Mobile Computing 1 2 Mahendrakumar Manilal Patelp ,P Dr
Total Page:16
File Type:pdf, Size:1020Kb
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 7, September 2014. www.ijiset.com ISSN 2348 – 7968 Mobile Computing 1 2 Mahendrakumar Manilal PatelP ,P Dr. Vikram Kaushik P 1 P MCA,P Ph.D (Pursuing) Mewar University Chhittogarh (Rajasthan) I.N.S.B. Institute of Information Technology and Management Studies, BCA College, Idar, Gujarat, 383430, India. Affiliated to Hemchandracharya North Gujarat University, Patan. 2 P P NSVKMS MCA College, Visnagar, Gujarat, 384315, India Abstract: Limitations: Mobile computing is human–computer interaction by Range & Bandwidth: Mobile Internet access which a computer is expected to be transported during is generally slower than direct cable normal usage. Mobile computing involves mobile • connections, using technologies such as communication, mobile hardware, and mobile GPRS and EDGE, and more recently software. Communication issues include ad hoc and HSDPA and HSUPA 3G and 4G networks. infrastructure networks as well as communication These networks are usually available within properties, protocols, data formats and concrete range of commercial cell phone towers. technologies. Hardware includes mobile devices or Higher speed wireless LANs are device components. Mobile software deals with the inexpensive but have very limited range. characteristics and requirements of mobile Security standards: When working mobile, applications. one is dependent on public networks, • requiring careful use of VPN. Security is a Definitions: major concern while concerning the mobile Mobile Computing is "taking a computer and all computing standards on the fleet. One can necessary files and software out into the field".[1] easily attack the VPN through a huge Mobile computing is any type of computing which use number of networks interconnected through Internet or intranet and respective communications the line. links, as WAN, LAN, WLAN etc. Mobile computers Power consumption: When a power outlet or may form a wireless personal network or a Pico-net. portable generator is not available, mobile • computers must rely entirely on battery There are at least three different classes of mobile power. Combined with the compact size of computing items: many mobile devices, this often means • Portable computers, compacted lightweight unusually expensive batteries must be used units including a full character set keyboard to obtain the necessary battery life. and primarily intended as hosts for software Transmission interferences: Weather, that may be parameterized, as laptops, terrain, and the range from the nearest signal • notebooks, notepads, etc. point can all interfere with signal reception. • Mobile phones including a restricted key set Reception in tunnels, some buildings, and primarily intended but not restricted to for rural areas is often poor. vocal communications, as cell phones, smart Potential health hazards: People who use phones, phone-pads, etc. mobile devices while driving are often • distracted from driving and are thus assumed • Wearable computers mostly limited to more likely to be involved in traffic functional keys and primarily intended as accidents.[2] (While this may seem obvious, incorporation of software agents, as there is considerable discussion about watches, wristbands, necklaces, keyless whether banning mobile device use while implants, etc. The existence of these classes driving reduces accidents or not.[3][4]) Cell is expected to be long lasting, and phones may interfere with sensitive medical complementary in personal usage, none devices. Questions concerning mobile phone replacing one the other in all features of radiation and health have been raised. convenience. Human interface with device: Screens and keyboards tend to be small, which may Devices: • make them hard to use. Alternate input Many types of mobile computers have been methods such as speech or handwriting introduced since the 1990s including the: recognition require training. Personal digital assistant/enterprise digital assistant In-vehicle computing and fleet • Smartphone Tablet computer computing: • Ultra-Mobile PC Many commercial and government field forces deploy • Wearable computer a ruggedized portable computer with their fleet of • vehicles. This requires the units to be anchored to the • 296 IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 7, September 2014. www.ijiset.com ISSN 2348 – 7968 vehicle for driver safety, device security, and safe and consistent manner away from airbags, vehicle ergonomics. Rugged computers are rated for severe HVAC controls, and driver controls. Frequently vibration associated with large service vehicles and installations will include a WWAN modem, power off-road driving and the harsh environmental conditioning equipment, transceiver antennae mounted conditions of constant professional use such as in external to the vehicle, and WWAN/WLAN/GPS/etc. emergency medical services, fire, and public safety. Advantages and Disadvantages of Mobile Computing: Advantages:– IncreaseU in ProductivityU- Mobile devices can be used out in the field of various • companies, therefore reducing the time and cost for clients and themselves. EntertainmentU U- Mobile devices can be used for entertainment purposes, for personal and • even for presentations to people and clients. PortabilityU U- this would be one of the main advantages of mobile computing, you are • not restricted to one location in order for you The Compaq Portable - Circa 1982 pre-laptop to get jobs done or even access email on the go. Other elements affecting function in vehicle: CloudU Computing-U This service is Operating temperature: A vehicle cabin can available for saving documents on a online often experience temperature swings from - • server and being able to access them • 20F to +140F. Computers typically must be anytime and anywhere when you have a able to withstand these temperatures while connection to the internet and can access operating. Typical fan-based cooling has these files on several mobile devices or even stated limits of 95F-100F of ambient PCs at home. temperature, and temperatures below freezing require localized heaters to bring components up to operating temperature (based on independent studies by the SRI Group and by Panasonic R&D). Vibration can decrease the life expectancy of computer components, notably rotational • storage such as HDDs. Visibility of standard screens becomes an issue in bright sunlight. • Touch-screen users easily interact with the units in the field without removing gloves. • High-temperature battery settings: Lithium ion batteries are sensitive to high • temperature conditions for charging. A computer designed for the mobile environment should be designed with a Disadvantages:– high-temperature charging function that QualityU of connectivityU- as one of the limits the charge to 85% or less of capacity. disadvantages, mobile devices will need External antenna connections go through the • either WiFi connectivity or mobile network typical metal cabins of vehicles which connectivity such as GPRS, 3G and in some • would block wireless reception, and take countries even 4G connectivity that is why advantage of much more capable external this is a disadvantage because if you are not communication and navigation equipment. near any of these connections your access to the internet is very limited. Several specialized manufacturers such as First SecurityU concernsU- Mobile VPNs are Mobile Technologies, National Products Inc (Ram unsafe to connect to, and also syncing Mounts), Gamber Johnson and LedCo build mounts • devices might also lead to security concerns. for vehicle mounting of computer equipment for a Accessing a WiFi network can also be risky wide range of vehicles. The mounts are built to because WPA and WEP security can be withstand the harsh conditions and maintain bypassed easily. ergonomics. PowerU ConsumptionU- due to the use of Specialized installation companies design the mount batteries in these devices, these do not tend • design, assembling the parts, and installing them in a to last long, if in a situation where there is 297 IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 7, September 2014. www.ijiset.com ISSN 2348 – 7968 no source of power for charging then that otherwise capable of carrying out most of will certainly be a let down. the tasks of an ordinary laptop. A personal digital assistant (PDA) is a small, Security issues involved in mobile usually pocket-sized, computer with limited • functionality. It is intended to supplement computing: and to synchronize with a desktop computer, Mobile security or mobile phone security has become giving access to contacts, address book, increasingly important in mobile computing. It is of notes, e-mail and other features. particular concern as it relates to the security of personal information now stored on the smart-phone. More and more users and businesses use smart-phones as communication tools but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smart-phones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the A Palm TX PDA company. A PDA with a web browser is an Internet All smart-phones,