Monday 1 June 2015

mobile computing


                                                            MOBILE COMPUTING                                                              



ABSTRACT:-

            
      Technology has developed rapidly over the last twenty years. This development in technology resulted in the development of communication. For example, Internet, email, Voicemail, etc. This development has still not given the user the freedom to access data anywhere or anytime he wants because of the limitations like the change in location resulted in either routing problems or connection breaks.

            The advent of MOBILE COMPUTING has given birth to hopes of overcoming the above limitations. These mobile networks have facilitated communication anywhere in the world at any time. The word MOBILE itself illustrated what it does. These mobile networks provide communication even when the source and destination are constantly changing their location.
                               

 INTRODUCTION:-

 
           Don Ring of Bell Labs, USA in 1947, invented the cellular concept. The first commercial mobile communications were in the form of radio paging networks. Advanced Mobile Phone System (AMPS) is a major cellular networks established in America using analog cellular technology. Total Access Communication System (TACS) is a major system use in Europe. Recently a number of digital communications are also introduced. The present trend is to cover communications anywhere in the world and at any time of the day. Cellular concept based on the concept of network of cells, which covers a large geographical area to communicate over the world.

  Mobile Computing is a program that allows user to access wireless network. This is done by using Radio Frequency (RF) technology to transmit data through the air without wired cabling. Mobile Computing provides all the same features and benefits of the existing campus network, but without the limitations of being tethered to a cable.
The goals of this service are to provide expanded wireless coverage for the campus, provide access to wireless monitor usage and solicit feedback in order to determine scope and scale of future expansion.

 IMPORTANCE OF MOBILE COMPUTERS:-

Mobile Computing is becoming increasingly important due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet irrespective of the physical location of the node. The Internet infrastructure is built on top of a collection of protocols, called the TCP/IP protocol suite. The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet Engineering Task Force (IETF) . It enables mobile computers to stay connected to the Internet regardless of their location and without changing their IP address. More precisely, Mobile IP is a standard protocol that builds on the Internet Protocol by making mobility transparent to applications and higher level protocols like TCP. 

     




 

 

 

 

HOW MOBILE IP WORKS:-


IP routes packets from a source endpoint to a destination by allowing routers to forward packets from incoming network interfaces to outbound interfaces according to routing tables. The routing tables typically maintain the next-hop (outbound interface) information for each destination IP address, according to the number of networks to which that IP address is connected. The network number is derived from the IP address by masking off some of the low-order bits. Thus, the IP address typically carries with it information that specifies the IP node's point of attachment.

To maintain existing transport-layer connections as the mobile node moves from place to place, it must keep its IP address the same. In TCP (which accounts for the overwhelming majority of Internet connections), connections are indexed by a quadruplet that contains the IP addresses and port numbers of both connection endpoints. Changing any of these four numbers will cause the connection to be disrupted and lost. On the other hand, correct delivery of packets to the mobile node's current point of attachment depends on the network number contained within the mobile node's IP address, which changes at new points of attachment. To change the routing requires a new IP address associated with the new point of attachment.

Mobile IP has been designed to solve this problem by allowing the mobile node to use two IP addresses (see the sidebar "Mobile Networking Terminology" for definitions of italicized terms). In Mobile IP, the home address is static and is used, for instance, to identify TCP connections. The care-of addresses changes at each new point of attachment and can be thought of as the mobile node's topologically significant address; it indicates the network number and thus identifies the mobile node's point of attachment with respect to the network topology. The home address makes it appear that the mobile node is continually able to receive data on its home network, where Mobile IP requires the existence of a network node known as the home agent. Whenever the mobile node is not attached to its home network (and is therefore attached to what is termed a foreign network), the home agent gets all the packets destined for the mobile node and arranges to deliver them to the mobile node's current point of attachment.

Whenever the mobile node moves, it registers its new care-of address with its home agent. To get a packet to a mobile node from its home network, the home agent delivers the packet from the home network to the care-of address. The further delivery requires that the packet be modified so that the care-of address appears as the destination IP address. This modification can be understood as a packet transformation or, more specifically, a redirection. When the packet arrives at the care-of address, the reverse transformation is applied so that the packet once again appears to have the mobile node's home address as the destination IP address. When the packet arrives at the mobile node, addressed to the home address, it will be processed properly by TCP or whatever higher level protocol logically receives it from the mobile node's IP (that is, layer 3) processing layer.


DIFFERENT TYPES OF MOBILE SYSTEMS:-

                In many ways mobile computing has several characteristics of distributed systems. Here we explain the different types of distributed systems ranging from the traditional type to nomadic, ad-hoc and finally ubiquitous ones.
TRADITIONAL DISTRIBUTED SYSTEMS
            Traditional distributed systems consists of a collection of fixed hosts that are themselves attached to a network- if hosts are disconnected from the network this is considered to be abnormal whereas in a mobile system this is quite the norm. These hosts are fixed. The bandwidth in traditional systems is very high too.
            The execution context is said to be static as opposed to a dynamic context whereby host joined and leave the network frequently. in a traditional system ,location rarely changes as well and hosts are much less likely to be added or deleted from the network
   Traditional distributed systems also need to guarantee non-functional requirements such as scalability, openness, heterogeneity, fault tolerance and finally resource sharing.
NOMADIC DISTRIBUTED SYSTEM
This kind of system is composed of a set of mobile devices and a core infrastructure with fixed and wired nodes. Mobile devices move from location to location while maintaining a connection to the fixed network. There are problems that arise from such shifts in location. The mobile host has a home IP address and thus any packets sent to mobile host will be delivered to the home network and not the foreign network where the mobile host is currently located. Such problem can be solved by forwarding packets to the foreign network with the help of mobile IP.
            These systems are susceptible to the uncertainty of location, a repeated lack of connections and the migration into different physical and logical environments while operating. However, compared to ad-hoc networks, nomadic systems still have comparatively reliable connections and services since most of these are actually supported by the fixed infrastructure of the network.
AD-HOC MOBILE DISTRIBUTED SYSTEM
Ad-hoc distributed systems are possibly the only type of network that comes close to mobile networks in the sense that every node is literally mobile.  It is these networks 0that are very much seen as the systems of the future, whereby hosts are connected to the network through high-variable quality links) e/g/ from GPS to broadband connection) and executed in an extremely dynamic environment
Ad-hoc systems do not have any fixed infrastructure which differs them both from traditional and nomadic distributed systems.  In fact, ad-hoc networks may come together as needed, not necessarily with any assistance from the existing (e.g. Internet) infrastructure.  When nodes are detached from the fixed/mobile network they may evolve independently and groups of hosts opportunistically from “clusters” of mini-networks.  The speed and ease of deployment make ad-hoc networks highly desirable.
THEORY IN MOBILE COMPUTERS:-
The trends of two fields related to mobile computing are
* MODELS
            Models permit the precise description of existing languages and system semantics.  In fact, they enable the formal reasoning about the correctness of such semantics.  Models are very much used to emphasize parallels and distinctions among various forms of mobility (logical and physical) and are concerned with the formulation of appropriate abstractions useful in specification and evaluation of such mobile systems

Models are mainly concerned with the characteristics of mobile units such as the unit of mobility (who is allowed to move), its location (where a mobile unit is positioned in space) and its context (determined by the current location of mobile units).  There are many existing models are many more are still in research.

·         Random mobility models(s)
·         Markovian model
·         Exponential Correlated Random Model
·         Nomadic Community Model.

*ALGORITHMS
       The current algorithms applied reflect the assumptions that are made about the underlying system.  Unfortunately, many of these assumptions are not suited for current algorithms for mobile systems.  Mobile algorithms are obliged to treat in much detail space and coordination of mobile systems.  In particular, algorithms have to carefully take into consideration location changes, the frequency of disconnection, power limitations and the dynamic changes in the connectivity pattern of mobile systems.  This field of theory is in fact spread among a vast spectrum of research due to the large diversity of mobile systems.

 

APPLICATIONS:-

   
The application areas of mobile technology include
  • Consumer Goods
  • Delivery and Route Sales
  • Government
  • Healthcare
  • Market Research
  • Pharmaceuticals
  • Transportation and
  • Utilities

 BENEFITS:-


         The benefits of automating data collection applications with mobile computing are the reduction of hard and soft costs, enhancement of revenue potential, and a distinct competitive advantage through:

  • improving the data collection process
  • improving data accuracy
  • facilitating collection of more useful information
  • eliminating redundant data entry
  • improving information flow
  • providing access to previously unavailable information
  • Reduced radio congestion. 
  • Improved supervision and resource management. 
  • Less time in data transformation.   
                             

LIMITATIONS:-

           Range & Bandwidth: Mobile Internet access is generally slower than direct cable connections, using technologies such as GPRS and EDGE, and more recently HSDPA and HSUPA 3G and 4G networks. These networks are usually available within range of commercial cell phone towers. Higher speed wireless LANs are inexpensive but have very limited range.

  • Security standards: When working mobile, one is dependent on public networks, requiring careful use of VPN. Security is a major concern while concerning the mobile computing standards on the fleet. One can easily attack the VPN through a huge number of networks interconnected through the line.
  • Power consumption: When a power outlet or portable generator is not available, mobile computers must rely entirely on battery power. Combined with the compact size of many mobile devices, this often means unusually expensive batteries must be used to obtain the necessary battery life.
  • Transmission interferences: Weather, terrain, and the range from the nearest signal point can all interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.
  • Potential health hazards: People who use mobile devices while driving are often distracted from driving and are thus assumed more likely to be involved in traffic accidents.[3] (While this may seem obvious, there is considerable discussion about whether banning mobile device use while driving reduces accidents or not.[4][5]) Cell phones may interfere with sensitive medical devices. Questions concerning mobile phone radiation and health have been raised.
  • Human interface with device: Screens and keyboards tend to be small, which may make them hard to use. Alternate input methods such as speech or handwriting recognition require training.

In-vehicle computing and fleet computing:-

Many commercial and government field forces deploy a ruggedized portable computer with their fleet of vehicles. This requires the units to be anchored to the vehicle for driver safety, device security, and ergonomics. Rugged computers are rated for severe vibration associated with large service vehicles and off-road driving and the harsh environmental conditions of constant professional use such as in emergency medical services, fire, and public safety.
 Typical fan-based cooling has stated limits of 95F-100F of ambient temperature, and temperatures below freezing require localized heaters to bring Several specialized manufacturers such as First Mobile Technologies, National Products Inc (Ram Mounts), Gamber Johnson and LedCo build mounts for vehicle mounting of computer equipment for a wide range of vehicles. The mounts are built to withstand the harsh conditions and maintain ergonomics.
Specialized installation companies design the mount design, assembling the parts, and installing them in a safe and consistent manner away from airbags, vehicle HVAC controls, and driver controls. Frequently installations will include a WWAN modem, power conditioning equipment, transceiver antennae mounted external to the vehicle, and WWAN/WLAN/GPS/etc.

 

 

SECURITY ISSUES:-

Mobile security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on the smartphone.
More and more users and businesses use smartphones as communication tools but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.
All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like SMS, MMS, wifi networks, and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. Finally, there are forms of malicious software that rely on the weak knowledge of average users.
Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps.

CONCLUSION:


This paper discusses every aspect for designing the mobile device in detail and I would like to draw attention of these issues while designing a mobile device or the device that going to be part of mobile computing domain.
At this stage we are facing different types of problems and threats to the mobile industry, the two major aspects are the security and the usability issue.










No comments:

Post a Comment