Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Mobile Computing
Jiems akkalkuwa Page 1
CHAPTER: 1 INTRODUCTION
A technology that allows transmission of data, via a computer, without having to be
connected to a fixed physical link Mobile voice communication is widely established
throughout the world and has had a very rapid increase in the number of subscribers to
the various cellular networks over the across these cellular networks. This is the principle
of mobile computing. Technology as it allows users to transmit data from remote
locations to other remote or fixed locations. This proves to be the solution to the biggest
problem of business people on the move - mobility. In this article we give an overview of
existing cellular networks and describe in detail the CDPD technology which allows data
communications across these networks. Finally, we look at the applications of Mobile
Computing in the real world.
Fig 1.1 wireless device
Mobile Computing
Jiems akkalkuwa Page 2
CHAPTER: 2 LITRATURE SURVEY
Collaboration among mobile devices: As the mobile devices have certain resource
constraints, there arises a need to get resources from external sources. One of the ways to
overcome this problem is getting resources from a cloud, but the access to such platforms
is not always guaranteed or/and is too expensive .Huerta-Canepa in presents the
guidelines for a framework that mimics a traditional cloud provider using mobile devices
in the vicinity of users. The framework detects nearby nodes that are in a stable mode,
meaning that will remain on the same area or follow the same movement pattern. If nodes
in that state are found, then the target provider for the application is changed, reflecting a
virtual provider created on-the-fly among users. In scenarios like downloading a
description file at a museum, collocation increases the chancesof people willing to
perform common tasks. To save the resources like energy and processing power, the
collocated mobile devices can collaboratively act as a local cloud and split the task into
smaller subtasks to be performed on different devices. The results can then be aggregated
and shared. The proposed approach allows avoiding a connection to infrastructure-based
cloud providers while maintaining the main benefits of offloading.
SPACCE concept in providing calculation capacity of PCs is proposed to facilitate
distributed collaboration. A SPACCE is a sophisticated ad hoc cloud computing
environment that can be built according to the needs that occur at any given time on a set
of personal, i.e., non-dedicated, PCs and dynamically migrate a server[13] for application
sharing to another PC. By migrating the server , redundant calculation capacity of PCs
can be utilized for creating a SPACCE, where the response time of the application shared
among users is improved.
A SPACCE provides the available calculation capacity of a PC as the server for
collaboration to other PCs which have no application and/or not enough calculation
capacity to be the server on demand.
Mobile Computing
Jiems akkalkuwa Page 3
CHAPTER: 3 EXISTING SYSTEM
3.1EXISTING CELLULAR NETWORK ARCHITECTURE:
Mobile telephony took off with the introduction of cellular technology which
allowed the efficient utilization of frequencies enabling the connection of a large number
of users. During the 1980's analogue technology was used. A cellular network consists of
mobile units linked together to switching equipment, which interconnect the different
parts of the network and allow access to the fixed Public Switched Telephone Network
(PSTN). The technology is hidden from view; it's incorporated in a number of
transceivers called Base Stations (BS). Every BS is located at a strategically selected
place and covers a given area or cell - hence the name cellular communications. A
number of adjacent cells grouped together form an area and the corresponding BSs
communicate through a so called Mobile Switching Centre (MSC). The MSC is the heart
of a cellular radio system. It is responsible for routing, or switching, calls from the
originator to the designator. It can be thought of managing the cell, being responsible for
set-up, routing control and termination of the call,
Fig 3.1 Existing Cellular Network Architecture
for management inter MSC hand over and supplementary services, and for collecting
charging and accounting information. The MSC may be connected to other MSCs on the
same network or to the PSTN.
Mobile Computing
Jiems akkalkuwa Page 4
CHAPTER: 4 PROPOSED SYSTEM
The purpose of these guidelines is to provide direction for the appropriate usage,
including access and support, of Mobile Computing Devices on the NOCCCD network.
The network exists to meet the instructional mission of the colleges and district. The
guidelines apply to many types of devices including but not limited to Laptops, Smart
phones (phones with data/network connectivity capabilities), portable storage devices,
tablet devices, and other mobile devices. The key reasons for the creation of these
guidelines are: to insure uninterrupted support of our instructional mission;
 To protect the District and the colleges from legal liability;
 To meet legal requirements;
 To protect the network so that all can use it;
 To protect the data housed in the systems on the network and;
 To insure that devices can be properly supported for effective use.
Mobile Computing
Jiems akkalkuwa Page 5
CHAPTER: 5 ADVANTAGES & DISADVANTAGE
5.1Advantages:
1- Increase in Productivity- Mobile devices can be used out in the field of various
companies, therefore reducing the time and cost for clients and themselves.
2- Entertainment- Mobile devices can be used for entertainment purposes, for personal
and even for presentations to people and clients.
3- Portability- this would be one of the main advantages of mobile computing, you are
not restricted to one location in order for you to get jobs done or even access email on the
go
4- Cloud Computing- This service is available for saving documents on a online server
and being able to access them anytime and anywhere when you have a connection to the
internet and can access these files on several mobile devices or even PCs at home.
Mobile Computing
Jiems akkalkuwa Page 6
5.2Disadvantages:
1- Quality of connectivity- as one of the disadvantages, mobile devices will need
either Wi-Fi connectivity or mobile network connectivity such as GPRS, 3G and in some
countries even 4G connectivity that is why this is a disadvantage because if you are not
near any of these connections your access to the internet is very limited.
2- Security concerns- Mobile VPNs are unsafe to connect to, and also syncing devices
might also lead to security concerns. Accessing a Wi-Fi network can also be risky
because WPA and WEP security can be bypassed easily.
3- Power Consumption- due to the use of batteries in these devices, these do not tend to
last long, if in a situation where there is no source of power for charging then that will
certainly be a letdown.
Mobile Computing
Jiems akkalkuwa Page 7
CHAPTER: 6 APPLICATIONS
1) For Estate Agents
2) Emergency Services
3) Credit Card Verification
4) Taxi/Truck Dispatch
5) Electronic Mail/Paging
6.1) For Estate Agents
Estate agents can work either at home or out in the field. With mobile computers they can
be more productive. They can obtain current real estate information by accessing multiple
listing services, which they can do from home, office or car when out with clients. They
can provide clients with immediate feedback regarding specific homes or neighborhoods,
and with faster loan approvals, since applications can be submitted on the spot.
Therefore, mobile computers allow them to devote more time to clients.
6.2) Emergency Services
Ability to receive information on the move is vital where the emergency services are
involved. Information regarding the address, type and other details of an incident can be
dispatched quickly, via a CDPD system using mobile computers, to one or several
appropriate mobile units which are in the vicinity of the incident. Here the reliability and
security implemented in the CDPD system would be of great advantage.
Fig. Police Incident Information Screen
Mobile Computing
Jiems akkalkuwa Page 8
6.3) Credit Card Verification
At Point of Sale (POS) terminals in shops and supermarkets, when customers use
credit cards for transactions, the intercommunication required between the bank
central computer and the POS terminal, in order to effect verification of the card
usage, can take place quickly and securely over cellular channels using a mobile
computer unit. This can speed up the transaction process and relieve congestion at
the POS terminals.
6.4 Taxi/Truck Dispatch
Using the idea of a centrally controlled dispatcher with several mobile units
(taxis), mobile computing allows the taxis to be given full details of the
dispatched job as well as allowing the taxis to communicate information about
their whereabouts back to the central dispatch office. This system is also
extremely useful in secure deliveries i.e.: Securicor. This allows a central
computer to be able to track and receive status information from all of its mobile
secure delivery vans.
6.5 Electronic Mail/Paging
Usage of a mobile unit to send and read emails is a very useful asset for any
business individual, as it allows him/her to keep in touch with any colleagues as
well as any urgent developments that may affect their work. Access to the
Internet, using mobile computing technology, allows the individual to have vast
arrays of knowledge at his/her fingertips.
Mobile Computing
Jiems akkalkuwa Page 9
CHAPTER:7 FUTURE SCOPE & CONCLUSION
FUTURE SCOPE:
7.1 With the rapid technological advancements in Artificial Intelligence,
Integrated
Circuitry and increases in Computer Processor speeds, the future of mobile
computing looks increasingly exciting.
7.2 With the emphasis increasingly on compact, small mobile computers, it may also be
possible to have all the practicality of a mobile computer in the size of a hand held
organizer or even smaller.
7.3 Use of Artificial Intelligence may allow mobile units to be the ultimate in personal
secretaries, which can receive emails and paging messages, understand what they are
about, and change the individual’s personal schedule according to the message. This can
then be checked by the individual to plan his/her day.
7.4 The working lifestyle will change, with the majority of people working from home,
rather than commuting. This may be beneficial to the environment as less transportation
will be utilized. This mobility aspect may be carried further in that, even in social
spheres, people will interact via mobile stations.
.CONCLUSION:
According to my aims and objectives of this paper I have done the detailed
research and get the knowledge about it and the factors that need to be consider carefully.
At this stage we are facing different types of problems and threats to the mobile industry,
the two major aspects are the security and the usability issue. Detailed analysis of
security issues is very important at least for a mobile wireless device, there are numbers
of ways that it can be compromised, but I would like to draw an attention on the usability
issues as well. They both need to be carefully planned and designed that the mobile user
or target audience get used to it easily, effectively and securely.
Mobile Computing
Jiems akkalkuwa Page 10
CHAPTER:8 REFERENCES:
 Interview with Mr Eleftherios Koudounas, Assistant Commercial Services
Manager at Cyprus Telecommunications Authority
 Interview with Dr Leonidas Leonidou, Mobile Services, Cyprus
telecommunications Authority
 www.w3school.com
 Www. Ijecs.in
 www.studymafia.com
 Network Switching Techniques-Circuit, Packet and Datagram: Halsall, Fred. Data
Communications, Computer Networks and Open Systems. 4th edition 1996. pp
424-459.
 Asynchronous Transfer Mode , Solution for Broadband ISDN, Third edition
1993, By Martin de Prycker

More Related Content

4 (mobile computing)

  • 1. Mobile Computing Jiems akkalkuwa Page 1 CHAPTER: 1 INTRODUCTION A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the across these cellular networks. This is the principle of mobile computing. Technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move - mobility. In this article we give an overview of existing cellular networks and describe in detail the CDPD technology which allows data communications across these networks. Finally, we look at the applications of Mobile Computing in the real world. Fig 1.1 wireless device
  • 2. Mobile Computing Jiems akkalkuwa Page 2 CHAPTER: 2 LITRATURE SURVEY Collaboration among mobile devices: As the mobile devices have certain resource constraints, there arises a need to get resources from external sources. One of the ways to overcome this problem is getting resources from a cloud, but the access to such platforms is not always guaranteed or/and is too expensive .Huerta-Canepa in presents the guidelines for a framework that mimics a traditional cloud provider using mobile devices in the vicinity of users. The framework detects nearby nodes that are in a stable mode, meaning that will remain on the same area or follow the same movement pattern. If nodes in that state are found, then the target provider for the application is changed, reflecting a virtual provider created on-the-fly among users. In scenarios like downloading a description file at a museum, collocation increases the chancesof people willing to perform common tasks. To save the resources like energy and processing power, the collocated mobile devices can collaboratively act as a local cloud and split the task into smaller subtasks to be performed on different devices. The results can then be aggregated and shared. The proposed approach allows avoiding a connection to infrastructure-based cloud providers while maintaining the main benefits of offloading. SPACCE concept in providing calculation capacity of PCs is proposed to facilitate distributed collaboration. A SPACCE is a sophisticated ad hoc cloud computing environment that can be built according to the needs that occur at any given time on a set of personal, i.e., non-dedicated, PCs and dynamically migrate a server[13] for application sharing to another PC. By migrating the server , redundant calculation capacity of PCs can be utilized for creating a SPACCE, where the response time of the application shared among users is improved. A SPACCE provides the available calculation capacity of a PC as the server for collaboration to other PCs which have no application and/or not enough calculation capacity to be the server on demand.
  • 3. Mobile Computing Jiems akkalkuwa Page 3 CHAPTER: 3 EXISTING SYSTEM 3.1EXISTING CELLULAR NETWORK ARCHITECTURE: Mobile telephony took off with the introduction of cellular technology which allowed the efficient utilization of frequencies enabling the connection of a large number of users. During the 1980's analogue technology was used. A cellular network consists of mobile units linked together to switching equipment, which interconnect the different parts of the network and allow access to the fixed Public Switched Telephone Network (PSTN). The technology is hidden from view; it's incorporated in a number of transceivers called Base Stations (BS). Every BS is located at a strategically selected place and covers a given area or cell - hence the name cellular communications. A number of adjacent cells grouped together form an area and the corresponding BSs communicate through a so called Mobile Switching Centre (MSC). The MSC is the heart of a cellular radio system. It is responsible for routing, or switching, calls from the originator to the designator. It can be thought of managing the cell, being responsible for set-up, routing control and termination of the call, Fig 3.1 Existing Cellular Network Architecture for management inter MSC hand over and supplementary services, and for collecting charging and accounting information. The MSC may be connected to other MSCs on the same network or to the PSTN.
  • 4. Mobile Computing Jiems akkalkuwa Page 4 CHAPTER: 4 PROPOSED SYSTEM The purpose of these guidelines is to provide direction for the appropriate usage, including access and support, of Mobile Computing Devices on the NOCCCD network. The network exists to meet the instructional mission of the colleges and district. The guidelines apply to many types of devices including but not limited to Laptops, Smart phones (phones with data/network connectivity capabilities), portable storage devices, tablet devices, and other mobile devices. The key reasons for the creation of these guidelines are: to insure uninterrupted support of our instructional mission;  To protect the District and the colleges from legal liability;  To meet legal requirements;  To protect the network so that all can use it;  To protect the data housed in the systems on the network and;  To insure that devices can be properly supported for effective use.
  • 5. Mobile Computing Jiems akkalkuwa Page 5 CHAPTER: 5 ADVANTAGES & DISADVANTAGE 5.1Advantages: 1- Increase in Productivity- Mobile devices can be used out in the field of various companies, therefore reducing the time and cost for clients and themselves. 2- Entertainment- Mobile devices can be used for entertainment purposes, for personal and even for presentations to people and clients. 3- Portability- this would be one of the main advantages of mobile computing, you are not restricted to one location in order for you to get jobs done or even access email on the go 4- Cloud Computing- This service is available for saving documents on a online server and being able to access them anytime and anywhere when you have a connection to the internet and can access these files on several mobile devices or even PCs at home.
  • 6. Mobile Computing Jiems akkalkuwa Page 6 5.2Disadvantages: 1- Quality of connectivity- as one of the disadvantages, mobile devices will need either Wi-Fi connectivity or mobile network connectivity such as GPRS, 3G and in some countries even 4G connectivity that is why this is a disadvantage because if you are not near any of these connections your access to the internet is very limited. 2- Security concerns- Mobile VPNs are unsafe to connect to, and also syncing devices might also lead to security concerns. Accessing a Wi-Fi network can also be risky because WPA and WEP security can be bypassed easily. 3- Power Consumption- due to the use of batteries in these devices, these do not tend to last long, if in a situation where there is no source of power for charging then that will certainly be a letdown.
  • 7. Mobile Computing Jiems akkalkuwa Page 7 CHAPTER: 6 APPLICATIONS 1) For Estate Agents 2) Emergency Services 3) Credit Card Verification 4) Taxi/Truck Dispatch 5) Electronic Mail/Paging 6.1) For Estate Agents Estate agents can work either at home or out in the field. With mobile computers they can be more productive. They can obtain current real estate information by accessing multiple listing services, which they can do from home, office or car when out with clients. They can provide clients with immediate feedback regarding specific homes or neighborhoods, and with faster loan approvals, since applications can be submitted on the spot. Therefore, mobile computers allow them to devote more time to clients. 6.2) Emergency Services Ability to receive information on the move is vital where the emergency services are involved. Information regarding the address, type and other details of an incident can be dispatched quickly, via a CDPD system using mobile computers, to one or several appropriate mobile units which are in the vicinity of the incident. Here the reliability and security implemented in the CDPD system would be of great advantage. Fig. Police Incident Information Screen
  • 8. Mobile Computing Jiems akkalkuwa Page 8 6.3) Credit Card Verification At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for transactions, the intercommunication required between the bank central computer and the POS terminal, in order to effect verification of the card usage, can take place quickly and securely over cellular channels using a mobile computer unit. This can speed up the transaction process and relieve congestion at the POS terminals. 6.4 Taxi/Truck Dispatch Using the idea of a centrally controlled dispatcher with several mobile units (taxis), mobile computing allows the taxis to be given full details of the dispatched job as well as allowing the taxis to communicate information about their whereabouts back to the central dispatch office. This system is also extremely useful in secure deliveries i.e.: Securicor. This allows a central computer to be able to track and receive status information from all of its mobile secure delivery vans. 6.5 Electronic Mail/Paging Usage of a mobile unit to send and read emails is a very useful asset for any business individual, as it allows him/her to keep in touch with any colleagues as well as any urgent developments that may affect their work. Access to the Internet, using mobile computing technology, allows the individual to have vast arrays of knowledge at his/her fingertips.
  • 9. Mobile Computing Jiems akkalkuwa Page 9 CHAPTER:7 FUTURE SCOPE & CONCLUSION FUTURE SCOPE: 7.1 With the rapid technological advancements in Artificial Intelligence, Integrated Circuitry and increases in Computer Processor speeds, the future of mobile computing looks increasingly exciting. 7.2 With the emphasis increasingly on compact, small mobile computers, it may also be possible to have all the practicality of a mobile computer in the size of a hand held organizer or even smaller. 7.3 Use of Artificial Intelligence may allow mobile units to be the ultimate in personal secretaries, which can receive emails and paging messages, understand what they are about, and change the individual’s personal schedule according to the message. This can then be checked by the individual to plan his/her day. 7.4 The working lifestyle will change, with the majority of people working from home, rather than commuting. This may be beneficial to the environment as less transportation will be utilized. This mobility aspect may be carried further in that, even in social spheres, people will interact via mobile stations. .CONCLUSION: According to my aims and objectives of this paper I have done the detailed research and get the knowledge about it and the factors that need to be consider carefully. At this stage we are facing different types of problems and threats to the mobile industry, the two major aspects are the security and the usability issue. Detailed analysis of security issues is very important at least for a mobile wireless device, there are numbers of ways that it can be compromised, but I would like to draw an attention on the usability issues as well. They both need to be carefully planned and designed that the mobile user or target audience get used to it easily, effectively and securely.
  • 10. Mobile Computing Jiems akkalkuwa Page 10 CHAPTER:8 REFERENCES:  Interview with Mr Eleftherios Koudounas, Assistant Commercial Services Manager at Cyprus Telecommunications Authority  Interview with Dr Leonidas Leonidou, Mobile Services, Cyprus telecommunications Authority  www.w3school.com  Www. Ijecs.in  www.studymafia.com  Network Switching Techniques-Circuit, Packet and Datagram: Halsall, Fred. Data Communications, Computer Networks and Open Systems. 4th edition 1996. pp 424-459.  Asynchronous Transfer Mode , Solution for Broadband ISDN, Third edition 1993, By Martin de Prycker