You are on page 1of 8

RAMSWAROOP SINGH T I.

ANIL KUMAR
E-mail: ram_fr_547@yahoo.co.in E-mail:ivaturianil@gmail.com
III/II CSE III/II CSE
ELLENKI COLLEGE OF ENGG ELLENKI COLLEGE OF ENGG
PATELGUDA PATELGUDA

Abstract

Mobile computing has been undergoing with infrared ports to allow communication
a bit of a renaissance lately. A few years ago with laptops. Then cell phones started to
it was a simple matter of finding a data- come with modems built in. The connecting
compatible mobile phone, a PC card methods of mobile computing, its
modem, and a matching cable and installing introduction, connection types, factors
it as a modem. Then people started to use affecting connections, mobile applications
PDA’s as well. Cell phones started to come and its limitations are explained.
to be productive immediately by reducing
 Mobile Devices
the training requirements associated with
 Challenges in mobile
traditional automated data collection
computing
methods and provides a higher level of
 Merits and Demerits
portability than keyboard-based systems.
 Applications
Field-based users can access any
 Conclusion information available from the system at any
 Bibliography time to make critical business decisions.
This information is available at the point of
use, wherever and whenever they need it.
Portable devices like laptop and palm top
Introduction
computers give mobile users access to
diverse sources of global information
Wireless networking technology has
anywhere and at any time.
engendered a new era of computing, called

especially those involved with field-based data


collection into computer users. The market
potential and breadth of application requirements
for mobile computing has prompted numerous
hardware and software companies to focus their
efforts in providing solutions to the vertical, form-
oriented marketplace.

Distinction between "wireless" and "mobile."


Wireless refers to the method of transferring
information between computing devices, such as a
personal data assistant (PDA), and

a data source, such as an agency database server,


One of the most important and highly publicized
without a physical connection. Not all wireless
recent developments in the PC world has been the
communications technologies are mobile. For
introduction of the pen interface. By using a stylus
example, lasers are used in wireless data transfer
to replace the keyboard, mobile computers are
between buildings, but cannot be used in mobile
turning thousands of computer illiterate people
communications at this time.
Mobile simply describes a computing device that  Mobile devices
is not restricted to a desktop. A mobile device may Here we have seven different types of mobile
be a PDA, a "smart" cell phone or Web phone, a devices:
laptop computer, or any one of numerous other  Laptop computers
devices that allow the user to complete computing  PDA’s and handheld PCs
tasks without being tethered, or connected, to a
 Pagers
network. Mobile computing does not necessarily
 Smart phones and cellular phones
require wireless communication. In fact, it may not
 Task devices, such as bar code scanners
require communication between devices at all.
 Blue tooth
 Bridge

Laptops are typically used have intense and constant need for time sensitive
and supported in the same communications.
way as desktop PCs. In fact, Pagers that support one- and two-way text
many organizations have messaging are also used in similar situations. Third
replaced desktops with their party vendors most often provide support for these
portable cousins, as the workforce has grown devices.
increasingly mobile. Task devices such as the parcel tracking devices
PDA’s, however, are the least planned for and used by Federal Express (FedEx) and the United
supported devices. They are undergoing rapid Parcel Service (UPS) delivery personnel are most
evolution and are being brought into organizations often bought as part of a complete system from a
in the same way the earliest PCs were. That is, third-party vendor. Because they are frequently
adventurous early adopters buy the devices for mission-critical, most corporations support task
their personal use and then ask IT departments to devices as rigorously as desktop computers.
integrate the devices into the corporate IT Bluetooth:- A short-range wireless standard that
environment. specifies radio connections between devices within
Smart phones that allow users to access phone a 10-meter range of each other. Bluetooth is
calls, two-way radio transmissions, and paging and designed as a Personal Area Network (PAN, or
data transmissions on one device are also finding WPAN for "Wireless Personal Area Network")
applications in hospitals and other situations that technology with a wide variety of theoretical uses.
Bridge:- A device that connects two local-area constraints become much more important, such as
networks (LANs), or two segments of the same device weight, battery power, screen size,
LAN. Bridges simply forward packets from one portability, quality of radio transmission, error
segment to another without analyzing or routing rates. Mobility brings additional uncertainties, as
messages. This allows them to connect dissimilar well as opportunities to provide new services and
networks (e.g., a bridge can connect an Ethernet supplementary information to users in the
and Token-Ring network). locations where they find themselves.
Challenges in mobile computing The major challenges in mobile computing are
Wireless and mobile environments bring different described including: low bandwidth, high error
challenges to users and service providers when rate, power restrictions, security, limited
compared to fixed, wired networks. Physical capabilities, disconnection and problems due to
client mobility.

 Low Bandwidth environment exhibits higher error rates,


Wireless networks deliver lower bandwidth which results in retransmission and affects
than wired networks. As a result, mobile the Quality of Service. By minimizing the
applications have to be carefully designed to usage of wireless transmission, the data is
control the bandwidth consumption. less exposed to transmission errors. In
Software techniques required to improve addition, error correction schemes can be
effective bandwidth usage include data employed to improve performance.
compression logging requests to combine However, these schemes also add to the
multiple short ones, lazy write back, communication overhead and reduce the
difference-based updates, caching, usable bandwidth.
prefetching, usage of proxy, priority  Power Limitations
scheduling, etc. Mobile computers are concerned with the
limited power supply, an issue that does not
 High Error Rate appear in distributed wired environment.
The network quality varies as the mobile Hardware improvements on batteries can
computer moves across the heterogeneous help to lengthen the life of a charge and
network connections. The wireless reduce battery weight. In addition, efficient
software operations can help to lower the
power consumption. Examples include: ease of connecting to the wireless link
shifting the processing to a fixed host, anonymously. Common problems are
aggressively caching and prefetching data to impersonation, denial of service and tapping.
reduce disk traffic, and transmitting less data The main technique used is encryption. In
while receiving more personal profiles of users are used to restrict
access to the mobile units.
 Security
Security and privacy are of specific concerns
in wireless communication because of the

Merits  Reducing data backlog


 Improving information flow
The benefits of automating data collection  Allowing faster adaptation to changing
applications with mobile computing are the business conditions
reduction of hard and soft costs,  Increasing responsiveness and customer
enhancement of revenue potential, and a satisfaction
distinct competitive advantage through:
 Providing access to previously
 Improving the data collection process unavailable information
 Improving data accuracy
 Reducing paperwork Demerits
 Enforcing collection of more complete
The demerits of the mobile computing are
information
discussed as follows:
 Facilitating collection of more useful
information
 Information access via a mobile device
 Eliminating redundant data entry
is plagued by low available bandwidth,
 Reducing administrative costs
poor connection maintenance, poor
 Reducing billing errors
security, and addressing problems. services and supplementary information
Unlike their wired counterparts, design to users in the locations where they find
of software for mobile devices must themselves. In general, most application
consider resource limitation, battery software, operating systems, and
power and display size. Consequently, network infrastructures are intended for
new hardware and software techniques more conventional environments, and so
must be developed. For example, the mobile, wireless user has great
applications need to be highly optimized difficulty exploiting the computational
for space, in order to fit in the limited infrastructure as fully as he or she might.
memory on the mobile devices. There is an emerging consensus among
 Mobility brings additional uncertainties, researchers that a new architecture and
as well as opportunities to provide new dynamic infrastructure is an appropriate
way to address this problem.

 Day by day as the standard of the mobile and Orbcomm are actively promoting
computing is increasing the boons of mobile Internet access.
computing are changing to banes. Eg: The Vertical industries where mobile technology has
most deadly terrorist attack occurred on sept already been successfully adopted include
11, 2001. Consumer Goods, Delivery and Route Sales,
 Applications Government, Healthcare, Market Research,
New technical and application Pharmaceuticals, Transportation, and Utilities.
developments have established that mobile
systems can be a cost-effective, efficient, Consumer Goods. Typical applications include
and productive solution in several different inventory, merchandising, order entry, and sales
types of application environments. They automation. Features found in these applications
are:- a new generation of satellites, usually provide access to stock and pricing
especially Low-Earth Orbit systems information, monitor promotions, and perform
(LEOS) are under development with the shelf space analysis including number of facings
Internet in mind. Companies like Teledesic and product age. Customer detail helps reps to act
more as consultants than order takers.
and sample collection. A common goal is to
Delivery & Route Sales. With fierce competition leverage mobile computing in the implementation
and an increasing inventory, having timely and of positive patient identification.
accurate information is more important than ever.
Market Research. Automating the survey process
Government. Applications center around has enabled these companies to get their data more
assessments, inspections, and work orders. Most of accurately and quickly while being able to
these applications involve auditing some sort of customize their queries at will.
facility or process (food service, restaurant, Pharmaceuticals. In addition to the reps need to
nursing home, child care, schools, commercial and perform account management and call reporting
residential buildings). functions, the FDA’s requirement for physician
signatures for all drug samples dispensed was an
Healthcare. The focus in this industry has been on added complication that was eliminated through
automating patient records, medication dispension, the use of mobile technology.

Transportation. Transforming freight are instrumental to an industry that is required


damage inspections from paper to mobile to perform inspections on a routine basis.
computing greatly expedites the process and
reduces costs by providing on-line pre- Conclusion
shipment inspections. This technology also Mobile computing is rapidly becoming
offers a more efficient means of storing and popular, and user demand for useful wireless
transmitting maintenance inspection reports. applications is increasing.
In conjunction with GPS (global positioning Additionally, this paper shows how these
systems), mobile computing allows behavioral extensions serve as a powerful
companies to provide better customer abstraction for practical systems.
service by being continually aware of In this paper, we have looked at issues
exactly where any given shipment is when in related to portable devices, merits, demerits
transit. and applications in mobile environment.
Because of the banes of mobile computing
Utilities. Eliminating the rekeying of data and the security level should be improved.
providing a means to perform on site analysis
Application design for wireless computing :
M-Mail: A Case Study of Dynamic
Application Partitioning in Mobile
Computing
Christine Julien and Gruia-Catalin Roman :
Bibilography
Active Coordination in Ad Hoc Networks
Raymond J. Brunsting : Quality of Service
Terri Watson. : Application design for
Issues in Wireless Networks
wireless computing.

You might also like