Computer Networks and Communications: Specification of Mobile Computing
Computer Networks and Communications: Specification of Mobile Computing
Computer Networks and Communications: Specification of Mobile Computing
FORM: 4 DEDIKASI
FORM: 4 DEDIKASI
services(MMS) include tasks such as the authentication of users, accounting and billing issues or profiling of the users habits. The tasks necessary to adapt certain existing applications to mobile usage are implemented by high level services, which are called special mobility services (SMS). Special mobility services adapt existing services to the mobile conditions. For example to allow remote database access over a wireless connection line one has to take special care of possible frequent connection losses especially in the context of the state of the database. Viewing services as distinct building blocks, we are able to sketch an architecture for a mobility services enhanced system.
radio frequency.
are developed and licensed by the Bluetooth Special Interest Group. Bluetooth technology relies on two things, a radio frequency technology and the protocol software enabling it to transmit data to other devices. Bluetooth-capable devices can transmit data to other devices not within the line of sight of the user. It also enables different devices to communicate using certain rules such as the amount of data that will be sent, the type of communication between the devices and the radio frequency or frequencies this communication will take place. These protocols ensure that Bluetooth devices experience the least amount of interference from other Bluetooth capable objects while communicating with each other.
SMARTPHONES are the ideal productivity solution for both voice and data for your mobile workforce. Theyll be able to stay in touch with the people and information that matter most. Access email, instant message, access the Internet, run business applications and more.Communicate your way: Call, email, instant message, or text message, all with one device.
FORM: 4 DEDIKASI
country for a fixed fee and a low per-minute charge for international. Broadband Internet access (cable or DSL) is required, and regular house phones plug into an analog telephone adapter (ATA) provided by the company or purchased from a third party.
Explain BLOG
A blog is a lot like a journal except it is generally intended to be read by others. The topics for blogs vary greatly; some being about day to day activities and others taking a more corporate or political slant. There is no defined or widely accepted format and so blogs range from one liners that the author adds every few hours to relatively long, well thought out arguments for or against a topic of interest.
A Personal Area Network (PAN) is a computer network used for communication among computer devices (including telephones and personal digital assistants) close to one person. The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters. PANs can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink). Personal area networks may be wired with computer buses such as USBand FireWire. A wireless personal area network (WPAN) can also be made possible with network technologies such as IrDAand Bluetooth.
VPN Short for (Virtual Private Network), VPN is a type of network that allows a user to connect to a network through a tunneling
protocoland
access internal internet and intranet web sites and e-mail. Virtual Private
Networks are commonly used to allow an employee with a large company to connect to the companys intranet WLAN A wireless LAN (or WLAN, for Wireless Local Area Network, sometimes referred to as LAWN, for local area wireless network) is one in which a mobile user can connect to a local area network ( LAN) through a wireless (radio) connection. The
IEEE802.11group
NAME:NOR SUHADA BT ABD AZIZ wireless LANs. 802.11 standards use the
FORM: 4 DEDIKASI
Ethernetprotocoland
collision avoidance) for path sharing and include an encryption method, the personal area network WIMAX
WIMAX is the industry term for a long-range wireless networking standard. WIMAX technology has the potential to deliver high-speed Internet access to rural areas and other locations not serviced by cable or DSL technology. WIMax also offers an alternative to satellite Internet services.WIMAX technology is based on the IEEE 802.16 WANcommunications standard. WIMAX signals can function over a distance of several miles / kilometers. Data rates for WIMAX can reach up to 75 megabits per second (Mb/s). A number of wireless signaling options exist ranging anywhere from the 2 GHz range up to 66 GHz.
Conclusion
Mobile computing (like the peer to peer transaction model did) brings about a new paradigm of distributed computing in which communication may be achieved through wireless networks and users can compute even as they relocate from one support environment to another. The impact of mobile computing on systems design goes beyond the networking level and directly effects data management. Although being a relatively new area, mobile data management has attracted a lot of research efforts, motivated by both a great market potential and by many challenging research problems
References Book Shelly Cashman,SVermat (2004),Thomson Course Technology, Discovery Computer. Internet
http://en.wikipedia.org/wiki/image:Bluetooth.headset.jpg
www.wimax.com/deployment/network
FORM: 4 DEDIKASI