<<

IJISET - International Journal of Innovative , Engineering & Technology, Vol. 1 Issue 7, September 2014. www.ijiset.com ISSN 2348 – 7968 1 2 Mahendrakumar Manilal PatelP ,P Dr. Vikram Kaushik P

1 P MCA,P Ph.D (Pursuing) Mewar University Chhittogarh (Rajasthan) I.N.S.B. Institute of Information Technology and Management Studies, BCA College, Idar, Gujarat, 383430, India. Affiliated to Hemchandracharya North Gujarat University, Patan.

2 P P NSVKMS MCA College, Visnagar, Gujarat, 384315, India

Abstract: Limitations: Mobile computing is human– interaction by Range & Bandwidth: Mobile access which a computer is expected to be transported during is generally slower than direct cable normal usage. Mobile computing involves mobile • connections, using technologies such as communication, mobile hardware, and mobile GPRS and EDGE, and more recently software. Communication issues include ad hoc and HSDPA and HSUPA and networks. infrastructure networks as well as communication These networks are usually available within properties, protocols, data formats and concrete range of commercial cell phone towers. technologies. Hardware includes mobile devices or Higher speed LANs are device components. Mobile software deals with the inexpensive but have very limited range. characteristics and requirements of standards: When working mobile, applications. one is dependent on public networks, • requiring careful use of VPN. Security is a Definitions: major concern while concerning the mobile Mobile Computing is "taking a computer and all computing standards on the fleet. One can necessary files and software out into the field".[1] easily attack the VPN through a huge Mobile computing is any type of computing which use number of networks interconnected through Internet or intranet and respective communications the line. links, as WAN, LAN, WLAN etc. Mobile Power consumption: When a power outlet or may form a wireless personal network or a Pico-net. portable generator is not available, mobile • computers must rely entirely on battery There are at least three different classes of mobile power. Combined with the compact size of computing items: many mobile devices, this often means • Portable computers, compacted lightweight unusually expensive batteries must be used units including a full character set keyboard to obtain the necessary battery life. and primarily intended as hosts for software Transmission interferences: Weather, that may be parameterized, as , terrain, and the range from the nearest signal • notebooks, notepads, etc. point can all interfere with signal reception. • Mobile phones including a restricted key set Reception in tunnels, some buildings, and primarily intended but not restricted to for rural areas is often poor. vocal communications, as cell phones, smart Potential health hazards: People who use phones, phone-pads, etc. mobile devices while driving are often • distracted from driving and are thus assumed • Wearable computers mostly limited to more likely to be involved in traffic functional keys and primarily intended as accidents.[2] (While this may seem obvious, incorporation of software agents, as there is considerable discussion about , wristbands, necklaces, keyless whether banning use while implants, etc. The existence of these classes driving reduces accidents or not.[3][4]) Cell is expected to be long lasting, and phones may interfere with sensitive medical complementary in personal usage, none devices. Questions concerning replacing one the other in all features of radiation and health have been raised. convenience. Human interface with device: Screens and keyboards tend to be small, which may Devices: • make them hard to use. Alternate input Many types of mobile computers have been methods such as speech or handwriting introduced since the 1990s including the: recognition require training. Personal digital assistant/enterprise digital assistant In-vehicle computing and fleet • computing: • Ultra-Mobile PC Many commercial and government field forces deploy • a ruggedized with their fleet of • vehicles. This requires the units to be anchored to the •

296 IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 7, September 2014. www.ijiset.com ISSN 2348 – 7968 vehicle for driver safety, device security, and safe and consistent manner away from airbags, vehicle ergonomics. Rugged computers are rated for severe HVAC controls, and driver controls. Frequently vibration associated with large service vehicles and installations will include a WWAN modem, power off-road driving and the harsh environmental conditioning equipment, transceiver antennae mounted conditions of constant professional use such as in external to the vehicle, and WWAN/WLAN/GPS/etc. emergency medical services, fire, and public safety. Advantages and Disadvantages of Mobile Computing: Advantages:–

IncreaseU in ProductivityU- Mobile devices can be used out in the field of various • companies, therefore reducing the time and cost for clients and themselves.

EntertainmentU U- Mobile devices can be used for entertainment purposes, for personal and • even for presentations to people and clients.

PortabilityU U- this would be one of the main advantages of mobile computing, you are • not restricted to one location in order for you The Compaq Portable - Circa 1982 pre- to get jobs done or even access email on the go.

Other elements affecting function in vehicle: CloudU Computing-U This service is Operating temperature: A vehicle cabin can available for saving documents on a online often experience temperature swings from - • and being able to access them • 20F to +140F. Computers typically must be anytime and anywhere when you have a able to withstand these temperatures while connection to the internet and can access operating. Typical fan-based cooling has these files on several mobile devices or even stated limits of 95F-100F of ambient PCs at home. temperature, and temperatures below freezing require localized heaters to bring components up to operating temperature (based on independent studies by the SRI Group and by Panasonic R&D). Vibration can decrease the life expectancy of computer components, notably rotational • storage such as HDDs. Visibility of standard screens becomes an issue in bright sunlight. • Touch-screen users easily interact with the units in the field without removing gloves. • High-temperature battery settings: Lithium ion batteries are sensitive to high • temperature conditions for charging. A computer designed for the mobile

environment should be designed with a Disadvantages:– high-temperature charging function that QualityU of connectivityU- as one of the limits the charge to 85% or less of capacity. disadvantages, mobile devices will need External antenna connections go through the • either WiFi connectivity or mobile network typical metal cabins of vehicles which connectivity such as GPRS, 3G and in some • would block wireless reception, and take countries even 4G connectivity that is why advantage of much more capable external this is a disadvantage because if you are not communication and navigation equipment. near any of these connections your access to

the internet is very limited. Several specialized manufacturers such as First SecurityU concernsU- Mobile VPNs are Mobile Technologies, National Products Inc (Ram unsafe to connect to, and also syncing Mounts), Gamber Johnson and LedCo build mounts • devices might also lead to security concerns. for vehicle mounting of computer equipment for a Accessing a WiFi network can also be risky wide range of vehicles. The mounts are built to because WPA and WEP security can be withstand the harsh conditions and maintain bypassed easily. ergonomics. PowerU ConsumptionU- due to the use of Specialized installation companies design the mount batteries in these devices, these do not tend • design, assembling the parts, and installing them in a to last long, if in a situation where there is

297 IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 7, September 2014. www.ijiset.com ISSN 2348 – 7968 no source of power for charging then that otherwise capable of carrying out most of will certainly be a let down. the tasks of an ordinary laptop. A personal digital assistant (PDA) is a small, Security issues involved in mobile usually pocket-sized, computer with limited • functionality. It is intended to supplement computing: and to synchronize with a , Mobile security or mobile phone security has become giving access to contacts, address book, increasingly important in mobile computing. It is of notes, e-mail and other features. particular concern as it relates to the security of personal information now stored on the smart-phone.

More and more users and businesses use smart-phones as communication tools but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smart-phones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the A Palm TX PDA company. A PDA with a web browser is an Internet All smart-phones, as computers, are preferred targets tablet, an Internet appliance in tablet form. It of attacks. These attacks exploit weaknesses related to • does not have as much computing power as smart-phones that can come from means of a full tablet computer and its applications communication like SMS, MMS, WIFI networks, and suite is limited, and it can not replace a GSM. There are also attacks that exploit software general purpose computer. Internet tablets vulnerabilities from both the web browser and typically feature an MP3 and video player, a . Finally, there are forms of malicious web browser, a chat application and a software that rely on the weak knowledge of average picture viewer. users. An ultra mobile PC is a full-featured, PDA- sized computer running a general-purpose Different security counter-measures are being • operating system. developed and applied to smart-phones, from security A smart-phone has a wide range of features in different layers of software to the dissemination of and installable applications. information to end users. There are good practices to • A computer is installed in an automobile. It be observed at all levels, from design to use, through operates as a wireless computer, sound the development of operating systems, software layers, • system, GPS, and DVD player. It also and downloadable apps. contains word processing software and is compatible.[5] Portable computing devices: A Fly Fusion Pentop Computer is a Several categories of portable computing devices can computing device the size and shape of a run on batteries but are not usually classified as • pen. It functions as a writing utensil, MP3 laptops: portable computers, keyboard less tablet PCs, player, language translator, digital storage Internet tablets, PDAs, ultra mobile PCs (UMPCs) and device, and .[6] smart-phones. A portable computer is a general-purpose Boundaries that separate these categories are blurry at computer that can be easily moved from times. For example, the OQO UMPC is also a PDA- • place to place, but cannot be used while in sized tablet PC; the Apple eMate had the clamshell transit, usually because it requires some form factor of a laptop, but ran PDA software. The HP "setting-up" and an AC power source. The Omnibook line of laptops included some devices small most famous example is the Osborne more enough to be called ultra mobile PCs. The Portable computers are also called a hardware of the Nokia 770 internet tablet is essentially "transportable" or a "luggable" PC. the same as that of a PDA such as the Zaurus 6000; A tablet computer that lacks a keyboard the only reason it's not called a PDA is that it does not (also known as a non-convertible tablet) is have PIM software. On the other hand, both the 770 • shaped like a slate or a paper notebook. and the Zaurus can run some desktop Linux software, Instead a physical keyboard it has a touch- usually with modifications. screen with some combination of , stylus and/or handwriting Mobile data communication: recognition software. Tablets may not be Wireless data connections used in mobile computing best suited for applications requiring a take three general forms so.[7] Cellular data service physical keyboard for typing, but are uses technologies such as GSM, CDMA or GPRS,3G

298 IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 7, September 2014. www.ijiset.com ISSN 2348 – 7968 networks such as W-CDMA, EDGE or Sarvesh Sharma, Srinivas CDMA2000.[8][9] and more recently 4G networks Sreemanthula."Getting to Know Wireless such as LTE, LTE-Advanced.[10] These networks are Networks and Technology", InformIT usually available within range of commercial cell 8. "What really is a Third Generation (3G) towers. Wi-Fi connections offer higher ", ITU performance,[11] may be either on a private business 9. LTE Advanced network or accessed through public hotspots, and have 10. Gier, Jim. "Wireless Network Industry a typical range of 100 feet indoors and up to 1000 feet Report", Wireless Nets, Ltd. outdoors.[12] Satellite Internet access covers areas 11. "Wi-Fi" where cellular and Wi-Fi are not available[13] and 12. Mitchell, Bradley. "Satellite Internet" may be set up anywhere the user has a line of sight to 13. "Introduction to Global Satellite Systems", the satellite's location,[14] which for satellites in CompassRose International Publications geostationary orbit means having an unobstructed 14. Case studies, netmotionwireless.com view of the southern sky.[7] Some enterprise 15. Phifer, Lisa. "Mobile VPN: Closing the deployments combine networks from multiple cellular Gap",SearchMobileComputing.com, July networks or use a mix of cellular, Wi-Fi and 16, 2006. satellite.[15] When using a mix of networks, a mobile 16. Cheng, Roger. "Lost Connections", The virtual private network (mobile VPN) not only handles Wall Street Journal, December 11, 2007. the security concerns, but also performs the multiple network logins automatically and keeps the Bibliography: application connections alive to prevent crashes or 1. GH Forman, J Zahorjan - Computer, 1994 - data loss during network transitions or coverage doi.ieeecomputersociety.org loss.[16][17] 2. David P. Helmbold, "A dynamic disk spin- down technique for mobile computing", Conclusion: citeseer.ist.psu.edu, 1996 Mobile devices can be used out in the field of various 3. MH Repacholi, "health risks from the use of companies, therefore reducing the time and cost for mobile phones", Toxicology Letters, 2001 – clients and themselves. Mobile devices can be used for Elsevier entertainment purposes, for personal and even for 4. Landay, J.A. Kaufmann, T.R., "user presentations to people and clients. This would be one interface issues in mobile computing", of the main advantages of mobile computing, you are Operating Systems, 1993. not restricted to one location in order for you to get 5. T Imielinski, BR Badrinath "mobile wireless jobs done or even access email on the go. This service computing, challenges in data management- is available for saving documents on a online server Communications of the ACM, 1994 - and being able to access them anytime and anywhere portal.acm.org when you have a connection to the internet and can 6. Roth, J. "Mobile Computing - Grundlagen, access these files on several mobile devices or even Technik, Konzepte", 2005, dpunkt.verlag, PCs at home. Germany 7. Pullela, Srikanth. "Security Issues in Mobile References: Computing" http://crystal.uta.edu/~kumar/cse6392/termp30TU 1. http://www.distraction.gov/stats30TU -and-facts/ U30T 2. Hands Free Cell Phones No Safer, Insurance apers/Srikanth_paper.pdf U30T Study Claims | Hands Free Info 8. Zimmerman, James B. "Mobile Computing: 3. Study: Distractions, not phones, cause car Characteristics, Business Benefits, and crashes | Signal Strength - CNET News Mobile Framework" April 2, 1999. http://ac30TU - 4. Carputer – Engadget support.europe.umuc.edu/~meinkej/inss690/ 5. The FLY Fusion Pentop Computer Review | zimmerman/INSS%20690%20CC%20- Gear Diary %20Mobile%20Computing.htmU30T 6. to:a b "Wireless Data Communications for 9. Koudounas, Vasilis. Iqbal, Omar. "Mobile Beginners", Ositech Computing: Past, Present, and Future" 7. Lachu Aravamudhan, Stefano Faccin, Risto http://www.doc.ic.ac.uk/~nd/surprise_96/jou Mononen, Basavaraj Patil, Yousuf Saifullah, rnal/vol4/vk5/report.html

299