SlideShare a Scribd company logo
1 of 10
Download to read offline
Mobile Computing
Jiems akkalkuwa Page 1
CHAPTER: 1 INTRODUCTION
A technology that allows transmission of data, via a computer, without having to be
connected to a fixed physical link Mobile voice communication is widely established
throughout the world and has had a very rapid increase in the number of subscribers to
the various cellular networks over the across these cellular networks. This is the principle
of mobile computing. Technology as it allows users to transmit data from remote
locations to other remote or fixed locations. This proves to be the solution to the biggest
problem of business people on the move - mobility. In this article we give an overview of
existing cellular networks and describe in detail the CDPD technology which allows data
communications across these networks. Finally, we look at the applications of Mobile
Computing in the real world.
Fig 1.1 wireless device
Mobile Computing
Jiems akkalkuwa Page 2
CHAPTER: 2 LITRATURE SURVEY
Collaboration among mobile devices: As the mobile devices have certain resource
constraints, there arises a need to get resources from external sources. One of the ways to
overcome this problem is getting resources from a cloud, but the access to such platforms
is not always guaranteed or/and is too expensive .Huerta-Canepa in presents the
guidelines for a framework that mimics a traditional cloud provider using mobile devices
in the vicinity of users. The framework detects nearby nodes that are in a stable mode,
meaning that will remain on the same area or follow the same movement pattern. If nodes
in that state are found, then the target provider for the application is changed, reflecting a
virtual provider created on-the-fly among users. In scenarios like downloading a
description file at a museum, collocation increases the chancesof people willing to
perform common tasks. To save the resources like energy and processing power, the
collocated mobile devices can collaboratively act as a local cloud and split the task into
smaller subtasks to be performed on different devices. The results can then be aggregated
and shared. The proposed approach allows avoiding a connection to infrastructure-based
cloud providers while maintaining the main benefits of offloading.
SPACCE concept in providing calculation capacity of PCs is proposed to facilitate
distributed collaboration. A SPACCE is a sophisticated ad hoc cloud computing
environment that can be built according to the needs that occur at any given time on a set
of personal, i.e., non-dedicated, PCs and dynamically migrate a server[13] for application
sharing to another PC. By migrating the server , redundant calculation capacity of PCs
can be utilized for creating a SPACCE, where the response time of the application shared
among users is improved.
A SPACCE provides the available calculation capacity of a PC as the server for
collaboration to other PCs which have no application and/or not enough calculation
capacity to be the server on demand.
Mobile Computing
Jiems akkalkuwa Page 3
CHAPTER: 3 EXISTING SYSTEM
3.1EXISTING CELLULAR NETWORK ARCHITECTURE:
Mobile telephony took off with the introduction of cellular technology which
allowed the efficient utilization of frequencies enabling the connection of a large number
of users. During the 1980's analogue technology was used. A cellular network consists of
mobile units linked together to switching equipment, which interconnect the different
parts of the network and allow access to the fixed Public Switched Telephone Network
(PSTN). The technology is hidden from view; it's incorporated in a number of
transceivers called Base Stations (BS). Every BS is located at a strategically selected
place and covers a given area or cell - hence the name cellular communications. A
number of adjacent cells grouped together form an area and the corresponding BSs
communicate through a so called Mobile Switching Centre (MSC). The MSC is the heart
of a cellular radio system. It is responsible for routing, or switching, calls from the
originator to the designator. It can be thought of managing the cell, being responsible for
set-up, routing control and termination of the call,
Fig 3.1 Existing Cellular Network Architecture
for management inter MSC hand over and supplementary services, and for collecting
charging and accounting information. The MSC may be connected to other MSCs on the
same network or to the PSTN.
Mobile Computing
Jiems akkalkuwa Page 4
CHAPTER: 4 PROPOSED SYSTEM
The purpose of these guidelines is to provide direction for the appropriate usage,
including access and support, of Mobile Computing Devices on the NOCCCD network.
The network exists to meet the instructional mission of the colleges and district. The
guidelines apply to many types of devices including but not limited to Laptops, Smart
phones (phones with data/network connectivity capabilities), portable storage devices,
tablet devices, and other mobile devices. The key reasons for the creation of these
guidelines are: to insure uninterrupted support of our instructional mission;
 To protect the District and the colleges from legal liability;
 To meet legal requirements;
 To protect the network so that all can use it;
 To protect the data housed in the systems on the network and;
 To insure that devices can be properly supported for effective use.
Mobile Computing
Jiems akkalkuwa Page 5
CHAPTER: 5 ADVANTAGES & DISADVANTAGE
5.1Advantages:
1- Increase in Productivity- Mobile devices can be used out in the field of various
companies, therefore reducing the time and cost for clients and themselves.
2- Entertainment- Mobile devices can be used for entertainment purposes, for personal
and even for presentations to people and clients.
3- Portability- this would be one of the main advantages of mobile computing, you are
not restricted to one location in order for you to get jobs done or even access email on the
go
4- Cloud Computing- This service is available for saving documents on a online server
and being able to access them anytime and anywhere when you have a connection to the
internet and can access these files on several mobile devices or even PCs at home.
Mobile Computing
Jiems akkalkuwa Page 6
5.2Disadvantages:
1- Quality of connectivity- as one of the disadvantages, mobile devices will need
either Wi-Fi connectivity or mobile network connectivity such as GPRS, 3G and in some
countries even 4G connectivity that is why this is a disadvantage because if you are not
near any of these connections your access to the internet is very limited.
2- Security concerns- Mobile VPNs are unsafe to connect to, and also syncing devices
might also lead to security concerns. Accessing a Wi-Fi network can also be risky
because WPA and WEP security can be bypassed easily.
3- Power Consumption- due to the use of batteries in these devices, these do not tend to
last long, if in a situation where there is no source of power for charging then that will
certainly be a letdown.
Mobile Computing
Jiems akkalkuwa Page 7
CHAPTER: 6 APPLICATIONS
1) For Estate Agents
2) Emergency Services
3) Credit Card Verification
4) Taxi/Truck Dispatch
5) Electronic Mail/Paging
6.1) For Estate Agents
Estate agents can work either at home or out in the field. With mobile computers they can
be more productive. They can obtain current real estate information by accessing multiple
listing services, which they can do from home, office or car when out with clients. They
can provide clients with immediate feedback regarding specific homes or neighborhoods,
and with faster loan approvals, since applications can be submitted on the spot.
Therefore, mobile computers allow them to devote more time to clients.
6.2) Emergency Services
Ability to receive information on the move is vital where the emergency services are
involved. Information regarding the address, type and other details of an incident can be
dispatched quickly, via a CDPD system using mobile computers, to one or several
appropriate mobile units which are in the vicinity of the incident. Here the reliability and
security implemented in the CDPD system would be of great advantage.
Fig. Police Incident Information Screen
Mobile Computing
Jiems akkalkuwa Page 8
6.3) Credit Card Verification
At Point of Sale (POS) terminals in shops and supermarkets, when customers use
credit cards for transactions, the intercommunication required between the bank
central computer and the POS terminal, in order to effect verification of the card
usage, can take place quickly and securely over cellular channels using a mobile
computer unit. This can speed up the transaction process and relieve congestion at
the POS terminals.
6.4 Taxi/Truck Dispatch
Using the idea of a centrally controlled dispatcher with several mobile units
(taxis), mobile computing allows the taxis to be given full details of the
dispatched job as well as allowing the taxis to communicate information about
their whereabouts back to the central dispatch office. This system is also
extremely useful in secure deliveries i.e.: Securicor. This allows a central
computer to be able to track and receive status information from all of its mobile
secure delivery vans.
6.5 Electronic Mail/Paging
Usage of a mobile unit to send and read emails is a very useful asset for any
business individual, as it allows him/her to keep in touch with any colleagues as
well as any urgent developments that may affect their work. Access to the
Internet, using mobile computing technology, allows the individual to have vast
arrays of knowledge at his/her fingertips.
Mobile Computing
Jiems akkalkuwa Page 9
CHAPTER:7 FUTURE SCOPE & CONCLUSION
FUTURE SCOPE:
7.1 With the rapid technological advancements in Artificial Intelligence,
Integrated
Circuitry and increases in Computer Processor speeds, the future of mobile
computing looks increasingly exciting.
7.2 With the emphasis increasingly on compact, small mobile computers, it may also be
possible to have all the practicality of a mobile computer in the size of a hand held
organizer or even smaller.
7.3 Use of Artificial Intelligence may allow mobile units to be the ultimate in personal
secretaries, which can receive emails and paging messages, understand what they are
about, and change the individual’s personal schedule according to the message. This can
then be checked by the individual to plan his/her day.
7.4 The working lifestyle will change, with the majority of people working from home,
rather than commuting. This may be beneficial to the environment as less transportation
will be utilized. This mobility aspect may be carried further in that, even in social
spheres, people will interact via mobile stations.
.CONCLUSION:
According to my aims and objectives of this paper I have done the detailed
research and get the knowledge about it and the factors that need to be consider carefully.
At this stage we are facing different types of problems and threats to the mobile industry,
the two major aspects are the security and the usability issue. Detailed analysis of
security issues is very important at least for a mobile wireless device, there are numbers
of ways that it can be compromised, but I would like to draw an attention on the usability
issues as well. They both need to be carefully planned and designed that the mobile user
or target audience get used to it easily, effectively and securely.
Mobile Computing
Jiems akkalkuwa Page 10
CHAPTER:8 REFERENCES:
 Interview with Mr Eleftherios Koudounas, Assistant Commercial Services
Manager at Cyprus Telecommunications Authority
 Interview with Dr Leonidas Leonidou, Mobile Services, Cyprus
telecommunications Authority
 www.w3school.com
 Www. Ijecs.in
 www.studymafia.com
 Network Switching Techniques-Circuit, Packet and Datagram: Halsall, Fred. Data
Communications, Computer Networks and Open Systems. 4th edition 1996. pp
424-459.
 Asynchronous Transfer Mode , Solution for Broadband ISDN, Third edition
1993, By Martin de Prycker

More Related Content

What's hot

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...IOSR Journals
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingSaif Salah
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARISivaSankari36
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionHossam Zein
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Understanding lte guide
Understanding lte guideUnderstanding lte guide
Understanding lte guideGreg Reyes
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resourcecsandit
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkIOSR Journals
 

What's hot (17)

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud Computing
 
395 401
395 401395 401
395 401
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
 
Ch6
Ch6Ch6
Ch6
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
 
Gf2411221128
Gf2411221128Gf2411221128
Gf2411221128
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Understanding lte guide
Understanding lte guideUnderstanding lte guide
Understanding lte guide
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resource
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
 

Similar to 4 (mobile computing)

MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicranjana dalwani
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingSuzanne Simmons
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptxYash771676
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Swapnali Pawar
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operativesIJERA Editor
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting ines beltaief
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingFatih Özlü
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Journals
 
Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
 

Similar to 4 (mobile computing) (20)

MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
40120130405016
4012013040501640120130405016
40120130405016
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connected
 

More from JIEMS Akkalkuwa

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)JIEMS Akkalkuwa
 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)JIEMS Akkalkuwa
 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)JIEMS Akkalkuwa
 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)JIEMS Akkalkuwa
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)JIEMS Akkalkuwa
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)JIEMS Akkalkuwa
 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)JIEMS Akkalkuwa
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)JIEMS Akkalkuwa
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)JIEMS Akkalkuwa
 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)JIEMS Akkalkuwa
 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)JIEMS Akkalkuwa
 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)JIEMS Akkalkuwa
 

More from JIEMS Akkalkuwa (20)

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)
 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
 
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)
 
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)
 
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
 
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
 
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

4 (mobile computing)

  • 1. Mobile Computing Jiems akkalkuwa Page 1 CHAPTER: 1 INTRODUCTION A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the across these cellular networks. This is the principle of mobile computing. Technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move - mobility. In this article we give an overview of existing cellular networks and describe in detail the CDPD technology which allows data communications across these networks. Finally, we look at the applications of Mobile Computing in the real world. Fig 1.1 wireless device
  • 2. Mobile Computing Jiems akkalkuwa Page 2 CHAPTER: 2 LITRATURE SURVEY Collaboration among mobile devices: As the mobile devices have certain resource constraints, there arises a need to get resources from external sources. One of the ways to overcome this problem is getting resources from a cloud, but the access to such platforms is not always guaranteed or/and is too expensive .Huerta-Canepa in presents the guidelines for a framework that mimics a traditional cloud provider using mobile devices in the vicinity of users. The framework detects nearby nodes that are in a stable mode, meaning that will remain on the same area or follow the same movement pattern. If nodes in that state are found, then the target provider for the application is changed, reflecting a virtual provider created on-the-fly among users. In scenarios like downloading a description file at a museum, collocation increases the chancesof people willing to perform common tasks. To save the resources like energy and processing power, the collocated mobile devices can collaboratively act as a local cloud and split the task into smaller subtasks to be performed on different devices. The results can then be aggregated and shared. The proposed approach allows avoiding a connection to infrastructure-based cloud providers while maintaining the main benefits of offloading. SPACCE concept in providing calculation capacity of PCs is proposed to facilitate distributed collaboration. A SPACCE is a sophisticated ad hoc cloud computing environment that can be built according to the needs that occur at any given time on a set of personal, i.e., non-dedicated, PCs and dynamically migrate a server[13] for application sharing to another PC. By migrating the server , redundant calculation capacity of PCs can be utilized for creating a SPACCE, where the response time of the application shared among users is improved. A SPACCE provides the available calculation capacity of a PC as the server for collaboration to other PCs which have no application and/or not enough calculation capacity to be the server on demand.
  • 3. Mobile Computing Jiems akkalkuwa Page 3 CHAPTER: 3 EXISTING SYSTEM 3.1EXISTING CELLULAR NETWORK ARCHITECTURE: Mobile telephony took off with the introduction of cellular technology which allowed the efficient utilization of frequencies enabling the connection of a large number of users. During the 1980's analogue technology was used. A cellular network consists of mobile units linked together to switching equipment, which interconnect the different parts of the network and allow access to the fixed Public Switched Telephone Network (PSTN). The technology is hidden from view; it's incorporated in a number of transceivers called Base Stations (BS). Every BS is located at a strategically selected place and covers a given area or cell - hence the name cellular communications. A number of adjacent cells grouped together form an area and the corresponding BSs communicate through a so called Mobile Switching Centre (MSC). The MSC is the heart of a cellular radio system. It is responsible for routing, or switching, calls from the originator to the designator. It can be thought of managing the cell, being responsible for set-up, routing control and termination of the call, Fig 3.1 Existing Cellular Network Architecture for management inter MSC hand over and supplementary services, and for collecting charging and accounting information. The MSC may be connected to other MSCs on the same network or to the PSTN.
  • 4. Mobile Computing Jiems akkalkuwa Page 4 CHAPTER: 4 PROPOSED SYSTEM The purpose of these guidelines is to provide direction for the appropriate usage, including access and support, of Mobile Computing Devices on the NOCCCD network. The network exists to meet the instructional mission of the colleges and district. The guidelines apply to many types of devices including but not limited to Laptops, Smart phones (phones with data/network connectivity capabilities), portable storage devices, tablet devices, and other mobile devices. The key reasons for the creation of these guidelines are: to insure uninterrupted support of our instructional mission;  To protect the District and the colleges from legal liability;  To meet legal requirements;  To protect the network so that all can use it;  To protect the data housed in the systems on the network and;  To insure that devices can be properly supported for effective use.
  • 5. Mobile Computing Jiems akkalkuwa Page 5 CHAPTER: 5 ADVANTAGES & DISADVANTAGE 5.1Advantages: 1- Increase in Productivity- Mobile devices can be used out in the field of various companies, therefore reducing the time and cost for clients and themselves. 2- Entertainment- Mobile devices can be used for entertainment purposes, for personal and even for presentations to people and clients. 3- Portability- this would be one of the main advantages of mobile computing, you are not restricted to one location in order for you to get jobs done or even access email on the go 4- Cloud Computing- This service is available for saving documents on a online server and being able to access them anytime and anywhere when you have a connection to the internet and can access these files on several mobile devices or even PCs at home.
  • 6. Mobile Computing Jiems akkalkuwa Page 6 5.2Disadvantages: 1- Quality of connectivity- as one of the disadvantages, mobile devices will need either Wi-Fi connectivity or mobile network connectivity such as GPRS, 3G and in some countries even 4G connectivity that is why this is a disadvantage because if you are not near any of these connections your access to the internet is very limited. 2- Security concerns- Mobile VPNs are unsafe to connect to, and also syncing devices might also lead to security concerns. Accessing a Wi-Fi network can also be risky because WPA and WEP security can be bypassed easily. 3- Power Consumption- due to the use of batteries in these devices, these do not tend to last long, if in a situation where there is no source of power for charging then that will certainly be a letdown.
  • 7. Mobile Computing Jiems akkalkuwa Page 7 CHAPTER: 6 APPLICATIONS 1) For Estate Agents 2) Emergency Services 3) Credit Card Verification 4) Taxi/Truck Dispatch 5) Electronic Mail/Paging 6.1) For Estate Agents Estate agents can work either at home or out in the field. With mobile computers they can be more productive. They can obtain current real estate information by accessing multiple listing services, which they can do from home, office or car when out with clients. They can provide clients with immediate feedback regarding specific homes or neighborhoods, and with faster loan approvals, since applications can be submitted on the spot. Therefore, mobile computers allow them to devote more time to clients. 6.2) Emergency Services Ability to receive information on the move is vital where the emergency services are involved. Information regarding the address, type and other details of an incident can be dispatched quickly, via a CDPD system using mobile computers, to one or several appropriate mobile units which are in the vicinity of the incident. Here the reliability and security implemented in the CDPD system would be of great advantage. Fig. Police Incident Information Screen
  • 8. Mobile Computing Jiems akkalkuwa Page 8 6.3) Credit Card Verification At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for transactions, the intercommunication required between the bank central computer and the POS terminal, in order to effect verification of the card usage, can take place quickly and securely over cellular channels using a mobile computer unit. This can speed up the transaction process and relieve congestion at the POS terminals. 6.4 Taxi/Truck Dispatch Using the idea of a centrally controlled dispatcher with several mobile units (taxis), mobile computing allows the taxis to be given full details of the dispatched job as well as allowing the taxis to communicate information about their whereabouts back to the central dispatch office. This system is also extremely useful in secure deliveries i.e.: Securicor. This allows a central computer to be able to track and receive status information from all of its mobile secure delivery vans. 6.5 Electronic Mail/Paging Usage of a mobile unit to send and read emails is a very useful asset for any business individual, as it allows him/her to keep in touch with any colleagues as well as any urgent developments that may affect their work. Access to the Internet, using mobile computing technology, allows the individual to have vast arrays of knowledge at his/her fingertips.
  • 9. Mobile Computing Jiems akkalkuwa Page 9 CHAPTER:7 FUTURE SCOPE & CONCLUSION FUTURE SCOPE: 7.1 With the rapid technological advancements in Artificial Intelligence, Integrated Circuitry and increases in Computer Processor speeds, the future of mobile computing looks increasingly exciting. 7.2 With the emphasis increasingly on compact, small mobile computers, it may also be possible to have all the practicality of a mobile computer in the size of a hand held organizer or even smaller. 7.3 Use of Artificial Intelligence may allow mobile units to be the ultimate in personal secretaries, which can receive emails and paging messages, understand what they are about, and change the individual’s personal schedule according to the message. This can then be checked by the individual to plan his/her day. 7.4 The working lifestyle will change, with the majority of people working from home, rather than commuting. This may be beneficial to the environment as less transportation will be utilized. This mobility aspect may be carried further in that, even in social spheres, people will interact via mobile stations. .CONCLUSION: According to my aims and objectives of this paper I have done the detailed research and get the knowledge about it and the factors that need to be consider carefully. At this stage we are facing different types of problems and threats to the mobile industry, the two major aspects are the security and the usability issue. Detailed analysis of security issues is very important at least for a mobile wireless device, there are numbers of ways that it can be compromised, but I would like to draw an attention on the usability issues as well. They both need to be carefully planned and designed that the mobile user or target audience get used to it easily, effectively and securely.
  • 10. Mobile Computing Jiems akkalkuwa Page 10 CHAPTER:8 REFERENCES:  Interview with Mr Eleftherios Koudounas, Assistant Commercial Services Manager at Cyprus Telecommunications Authority  Interview with Dr Leonidas Leonidou, Mobile Services, Cyprus telecommunications Authority  www.w3school.com  Www. Ijecs.in  www.studymafia.com  Network Switching Techniques-Circuit, Packet and Datagram: Halsall, Fred. Data Communications, Computer Networks and Open Systems. 4th edition 1996. pp 424-459.  Asynchronous Transfer Mode , Solution for Broadband ISDN, Third edition 1993, By Martin de Prycker