Вы находитесь на странице: 1из 22

NITS, II MCA

A Paper Presentation on

WELCOME TO THE WORLD OF COMPUTING


2
NITS, MCA II YEAR
MOBILE COMPUTING

CONTENTS

• ABSTRACT
• INTRODUCTION
• MOBILE COMPUTING APPLICATION ISSEUES
• DISTINCTION BETWEEN WIRELESS AND MOBILE.
• MOBILE DEVICES
• MOBILE COMPUTING SECURITY
• ARCHETECTURE OF MOBILE COMPUTING
• GPRS
• BLUETOOTH
• ADVANTAGES OF MOBILE COMPUTING
• CHALLENGES IN MOBILE COMPUTING
• MERITS.
• DEMERITS
• APPLICATIONS
• WIRELESS INTERNET IN FEATURES
• CONCLUSION
• BIBILOGRAPHY
3
NITS, MCA II YEAR
MOBILE COMPUTING

Mobile Computing has been undergoing a bit of renaissance lately. A Few years ago it was a
simple matter of finding a data compatible mobile phone, a PC card modem, and a matching cable
and installing it as modem. then people started to use PDA’s as well. Cell phones started to come
with infrared ports to allow communication with laptops. Then cell phones started to come with
modems built in. The connecting methods of mobile computing, its introduction, connection types,
factors affecting connections, mobile applications and its limitations are explained.
4
NITS, MCA II YEAR
MOBILE COMPUTING

INTRODUCTION

 Wireless networking technology has engendered a new era of computing, called mobile
computing. mobile computing is an umbrella term used to describe technologies that
enable people to access network services any please , any time , and any where.
Portable devices like laptop and palmtop computers give mobile users access to diverse
sources of global information any where and at any time.

 One of the most important and highly publicized recent developments in the PC world
has been the introduction of the pen interface. by using stylus to replace the keyboard ,
mobile computers are turning thousands of computer illiterate people especially those
 Involved with field based data collection into computer users. the market potential and
breadth of application requirements for mobile computing has Prompted Numerous
5
NITS, MCA II YEAR
MOBILE COMPUTING
hardware and Software Companies to focus their efforts in providing solutions to the
vertical form oriented market place .
 The pen interface allows users to interact with the computer in a very natural familiar
way by entering text, numbers and graphics in “electronic ink “ directly on the screen
the pen interface also provides users with highly intuitive and efficient applications,
whether tapping graphical icons to navigate
 through applications or selecting of options from scrolling lists and check boxes .
 Mobile computing applications can closely simulate the original paper one form line
providing users with a familiar look and feel through the use of the latest PCMCIA
technology data storage is large, fast and more efficient with minimal power
consumption and the highest level of ruggedness. While communications via modem
Or wireless is also tightly integrated, fulfilling the requirements of the mobile user and
standardized ports give users across to printers, barcode readers and various other
peripheral devices.

The way the world is changing!

Mobile Computing is an umbrella term used to describe technologies that enable people to
access network services anyplace, anytime, and anywhere. Ubiquitous computing and nomadic
computing are synonymous with mobile computing. Information access via a mobile device is
plagued by low available bandwidth, poor connection maintenence, poor security, and addressing
problems. Unlike their wired counterparts, design of software for mobile devices must consider
resource limitation, battery power and display size. Consequently, new hardware and software
techniques must be developed. For example, applications need to be highly optimized for space,
in order to fit in the limited memory on the mobile devices. For Internet enabled devices, the
good old TCP/IP stack cannot be used; it takes too much space and is not optimized for minimal
power consumption. Given the plethora of cellular technologies that have emerged in such a
market, it becomes extremely difficult to provide support for inter-device communication.

A new hardware technology solution, Bluetooth, has been proposed to


overcome this barrier. Any device with a Bluetooth chip will be able to
communicate seamlessly with any other device having a similar chip
irrespective of the communication technologies they might be using.
For the sake of explanation, an analogy can be drawn between the Java
Virtual Machine and Blue tooth.

In the recent past, cellular phone companies have shown an interesting


growth pattern. The number of customers has been steadily increasing
but the average airtime per user has slowed to a constant. To increase the user average connect
time, many cellular providers have started providing data services on their networks which
entices the user to use the mobile device for both voice and data communication. Typical data
6
NITS, MCA II YEAR
MOBILE COMPUTING
services include chat, e-mail, Internet browsing. An example of this type of service
is SMS (Short Message Service). It is a data service in a GSM cellular network that allows the
users to send a maximum of 160-character message at a time (similar to paging). Inherently, this
service is not feasible for browsing, checking e-mail or chatting. GSM networks provide another
service called GPRS (General Packet Radio Service) that allows information to be sent and
received across the cellular network.

Mobile Computing Application Issues


The programs used in mobile devices like mobile phones, laptops, palm computers, etc. for
internet connectivity and other computer related activities are called mobile computing
applications. The various issues and designs of mobile computing application are discussed
under various headings below.

Technical Design

First comes the Technical Design Issues, which consist of network design, capacity planning,
response time calculations, data compression considerations, system availability design and
security issues. The technical design plays a key role in a mobile computing project and offers
unique challenges to the system professionals.

Network Design

Issues regarding Wireless LAN design and Wide Area Radio Network Design which network
design comprises are discussed below.

a. Wireless LAN design issuess

 The number of mobile users who will use wireless LAN and the number of them active
during the peak period.
 The types of LAN application accessed by them. (Keeping in mind that wireless LANs
will not be acceptable for the intended users as they operate at much slower speeds than
wired LANs).
 Use of notebook with a wireless NIC as a primary and user device.
 Roaming areas, location & range of needed access point.
 Impact of construction materials in single penetration.
 Preferred technology-spread spectrum or frequency hopping.
 Radio frequency interference from any other devices in office, factory or campus etc.

b. Wide Area Radio Network Design Issues

 The need of building a private radio network.


 Most appropriate radio network technology for the suite of applications.
7
NITS, MCA II YEAR
MOBILE COMPUTING
 Matching of user application-usage profiles to a given network capacity.
 Integration of RNA technology with a radio network infrastructure.

 Ensuring good coverage & minimum number of dead spots.


 If distributed wireless network design with several MCSSs must be used?
 Managing the way logic networks will be influenced by network design options.

o DISTINCTION BETWEEN “WIRELESS” AND


“MOBILE

 Wireless refers to the method of transferring information between computing devices,


such as a personal data assistant (PDA), and a data source, such as an agency data base
server, with out a physical connection. Not all wireless communication technologies are
mobile. For example, lasers are used in wireless data transfer between buildings, but can’t
be used in mobile communications at this time.
 Mobile simply describes a computing device that is not restricted to a desktop. A mobile
device may be a PDA. A smart cell phone or web phone a laptop computer or any one of
8
NITS, MCA II YEAR
MOBILE COMPUTING
the numerous other devices that allow the user to complete computing tasks without
being tethered, or connected, to a network. Mobile computing does not necessarily
required wireless communication .in fact it may not require communication between
devices at all.

MOBILE DEVICES

Here we have seven different types of mobile devices

 Laptop computers.
 PDA’s and, handheld PC’s.
 Pagers.
 Smart phones and cellular phones.
 Task devices, such as bar code readers.
 Bluetooth.
 Bridge.

 Laptops are typically used and supported in


the same way as desktop PC’s. in fact many
organizations have replaced desktops with
their portable cousins , as the work force has
grown increasingly mobile.

 PDA’s however, Are the least planned


for and supported devices. they are
undergoing rapid evolution and are
being brought into organizations in the
same way the earliest PC’s were .that
is adventurous early adopters buy the
devices for their personal use and then ask IT departments to integrate the devices in to
the corporate IT environment. at present PDA’s are most often used for storing and
synchronizing personal information such as addresses, schedules and E-mail .however
the medical industry has developed numerous applications for PDA’s .at least one web
ring( a collection of websites with a common topic) has been created to discuss medical
9
NITS, MCA II YEAR
MOBILE COMPUTING
software that automates functions such as patient and diagnostic data entry ,patient
monitoring and diagnosis ,and messaging .in a hospital setting, these applications may
include wireless communication between staff members handheld devices and a base
station at which patient information is stored .
 Smart phones that allow users to access phone calls, two way radio transmissions, paging and
data transmissions on one device are also finding applications in hospitals and other situations
that have intense and constant need for time sensitive communications.
 Pagers that support one and two way text messaging are also used in similar situations .third
party vendors most often provide support for these devices .
 Task devices such as the parcel tracking devices used by FEDERAL EXPRESS(Fed ex) and the
UNITED PARCEL SERVICE (ups) delivery personal are most often bought as part of a
complete system from a third party vendor. Because they are frequently mission critical most
corporations support task devices as rigorously as desktop computers.
 Bluetooth, a short range wireless standard that specifies radio connections between devices
within a ten meter range of each other. Bluetooth is designed as a personal area network (PAN
or WPAN for
“wireless personal area network”)technology with a wide variety of

theoretical uses .

Mobile Computing Security:


10
NITS, MCA II YEAR
MOBILE COMPUTING
Security in Broad Sense
Securing information from unauthorized access is a major problem for any network -
wireline or wireless Security, in a broad sense, focuses on network security, system
security, information security, and physical security. It is made up of a suite of multiple
technologies that solve numerous authentication, information integrity, and
identification problems. It includes the following technologies – firewalls,
authentication servers, biometrics, cryptography, intrusion detection, virus protection,
and VPNs.

GPRS:

The General Packet Radio Service (GPRS) extends the Global System Mobile
Communication (GSM) by introducing a packet-switched transmission service. This
paper analyzes the GPRS behavior under critical conditions. In particular, we focus on
outages, which significantly impact the GPRS dependability. In fact, during outage
11
NITS, MCA II YEAR
MOBILE COMPUTING
periods, the cumulative number of users trying to access the service grows
proportionally over time. When the system resumes its operations, the overload caused
by accumulated users determines a higher probability of collisions on resources
assignment and, therefore, a degradation of the overall QoS. This paper adopts a
stochastic activity network modeling approach for evaluating the dependability of a
GPRS network under outage conditions. The major contribution of this study lies in
the novel perspective the dependability study is framed in. Starting from a quite
classical availability analysis, the network dependability figures are incorporated into a
very detailed service model that is used to analyze the overload effect GPRS has to face
after outages, gaining deep insights on its impact on user's perceived QoS. The result of
this modeling is an enhanced availability analysis, which takes into account not only
the bare estimation of unavailability periods, but also the important congestion
phenomenon following outages that contribute to service degradation for a certain
period of time after operations resume.
The difficulties the international industry standard bodies have had in approving all of the
necessary standards has led to a delay in the deployment of 3G wireless systems. To lessen the
impact of these delays, General Packet Radio Service is being introduced as an intermediate step
to efficiently transport high-speed data over the current GSM wireless network infrastructures.

GPRS is a packet-based data bearer service for GSM and TDMA networks. It is being rolled out
by operators around the world as the first vital step towards 3G. GPRS gives mobile users faster
data speeds and is particularly suitable for "bursty" Internet and intranet traffic. It makes mobile
data faster, cheaper and more user-friendly than ever before. With GPRS-enabled mobile
devices, users can be "always on" the Mobile Internet, so that, for example, emails arrive
instantaneously. It also permits users to receive calls simultaneously when sending and receiving
data calls.

GPRS provides end-to-end IP connectivity that can be used to connect corporate LANs, ISPs and
operators' own service LANs via interfaces to TCP/IP and X.25. GPRS gives almost
instantaneous connection set-up, and allows charging on the basis of data transmitted rather than
connection time. As a packet data technology, GPRS only uses network resources and bandwidth
when data is actually transmitted. This makes extremely efficient use of available radio
bandwidth. Supported data rates range from 14.4 Kbps using just one TDMA slot, up to 115
Kbps and higher using all eight.

GPRS can be implemented by simply adding new packet data nodes in GSM/TDMA networks,
and upgrading existing nodes to provide a routing path for packet data between the mobile
terminal and a gateway node. The gateway node provides interworking with external packet data
12
NITS, MCA II YEAR
MOBILE COMPUTING
networks for access to the Internet and intranets, for example, and requires few or no hardware
upgrades to existing GSM/TDMA nodes.

The New Phone -- Thanks to GPRS

Huawei E220 GPRS Modem

Download TDMA Timeslots


Technology Upload (kbit/s)
(kbit/s) allocated
CSD 9.6 9.6 1+1
HSCSD 28.8 14.4 2+1
HSCSD 43.2 14.4 3+1
20.0 (Class 8 & 10 and
GPRS 80.0 4+1
CS-4)
40.0 (Class 10 and CS-
GPRS 60.0 3+2
4)
59.2 (Class 8, 10 and
EGPRS (EDGE) 236.8 4+1
MCS-9)
118.4 (Class 10 and
EGPRS (EDGE) 177.6 3+2
MCS-9)

Architecture of Mobile computing:


13
NITS, MCA II YEAR
MOBILE COMPUTING
A central piece of infrastructure is the environment monitor. The client application needs to be
informed of changes in the environment. This can be achieved by a daemon process on the
mobile device, monitoring relevant environment parameters and notifying the application
through registered call-back functions. To avoid interruptions of the client logic, these call-back
functions could execute in a separate thread, for example, communicating with the rest of the
mobile client through shared state. An application must register with this daemon, inform it of
environment parameters it is interested in and the conditions under which it wants to be notified,
and provide appropriate call-back functions. To obtain reliable information about the wireless
link, the client-side daemon might interact with a similar daemon on the other end of the wireless
link.

The mobile device will execute the user interface and parts of the client application logic. Other
parts of the client logic execute on a dedicated proxy server, which is a powerful machine in the
fixed network. Ideally, the proxy server should be close to the base station. The client and high-
level proxy will communicate following either a standard protocol such as HTTP or an
application-specific protocol. The high-level proxy communicates with the server, transparently
hiding the fact that the server communicates with a mobile client. We believe it reasonable to
execute this software in user space on the proxy server.
14
NITS, MCA II YEAR
MOBILE COMPUTING
ARCHETURE OF MOBILE COMPUTING

Bluetooth
First developed in 1994, Bluetooth is a low-power, short-range (30 feet) networking specification
with moderately fast transmission speeds of 800 kilobits per second. Bluetooth provides a
wireless, point-to-point, "personal area network" for PDAs, notebooks, printers, mobile phones,
audio components, and other devices. The wireless technology can be used anywhere you have
two or more devices that are Bluetooth enabled. For example, you could send files from a
notebook to a printer without having to physically connect the two devices with a cable.

A few notebooks, such as the IBM ThinkPad T30, now include built-in Bluetooth connectivity.
And $129 will buy you a Bluetooth card for expansion-slot Palm PDAs, allowing you to connect
to printers, notebooks, mobile phones, and other devices without cables.

Despite the promises of Bluetooth, however, hardware makers have been slow to incorporate it
into their products. Some experts believe it could be eight years before Bluetooth is commonly
used. They attribute the technology's lagging adoption rate to poor usability and confusion about
what Bluetooth is and does. For more on that topic, read "Why We're Still Waiting for
Bluetooth."

Bluetooth's chief advantage over infrared is that Bluetooth does not require line of sight. Its
backers hope the component costs will be so low that it will ultimately replace infrared. Others
believe that, although there are clear areas of overlap, IrDA and Bluetooth are complementary
with either being the most appropriate for certain applications and intended usage models.

Bluetooth operates in the unlicensed Industrial Scientific and Medical (ISM) 2.4GHz band,
ranging from 2.4 to 2.4835 GHz in the US, Japan and Europe. Parts of this band are also
available in France and Spain. By using the 2.4 GHz band, Bluetooth Wireless Technology
promises to be a universal wireless solution. Essentially, it is the same kind of microwave radio
technology that has given us wireless door chimes and automatic garage door openers. It draws
heavily on existing wireless LAN technology since it is based around the IEEE's 802.11 - the
existing standard for wireless Ethernet. The main differences are that in order to consume less
power, Bluetooth is initially restricted to an operating distance of just 10 metres and a speed of
approximately 1 Mbit/s.
15
NITS, MCA II YEAR
MOBILE COMPUTING

Advantages of Mobile computing:


Computers are one of the major inventions of the world. The invention of computer has changed
the world. During these days every field of life seems to be computerized. Later in the 21st
century a new technology was introduced in the world known as mobile computing. Now-a-days
computers are modified into mobile computers known as laptops.

A small introduction of mobile computing is that you can do your work in motion. In simple
words it means that you can do your work while sitting anywhere in the world. You do not have
to sit at one place to do your work.

Following are some of the advantages of mobile computing.

The main benefit of mobile computers is that you do not have to bind yourself to a certain place.
You can do your work while sitting in a car or a train. You can communicate with other people
while sitting anywhere in the world. You can chat online with your friends and family members
while sitting on a beach. You can do your office work while sitting anywhere.

The second major benefit is related to the first benefit. When people can do their work while
sitting anywhere they will do more work. This will play an important role in the economy of the
country and the world.

During these days there is no problem for a student to search any information that he needs for
his assignment. Many people use these mobile computers for entertainment. Children play video
games on these computers.

CHALLENGES IN MOBILE COMPUTING


 Wireless and mobile environments bring different challenges to users and service
 Providers when compared to fixed ,wired networks .physical constraints become much
more important, such as device weight, battery power, screen size, portability, quality
of radio transmission, error rates . mobility brings additional uncertainties, as well as
opportunities to provide new services and supplementary information to users in the
locations where they find themselves. the major challenges in mobile computing are
16
NITS, MCA II YEAR
MOBILE COMPUTING
described including ;bandwidth, high error rate, power restrictions ,security ,limited
capabilities, disconnection and problems due to client mobility.

LOW BAND WIDTH:


 Wireless networks deliver lower bandwidth than wired networks. as a result, mobile
applications have to be carefully designed to control the bandwidth consumption.
 Software techniques to improve effective bandwidth usage include data compression
logging requests to combine multiple short ones , lazy write back, difference based
updates, caching , pre fetching, usage of proxy, priority scheduling etc.

HIGH ERROR RATE:

 The network quality varies as the mobile computer moves across the heterogeneous
network connections . the wireless environment exhibits higher error rates, which
results in retransmission and affects the quality of service . by minimizing the usage of
wireless transmission , the data is less exposed to transmission errors. in addition ,error
correction schemes can be employed to improve performance . however , these
schemes add to the communication overhead and reduce the usable band width.

POWER LIMITATIONS:
 Mobile computers are concerned with the limited power supply, an issue that does not
appear in distributed wired environment. Hardware improvements on batteries can help
to lengthen the life of a charge and reduce the battery weight. In addition effective
software operations can help to lower the power consumption. examples include:
shifting the processing to a fixed host, aggressively caching and pre fetching data to
reduce disk traffic, and transmitting less data while receiving more.

SECURITY AND PRIVACY:


 Security and piracy are of specific concerns in wireless communication because of the
ease of connecting to the wireless link anonymously. Common problems are
impersonation , denial of service and tapping. The main technique used in encryption .
in personal profiles of users are used to restrict access to the mobile units.

LIMITED CAPABILITIES:
 Unlike stationary computers mobile computers are similar in physical size and have
smaller storage capacity. PDA’s like info pad and parc tab are designed to have extreme
portability and provide ubiquitous information access. However, their application relies
heavily on the interoperability of the pads and other servers. even ordinary laptops
typically have less RAM and smaller hard disks than stationary computers.
17
NITS, MCA II YEAR
MOBILE COMPUTING

DISCONNECTION:
 Disconnection and be voluntary or involuntary. Voluntary disconnection occurs when
mobile users want to disconnect the mobile unit from the network temporarily, like
working on a plane. Involuntary disconnection is mainly due to network failures.
 The mobile application should not be disrupted under these circumstances. some
applications are designed to run entirely locally on the mobile unit, but it may not be
feasible for distributed applications where users have to communicate with one another.
Again, pre fetching and lazy write-back are some useful techniques that allow to work
under disconnection.
 The CMU CODA file system allows shared files to be modified even during
disconnections.
 Upon reconnection, application-specific conflict resolution schemes are used in the file
servers to reconfile any update conflicts maybe by various clients. it also uses
concurrency control and pre fetching techniques .however ,this approach is designed
mainly for file systems and does not for all kinds of applications .

MOBILITY
 There are two types of mobility described(a)mobility of clients and(b)mobility of
resources .mobility of clients raises the issues of unique naming of the clients and
finding their current locations. unlike stationary computers ,where information on
location is configured statically mobile computers have to configure information
dynamically mobility of resources addresses this problem. When a mobile host moves
into a new cell or administrative domain , it has to discover the resources available
there . at the same time , any server that needs to communicate with the mobile host has
to identify its new location. Location transparency should be provided to the mobile
applications by the underlying runtime system so that the users are not aware of the
effects of mobility.

MERITS
 Improving the data collection process.
 Improving data accuracy.
 Reducing paper work.
 Facilitating collection of more useful information.
 Eliminating redundant data entry.
 Reducing administrative costs.
 Reducing billing errors.
 Reducing data backlog.
18
NITS, MCA II YEAR
MOBILE COMPUTING
 Improving information flow.
 Allowing faster adaptation to change the business conditions.
 Increasing responsiveness and customer satisfaction.
 Providing access to unavailable information.

DEMERITS
 The demerits of the mobile computing are discussed as fallows.
 Information access via a mobile device is plagued by low available band width, poor
connection maintenance, poor and addressing problems. Unlike their wired counter
parts, design of software for mobile devices must consider resource limitation, battery
power and display size. Consequently, new hardware and software techniques must be
developed. for example, application need to be highly optimized for space, in order to
fit in the limited memory on the mobile devices.
 Mobility brings additional uncertainties , as well as opportunities to provide new
services and supplementary information to users in the location where they find
themselves. in general, most application software, operating systems, and network
infrastructures are intended for more conventional environments , and so the mobile,
wireless user has great difficulty exploiting the computational infrastructure as fully as
he or she might . there is an emerging consensus among researchers that a new
architecture and dynamic infrastructure is an appropriate way to address this problem .
 Day by day as the standard of the mobile computing is increasing the boons of mobile
computing are changing to banes. eg : the most deadly terrorist attack occurred on
September 11th , 2001

APPLICATIONS
 New technical and application developments have established that mobile systems can
be a cost effective, efficient and productive solution in several different types of
application environments . they are :-a new generation of satellites , especially low
earth orbit systems (LEOS)are under development with the internet in mind .companies
like Teledesic and Orbcomm are actively promoting internet access .
 Vertical industries where mobile technology has already been successfully adopted
include consumer goods. Delivery and root sales , government , healthcare , market
research , pharmaceuticals , transportation and utilities .

CONSUMER GOODS:
19
NITS, MCA II YEAR
MOBILE COMPUTING
Typical applications include inventory, merchandising , order entry and sales automation.
features found in these applications usually provide access to stock and pricing information,
monitor promotion , and perform shelf space analysis including number of facings and
product age . customer detail helps reps to act more as consultants than order takers .

DELIVERY AND ROUTE SALES:


 With fierce competition and an increasing inventory , having timely and accurate
information is more important than ever.

GOVERNMENT:
 Applications center around assessments, inspections, and work orders. Most of these
applications involve auditing some sort of facility or process(food service, restaurant,
nursing home, child care, schools, commercials and residential buildings).

HEALTH CARE:
 The focus in this industry has been on automating patient records, medication,
dispension, and sample collection. A common goal is to leverage mobile computing in
the implementation of positive patient identification.

MARKET RESEARCH:
 Automating the survey the process has enabled these companies to get their data more
accurately and quickly while being able to customize their queries at will.

PHARMACEUTICALS:
 In addition to the reps need to perform account management and cell reporting
functions ,the FDA’s requirements for physician signatures for all drug samples
dispensed was an ordered complication that was eliminated through the use of mobile
technology.

TRANSPORTATION:
 Transforming freight damage inspection from paper to mobile computing greatly
expedites the process and reduces cost by providing online pre-shipment inspections.
This technology also offers a more efficient means of storing and transmitting
maintenance inspection reports . in conjunction with GPS(global positioning systems),
 Mobile computing allows companies to provide better customer service by being
continuously aware of exactly where any given shipment is when in transit .
20
NITS, MCA II YEAR
MOBILE COMPUTING

UTILITIES:
 Eliminating the rekeying of data and providing a means to perform on site analysis are
instrumental to an industry that is required to perform inspection on routine basis.

WIRELESS INTERNET IN FEATURES


 There’s more happening than many people suspect. the difficulty , though is to provide
the right network , the right device , the right price and the right applications. Wireless
is not wired, and there are numerous advantages and disadvantages. The wireless
industry “mindset” is different from the computer communities. these different
philosophies produce what we call a “wireless-web culture clash”. Also much of the
information we obtain via the internet isn’t worth paying for in a mobile environment.
the internet will change is already changing the way mobile companies and computer
companies offer products and services, and deal with customers. Indeed, many wireless
subscribers will demand these changes, ranging from online customer service to
electronic bill paying to creating profiles that automatically transmit personalized
information via the internet to wireless devices. We are in a period of tremendous
change. It’s mobile computing jungle where old technologies must evolve to survive
and where proponents of new technologies are jockeying for dominance. it’s a
dangerous and exciting time where existing business models can crumble and more
nimble , innovative companies can usurp established institutions.
 Uncovering these developments, analyzing there impact and recommending solutions
to corporations is what wireless internet and mobile computing consulting is all about.

CONCLUSION
 Mobile computing is rapidly becoming popular, and user demand for useful wireless
applications is increasing.
 Additionally, this paper shows how these behavioral extensions serve as a powerful
abstraction for practical systems.
 In this paper, we have looked at issues related to portable devices, merits, demerits and
applications in mobile environment.
 Because of these banes of mobile computing the security level should be improved.

BIBILOGRAPHY
 Terry Watson:- application design for wireless computing.
 Application design for wireless computing; M –mail a
case study of dynamic application portioning in mobile computing.
21
NITS, MCA II YEAR
MOBILE COMPUTING

Christine julien and gruia – catalin roman : active co-ordination in adhoc networks.

 Raymond j.Brunsting:- quality of service issues in wireless networks.


22
NITS, MCA II YEAR
MOBILE COMPUTING

Вам также может понравиться