0% found this document useful (0 votes)
43 views

Issues in Mobile Computing

Issues in Mobile Computing

Uploaded by

Akhil Chandran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Issues in Mobile Computing

Issues in Mobile Computing

Uploaded by

Akhil Chandran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Dr.

Pranav Patil, International Journal of Computer Science and Mobile Applications,


Vol.4 Issue. 8, Aug- 2016, pg. 1-6 ISSN: 2321-8363
Impact Factor: 4.123

Mobile Computing: Issues and Limitations


Dr. Pranav Patil
Assistant Professor, Department of Computer Science, M. J. College, Jalgaon, Maharashtra, India

Abstract: Mobile computing is changing into progressively necessary because of the increase within
the variety of moveable computers and also the want to possess continuous network property to the
web regardless of the physical location of the node. Mobile computing has quick become an important
new paradigm in today's world of networked computing systems. Starting since wireless laptops to
mobile and Wi-Fi/Bluetooth- permitted PDA’s to wireless sensing element networks, mobile computing
has become present in its impact on our daily lives. The goal of this paper is to show a number of the
restrictions, characteristics, applications and problems with mobile computing. during this paper
introduction to Mobile Computing, Characteristics and few of the technologies used for communication,
Limitations, Applications, the problems regarding Mobile computing.
Keywords— Mobile, Software, Mobile Computing,

1. Introduction
Mobile Computing is technology that enables communication of information, via a pc, while not
having to be connected to a place physical link. The term "Mobile computing" is worn to explain the
utilization of computing devices that sometimes move in some fashion with a central data system pass
from the traditional, fastened work. Mobile computing technology allows the mobile employee to form,
access, process, and store and communicates data while not being affected to one location. By
extending the reach of an organization's fastened data system, mobile computing allows interaction
with structure people that were previously detached. Mobile computing is that the discipline for making
a data management platform, that is free from abstraction and temporal constraints. The liberty from
these constraints permits its users to access and scheme desired data from anywhere inside the part. The
state of the user, static or mobile, does not have an effect on the knowledge management capability of
the mobile platform being affected to one location. In mobile computing platform information between
process units flows through wireless channels. The process units are free from activist and special
constraints. That is, a process unit is absolve to move regarding within the area whereas being
connected to the server. This temporal and special freedom provides a strong facility permitting users to
succeed in information website (site wherever the required data is stored) and also the process site (the
geographical location anywhere a process should be performed) from everywhere. This capability
permits organizations to line their offices at every location. The regulation of mobile computing has its
beginning in Personal Communications Services (PCS). It refers to a large form of wireless access and
private quality services provided through a tiny low terminal (e.g., cell phone), with the goal of
facultative communications at any time, at anyplace, and in any kind. These PCS are connected to
Public Switched Telephone Network to produce access to wired telephones.

©2016, IJCSMA All Rights Reserved, www.ijcsma.com 1


Dr. Pranav Patil, International Journal of Computer Science and Mobile Applications,
Vol.4 Issue. 8, Aug- 2016, pg. 1-6 ISSN: 2321-8363
Impact Factor: 4.123

2. Characteristics of Mobile Computing


Mobile computing is skilled using a grouping of component, system and applications package and a
few kinds of communications medium. Potent mobile results have recently become potential due to the
supply of particularly powerful and tiny computing devices, specialized package and improved
telecommunication. A number of the characteristics of mobile computing is predicated on following:
2.1. Hardware: Here during this section a short summary of the final forms of software, hardware, and
communications averages that are ordinarily integrated to form mobile computing solutions are
outlined. The characteristics of mobile computing hardware are outlined by the dimensions and kind
issue, weight, micro chip, primary storage, external storage, screen size and kind, suggests that of input,
suggests that of output, battery life, communications capabilities, expandability and sturdiness of the
device.
2.2. Software: Mobile computers build use of a good type of system and application package. The
primary common systems enclose and operative locations used on mobile computers include MS-DOS,
Windows 95/98/NT, UNIX, android etc. These operative settings place capabilities from a discreet
graphically- enhanced- pen- allowed DOS surroundings to the powerful potential of Windows NT.
every operative system/environment has some kind of integrated development setting for application
development. Most of the operative settings offer over one development environment choice for
custom application development.
2.3. Communication: The flexibility of a mobile pc to speak in some fashion with a set system may be
a process characteristic of mobile computing. The kind and accessibility of communication medium
considerably impacts the kind of mobile computing application that may be created.
The means a mobile computer communicates with a set system are often categorized as: (a) connected
(b) feeble connected (c) batch and (d) disconnected. The connected class implies an unceasingly
accessible high-speed association. The flexibility to speak unceasingly, however at slow speeds,
permits mobile computers to be feeble connected to the mounted system. A batch association means the
mobile pc is not unceasingly accessible for communication with the mounted system. Within the batch
mode, communication is established arbitrarily or sporadically to exchange and update info between
the mobile pc and glued info systems. Mobile computers might operate in batch mode over
communication mediums that are able of continuous operation, falling the wireless airtime and
associated fees. Disconnected mobile computers permit users to enhance potency by creating
calculations, storing contact info, keeping a schedule, and different non- communications directed tasks.
This mode of operation is of very little interest as a result of the mobile device is unable of
electronically interacting and replacing info with the mounted structure system. Exchange of data with
a disconnected mobile computer will solely be accomplished by manually getting into information into
the device or repeating from the device's screen and manually getting into the knowledge into the
mounted system. This type of knowledge exchange is not any extra reasonable than mistreatment paper
and is effectively nonexistent, since nearly all trendy mobile computing hardware is capable of some
kind of native electronic knowledge communications. Knowledge Communications is that the
exchange of knowledge mistreatment existing communication networks.

©2016, IJCSMA All Rights Reserved, www.ijcsma.com 2


Dr. Pranav Patil, International Journal of Computer Science and Mobile Applications,
Vol.4 Issue. 8, Aug- 2016, pg. 1-6 ISSN: 2321-8363
Impact Factor: 4.123

The term knowledge covers a good vary of applications as well as File Transfer, interrelation between
Wide-Area-Networks (WAN), reproduction, email correspondence, access to the web and also the
World Wide web (WWW).

3. Limitations of Mobile Computing


3.1. Deficient Bandwidth: Mobile web access is usually slower than direct cable connections,
victimisation technologies like GPRS and EDGE, and additional recently 3G networks. These networks
are typically accessible at intervals vary of economic mobile phone towers. Higher speed wireless
LANs are cheap however have terribly restricted vary.
3.2. Security Standards: once operating mobile, one relies on public networks, requiring careful use
of Virtual personal Network (VPN). Security could be a major concern whereas regarding the mobile
computing standards on the fleet. One will simply attack the VPN through an enormous variety of
networks interconnected through the road.
3.3. Power consumption: once an influence outlet or moveable generator is not accessible, mobile
computers should swear entirely on battery power. Combined with the compact size of the many
mobile devices, this typically means that uncover priced batteries should be accustomed get the
required battery life. Mobile computing should additionally look at Greener IT, in such the simplest
way that it saves the ability or will increase the battery life.
3.4. Transmission interferences: Weather, terrain, and also differ from the closest signal purpose will
all interfere with signal response. Reception in tunnels, some structures, and rural areas is usually poor.
3.5. Potential health hazards: those that use mobile devices whereas driving are usually distracted
from driving are so assumed additional probably to be concerned in traffic accidents. Cell phones could
interfere with sensitive medical devices. There are allegations that mobile phone signals could cause
health issues.
3.6. Human interface with mechanism: Screens and keyboards are likely to be little, which can create
them exhausting to use. Alternate input strategies like speech or handwriting recognition need
coaching.

4. Applications of Mobile Computing


Mobile operating infrastructure will deliver real time business advantages, corporations of all sizes are
walking up to the actual fact that they will improve productivity and increase profits by giving workers
remote access to mission essential company IT system. The importance of Mobile Computers has been
highlighted in several fields of that some are represented below:
4.1. For Estate Agents: Estate agents will work either reception or call at the sector. With mobile
computers they will be a lot of productive. They will acquire current property data by accessing
multiple listing services, that they will do from home, workplace or automobile once out with
purchasers. They will give shoppers with immediate feedback concerning specific homes or
neighborhoods, and with quicker loan approvals, since applications is submitted on the spot. Therefore,
mobile computers enable them to devote longer to purchasers.

©2016, IJCSMA All Rights Reserved, www.ijcsma.com 3


Dr. Pranav Patil, International Journal of Computer Science and Mobile Applications,
Vol.4 Issue. 8, Aug- 2016, pg. 1-6 ISSN: 2321-8363
Impact Factor: 4.123

4.2. Emergency Services: Ability to receive data on the move is important wherever the emergency
services are concerned. Data concerning the address, kind and different details of an event is sent
quickly, via a Cellular Digital Packet data (CDPD) system using mobile computers, to 1 or many
acceptable mobile units that are within the locality of the incident.
4.3. In courts: Defense counsels will take mobile computers in court. Once the opposing counsel
references a case that they are not familiar, they'll use the computer to induce direct, period access to
on-line legal information services, wherever they'll gather data on the case and connected precedents.
Mobile computers enable immediate access to a wealth of data, creating individuals higher knowing
and ready.
4.4. In companies: Managers will use mobile computers in, say, and essential shows to major
customers. They will access the most recent market share data. At a tiny low recess, they will revise the
presentation to require advantage of this data. They will communicate with the workplace regarding
doable new offers and decision conferences for discussing responds to the new proposals. Therefore,
mobile computers will leverage competitive blessings.

4.5. MasterCard Verification: At purpose of Sale (POS) terminals in retailers and supermarkets, once
customers use credit cards for transactions, the communication is needed between the bank central pc
and also the POS terminal, so as to result verification of the cardboard usage, will happen quickly and
firmly over cellular channels using a mobile computer unit. This could speed up the dealings method
and relieve congestion at the POS terminals.

5. Issues in Mobile Computing


5.1. Security problems: In this paper the author had mentioned varied sorts of security problems and
protocols that are used for securing the information once communication between them.
 Privacy: avoiding unauthorized users from fast access to essential data of any explicit customer.
 Reliability: Ensures unauthorized modification, damage or creation of knowledge cannot occur.
 Availability: making certain approved users obtaining the access they need.
 Legitimate: making certain that only approved users have access to services.
 Accountability: making certain that the users are command liable for their security connected
activities by composing the user and his/her activities are joined if and once necessary.
Primarily author has mentioned on parallel and uneven key coding mechanisms for providing security
to the information across the network.
5.2. Bandwidth: Bandwidth utilization is often improved by work (bulk operations against short
requests) and compression of information before transmission. In addition, lazy write back and file
perfecting will facilitate the network in times of peak demands. Lazy write back is incredibly useful
within the sense that the information to be written could bear any modifications. The technique of
caching often accessed information things will play a very important role in reducing rivalry in slim
information measure wireless networks. The cached information will facilitate improve question
reaction time. Since mobile purchasers usually disconnect to conserve battery power the cached
information will support disconnected procedures.

©2016, IJCSMA All Rights Reserved, www.ijcsma.com 4


Dr. Pranav Patil, International Journal of Computer Science and Mobile Applications,
Vol.4 Issue. 8, Aug- 2016, pg. 1-6 ISSN: 2321-8363
Impact Factor: 4.123

5.3. Location aptitude: Mobile computers move they come across networks with completely different
options. A mobile computer should be ready to switch from infrared mode to radio mode because it
moves from inside to outdoors. In addition it ought to be capable of change from cellular mode of
operation to satellite mode because the computer moves from urban and rural areas. In mobile
computing as computers are operating in cells and are being maintained by totally different network
suppliers, the physical distance might not replicate actuality network distance. A little movement might
end in a far longer path if cell or network boundaries are crossed. It will additionally result in change of
the placement dependent information as delineated above. This will increase the network latency
likewise as risk of disconnection. Service connections should be dynamically transferred to the closest
server. However, once load equalization may be a priority this could not be potential.
5.4. Power Consumption: Mobile Computers can deem their batteries because the primary power
supply. Batteries should be ideally as lightweight as potential however at constant time they must be
capable of longer operation times. Power consumption should be decreased to extend battery life.
Chips are redesigned to control at lower voltages. Power management may also facilitate. Individual
Components, be high-powered down once they are idle.

6. Advantages and Categories of Mobile Computing


Computers are one among the main inventions of the world. The invention of computer has modified
the world. During lately each field of life looks to be processed. Later within the 21st century a
replacement technology was introduced within the world referred to as mobile computing. Now-a-days
computers area unit changed into mobile computers referred to as laptops. A little introduction of
mobile computing is that you just will do your add motion. In easy words it means you'll do your work
whereas sitting anyplace within the world. You are doing not need to sit at one place to try to your
work. The most challenge of Mobile computing is that, we are able to communicate with alternative
people’s whereas sitting anyplace within the world.
The name MOBILE comes from the primary letter in every of the six classes that conjure the
framework. The six classes are:
M -they would like for mobility
O- the necessity to enhance operations
B -the got to break business barriers
I -the got to improve info quality
L -the got to decrease dealings lag
E -the got to improve potency

7. Conclusion
Mobile computing offers important advantages for organizations that prefer to integrate the technology
into their fastened structure data system. Mobile computing is created attainable by personal computer
hardware, software, and communications systems that move with a non-mobile structure data system
get through from the conventional, fastened work. Mobile computing may be a versatile and probably
strategic technology that improves data quality and accessibility, will increase operational potency, and

©2016, IJCSMA All Rights Reserved, www.ijcsma.com 5


Dr. Pranav Patil, International Journal of Computer Science and Mobile Applications,
Vol.4 Issue. 8, Aug- 2016, pg. 1-6 ISSN: 2321-8363
Impact Factor: 4.123

enhances management effectiveness. Here during this paper known a number of the difficult problems,
applications of mobile computing beside few of the characteristics of Mobile computing.

References
[1] http://www.doc.ic.ac.uk/~nd/surprise_96/journal.
[2] Srikanth Pullela, Department of Computer Science. University of Texas at Arlington: Security Issues in Mobile
Computing.
[3] http://ac-support.europe.umuc.edu.
[4] http://ac-support.europe.umuc.edu.
[5] CiiT International Journal of Networking and Communication Engineering, Vol 3.
[6] Muller, N. J. Mobile Telecommunications factbook. New York: McGraw-Hill.

©2016, IJCSMA All Rights Reserved, www.ijcsma.com 6

You might also like