Mobile Computing: Introduction:: Unit - I

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

UNIT -I

Mobile Computing: Introduction


Definition: A technology that is capable of providing an environment which enables users to
transmit data from one device to other device without the use of any physical link/cables is
known as Mobile Computing.
It means, data transmission is done wireless-ly with the help of wireless devices such as
mobiles, laptops etc. Whenever any device is connected to a network without being connected
physically over a link or cable, data transmission such as messages, voice recording, videos etc.
can be done be done by using the concept of mobile computing.
Mobile Computing technology helps users to access and transmit data from any remote locations
without being present there physically. Thus, having such a big coverage diameter, it is one of
the fastest and most reliable sectors of computing technology field. Mobile Communication is
the framework that is responsible behind the working of mobile computing technology. It ensures
the consistency and reliability of communication process through this framework. Mobile
communication framework includes communication devise such as mobiles, laptops, as rules of
conduct, fitness etc. They are responsible for delivering of smooth communication process.

Mobile communication can be of one of the following form as mentioned below.

1. Mobile and Wired: In this configuration, Some of the devices are wired and some are mobile in nature.
For Example: Laptops. Many of today’s laptops fall into this category; users carry the laptop from
one hotel to the next, reconnecting to the company’s network via the telephone network and
a modem.
2. Fixed and Wired: In this configuration, the devices are fixed at a position and are connected through a
physical link for communication. For Example: Office/Desktop Computer. This configuration
describes the typical desktop computer in an office. Neither weight nor power consumption of
the devices allow for mobile usage. The devices use fixed networks for performance reasons.
3. Mobile and Wireless: In this configuration, devices can communicate (data transmission) with each
other irrespective of their position and can connect to any network without the use of any wired device.
For Example: Wi-Fi Dongle. This is the most interesting case. No cable restricts the user, who
can roam between different wireless networks. Most technologies discussed in this book deal
with this type of device and the networks supporting them. Today’s most successful example
for this category is GSM with more than 800 million users.
4. F i x e d and wireless: This mode is used for installing networks, e.g., in historical buildings to
avoid damage by installing wires, or at trade shows to ensure fast network setup

APP LICATIO NS OF MO BILE CO MP UTI NG

In many fields of work, the ability to keep on the move is vital in order to utilize time efficiently.
The importance of Mobile Computers has been highlighted in any fields of which a few are
described below:
a. Vehicles: Music, news, road conditions, weather reports, and other broadcast information are
received via digital audio broadcasting (DAB) with 1.5 Mbit/s. For personal
communication, a universal mobile telecommunications system (UMTS) phone might be
available offering voice and data connectivity with 384 kbit/s. The current position of the car is
determined via the global positioning system (GPS). Cars driving in the same area build a local
ad-hoc network for the fast exchange of information in emergency situations or to help each
other keep a safe distance. In case of an accident, not only will the airbag be triggered, but the
police and ambulance service will be informed via an emergency call to a service provider.
Buses, trucks, and trains are already transmitting maintenance and logistic information to their
home base, which helps to improve organization (fleet management), and saves time and money.
b. Emergencies: An ambulance with a high-quality wireless connection to a hospital can carry
vital information about injured persons to the hospital from the scene of the accident. All the
necessary steps for this particular type of accident can be prepared and specialists can be
consulted for an early diagnosis. Wireless networks are the only means of communication in the
case of natural disasters such as hurricanes or earthquakes. In the worst cases, only decentralized,
wireless ad-hoc networks survive.
c. Business: Managers can use mobile computers say, critical presentations to major customers.
They can access the latest market share information. At a small recess, they can revise the
presentation to take advantage of this information. They can communicate with the office about
possible new offers and call meetings for discussing responds to the new proposals. Therefore,
mobile computers can leverage competitive advantages. A travelling salesman today needs
instant access to the company’s database: to ensure that files on his or her laptop reflect the
current situation, to enable the company to keep track of all activities of their travelling
employees, to keep databases consistent etc.With wireless access, the laptop can be turned into a
true mobile office, but efficient and powerful synchronization mechanisms are needed to ensure
data consistency.
d. Credit Card Verification: At Point of Sale (POS) terminals in shops and supermarkets, when
customers use credit cards for transactions,the intercommunication required between the bank
central computer and the POS terminal, in order to effect verification of the card usage, can take
place quickly and securely over cellular channels using a mobile computer unit. This can speed
up the transaction process and relieve congestion at the POS terminals.
e. Replacement of Wired Networks: wireless networks can also be used to replace wired
networks, e.g., remote sensors, for tradeshows, or in historic buildings. Due to economic reasons,
it is often impossible to wire remote sensors for weather forecasts, earthquake detection, or to
provide environmental information. Wireless connections, e.g., via satellite, can help in
this situation. Other examples for wireless networks are computers, sensors, or
information displays in historical buildings, where excess cabling may destroy
valuable walls or floors.
f. Infotainment: wireless networks can provide up-to-date information at an y appropriate
location. TI hUeN ItTr avel guide might tell you something a bMoLuRtI Tthe
history of a building (knowing via GPS, contact to a local base station, or
triangulation where you are) downloading information about a concert in the
building at the same evening via a local wireless network. Another growing field
of wireless network applications lies in entertainment and games to enable, e.g.,
ad-hoc gaming networks as soon as people meet to play together.
Lim i t a t io n s of M ob i le Co mp u t i ng
Resource constraints:
Battery
Interference: Radio transmission cannot be protected against interference
using shielding and result in higher loss rates for transmitted data or higher bit
error rates respectively
Bandwidth: Although they are continuously increasing, transmission rates are
still very low for wireless devices compared to desktop systems. Researchers
look for more efficient communication protocols with low overhead.
Dynamic changes in communication environment: variations in signal power
within a region, thus link delays and connection losses
Network Issues: discovery of the connection-service to destination and
connection stability
Interoperability issues: the varying protocol
standards
Security constraints: Not only can portable devices be stolen more easily, but
the radio interface is also prone to the dangers of eavesdropping. Wireless
access must always include encryption, authentication, and other security
mechanisms that must be efficient and simple to use.
A simplified reference model The figure shows the protocol stack implemented in the
system according to the reference model.
End-systems, such as the PDA and computer in the example, need a full protocol stack
comprising the application layer, transport layer, network layer, data link layer, and physical
layer. Applications on the end-systems communicate with each other using the lower layer
services.
Intermediate systems,such as the interworking unit, do not necessarily need all of the
layers.

You might also like