Upload
sushil-singh
View
217
Download
0
Embed Size (px)
Citation preview
8/2/2019 Mobile Computing Chk
1/7
Mobile computing
Introduction
Mobile computing is a form of humancomputer interaction by which a computer is
expected to be transported during normal usage. Mobile computing has three aspects:mobile communication, mobile hardware, and mobile software.
The first aspect addresses Communication issues in ad-hoc and infrastructure networks
as well as communication properties, protocols, data formats and concrete technologies.
The second aspect is on the hardware, e.g., mobile devices or device components. The
third aspect deals with the characteristics and requirements of mobile applications.
Definitions
Mobile computing is "taking a computer and all necessary files and software out into the field.
"Mobile computing: being able to use a computing device even when being mobile and therefore changing
location. Portability is one aspect of mobile computing.
"Mobile computing is the ability to use computing capability without a pre-defined location and/or connection to a
network to publish and/or subscribe to information." Uwe Vieille, ACM.org
Mobile Computing is a variety of wireless devices that has the mobility to allow people to connect to the internet,
providing wireless transmission to access data and information from where ever location they may be.
Devices
Many types of mobile computers have been introduced since the 1990s including the:
Carputer Personal digital assistant/enterprise digital assistant Smartphone Tablet computer Ultra-Mobile PC Wearable computer
http://en.wikipedia.org/wiki/Human%E2%80%93computer_interactionhttp://en.wikipedia.org/wiki/Human%E2%80%93computer_interactionhttp://en.wikipedia.org/wiki/Human%E2%80%93computer_interactionhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/1990http://en.wikipedia.org/wiki/Carputerhttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Enterprise_digital_assistanthttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Ultra-Mobile_PChttp://en.wikipedia.org/wiki/Wearable_computerhttp://en.wikipedia.org/wiki/Wearable_computerhttp://en.wikipedia.org/wiki/Ultra-Mobile_PChttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Enterprise_digital_assistanthttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Carputerhttp://en.wikipedia.org/wiki/1990http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Human%E2%80%93computer_interaction8/2/2019 Mobile Computing Chk
2/7
Limitations
Insufficient bandwidth: Mobile Internet access is generally slower than direct cable connections, usingtechnologies such as GPRS and EDGE, and more recently HSDPA and HSUPA 3G networks. These networks
are usually available within range of commercial cell phone towers. Higher speed wireless LANs are
inexpensive but have very limited range.
Security standards: When working mobile, one is dependent on public networks, requiring careful use ofVPN. Security is a major concern while concerning the mobile computing standards on the fleet. One can
easily attack the VPN through a huge number of networks interconnected through the line.
Power consumption: When a power outlet or portable generator is not available, mobile computers mustrely entirely on battery power. Combined with the compact size of many mobile devices, this often means
unusually expensive batteries must be used to obtain the necessary battery life.
Transmission interferences: Weather, terrain, and the range from the nearest signal point can allinterfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.
Potential health hazards: People who use mobile devices while driving are often distracted from drivingand are thus assumed more likely to be involved in traffic accidents. (While this may seem obvious, there
is considerable discussion about whether banning mobile device use while driving reduces accidents or
not.) Cell phones may interfere with sensitive medical devices. There are allegations that cell phonesignals may cause health problems.
Human interface with device: Screens and keyboards tend to be small, which may make them hard touse. Alternate input methods such as speech or handwriting recognition require training.
Security Issues involved in Mobile Computing
As oppose to the benefits of being able to access information from any location through wireless transmission,
there is it faults with the need for security protection. In a wireless mobile communication environment, the
messages transmitted over the wireless medium are more susceptible to eavesdropping than in a wired network.Also, it is possible for any user to access the mobile communication system using false identity.
In order to provide security from eavesdropping or false identities, systems use encryption. Which provides
confidentiality of the messages sent over wireless channel and to authenticate. The main idea is to conceal the
content of the messages before transmitting them in clear (radio signals).
http://en.wikipedia.org/wiki/GPRShttp://en.wikipedia.org/wiki/EDGEhttp://en.wikipedia.org/wiki/HSDPAhttp://en.wikipedia.org/wiki/HSUPAhttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Virtual_private_networkshttp://en.wikipedia.org/wiki/Virtual_private_networkshttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/HSUPAhttp://en.wikipedia.org/wiki/HSDPAhttp://en.wikipedia.org/wiki/EDGEhttp://en.wikipedia.org/wiki/GPRS8/2/2019 Mobile Computing Chk
3/7
Portable computing devices
There are several categories of portable computing devices that can run on batteries but are not usually classified
as laptops: portable computers, keyboard less tablet PCs, Internet tablets, PDAs, ultra mobile PCs (UMPCs) and
smartphones.
A portable computer is a general-purpose computer that can be easily moved from place to place, but cannot be
used while in transit, usually because it requires some "setting-up" and an AC power source. The most famous
example is the Osborne 1. Portable computers are also called a "transportable" or a "luggable" PC.
A tablet computer that lacks a keyboard (also known as a non-convertible tablet) is shaped like slate or a paper
notebook, features a touch screen with a stylus and handwriting recognition software. Tablets may not be best
suited for applications requiring a physical keyboard for typing, but are otherwise capable of carrying out most
tasks that an ordinary laptop would be able to perform.
A personal digital assistant (PDA) is a small, usually pocket-sized, computer with limited functionality. It is intended
to supplement and to synchronize with a desktop computer, giving access to contacts, address book, notes, e -mail
and other features.
A Palm TX PDA
A PDA with a web browser is an Internet tablet, an Internet appliance in tablet form. Unlike a tablet PC, an
Internet tablet does not have much computing power and its applications suite is limited, and it can not replace a
general purpose computer. Internet tablets typically feature an MP3 and video player, a web browser, a chat
application and a picture viewer.
An ultra mobile PC is a full-featured, PDA-sized computer running a general-purpose operating system.
A smartphone has a wide range of features and installable applications.
A carputer is a computing device installed in an automobile. It operates as a wireless computer, sound system,
GPS, and DVD player. It also contains word processing software and is Bluetooth compatible.
A Fly Fusion Pentop Computer is a computing device the size and shape of a pen. It functions as a writing utensil,
MP3 player, language translator, digital storage device, and calculator.
Boundaries that separate these categories are blurry at times. For example, the OQO UMPC is also a PDA-sized
tablet PC; the Apple eMate had the clamshell form factor of a laptop, but ran PDA software. The HP Omnibook line
of laptops included some devices small more enough to be called ultra mobile PCs.
http://en.wikipedia.org/wiki/Portable_computerhttp://en.wikipedia.org/wiki/Osborne_1http://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Palm_TXhttp://en.wikipedia.org/wiki/Internet_appliancehttp://en.wikipedia.org/wiki/Ultra_mobile_PChttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Carputerhttp://en.wikipedia.org/wiki/Fly_Fusion_Pentop_Computerhttp://en.wikipedia.org/wiki/OQOhttp://en.wikipedia.org/wiki/EMate_300http://en.wikipedia.org/wiki/HP_Omnibookhttp://en.wikipedia.org/wiki/File:PalmTX.jpghttp://en.wikipedia.org/wiki/HP_Omnibookhttp://en.wikipedia.org/wiki/EMate_300http://en.wikipedia.org/wiki/OQOhttp://en.wikipedia.org/wiki/Fly_Fusion_Pentop_Computerhttp://en.wikipedia.org/wiki/Carputerhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Ultra_mobile_PChttp://en.wikipedia.org/wiki/Internet_appliancehttp://en.wikipedia.org/wiki/Palm_TXhttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Osborne_1http://en.wikipedia.org/wiki/Portable_computer8/2/2019 Mobile Computing Chk
4/7
The hardware of the Nokia 770 internet tablet is essentially the same as that of a PDA such as the Zaurus 6000; the
only reason it's not called a PDA is that it does not have PIM software. On the other hand, both the 770 and the
Zaurus can run some desktop Linux software, usually with modifications.
Mobile data communication
Wireless data connections used in mobile computing take three general forms. Cellular data service uses
technologies such as GSM, CDMA or GPRS, and more recently 3G networks such as W-CDMA, EDGE or CDMA2000.
These networks are usually available within range of commercial cell towers. Wi-Fi connections offer higher
performance, may be either on a private business network or accessed through public hotspots, and have a typical
range of 100 feet indoors and up to 1000 feet outdoors.
Satellite Internet access covers areas where cellular and Wi-Fi are not available and may be set up anywhere the
user has a line of sight to the satellite's location, which for satellites in geostationary orbit means having an
unobstructed view of the southern sky. Some enterprise deployments combine networks from multiple cellular
networks or use a mix of cellular, Wi-Fi and satellite.
When using a mix of networks, a mobile virtual private network (mobile VPN) not only handles the security
concerns, but also performs the multiple network logins automatically and keeps the application connections aliveto prevent crashes or data loss during network transitions or coverage loss.
Advantages/ disadvantages
Very small, compact and light weight mobile computer
Less power consumption and large battery life - this may not be true, if radio communication requires more
power than to power up all necessary devices for a standalone computer on average basis.
Higher reliability of data - theft of standalone computer means everything is lost. But here all information is
stored on some static server.
But data privacy while communicating to servers via the network has to be ensured.
The performance highly dependent upon network and wireless channel conditions.
http://en.wikipedia.org/wiki/Nokia_770http://en.wikipedia.org/wiki/Sharp_Zaurushttp://en.wikipedia.org/wiki/Personal_information_managerhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/GSMhttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/General_Packet_Radio_Servicehttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/W-CDMA_%28UMTS%29http://en.wikipedia.org/wiki/Enhanced_Data_Rates_for_GSM_Evolutionhttp://en.wikipedia.org/wiki/CDMA2000http://en.wikipedia.org/wiki/Cell_sitehttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Hotspot_%28Wi-Fi%29http://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/Line-of-sight_propagationhttp://en.wikipedia.org/wiki/Geostationaryhttp://en.wikipedia.org/wiki/Mobile_virtual_private_networkhttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Loginhttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Crash_%28computing%29http://en.wikipedia.org/wiki/Crash_%28computing%29http://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Loginhttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Mobile_virtual_private_networkhttp://en.wikipedia.org/wiki/Mobile_virtual_private_networkhttp://en.wikipedia.org/wiki/Geostationaryhttp://en.wikipedia.org/wiki/Line-of-sight_propagationhttp://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/Hotspot_%28Wi-Fi%29http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Cell_sitehttp://en.wikipedia.org/wiki/CDMA2000http://en.wikipedia.org/wiki/Enhanced_Data_Rates_for_GSM_Evolutionhttp://en.wikipedia.org/wiki/W-CDMA_%28UMTS%29http://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/General_Packet_Radio_Servicehttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/GSMhttp://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Personal_information_managerhttp://en.wikipedia.org/wiki/Sharp_Zaurushttp://en.wikipedia.org/wiki/Nokia_7708/2/2019 Mobile Computing Chk
5/7
Kontron Application Story
Mobiles Computing for the Police
From a technical standpoint its not too much to expect: detectives in an
Unmarked vehicle key the license plate of the car approaching a house under surveillance into their in-vehicle
computer and the owners name appears on screen in real time. A further search for the name in the security
authoritys database shows the owner has a record and is wanted. His mugshot arrives simultaneously. The officers
react immediately and stop the car, before it reaches the place theyre watching.
Mobile Computing in Military
Pc, laptop, mobile pc.
8/2/2019 Mobile Computing Chk
6/7
APPLICATIONS OF MOBILE COMPUTING
For Estate Agents
Estate agents can work either at home or out in the field. With mobile computers they can be more productive.
They can obtain current real estate information by accessing multiple listing services, which they can do from
home, office or car when out with clients. They can provide clients with immediate feedback regarding specific
homes or neighborhoods, and with faster loan approvals, since applications can be submitted on the spot.
Therefore, mobile computers allow them to devote more time to clients.
Emergency Services
Ability to recieve information on the move is vital where the emergency services are involved. Information
regarding the address, type and other details of an incident can be dispatched quickly, via a CDPD system using
mobile computers, to one or several appropriate mobile units which are in the vicinity of the incident.
Here the reliability and security implemented in the CDPD system would be of great advantage.
Police Incident Information Screen
8/2/2019 Mobile Computing Chk
7/7
In courts
Defense counsels can take mobile computers in court. When the opposing counsel references a case which they
are not familiar, they can use the computer to get direct, real-time access to on-line legal database services, where
they can gather information on the case and related precedents. Therefore mobile computers allow immediate
access to a wealth of information, making people better informed and prepared.
In companies
Managers can use mobile computers in, say, critical presentations to major customers. They can access the latest
market share information. At a small recess, they can revise the presentation to take advantage of this
information. They can communicate with the office about possible new offers and call meetings for discussing
responds to the new proposals. Therefore, mobile computers can leverage competitive advantages.
Credit Card Verification
At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for transactions, the
intercommunication required between the bank central computer and the POS terminal, in order to effect
verification of the card usage, can take place quickly and securely over cellular channels using a mobile computerunit. This can speed up the transaction process and relieve congestion at the POS terminals.
Electronic Mail/Paging
Usage of a mobile unit to send and read emails is a very useful asset for any business individual, as it allows
him/her to keep in touch with any colleagues as well as any urgent developments that may affect their work.
Access to the Internet, using mobile computing technology, allows the individual to have vast arrays of knowledge
at his/her fingertips.
Paging is also achievable here, giving even more intercommunication capability between individuals, using a single
mobile computer device.