones may interfere with sensitive medical devices. There are allegations that cell phonesignals may cause health problems.

    Human interface with device: Screens and keyboards tend to be small, which may make them hard touse. Alternate input methods such as speech or handwriting recognition require training.

    Security Issues involved in Mobile Computing

    As oppose to the benefits of being able to access information from any location through wireless transmission,

    there is it faults with the need for security protection. In a wireless mobile communication environment, the

    messages transmitted over the wireless medium are more susceptible to eavesdropping than in a wired network.Also, it is possible for any user to access the mobile communication system using false identity.

    In order to provide security from eavesdropping or false identities, systems use encryption. Which provides

    confidentiality of the messages sent over wireless channel and to authenticate. The main idea is to conceal the

    content of the messages before transmitting them in clear (radio signals).

    http://en.wikipedia.org/wiki/GPRShttp://en.wikipedia.org/wiki/EDGEhttp://en.wikipedia.org/wiki/HSDPAhttp://en.wikipedia.org/wiki/HSUPAhttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Virtual_private_networkshttp://en.wikipedia.org/wiki/Virtual_private_networkshttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/HSUPAhttp://en.wikipedia.org/wiki/HSDPAhttp://en.wikipedia.org/wiki/EDGEhttp://en.wikipedia.org/wiki/GPRS
  • 8/2/2019 Mobile Computing Chk

    3/7

    Portable computing devices

    There are several categories of portable computing devices that can run on batteries but are not usually classified

    as laptops: portable computers, keyboard less tablet PCs, Internet tablets, PDAs, ultra mobile PCs (UMPCs) and

    smartphones.

    A portable computer is a general-purpose computer that can be easily moved from place to place, but cannot be

    used while in transit, usually because it requires some "setting-up" and an AC power source. The most famous

    example is the Osborne 1. Portable computers are also called a "transportable" or a "luggable" PC.

    A tablet computer that lacks a keyboard (also known as a non-convertible tablet) is shaped like slate or a paper

    notebook, features a touch screen with a stylus and handwriting recognition software. Tablets may not be best

    suited for applications requiring a physical keyboard for typing, but are otherwise capable of carrying out most

    tasks that an ordinary laptop would be able to perform.

    A personal digital assistant (PDA) is a small, usually pocket-sized, computer with limited functionality. It is intended

    to supplement and to synchronize with a desktop computer, giving access to contacts, address book, notes, e -mail

    and other features.

    A Palm TX PDA

    A PDA with a web browser is an Internet tablet, an Internet appliance in tablet form. Unlike a tablet PC, an

    Internet tablet does not have much computing power and its applications suite is limited, and it can not replace a

    general purpose computer. Internet tablets typically feature an MP3 and video player, a web browser, a chat

    application and a picture viewer.

    An ultra mobile PC is a full-featured, PDA-sized computer running a general-purpose operating system.

    A smartphone has a wide range of features and installable applications.

    A carputer is a computing device installed in an automobile. It operates as a wireless computer, sound system,

    GPS, and DVD player. It also contains word processing software and is Bluetooth compatible.

    A Fly Fusion Pentop Computer is a computing device the size and shape of a pen. It functions as a writing utensil,

    MP3 player, language translator, digital storage device, and calculator.

    Boundaries that separate these categories are blurry at times. For example, the OQO UMPC is also a PDA-sized

    tablet PC; the Apple eMate had the clamshell form factor of a laptop, but ran PDA software. The HP Omnibook line

    of laptops included some devices small more enough to be called ultra mobile PCs.

    http://en.wikipedia.org/wiki/Portable_computerhttp://en.wikipedia.org/wiki/Osborne_1http://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Palm_TXhttp://en.wikipedia.org/wiki/Internet_appliancehttp://en.wikipedia.org/wiki/Ultra_mobile_PChttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Carputerhttp://en.wikipedia.org/wiki/Fly_Fusion_Pentop_Computerhttp://en.wikipedia.org/wiki/OQOhttp://en.wikipedia.org/wiki/EMate_300http://en.wikipedia.org/wiki/HP_Omnibookhttp://en.wikipedia.org/wiki/File:PalmTX.jpghttp://en.wikipedia.org/wiki/HP_Omnibookhttp://en.wikipedia.org/wiki/EMate_300http://en.wikipedia.org/wiki/OQOhttp://en.wikipedia.org/wiki/Fly_Fusion_Pentop_Computerhttp://en.wikipedia.org/wiki/Carputerhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Ultra_mobile_PChttp://en.wikipedia.org/wiki/Internet_appliancehttp://en.wikipedia.org/wiki/Palm_TXhttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Osborne_1http://en.wikipedia.org/wiki/Portable_computer
  • 8/2/2019 Mobile Computing Chk

    4/7

    The hardware of the Nokia 770 internet tablet is essentially the same as that of a PDA such as the Zaurus 6000; the

    only reason it's not called a PDA is that it does not have PIM software. On the other hand, both the 770 and the

    Zaurus can run some desktop Linux software, usually with modifications.

    Mobile data communication

    Wireless data connections used in mobile computing take three general forms. Cellular data service uses

    technologies such as GSM, CDMA or GPRS, and more recently 3G networks such as W-CDMA, EDGE or CDMA2000.

    These networks are usually available within range of commercial cell towers. Wi-Fi connections offer higher

    performance, may be either on a private business network or accessed through public hotspots, and have a typical

    range of 100 feet indoors and up to 1000 feet outdoors.

    Satellite Internet access covers areas where cellular and Wi-Fi are not available and may be set up anywhere the

    user has a line of sight to the satellite's location, which for satellites in geostationary orbit means having an

    unobstructed view of the southern sky. Some enterprise deployments combine networks from multiple cellular

    networks or use a mix of cellular, Wi-Fi and satellite.

    When using a mix of networks, a mobile virtual private network (mobile VPN) not only handles the security

    concerns, but also performs the multiple network logins automatically and keeps the application connections aliveto prevent crashes or data loss during network transitions or coverage loss.

    Advantages/ disadvantages

    Very small, compact and light weight mobile computer

    Less power consumption and large battery life - this may not be true, if radio communication requires more

    power than to power up all necessary devices for a standalone computer on average basis.

    Higher reliability of data - theft of standalone computer means everything is lost. But here all information is

    stored on some static server.

    But data privacy while communicating to servers via the network has to be ensured.

    The performance highly dependent upon network and wireless channel conditions.

    http://en.wikipedia.org/wiki/Nokia_770http://en.wikipedia.org/wiki/Sharp_Zaurushttp://en.wikipedia.org/wiki/Personal_information_managerhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/GSMhttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/General_Packet_Radio_Servicehttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/W-CDMA_%28UMTS%29http://en.wikipedia.org/wiki/Enhanced_Data_Rates_for_GSM_Evolutionhttp://en.wikipedia.org/wiki/CDMA2000http://en.wikipedia.org/wiki/Cell_sitehttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Hotspot_%28Wi-Fi%29http://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/Line-of-sight_propagationhttp://en.wikipedia.org/wiki/Geostationaryhttp://en.wikipedia.org/wiki/Mobile_virtual_private_networkhttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Loginhttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Crash_%28computing%29http://en.wikipedia.org/wiki/Crash_%28computing%29http://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Loginhttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Mobile_virtual_private_networkhttp://en.wikipedia.org/wiki/Mobile_virtual_private_networkhttp://en.wikipedia.org/wiki/Geostationaryhttp://en.wikipedia.org/wiki/Line-of-sight_propagationhttp://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/Hotspot_%28Wi-Fi%29http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Cell_sitehttp://en.wikipedia.org/wiki/CDMA2000http://en.wikipedia.org/wiki/Enhanced_Data_Rates_for_GSM_Evolutionhttp://en.wikipedia.org/wiki/W-CDMA_%28UMTS%29http://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/General_Packet_Radio_Servicehttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/GSMhttp://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Personal_information_managerhttp://en.wikipedia.org/wiki/Sharp_Zaurushttp://en.wikipedia.org/wiki/Nokia_770
  • 8/2/2019 Mobile Computing Chk

    5/7

    Kontron Application Story

    Mobiles Computing for the Police

    From a technical standpoint its not too much to expect: detectives in an

    Unmarked vehicle key the license plate of the car approaching a house under surveillance into their in-vehicle

    computer and the owners name appears on screen in real time. A further search for the name in the security

    authoritys database shows the owner has a record and is wanted. His mugshot arrives simultaneously. The officers

    react immediately and stop the car, before it reaches the place theyre watching.

    Mobile Computing in Military

    Pc, laptop, mobile pc.

  • 8/2/2019 Mobile Computing Chk

    6/7

    APPLICATIONS OF MOBILE COMPUTING

    For Estate Agents

    Estate agents can work either at home or out in the field. With mobile computers they can be more productive.

    They can obtain current real estate information by accessing multiple listing services, which they can do from

    home, office or car when out with clients. They can provide clients with immediate feedback regarding specific

    homes or neighborhoods, and with faster loan approvals, since applications can be submitted on the spot.

    Therefore, mobile computers allow them to devote more time to clients.

    Emergency Services

    Ability to recieve information on the move is vital where the emergency services are involved. Information

    regarding the address, type and other details of an incident can be dispatched quickly, via a CDPD system using

    mobile computers, to one or several appropriate mobile units which are in the vicinity of the incident.

    Here the reliability and security implemented in the CDPD system would be of great advantage.

    Police Incident Information Screen

  • 8/2/2019 Mobile Computing Chk

    7/7

    In courts

    Defense counsels can take mobile computers in court. When the opposing counsel references a case which they

    are not familiar, they can use the computer to get direct, real-time access to on-line legal database services, where

    they can gather information on the case and related precedents. Therefore mobile computers allow immediate

    access to a wealth of information, making people better informed and prepared.

    In companies

    Managers can use mobile computers in, say, critical presentations to major customers. They can access the latest

    market share information. At a small recess, they can revise the presentation to take advantage of this

    information. They can communicate with the office about possible new offers and call meetings for discussing

    responds to the new proposals. Therefore, mobile computers can leverage competitive advantages.

    Credit Card Verification

    At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for transactions, the

    intercommunication required between the bank central computer and the POS terminal, in order to effect

    verification of the card usage, can take place quickly and securely over cellular channels using a mobile computerunit. This can speed up the transaction process and relieve congestion at the POS terminals.

    Electronic Mail/Paging

    Usage of a mobile unit to send and read emails is a very useful asset for any business individual, as it allows

    him/her to keep in touch with any colleagues as well as any urgent developments that may affect their work.

    Access to the Internet, using mobile computing technology, allows the individual to have vast arrays of knowledge

    at his/her fingertips.

    Paging is also achievable here, giving even more intercommunication capability between individuals, using a single

    mobile computer device.