SlideShare a Scribd company logo
Mobile Computing
Jiems akkalkuwa Page 1
CHAPTER: 1 INTRODUCTION
A technology that allows transmission of data, via a computer, without having to be
connected to a fixed physical link Mobile voice communication is widely established
throughout the world and has had a very rapid increase in the number of subscribers to
the various cellular networks over the across these cellular networks. This is the principle
of mobile computing. Technology as it allows users to transmit data from remote
locations to other remote or fixed locations. This proves to be the solution to the biggest
problem of business people on the move - mobility. In this article we give an overview of
existing cellular networks and describe in detail the CDPD technology which allows data
communications across these networks. Finally, we look at the applications of Mobile
Computing in the real world.
Fig 1.1 wireless device
Mobile Computing
Jiems akkalkuwa Page 2
CHAPTER: 2 LITRATURE SURVEY
Collaboration among mobile devices: As the mobile devices have certain resource
constraints, there arises a need to get resources from external sources. One of the ways to
overcome this problem is getting resources from a cloud, but the access to such platforms
is not always guaranteed or/and is too expensive .Huerta-Canepa in presents the
guidelines for a framework that mimics a traditional cloud provider using mobile devices
in the vicinity of users. The framework detects nearby nodes that are in a stable mode,
meaning that will remain on the same area or follow the same movement pattern. If nodes
in that state are found, then the target provider for the application is changed, reflecting a
virtual provider created on-the-fly among users. In scenarios like downloading a
description file at a museum, collocation increases the chancesof people willing to
perform common tasks. To save the resources like energy and processing power, the
collocated mobile devices can collaboratively act as a local cloud and split the task into
smaller subtasks to be performed on different devices. The results can then be aggregated
and shared. The proposed approach allows avoiding a connection to infrastructure-based
cloud providers while maintaining the main benefits of offloading.
SPACCE concept in providing calculation capacity of PCs is proposed to facilitate
distributed collaboration. A SPACCE is a sophisticated ad hoc cloud computing
environment that can be built according to the needs that occur at any given time on a set
of personal, i.e., non-dedicated, PCs and dynamically migrate a server[13] for application
sharing to another PC. By migrating the server , redundant calculation capacity of PCs
can be utilized for creating a SPACCE, where the response time of the application shared
among users is improved.
A SPACCE provides the available calculation capacity of a PC as the server for
collaboration to other PCs which have no application and/or not enough calculation
capacity to be the server on demand.
Mobile Computing
Jiems akkalkuwa Page 3
CHAPTER: 3 EXISTING SYSTEM
3.1EXISTING CELLULAR NETWORK ARCHITECTURE:
Mobile telephony took off with the introduction of cellular technology which
allowed the efficient utilization of frequencies enabling the connection of a large number
of users. During the 1980's analogue technology was used. A cellular network consists of
mobile units linked together to switching equipment, which interconnect the different
parts of the network and allow access to the fixed Public Switched Telephone Network
(PSTN). The technology is hidden from view; it's incorporated in a number of
transceivers called Base Stations (BS). Every BS is located at a strategically selected
place and covers a given area or cell - hence the name cellular communications. A
number of adjacent cells grouped together form an area and the corresponding BSs
communicate through a so called Mobile Switching Centre (MSC). The MSC is the heart
of a cellular radio system. It is responsible for routing, or switching, calls from the
originator to the designator. It can be thought of managing the cell, being responsible for
set-up, routing control and termination of the call,
Fig 3.1 Existing Cellular Network Architecture
for management inter MSC hand over and supplementary services, and for collecting
charging and accounting information. The MSC may be connected to other MSCs on the
same network or to the PSTN.
Mobile Computing
Jiems akkalkuwa Page 4
CHAPTER: 4 PROPOSED SYSTEM
The purpose of these guidelines is to provide direction for the appropriate usage,
including access and support, of Mobile Computing Devices on the NOCCCD network.
The network exists to meet the instructional mission of the colleges and district. The
guidelines apply to many types of devices including but not limited to Laptops, Smart
phones (phones with data/network connectivity capabilities), portable storage devices,
tablet devices, and other mobile devices. The key reasons for the creation of these
guidelines are: to insure uninterrupted support of our instructional mission;
 To protect the District and the colleges from legal liability;
 To meet legal requirements;
 To protect the network so that all can use it;
 To protect the data housed in the systems on the network and;
 To insure that devices can be properly supported for effective use.
Mobile Computing
Jiems akkalkuwa Page 5
CHAPTER: 5 ADVANTAGES & DISADVANTAGE
5.1Advantages:
1- Increase in Productivity- Mobile devices can be used out in the field of various
companies, therefore reducing the time and cost for clients and themselves.
2- Entertainment- Mobile devices can be used for entertainment purposes, for personal
and even for presentations to people and clients.
3- Portability- this would be one of the main advantages of mobile computing, you are
not restricted to one location in order for you to get jobs done or even access email on the
go
4- Cloud Computing- This service is available for saving documents on a online server
and being able to access them anytime and anywhere when you have a connection to the
internet and can access these files on several mobile devices or even PCs at home.
Mobile Computing
Jiems akkalkuwa Page 6
5.2Disadvantages:
1- Quality of connectivity- as one of the disadvantages, mobile devices will need
either Wi-Fi connectivity or mobile network connectivity such as GPRS, 3G and in some
countries even 4G connectivity that is why this is a disadvantage because if you are not
near any of these connections your access to the internet is very limited.
2- Security concerns- Mobile VPNs are unsafe to connect to, and also syncing devices
might also lead to security concerns. Accessing a Wi-Fi network can also be risky
because WPA and WEP security can be bypassed easily.
3- Power Consumption- due to the use of batteries in these devices, these do not tend to
last long, if in a situation where there is no source of power for charging then that will
certainly be a letdown.
Mobile Computing
Jiems akkalkuwa Page 7
CHAPTER: 6 APPLICATIONS
1) For Estate Agents
2) Emergency Services
3) Credit Card Verification
4) Taxi/Truck Dispatch
5) Electronic Mail/Paging
6.1) For Estate Agents
Estate agents can work either at home or out in the field. With mobile computers they can
be more productive. They can obtain current real estate information by accessing multiple
listing services, which they can do from home, office or car when out with clients. They
can provide clients with immediate feedback regarding specific homes or neighborhoods,
and with faster loan approvals, since applications can be submitted on the spot.
Therefore, mobile computers allow them to devote more time to clients.
6.2) Emergency Services
Ability to receive information on the move is vital where the emergency services are
involved. Information regarding the address, type and other details of an incident can be
dispatched quickly, via a CDPD system using mobile computers, to one or several
appropriate mobile units which are in the vicinity of the incident. Here the reliability and
security implemented in the CDPD system would be of great advantage.
Fig. Police Incident Information Screen
Mobile Computing
Jiems akkalkuwa Page 8
6.3) Credit Card Verification
At Point of Sale (POS) terminals in shops and supermarkets, when customers use
credit cards for transactions, the intercommunication required between the bank
central computer and the POS terminal, in order to effect verification of the card
usage, can take place quickly and securely over cellular channels using a mobile
computer unit. This can speed up the transaction process and relieve congestion at
the POS terminals.
6.4 Taxi/Truck Dispatch
Using the idea of a centrally controlled dispatcher with several mobile units
(taxis), mobile computing allows the taxis to be given full details of the
dispatched job as well as allowing the taxis to communicate information about
their whereabouts back to the central dispatch office. This system is also
extremely useful in secure deliveries i.e.: Securicor. This allows a central
computer to be able to track and receive status information from all of its mobile
secure delivery vans.
6.5 Electronic Mail/Paging
Usage of a mobile unit to send and read emails is a very useful asset for any
business individual, as it allows him/her to keep in touch with any colleagues as
well as any urgent developments that may affect their work. Access to the
Internet, using mobile computing technology, allows the individual to have vast
arrays of knowledge at his/her fingertips.
Mobile Computing
Jiems akkalkuwa Page 9
CHAPTER:7 FUTURE SCOPE & CONCLUSION
FUTURE SCOPE:
7.1 With the rapid technological advancements in Artificial Intelligence,
Integrated
Circuitry and increases in Computer Processor speeds, the future of mobile
computing looks increasingly exciting.
7.2 With the emphasis increasingly on compact, small mobile computers, it may also be
possible to have all the practicality of a mobile computer in the size of a hand held
organizer or even smaller.
7.3 Use of Artificial Intelligence may allow mobile units to be the ultimate in personal
secretaries, which can receive emails and paging messages, understand what they are
about, and change the individual’s personal schedule according to the message. This can
then be checked by the individual to plan his/her day.
7.4 The working lifestyle will change, with the majority of people working from home,
rather than commuting. This may be beneficial to the environment as less transportation
will be utilized. This mobility aspect may be carried further in that, even in social
spheres, people will interact via mobile stations.
.CONCLUSION:
According to my aims and objectives of this paper I have done the detailed
research and get the knowledge about it and the factors that need to be consider carefully.
At this stage we are facing different types of problems and threats to the mobile industry,
the two major aspects are the security and the usability issue. Detailed analysis of
security issues is very important at least for a mobile wireless device, there are numbers
of ways that it can be compromised, but I would like to draw an attention on the usability
issues as well. They both need to be carefully planned and designed that the mobile user
or target audience get used to it easily, effectively and securely.
Mobile Computing
Jiems akkalkuwa Page 10
CHAPTER:8 REFERENCES:
 Interview with Mr Eleftherios Koudounas, Assistant Commercial Services
Manager at Cyprus Telecommunications Authority
 Interview with Dr Leonidas Leonidou, Mobile Services, Cyprus
telecommunications Authority
 www.w3school.com
 Www. Ijecs.in
 www.studymafia.com
 Network Switching Techniques-Circuit, Packet and Datagram: Halsall, Fred. Data
Communications, Computer Networks and Open Systems. 4th edition 1996. pp
424-459.
 Asynchronous Transfer Mode , Solution for Broadband ISDN, Third edition
1993, By Martin de Prycker

More Related Content

What's hot

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
IOSR Journals
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud Computing
Saif Salah
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
IJASRD Journal
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
SivaSankari36
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
Hossam Zein
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
ijsptm
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
Rida Qayyum
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Understanding lte guide
Understanding lte guideUnderstanding lte guide
Understanding lte guideGreg Reyes
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resource
csandit
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
IOSR Journals
 

What's hot (17)

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud Computing
 
395 401
395 401395 401
395 401
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
 
Ch6
Ch6Ch6
Ch6
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
 
Gf2411221128
Gf2411221128Gf2411221128
Gf2411221128
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Understanding lte guide
Understanding lte guideUnderstanding lte guide
Understanding lte guide
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resource
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
 

Similar to 4 (mobile computing)

MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
ranjana dalwani
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
Suzanne Simmons
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
Santhosh Krishna
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Rishabh Gupta
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
Yash771676
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514
Swapnali Pawar
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
Swapnali Pawar
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
IJERA Editor
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
ines beltaief
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
Ankit Gupta
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Fatih Özlü
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
paperpublications3
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
Santhosh Krishna
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
gouse_1210
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
ijasuc
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
ijasuc
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
homeworkping7
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
eSAT Journals
 
Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson
 

Similar to 4 (mobile computing) (20)

MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
40120130405016
4012013040501640120130405016
40120130405016
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connected
 

More from JIEMS Akkalkuwa

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
JIEMS Akkalkuwa
 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)
JIEMS Akkalkuwa
 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
JIEMS Akkalkuwa
 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
JIEMS Akkalkuwa
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
JIEMS Akkalkuwa
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
JIEMS Akkalkuwa
 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
JIEMS Akkalkuwa
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
JIEMS Akkalkuwa
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
JIEMS Akkalkuwa
 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
JIEMS Akkalkuwa
 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
JIEMS Akkalkuwa
 
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)
JIEMS Akkalkuwa
 
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)
JIEMS Akkalkuwa
 
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)
JIEMS Akkalkuwa
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
JIEMS Akkalkuwa
 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
JIEMS Akkalkuwa
 
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
JIEMS Akkalkuwa
 
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
JIEMS Akkalkuwa
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa
 

More from JIEMS Akkalkuwa (20)

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)
 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
 
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)
 
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)
 
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
 
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
 
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 

Recently uploaded

ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 

Recently uploaded (20)

ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 

4 (mobile computing)

  • 1. Mobile Computing Jiems akkalkuwa Page 1 CHAPTER: 1 INTRODUCTION A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the across these cellular networks. This is the principle of mobile computing. Technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move - mobility. In this article we give an overview of existing cellular networks and describe in detail the CDPD technology which allows data communications across these networks. Finally, we look at the applications of Mobile Computing in the real world. Fig 1.1 wireless device
  • 2. Mobile Computing Jiems akkalkuwa Page 2 CHAPTER: 2 LITRATURE SURVEY Collaboration among mobile devices: As the mobile devices have certain resource constraints, there arises a need to get resources from external sources. One of the ways to overcome this problem is getting resources from a cloud, but the access to such platforms is not always guaranteed or/and is too expensive .Huerta-Canepa in presents the guidelines for a framework that mimics a traditional cloud provider using mobile devices in the vicinity of users. The framework detects nearby nodes that are in a stable mode, meaning that will remain on the same area or follow the same movement pattern. If nodes in that state are found, then the target provider for the application is changed, reflecting a virtual provider created on-the-fly among users. In scenarios like downloading a description file at a museum, collocation increases the chancesof people willing to perform common tasks. To save the resources like energy and processing power, the collocated mobile devices can collaboratively act as a local cloud and split the task into smaller subtasks to be performed on different devices. The results can then be aggregated and shared. The proposed approach allows avoiding a connection to infrastructure-based cloud providers while maintaining the main benefits of offloading. SPACCE concept in providing calculation capacity of PCs is proposed to facilitate distributed collaboration. A SPACCE is a sophisticated ad hoc cloud computing environment that can be built according to the needs that occur at any given time on a set of personal, i.e., non-dedicated, PCs and dynamically migrate a server[13] for application sharing to another PC. By migrating the server , redundant calculation capacity of PCs can be utilized for creating a SPACCE, where the response time of the application shared among users is improved. A SPACCE provides the available calculation capacity of a PC as the server for collaboration to other PCs which have no application and/or not enough calculation capacity to be the server on demand.
  • 3. Mobile Computing Jiems akkalkuwa Page 3 CHAPTER: 3 EXISTING SYSTEM 3.1EXISTING CELLULAR NETWORK ARCHITECTURE: Mobile telephony took off with the introduction of cellular technology which allowed the efficient utilization of frequencies enabling the connection of a large number of users. During the 1980's analogue technology was used. A cellular network consists of mobile units linked together to switching equipment, which interconnect the different parts of the network and allow access to the fixed Public Switched Telephone Network (PSTN). The technology is hidden from view; it's incorporated in a number of transceivers called Base Stations (BS). Every BS is located at a strategically selected place and covers a given area or cell - hence the name cellular communications. A number of adjacent cells grouped together form an area and the corresponding BSs communicate through a so called Mobile Switching Centre (MSC). The MSC is the heart of a cellular radio system. It is responsible for routing, or switching, calls from the originator to the designator. It can be thought of managing the cell, being responsible for set-up, routing control and termination of the call, Fig 3.1 Existing Cellular Network Architecture for management inter MSC hand over and supplementary services, and for collecting charging and accounting information. The MSC may be connected to other MSCs on the same network or to the PSTN.
  • 4. Mobile Computing Jiems akkalkuwa Page 4 CHAPTER: 4 PROPOSED SYSTEM The purpose of these guidelines is to provide direction for the appropriate usage, including access and support, of Mobile Computing Devices on the NOCCCD network. The network exists to meet the instructional mission of the colleges and district. The guidelines apply to many types of devices including but not limited to Laptops, Smart phones (phones with data/network connectivity capabilities), portable storage devices, tablet devices, and other mobile devices. The key reasons for the creation of these guidelines are: to insure uninterrupted support of our instructional mission;  To protect the District and the colleges from legal liability;  To meet legal requirements;  To protect the network so that all can use it;  To protect the data housed in the systems on the network and;  To insure that devices can be properly supported for effective use.
  • 5. Mobile Computing Jiems akkalkuwa Page 5 CHAPTER: 5 ADVANTAGES & DISADVANTAGE 5.1Advantages: 1- Increase in Productivity- Mobile devices can be used out in the field of various companies, therefore reducing the time and cost for clients and themselves. 2- Entertainment- Mobile devices can be used for entertainment purposes, for personal and even for presentations to people and clients. 3- Portability- this would be one of the main advantages of mobile computing, you are not restricted to one location in order for you to get jobs done or even access email on the go 4- Cloud Computing- This service is available for saving documents on a online server and being able to access them anytime and anywhere when you have a connection to the internet and can access these files on several mobile devices or even PCs at home.
  • 6. Mobile Computing Jiems akkalkuwa Page 6 5.2Disadvantages: 1- Quality of connectivity- as one of the disadvantages, mobile devices will need either Wi-Fi connectivity or mobile network connectivity such as GPRS, 3G and in some countries even 4G connectivity that is why this is a disadvantage because if you are not near any of these connections your access to the internet is very limited. 2- Security concerns- Mobile VPNs are unsafe to connect to, and also syncing devices might also lead to security concerns. Accessing a Wi-Fi network can also be risky because WPA and WEP security can be bypassed easily. 3- Power Consumption- due to the use of batteries in these devices, these do not tend to last long, if in a situation where there is no source of power for charging then that will certainly be a letdown.
  • 7. Mobile Computing Jiems akkalkuwa Page 7 CHAPTER: 6 APPLICATIONS 1) For Estate Agents 2) Emergency Services 3) Credit Card Verification 4) Taxi/Truck Dispatch 5) Electronic Mail/Paging 6.1) For Estate Agents Estate agents can work either at home or out in the field. With mobile computers they can be more productive. They can obtain current real estate information by accessing multiple listing services, which they can do from home, office or car when out with clients. They can provide clients with immediate feedback regarding specific homes or neighborhoods, and with faster loan approvals, since applications can be submitted on the spot. Therefore, mobile computers allow them to devote more time to clients. 6.2) Emergency Services Ability to receive information on the move is vital where the emergency services are involved. Information regarding the address, type and other details of an incident can be dispatched quickly, via a CDPD system using mobile computers, to one or several appropriate mobile units which are in the vicinity of the incident. Here the reliability and security implemented in the CDPD system would be of great advantage. Fig. Police Incident Information Screen
  • 8. Mobile Computing Jiems akkalkuwa Page 8 6.3) Credit Card Verification At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for transactions, the intercommunication required between the bank central computer and the POS terminal, in order to effect verification of the card usage, can take place quickly and securely over cellular channels using a mobile computer unit. This can speed up the transaction process and relieve congestion at the POS terminals. 6.4 Taxi/Truck Dispatch Using the idea of a centrally controlled dispatcher with several mobile units (taxis), mobile computing allows the taxis to be given full details of the dispatched job as well as allowing the taxis to communicate information about their whereabouts back to the central dispatch office. This system is also extremely useful in secure deliveries i.e.: Securicor. This allows a central computer to be able to track and receive status information from all of its mobile secure delivery vans. 6.5 Electronic Mail/Paging Usage of a mobile unit to send and read emails is a very useful asset for any business individual, as it allows him/her to keep in touch with any colleagues as well as any urgent developments that may affect their work. Access to the Internet, using mobile computing technology, allows the individual to have vast arrays of knowledge at his/her fingertips.
  • 9. Mobile Computing Jiems akkalkuwa Page 9 CHAPTER:7 FUTURE SCOPE & CONCLUSION FUTURE SCOPE: 7.1 With the rapid technological advancements in Artificial Intelligence, Integrated Circuitry and increases in Computer Processor speeds, the future of mobile computing looks increasingly exciting. 7.2 With the emphasis increasingly on compact, small mobile computers, it may also be possible to have all the practicality of a mobile computer in the size of a hand held organizer or even smaller. 7.3 Use of Artificial Intelligence may allow mobile units to be the ultimate in personal secretaries, which can receive emails and paging messages, understand what they are about, and change the individual’s personal schedule according to the message. This can then be checked by the individual to plan his/her day. 7.4 The working lifestyle will change, with the majority of people working from home, rather than commuting. This may be beneficial to the environment as less transportation will be utilized. This mobility aspect may be carried further in that, even in social spheres, people will interact via mobile stations. .CONCLUSION: According to my aims and objectives of this paper I have done the detailed research and get the knowledge about it and the factors that need to be consider carefully. At this stage we are facing different types of problems and threats to the mobile industry, the two major aspects are the security and the usability issue. Detailed analysis of security issues is very important at least for a mobile wireless device, there are numbers of ways that it can be compromised, but I would like to draw an attention on the usability issues as well. They both need to be carefully planned and designed that the mobile user or target audience get used to it easily, effectively and securely.
  • 10. Mobile Computing Jiems akkalkuwa Page 10 CHAPTER:8 REFERENCES:  Interview with Mr Eleftherios Koudounas, Assistant Commercial Services Manager at Cyprus Telecommunications Authority  Interview with Dr Leonidas Leonidou, Mobile Services, Cyprus telecommunications Authority  www.w3school.com  Www. Ijecs.in  www.studymafia.com  Network Switching Techniques-Circuit, Packet and Datagram: Halsall, Fred. Data Communications, Computer Networks and Open Systems. 4th edition 1996. pp 424-459.  Asynchronous Transfer Mode , Solution for Broadband ISDN, Third edition 1993, By Martin de Prycker