Mobile Technology Is A Collective Term Used To Describe The Various Types of Cellular
Mobile Technology Is A Collective Term Used To Describe The Various Types of Cellular
Mobile Technology Is A Collective Term Used To Describe The Various Types of Cellular
communication technology. Mobile CDMA technology has evolved quite rapidly over the past
few years. Since the beginning of this millennium, a standard mobile device has gone from being
no more than a simple two-way pager to being a cellular phone, GPS navigation system, an
embedded web browser, and Instant Messenger client, and a hand-held video gaming system.
Many experts argue that the future of computer technology rests in mobile/wireless computing.
Contents
[hide]
1 4G networking
2 Operating systems
3 Channel hogging & file sharing
4 Future of smartphone
5 References
6 External links
[edit] 4G networking
One of the most important features in the 4G mobile networks is the domination of high-speed
packet transmissions or burst traffic in the channels. The same codes used in the 2G-3G networks
will be applied to future 4G mobile or wireless networks, the detection of very short bursts will
be a serious problem due to their very poor partial correlation properties. Recent study has
indicated that traditional multi-layer network architecture based on the OSI model may not be
well suited for 4G mobile network, where transactions of short packets will be the major part of
the traffic in the channels. As the packets from different mobiles carry completely different
channel characteristics, the receiver should execute all necessary algorithms, such as channel
estimation, interactions with all upper layers and so on, within a very short time to make the
detections of each packet flawlessly and even to reduce the congestion
Symbian is the original smartphone OS, with the richest history and the largest marketshare.
Although no single Symbian device has sold as many units as the iPhone, Nokia and other
manufacturers (currently including Sony Ericsson and Samsung, and previously Motorola)
release a wide variety of Symbian models every year which gives Symbian the greatest
marketshare.
Mobile devices can be enabled to use a variety of communications technologies such as:
It is therefore possible to network the mobile device to a home office or the internet while
travelling.
Benefits
Mobile computing can improve the service you offer your customers. For example, when
meeting with customers you could access your customer relationship management system - over
the internet - allowing you to update customer details whilst away from the office. Alternatively,
you can enable customers to pay for services or goods without having to go to the till. For
example, by using a wireless payment terminal diners can pay for their meal without leaving
their table.
More powerful solutions can link you directly into the office network while working off site, for
instance to access your database or accounting systems. For example, you could:
This leads to great flexibility in working - for example, enabling home working, or working
while travelling. Increasingly, networking 'hot spots' are being provided in public areas that
allow connection back to the office network or the internet. The growth of cloud computing has
also impacted positively on the use of mobile devices, supporting more flexible working
practices by providing services over the internet. For more information see our guide on cloud
computing.
Drawbacks
There are costs involved in setting up the equipment and training required to make use of mobile
devices. Mobile IT devices can expose valuable data to unauthorised people if the proper
precautions are not taken to ensure that the devices, and the data they can access, are kept safe.
See our guide on securing your wireless systems.
Laptop computers and netbooks give you the full functionality of a desktop PC and can handle
the full range of office software.
If you need to access the internet and check emails while travelling, or connect to your office
network, you can connect a laptop or netbook to the internet via a landline, a mobile phone, or
wireless data services. Handheld computers can often be linked to a mobile phone for data
networking - exchanging information with other computers. Wireless-enabled devices can also
be used to connect to the internet, office or email inbox using the wireless 'hot spots' that are
often available in public places such as railway and service stations, eg wireless fidelity networks
(WiFi). Find local hotspots on the Wi-Fi Alliance website - Opens in a new window.
In the office you can connect mobile devices to the network using cables or wireless technology.
Wireless-enabled devices - laptops, PDAs etc - can automatically connect to their 'home' network
when in signal range in order to synchronise data with office databases and file servers so that
data on all devices is up to date.
Uses
Mobile devices can be used for a wide variety of purposes. Key features include immediate
access to data and more flexible ways of doing business. It is often possible to carry out the same
tasks that you would in an office while on the move, as many mobile devices operate the same
software as office PCs.
Examples:
salespeople can use laptops and handhelds to make presentations, check stock levels, make
quotations, and place online orders while on customer premises
laptops are ideal for 'hot desking', and other types of flexible working, like homeworking and
working while travelling away from the office
laptops and handhelds allow users to keep in touch via email while out of the office
Drawbacks
PDAs that have keyboards can be small and so can be difficult to use. It is possible to get around
this by choosing one with a stylus, which can be quicker than typing or using a touch screen.
Laptops, netbooks and PDAs have security issues - eg they are easy to steal or lose. When using
mobile devices it is important to ensure that employee's are aware of their responsibilities and
the need to keep both mobile devices and business information secure. See our guide
on keeping your systems and data secure.
If using public WiFi to access the internet, it may not always be possible to find a secure and
available network for your mobile device. This may prevent you accessing your business
information when you need to.
As with all technology, training can be key to delivering the full benefits.
Mobile phones are a familiar feature of business life. The traditional telephony features of
mobile phones, such as making calls, receiving voicemail, and call diversion, are important to
business users. Mobile phones also offer data transmission services such as:
global system for mobile communications (GSM) - allows mobile phones to send and receive
data, eg connecting to the internet at a rate similar to a dial-up modem
general packet radio service (GPRS) - an 'always-on' data service similar to broadband, but at
slower transfer rates
'third generation' (3G) cellular data services, also offering always-on connection at rates
comparable to broadband from as little as £10 per month
Many mobile handsets are capable of accessing these data services, and include functions such as
email and web access, and simplified office applications. These handsets are often known as
smart phones.
Uses
A mobile handset can provide network connection for other devices, such as personal digital
assistants (PDAs) and laptops. The handset could connect to the laptop using Bluetooth, a
wireless technology. It could then provide data connection to the laptop using GSM, 3G or GPRS.
However, most new laptops and PDAs have wireless capability built in making this method
redundant.
'Smart phones' such as BlackBerry phones can combine phone and PDA into a single device. This
is a versatile business tool - handling email, offering diary functions, providing data connection
for a laptop along with conventional mobile phone use.
Near-universal availability of cellular networks and the established billing systems between
operators, which allow you to use your device outside your service provider's network, make
these services very useful for keeping in contact while travelling.
Drawbacks
The new data services can be expensive, so it is important to get the right tariff.
Although improving rapidly, data transmission rates are not as good as wireless local area
networks using wireless fidelity (WiFi). See our guide on wireless technology.
'Smart phones' can have disadvantages - the keyboard may be small and therefore difficult to
use, and their size also makes them easier to lose or damage.
Uses
Sometimes you don't need networking capability on the move. It might be sufficient to download
and upload the information required at the start and end of the day from the office computer
system.
However, real-time communication with the office can be important in delivering business
benefits, such as efficient use of staff time, improved customer service, and a greater range of
products and services delivered. Examples include:
making presentations to customers, and being able to download product information to their
network during the visit
quotations and interactive order processing
checking stock levels via the office network
interacting with colleagues while travelling - sending and receiving emails, collaborating on
responses to tenders, delivering trip reports in a timely manner
Disadvantages
There can be issues with maintaining the security of devices and data - for example, these
devices are easy to steal. It is also possible for data to be intercepted using some of these mobile
technologies - such as Bluetooth and infrared. For more information on this see our guide on
securing your wireless systems.
There are also other considerations. Infrared and Bluetooth both have connectivity limitations.
Infrared requires line of sight that will not pass through walls or other obstacles, while Bluetooth
will pass through walls but only up to a range of 100 metres. As a consequence, many phones
and laptops do not have these capabilitie
Don't:
Allow mobile devices to have free access to all sensitive corporate data, unless strong security
measures (VPNs, authentication and encryption) are in place.
Leave mobile devices in areas where they can be seen or easily taken.
Share or leave password information in places where unauthorised users can find it.