Assignment #2 Mobile Computing

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

MOBILE COMPUTING

WONG JIAN RONG


A13CS0202
AKRAM FIKRI BIN MOHAMED @ AHMAD FAHMY A14DP1367

Mobile Computingisatechnologythatallowstransmissionofdata,voice
andvideoviaacomputeroranyotherwirelessenableddevicewithout
havingtobeconnectedtoafixedphysicallink.Themainconceptinvolves
-Mobile communication
- Mobile hardware.
- Mobile software

Mobile communication
The mobile communication in this case, refers to the infrastructure put in place
to ensure that seamless and reliable communication goes on. These would
include devices such as protocols, services, bandwidth, and portals necessary to
facilitate and support the stated services. The data format is also defined at this
stage. This ensures that there is no collision with other existing systems which
offer the same service.

Since the media is unguided/unbounded, the overlaying infrastructure is


basically radio wave-oriented. That is, the signals are carried over the air to
intended devices that are capable of receiving and sending similar kinds of
signals.

Mobile
Hardware
Mobile hardware includes mobile devices or device components that receive or
access the service of mobility. They would range from portable laptops,
smartphones, tablet Pc's, Personal Digital Assistants.

These devices will have a receptor medium that is capable of sensing


and receiving signals. These devices are configured to operate in fullduplex, whereby they are capable of sending and receiving signals at
the same time.
They don't have to wait until one device has finished communicating
for the other device to initiate communications.
Above mentioned devices use an existing and established network to
operate on. In most cases, it would be a wireless network.

Mobile software
Mobile software is the actual program that runs on the
mobile hardware. It deals with the characteristics and
requirements of mobile applications. This is the engine of
the mobile device. In other terms, it is the operating
system of the appliance. It's the essential component that
operates the mobile device.

Since portability is the main factor, this type of computing


ensures that users are not tied or pinned to a single
physical location, but are able to operate from anywhere.
It incorporates all aspects of wireless communications.

Mobile Computing - Major Advantages


Mobile computing has changed the complete landscape of our day-to-day
life. Following are the major advantages of Mobile Computing

Location Flexibility
This has enabled users to work from anywhere as long as there is a connection
established. A user can work without being in a fixed position. Their mobility
ensures that they are able to carry out numerous tasks at the same time and
perform their stated jobs.
Saves Time
The time consumed or wasted while travelling from different locations or to the office
and back, has been slashed. One can now access all the important documents and files
over a secure channel or portal and work as if they were on their computer. It has
enhanced telecommuting in many companies. It has also reduced unnecessary incurred
expenses.
Enhanced Productivity
Users can work efficiently and effectively from whichever location they find
comfortable. This in turn enhances their productivity level.
Ease of Research
Research has been made easier, since users earlier were required to go to the field
and search for facts and feed them back into the system. It has also made it easier for
field officers and researchers to collect and feed data from wherever they are without
making unnecessary trips to and from the office to the field.

Mobile Computing - Security


Issues

Mobile computing has its fair share of security concerns as any other technology.
Due to its nomadic nature, it's not easy to monitor the proper usage. Users might
have different intentions on how to utilize this privilege. Improper and unethical
practices such as hacking, industrial espionage, pirating, online fraud and
malicious destruction are some but few of the problems experienced by mobile
computing.

These are just but a few ways to help deter possible threats to any company
planning to offer mobile computing. Since information is vital, all possible
measures should be evaluated and implemented for safeguard purposes.
In the absence of such measures, it's possible for exploits and other unknown
threats to infiltrate and cause irrefutable harm. These may be in terms of
reputation or financial penalties. In such cases, it's very easy to be misused in
different unethical practices.

Conclusion
Today's computing has rapidly grown from being confined to a single location.
With mobile computing, people can work from the comfort of any location they
wish to as long as the connection and the security concerns are properly factored.
In the same light, the presence of high speed connections has also promoted the
use of mobile computing.
Being an ever growing and emerging technology, mobile computing will continue
to be a core service in computing, and Information and Communications
Technology.

You might also like