Definitions
Mobile Computing
technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. The main concept involves:
Mobile communication
Mobile hardware
Devices
Some of the most common forms of mobile computing devices are as follows.
- portable computers, compacted lightweight units including a full character set keyboard and primarily intended as hosts for software that may be parametrized, as laptops, notebooks, notepads, etc.
- mobile phones including a restricted key set primarily intended but not restricted to for vocal communications, as cell phones, smart phones, phonepads, etc.
- Smart cards that can run multiple applications but typically payment, travel and secure area access
- wearable computers, mostly limited to functional keys and primarily intended as incorporation of software agents, as watches, wristbands, necklaces, keyless implants, etc.
The existence of these classes is expected to be long lasting, and complementary in personal usage, none replacing one the other in all features of convenience.
Other types of mobile computers have been introduced since the 1990s including the:
- Portable computer (discontinued)
- Personal digital assistant/Enterprise digital assistant (discontinued)
- Ultra-Mobile PC (discontinued)
- Laptop
- Smartphone
- Robots
- Tablet computer
- Wearable computer
- Carputer
- Application-specific computer
Limitations
Range & Bandwidth: Mobile Internet access is generally slower than direct cable connections, using technologies such as GPRS and EDGE, and more recently HSDPA andHSUPA 3G and 4G networks and also upcoming 5G network. These networks are usually available within range of commercial cell phone towers. High speed network wireless LANs are inexpensive but have very limited range.
Security standards: When working mobile, one is dependent on public networks, requiring careful use of VPN. Security is a major concern while concerning the mobile computing standards on the fleet. One can easily attack the VPN through a huge number of networks interconnected through the line.
- Power consumption: When a power outlet or portable generator is not available, mobile computers must rely entirely on battery power. Combined with the compact size of many mobile devices, this often means unusually expensive batteries must be used to obtain the necessary battery life.
- Transmission interferences: Weather, terrain, and the range from the nearest signal point can all interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.
- Potential health hazards: People who use mobile devices while driving are often distracted from driving and are thus assumed more likely to be involved in traffic accidents.[1] (While this may seem obvious, there is considerable discussion about whether banning mobile device use while driving reduces accidents or not.[2][3]) Cell phones may interfere with sensitive medical devices. Questions concerning mobile phone radiation and health have been raised.
- Human interface with device: Screens and keyboards tend to be small, which may make them hard to use. Alternate input methods such as speech or handwriting recognition require training.
===================================
Mobile computing has changed the complete landscape of our day-to-day life. Following are the major advantages of Mobile Computing −
Location Flexibility
This has enabled users to work from anywhere as long as there is a connection established. A user can work without being in a fixed position. Their mobility ensures that they are able to carry out numerous tasks at the same time and perform their stated jobs.
Saves Time
The time consumed or wasted while travelling from different locations or to the office and back, has been slashed. One can now access all the important documents and files over a secure channel or portal and work as if they were on their computer. It has enhanced telecommuting in many companies. It has also reduced unnecessary incurred expenses.
Enhanced Productivity
Users can work efficiently and effectively from whichever location they find comfortable. This in turn enhances their productivity level.
Ease of Research
Research has been made easier, since users earlier were required to go to the field and search for facts and feed them back into the system. It has also made it easier for field officers and researchers to collect and feed data from wherever they are without making unnecessary trips to and from the office to the field.
Entertainment
Video and audio recordings can now be streamed on-the-go using mobile computing. It's easy to access a wide variety of movies, educational and informative material. With the improvement and availability of high speed data connections at considerable cost, one is able to get all the entertainment they want as they browse the internet for streamed data. One is able to watch news, movies, and documentaries among other entertainment offers over the internet. This was not possible before mobile computing dawned on the computing world.
Streamlining of Business Processes
Business processes are now easily available through secured connections. Looking into security issues, adequate measures have been put in place to ensure authentication and authorization of the user accessing the services.
Some business functions can be run over secure links and sharing of information between business partners can also take place.
Meetings, seminars and other informative services can be conducted using video and voice conferencing. Travel time and expenditure is also considerably reduced.
Mobile computing has its fair share of security concerns as any other technology. Due to its nomadic nature, it's not easy to monitor the proper usage. Users might have different intentions on how to utilize this privilege. Improper and unethical practices such as hacking, industrial espionage, pirating, online fraud and malicious destruction are some but few of the problems experienced by mobile computing.
Another big problem plaguing mobile computing is credential verification. As other users share username and passwords, it poses as a major threat to security. This being a very sensitive issue, most companies are very reluctant to implement mobile computing to the dangers of misrepresentation.
The problem of identity theft is very difficult to contain or eradicate. Issues with unauthorized access to data and information by hackers, is also an enormous problem. Outsiders gain access to steal vital data from companies, which is a major hindrance in rolling out mobile computing services.
No company wants to lay open their secrets to hackers and other intruders, who will in turn sell the valuable information to their competitors. It's also important to take the necessary precautions to minimize these threats from taking place. Some of those measures include −
- Hiring qualified personnel.
- Installing security hardware and software
- Educating the users on proper mobile computing ethics
- Auditing and developing sound, effective policies to govern mobile computing
- Enforcing proper access rights and permissions
These are just but a few ways to help deter possible threats to any company planning to offer mobile computing. Since information is vital, all possible measures should be evaluated and implemented for safeguard purposes.
In the absence of such measures, it's possible for exploits and other unknown threats to infiltrate and cause irrefutable harm. These may be in terms of reputation or financial penalties. In such cases, it's very easy to be misused in different unethical practices.
If these factors aren’t properly worked on, it might be an avenue for constant threat. Various threats still exist in implementing this kind of technology.
===========================
This chapter lists down the current mobile technologies starting from 3G technologies which is the hottest mobile technology available in the market.
3G
3G or third generation mobile telecommunications is a generation of standards for mobile phones and mobile telecommunication services fulfilling the International Mobile Telecommunications-2000 (IMT-2000) specifications by the International Telecommunication Union. Application services include wide-area wireless voice telephone, mobile Internet access, video calls and mobile TV, all in a mobile environment.
Global Positioning System (GPS)
The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather, anywhere on or near the Earth, where there is an unobstructed line of sight to four or more GPS satellites. The GPS program provides critical capabilities to military, civil and commercial users around the world. In addition, GPS is the backbone for modernizing the global air traffic system, weather, and location services.
Long Term Evolution (LTE)
LTE is a standard for wireless communication of high-speed data for mobile phones and data terminals. It is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the capacity and speed using new modulation techniques. It is related with the implementation of fourth Generation (4G) technology.
WiMAX
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates, with the latest update providing up to 1 Gbit/s for fixed stations. It is a part of a fourth generation or 4G wireless-communication technology. WiMAX far surpasses the 30-metre wireless range of a conventional Wi-Fi Local Area Network (LAN), offering a metropolitan area network with a signal radius of about 50 km. WiMAX offers data transfer rates that can be superior to conventional cable-modem and DSL connections, however, the bandwidth must be shared among multiple users and thus yields lower speed in practice.
Near Field Communication
Near Field Communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few centimeters. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. Communication is also possible between an NFC device and an unpowered NFC chip, called a "tag".
Conclusion
Today's computing has rapidly grown from being confined to a single location. With mobile computing, people can work from the comfort of any location they wish to as long as the connection and the security concerns are properly factored. In the same light, the presence of high speed connections has also promoted the use of mobile computing.
Being an ever growing and emerging technology, mobile computing will continue to be a core service in computing, and Information and Communications Technology.
No comments:
Post a Comment