Вы находитесь на странице: 1из 10

Visit: www.geocities.com/chinna_chetan05/forfriends.

html

1 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

CONTENTS
Page No

1. Introduction 4
What is Mobile and Quantum Computing?
A view on portable devices.
2. Distinction between “Wireless” and “Mobile.” 4
Challenges in mobile computing 5
Merits and Demerits 7
Merits
Demerits
Research on Quantum Computing. 8
3. Applications 8
4. Wireless Internet Future 9
5. Conclusion 10
6. Bibliography 10

2 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

ABSTRACT :

Mobile computing has been undergoing a bit of a renaissance lately. A few


years ago it was a simple matter of finding a data-compatible mobile phone, a PC card
modem, and a matching cable and installing it as a modem. Then people started to use
PDA’s as well. Cell phones started to come with infrared ports to allow communication
with laptops. Then cell phones started to come with modems built in. The connecting
methods of mobile computing, its introduction, connection types, factors affecting
connections, mobile applications and its limitations are explained.
First proposed in the 1970s, quantum computing relies on quantum physics by
taking advantage of certain quantum physics properties of atoms or nuclei that allow to
work together as quantum bits, or quibits, to be the computer’s processor and memory.
By interacting with each other while being isolated from the external environment,
quibits can perform certain calculations exponentially faster than conventional
computers.

3 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

Introduction :
Wireless networking technology has engendered a new era of computing, called
mobile computing. Mobile Computing is an umbrella term used to describe
technologies that enable people to access network services any place, anytime, and
anywhere.
Ubiquitous computing and nomadic computing are synonymous with mobile
computing. Mobile computing helps users to be productive immediately by reducing
the training requirements associated with traditional automated data collection methods
and provides a higher level of portability than keyboard-based systems.
Field-based users can access any information available from the system at any
time to make critical business decisions. This information is available at the point of
use, wherever and whenever they need it.
Portable devices like laptop and palm top computers give mobile users access to
diverse sources of global information anywhere and at any time.
One of the most important and highly publicized recent developments in the PC
world has been the introduction of the pen interface. By using a stylus to replace the
keyboard, mobile computers are turning thousands of computer illiterate people
especially those involved with field-based data collection into computer users.
The idea emerged when scientists were pondering the fundamental limits of
computation. They understood that if technology continued to abide by Moore’s Law
then the continually shrinking size of circuitry packed on silicon chips would eventually
reach a point individual elements would be no larger than a few attempts. Here a
problem arose because that the atomic scale the physical laws that govern the behavior
and properties of the circuit the inherently quantum mechanical in nature, not classical.

Distinction between "Wireless" and "Mobile"


Wireless refers to the method of transferring information between computing
devices, such as a personal data assistant (PDA), and a data source, such as an agency
database server, without a physical connection. Not all wireless communications
technologies are mobile. For example, lasers are used in wireless data transfer between
buildings, but cannot be used in mobile communications at this time.
Mobile simply describes a computing device that is not restricted to a desktop.
A mobile device may be a PDA, a "smart" cell phone or Web phone, a laptop computer,
or any one of numerous other devices that allow the user to complete computing tasks
4 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
without being tethered, or connected, to a network. Mobile computing does not
necessarily require wireless communication. In fact, it may not require communication
between devices at all.

Challenges in Mobile Computing :


Wireless and mobile environments bring different challenges to users and
service providers when compared to fixed, wired networks. Physical constraints become
much more important, such as device weight, battery power, screen size, portability,
quality of radio transmission, error rates. Mobility brings additional uncertainties, as
well as opportunities to provide new services and supplementary information to users in
the locations where they find themselves.
The major challenges in mobile computing are described including: low
bandwidth, high error rate, power restrictions, security, limited capabilities,
disconnection and problems due to client mobility.
1. Low Bandwidth: Wireless networks deliver lower bandwidth than wired
networks. As a result, mobile applications have to be carefully designed to control
the bandwidth consumption. Software techniques required to improve effective
bandwidth usage include data compression logging requests to combine multiple
short ones, lazy write back, difference-based updates, caching, prefetching, usage of
proxy, priority scheduling, etc.
2. High Error Rate: The network quality varies as the mobile computer
moves across the heterogeneous network connections. The wireless environment
exhibits higher error rates, which results in retransmission and affects the Quality of
Service. By minimizing the usage of wireless transmission, the data is less exposed
to transmission errors. In addition, error correction schemes can be employed to
improve performance. However, these schemes also add to the communication
overhead and reduce the usable bandwidth.
3. Power Limitations: Mobile computers are concerned with the limited
power supply, an issue that does not appear in distributed wired environment.
Hardware improvements on batteries can help to lengthen the life of a charge and
reduce battery weight. In addition, efficient software operations can help to lower
the power consumption. Examples include: shifting the processing to a fixed host,
aggressively caching and prefetching data to reduce disk traffic, and transmitting
less data while receiving more

5 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

4. Security: Security and privacy are of specific concerns in wireless


communication because of the ease of connecting to the wireless link
anonymously. Common problems are impersonation, denial of service and
tapping. The main technique used is encryption. In personal profiles of users
are used to restrict access to the mobile units.
5. Limited Capabilities: Unlike stationary computers, mobile computers are
smaller in physical size and have smaller storage capacity. PDA’s like Infopad and
ParcTab are designed to have extreme portability and provide ubiquitous
information access. However, their applications rely heavily on the interoperability
of the pads and other servers. Even ordinary laptops typically have less RAM and
smaller hard disks than stationary computers.
To overcome these limitations, some useful techniques are proposed
including: Compressing file systems, accessing remote storage over the network,
sharing code libraries and compressing virtual memory pages. In addition, the user
interface has to be designed to adapt to the small screen size of the portable
computers.
6. Disconnection: Disconnection can be voluntary or involuntary. Voluntary
disconnection occurs when mobile users want to disconnect the mobile unit from
the network temporarily, like working on a plane. Involuntary disconnection is
mainly due to network failures. The mobile application should not be disrupted
under these circumstances. Some applications are designed to run entirely locally on
the mobile unit, but it may not be feasible for distributed applications where users
have to communicate with one another. Again, prefetching and lazy write-back are
some useful techniques that allow to work under disconnection.
7. Mobility: There are two types of mobility described: (a) mobility of
clients and (b) mobility of resources.
a. Mobility of clients raises the issues of unique naming of the clients
and finding their current locations. Unlike stationary computers, where information on
location is configured statically mobile computers have to configure information
dynamically.
b. Mobility of resources addresses the above problem. When a mobile host
moves into a new cell or administrative domain, it has to discover the resources
available there. At the same time, any server that needs to communicate with the mobile
host has to identify its new location. Location transparency should be provided to the

6 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
mobile applications by the underlying runtime system so that the users are not aware of
the effects of mobility.
Merits and Demerits :
1.1.1 Merits :
 The benefits of automating data collection applications with mobile
computing are the reduction of hard and soft costs, enhancement of revenue
potential, and a distinct competitive advantage through:
 Improving the data collection process
 Improving data accuracy
 Reducing paperwork
 Enforcing collection of more complete information
 Facilitating collection of more useful information
 Eliminating redundant data entry
 Reducing administrative costs
 Reducing billing errors
 Reducing data backlog
 Improving information flow
 Allowing faster adaptation to changing business conditions
 Increasing responsiveness and customer satisfaction
 Providing access to previously unavailable information

Demerits:

 The demerits of the mobile computing are discussed as follows:


 Information access via a mobile device is plagued by low available
bandwidth, poor connection maintenance, poor security, and addressing
problems. Unlike their wired counterparts, design of software for mobile
devices must consider resource limitation, battery power and display size.
Consequently, new hardware and software techniques must be developed. For
example, applications need to be highly optimized for space, in order to fit in
the limited memory on the mobile devices.
 Mobility brings additional uncertainties, as well as opportunities to
provide new services and supplementary information to users in the locations
where they find themselves. In general, most application software, operating

7 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
systems, and network infrastructures are intended for more conventional
environments, and so the mobile, wireless user has great difficulty exploiting
the computational infrastructure as fully as he or she might. There is an
emerging consensus among researchers that a new architecture and dynamic
infrastructure is an appropriate way to address this problem.
 Day by day as the standard of the mobile computing is increasing
the boons of mobile computing are changing to banes. Eg: The most deadly
terrorist attack occurred on sept 11, 2001.
1.2 Research on Qunatum Computing :
The field of quantum information processing has made numerous promising
advancements since its conception, including the building of two- and three-qubit
quantum computers capable of some simple arithmetic and data storing. However, a few
potentially large obstacles still remain that prevent us from “just building one,” or more
precisely, building a quantum computer that can rival today’s modern digital computer.
Before any quantum computer will be capable of solving hard problems, research must
device a way to maintain decoherence and other potential sources of error at an
acceptable level.
In 1998, researches at Los Alamos National Laboratory and MIT led by Raymond
Laflamme managed to spread a single bit of quantum information across three nuclear
spins in each molecule of a liquid solutions of alanine or trichloroethylene molecules.
They accomplished this using the techniques of nuclear magnetic resonance (NMR).
Qubits do not rely on the traditional binary nature of computing. While traditional
computers encode information into bits using binary numbers, either 1 or 0, and can only
do calculations
on one set of numbers at once, quantum computers encode information as a series
of quantum mechanical states such as spin directions of electrons or polarization
orientations of a photon that might represent a 1 or 0, might represent a combination of
two or a number expressing that the state of qubit between 1 and 0, or a super position of
many different numbers at once.

Applications :
New technical and application developments have established that mobile
systems can be a cost-effective, efficient, and productive solution in several different
types of application environments. They are:- a new generation of satellites, especially
Low-Earth Orbit systems (LEOS) are under development with the Internet in mind.
8 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
Companies like Teledesic and Orbcomm are actively promoting Internet access.
Vertical industries where mobile technology has already been successfully adopted
include Consumer Goods, Delivery and Route Sales, Government, Healthcare, Market
Research, Pharmaceuticals, Transportation, andUtilities.
Consumer Goods. Typical applications include inventory, merchandising, order entry,
and sales automation. Features found in these applications usually provide access to
stock and pricing information, monitor promotions, and perform shelf space analysis
including number of facings and product age. Customer detail helps reps to act more as
consultants than order takers.
Delivery & Route Sales. With fierce competition and an increasing inventory,
having timely and accurate information is more important than ever.
Government. Applications center around assessments, inspections, and work
orders. Most of these applications involve auditing some sort of facility or process (food
service, restaurant, nursing home, child care, schools, commercial and residential
buildings).
Market Research. Automating the survey process has enabled these companies
to get their data more accurately and quickly while being able to customize their queries
at will.
Transportation. Transforming freight damage inspections from paper to mobile
computing greatly expedites the process and reduces costs by providing on-line pre-
shipment inspections. This technology also offers a more efficient means of storing and
transmitting maintenance inspection reports. In conjunction with GPS (global
positioning systems), mobile computing allows companies to provide better customer
service by being continually aware of exactly where any given shipment is when in
transit.
Utilities. Eliminating the rekeying of data and providing a means to perform on
site analysis are instrumental to an industry that is required to perform inspections on a
routine basis.
Wireless Internet Future :
There's more happening than many people suspect. The difficulty, though, is to
provide the right network, the right device, the right price and the right applications.
Wireless is not wired, and there are numerous advantages and disadvantages. The
wireless industry "mindset" is different from the computer community's. These different
philosophies produce what we call a "wireless-Web culture clash." Also, much of the
information we obtain via the Internet isn't worth paying for in a mobile environment.
9 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
The Internet will change is already changing the way mobile companies and computer
companies offer products and services, and deal with customers. Indeed, many wireless
subscribers will demand these changes, ranging from online customer service to
electronic bill-paying to creating profiles that automatically transmit personalized
information via the Internet to wireless devices.
We are in a period of tremendous change. It's mobile computing jungle where
old technologies must evolve to survive and where proponents of new technologies are
jockeying for dominance. It is a dangerous and exciting time where existing business
models can crumble and more nimble, innovative companies can usurp established
institutions.
Uncovering these developments, analyzing their impact and recommending
solutions to corporations is what Wireless Internet & Mobile Computing consulting is
all about.

Conclusion :
Mobile computing is rapidly becoming popular, and user demand for useful
wireless applications is increasing. Additionally, this paper shows how these behavioral
extensions serve as a powerful abstraction for practical systems. In this paper, we have
looked at issues related to portable devices, merits, demerits and applications in mobile
environment. Because of the banes of mobile computing the security level should be
improved.
Quantum Computation has its origins in highly specialized fields of theoretical
physics, but its future undoubtedly lies in the profound effect it will have on the lives of
all mankind.
Bibliography :
1. Terri Watson. : Application design for wireless computing.
2. Application design for wireless computing : M-Mail: A Case Study of Dynamic
Application Partitioning in Mobile Computing
3. Christine Julien and Gruia-Catalin Roman : Active Coordination in Ad Hoc
Networks
4. Raymond J. Brunsting : Quality of Service Issues in Wireless Networks
5. D. Deutsch, A. Ekert, “Quantum Computation,” Physics World, March (1998).

10 Email: chinna_chetan05@yahoo.com

Вам также может понравиться