Ria Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

Mobile Computing

RIA DASH
Regd.No:2121289056

Department of Computer Science & Information


Technology
Trident Academy of Technology
Bhubaneswar-751024, Odisha, India.
July 2023

1
Seminar Report on

Mobile Computing
Submitted in Partial Fulfillment of
The Requirement for the 6th
Sem. Seminar

Bachelor of Technology
In
Computer Science & Information Technology

Submitted by
RIA DASH
Regd.No:2121289056

Under the Guidance of


Mrs. ARCHANA ROUT

Asst. Professor, Dept. of CSE

Department of Computer Science & Information


Technology
Trident Academy of Technology
Bhubaneswar-751024, Odisha, India.
July 2023
2
CERTIFICATE

This is to certify that this Seminar Report on the topic


entitled Mobile Computing which is submitted by Ria
Dash bearing Registration No: 2121289056 in partial
fulfillment of the requirement for the award of the of
Bachelor of Technology in Computer Science &
Information Technology of Trident Academy of
Technology, Odisha, is a record of the candidate's own
work carried out by her under my supervision.

Guided By: - Head of the Department

Mrs. Archana Rout

Asst. Professor,
Dept. of CSE Professor, Dept. of CSIT
Trident Academy
of Technology Trident Academy of
Technology
Bhubaneswar,
Odisha. Bhubaneswar, Odisha

3
ABSTRACT
The mobile computing is a system in which a computer and all
necessary accessories like files and software are taken out to
the field. It is a system through which one can able to use a
computing device even when someone being mobile and
therefore changing location. The portability is one of the
important aspects of the system. The mobile phones are being
used to gather scientific data from remote and isolated places
which is not possible to retrieve by other means. The
scientists are initiating to use mobile devices and web-based
applications to systematically explore interesting scientific
aspects of their surroundings, ranging from climate change,
environmental pollution to earthquake monitoring. This mobile
revolution enables new ideas and innovations to spread out
more quickly and efficiently. Here we will discuss in brief about
the mobile computing technology, its sensing, challenges, and
the applications.

Ria Dash Mrs. Archana Rout


Asst. Professor, Dept. of CSE

Place: Bhubaneswar
Date: .07.2023

4
ACKNOWLEDGMENTS
I would like to express my special thanks of gratitude to
my guider (Mrs. Archana Rout) as well as our head of the
department who gave me the golden opportunity to do
this wonderful seminar on the topic, “Mobile Computing”,
which also helped me in doing a lot of research and I came
to know about so many new things. I am thankful to all the
faculty members of our department who have helped us
in getting to know computing better.

Place: Bhubaneswar
Date: .07.2023 Ria Dash

5
CONTENTS
• Certificate 03
• Abstract 04
• Acknowledgments 05
• Contents 06
• Introduction 07
• Why go with mobile? 08
• Application of mobile computing 09
• Types of wireless devices 10
• Comparison to wired networks 10
• Advantages/Disadvantages 13
• Future of mobile computing 16
• Conclusion 24
• Reference 25

6
Introduction
Mobile Computing tutorial provides basic and advanced concepts of
mobile computing. In this tutorial, you will get an overview of Mobile
Computing, its continuous evolution, and the future trends of this
technology. Our Mobile Computing tutorial is designed for beginners
and professionals.

Mobile Computing refers a technology that allows transmission of


data, voice and video via a computer or any other wireless enabled
device. It is free from having a connection with a fixed physical link.
It facilitates the users to move from one physical location to another
during communication.

Our Mobile communication tutorial includes all topics of mobile


computing like its brief overview and history, evolution,
classification, advantages and disadvantages, security issues, future
trends etc.

Mobile Computing is a technology that provides an environment


that enables users to transmit data from one device to another device
without the use of any physical link or cables
In other words, you can say that mobile computing allows
transmission of data, voice and video via a computer or any other
wireless-enabled device without being connected to a fixed physical
link. In this technology, data transmission is done wirelessly with the
help of wireless devices such as mobiles, laptops etc.

This is only because of Mobile Computing technology that you can


access and transmit data from any remote locations without being
present there physically. Mobile computing technology provides a
vast coverage diameter for communication. It is one of the fastest and
most reliable sectors of the computing technology field.

7
Why go with mobile?
Mobile computing is used in most facets of life both in business
and by consumers. It enables users to be untethered from a power
source for periods of time. This is advantageous for traveling
workers who want to stay connected to their work while on the
move. It is also useful for remote workers who may not have all
the connectivity and power options they have in an office setting.
Consumers use mobile computing in several ways, include
the following:

 internet access
 mobile communications
 web browsing
 mobile applications
 entertainment streaming media

Mobile devices and apps can collect user data in various


environments and contexts. Fitbits and smartwatches are examples
of wearable technology that collect user data in novel contexts,
including fitness and health settings.

Mobile computing also makes the internet of things (IoT) possible.


The nontraditional computers, sensors and other devices that make up
IoT can connect and communicate without direct human intervention.

8
Applications of Mobile Computing:
o Web or Internet access.
o Global Position System (GPS).
o Emergency services.
o Entertainment services.
o Educational services.
o For Estate Agents
o In courts
o In companies
o Stock Information Collection/Control
o 2Credit Card Verification
o Taxi/Truck Dispatch
o Electronic Mail/Paging
o research, healthcare
o sector, pollution monitoring, tourism industries, airlines and
railway industries, transportation industry manufacturing and
mining industries, banking and financial institutions, insurance
and financial planning, hospitality industry.
o The internet can be accessible from business, homes, and hot spots
cyber cafes, available on cell phones.
o It is a critical business requirement, such as the oceanic fiber cuts
that may result in loss of revenue and severe disruptions in networks.
o The required speeds have moved for supporting simple text
terminals to email, the web, audio, and video, requiring
orders of magnitude increase in performance.
 The written word is increasingly enhanced and replace
with graphical images, sound clips and videos.

.
Main principles
 devices may have limited device capabilities and limited power
supply but should have a sufficient processing capability and
physical portability to
Portability: Devices/nodes connected within the mobile computing
9
system should facilitate mobility. These operate in a movable
environment.
 Connectivity: This defines the quality of service (QoS) of the
network connectivity. In a mobile computing system, the network
availability is expected to be maintained at ahigh level with a
minimal amount of lag/downtime without being affected by the
mobility of the connected nodes.
 Interactivity: The nodes belonging to a mobile computing system
relate to one another to communicate and collaborate through active
transactions of data.
 Individuality: A portable device or a mobile node connected to a
mobile network often denotes an
individual; a mobile computing system should be able to adopt the
technology to cater to the individual needs and to obtain confirmation of
each node.

Types of Wireless Devices


Wireless Router
A wireless router is a device that accepts an incoming Internet
connection and sends data as RF signals to other wireless devices
that are near the router. Wireless routers are used to connect
wireless-enabled computers and other devices to the Internet. A
network set up with a wireless router is sometimes called a wireless
local area network (WLAN.).
Wireless Adapters
Wireless adapters are hardware devices installed inside computers
that enable wireless connectivity. If a computer does not have a
wireless adapter, it will not be able to connect to a router in order
to access the Internet. Some computers have wireless adapters
10
built directly into the motherboard while it is also possible to
install stand-alone wireless adapters to add wireless capability to a
computer that did not come with an adapter built in.
Wireless Repeater
A wireless repeater is a wireless networking device that is used to
extend the range of a router. A repeater receives wireless signals and
then re- emits them with increased strength. By placing a repeater
between a router and the computer connected to the router, signal
strength can be boosted, resulting in faster connection speeds.
Wireless Phones
Cellular and cordless phones are two more examples of device that
make use of wireless signals. Cordless phones have a limited range, but
cell phones typically have a much larger range than local

wireless networks, since cell phone providers use


telecommunication towers to provide cell phone coverage. Satellite
phones make use of signals from satellites to communicate, like
Global Positioning System (GSP) devices.
Security: With the protection of firewalls and other security
devices, a wired network is broadly protected. Daily business
operations are performed using correct ports, network
monitoring, and a wired connection with security technologies.

Please refer to our past blog on Cabled Network and Security


Management for more information.

Cost: The hardware required for a wired network often has a longer
lifecycle than a wireless network. There may be less hardware
needed which can reduce cost.

11
Taking the above into account, let us dig into some
DISADVANTAGES of using a wired network.

Disadvantages
Lack of mobility takes the lead. A wired network creates an
environment where you cannot pick up your laptop and move to a
different location in your space. You are forced to work where
there is a cable to connect to the internet. This can make
collaboration with colleagues difficult very difficult.

Installation: Network installation can be a much longer process and is


ideally done at the very beginning of construction. Not only does the
installation process take a lot of time, but the end user side of routers,
switches, and hubs can require security and firewall components as
well. If you are expanding or adding an employee,you will need to add
cable drops for them to connect.

Installation: While initial structured cabling installation is


extensive, adding or upgrading wireless systems is much easier.
When you are expanding or adding employees you do not need to
do as much disruptive physical work. It can be as simple as running
a single cable to add a WAP to a new office or cubicle area. Which
is considerably easier than installing wall jacks into each new space.

Mobility: Seamless. Freedom. Mobile to all levels. Self-


explanatory to say the least, however wireless connection allows
office workers the flexibility to accesses the network from any
location on any device. Guests can easily join a public wi-fi
connection and collaboration can be done anywhere connectivity is
present.
Disadvantages
Visibility: One network is visible to the other which can affect the
12
performance of your connection. Because the networks can see one
another, the possibility of interference by other wireless enabled
devices or obstructions is higher. Additionally, the nodes or
connectivity points on a wireless network cannot hear the other
nodes on a single network. This can compromise the performance
and quality of connection.

Security: Hot topic and of high importance. Truth: wireless networks


are less secure than wired. Communication signals being transmitted
through the air/ radio waves are far more likely to get intercepted if
the proper encryption (security) technologies are not in place.
However, many security options are available so wireless internet
can be very safe.

Speed: While wireless internet keeps getting faster and faster, a


hardwired connection will always be the fastest option. Hybrid
configuration is always an option for internet connectivity, meaning
you can have wireless internet along with some areas where you can
hardwire in.

Reliability & Stability: Finally, reliability and stability of wireless


networks are prone to interference by other networks, wireless
enabled devices, and objects such as walls that can obstruct the
connection. The strength of the connection can vary from place to
place, and the design of your network makes all the difference. It is
important to have a professional provider install your network to
ensure your space has even and reliable connectivity.

13
Advantages
Enhanced Productivity
We can use mobile devices in various companies, which can
reduce the time and cost for clients and themselves and
enhance the productivity of the company.
Location Flexibility
This technology facilitates users to work efficiently and
effectively from whichever location they want to do their
tasks. So, a user can work without being in a fixed position.
This facility makes them able to carry out numerous tasks at
the same time and also benefitted the company.
Saves Time
The location flexibility facility of mobile computing makes it
time-saving. It cuts down the time consumed or wasted while
traveling from different locations or to the office and back. It
facilitates users to access all the essential documents and
files over a secure channel and work on their computers. It
has also reduced many unnecessary incurred expenses.
Entertainment
Nowadays, mobile devices can be used as an entertainment
source. They provide a lot of entertainment facilities to
their users.
Besides the above advantages, it provides some other facilities
such as Device Mobility, Simple Framework, easy and simple
infrastructure etc.
14
Disadvantages of Mobile Computing Technology
Along with these advantages, there are some disadvantages also of
mobile computing technology. Following is the list of biggest
disadvantages:

Poor Quality of Connectivity


This is one of the biggest disadvantages because if you are not near any
of these connection providers, your access to the internet may be minima

Security Issues
Mobile VPNs are not very safe to connect, and there is always a
chance of security concerns.

High on Power Consumption


These devices run on batteries that do not tend to long-lasting. So, if
in a situation where there is no source of power for charging, then that
will be a failure.

Besides the above, there are also some disadvantages such as low data
transmission rates, High data losses, Frequent network issues etc.

Multiplexing in Mobile Computing


Multiplexing is a technique used in the area of electronics and signal
processing. In mobile computing, telecommunications and computer
networks, Multiplexing is a method that can be used to combine
multiple analog or digital signals into one signal over a shared
medium. The main aim of using this method is to share a scarce
resource. Example: You can see a real-life example of Multiplexing in
the telecommunication field where several telephone calls may be
carried using one wire. Multiplexing is also called as muxing.

15
Future Of Mobile Computing
Smart phones, personal digital assistants (PDAs), tablets and other
mobile devices currently being used in the world have made mobile
computing exceptionally handy. The mobility of these innovative
gadgets enables their users to access almost all computer-based
services. These advanced technological devices can create or upload
files, browse the internet, stream live videos at high speeds and also
do video or voice conferencing.
The exponentially increasing demand for better and quality devices
has been as a reason for market growth. Manufacturers of these
devices are having sleepless nights seeking to get their own big
share of the market.

The market share for the various companies is constantly being


jostled for. An example is Microsoft Windows Mobile makers and
Apple’s I phone OS makers who are continuously trying to outdo
each other by improving on their products every now and then.

The objective of mobile computing is to be able to work from


anywhere. People of the world today need devices that will easily
enable them to do their work from the confines of their current
location. The devices are programmed to access, process and store
large sizes of data.

Chief Executive Officers and other high-ranking officers can make


decisions based on mobile computing information without having to
go to the office (Russell, 2011). For example, a C.E.O can access
sales reports of his company through such devices and a do review or
remark of the same report.

16
2. Internet of Things (IoT): Mobile devices will play a significant role
in the IoT ecosystem, connecting and controlling a wide range of
smart devices and appliances. With IoT integration, mobile
computing will enable users to interact with their surroundings,
homes, and workplaces in more intelligent and interconnected ways.
3. Artificial Intelligence (AI) Integration: AI will continue to play a
crucial role in mobile computing, powering features such as voice
assistants, personalized recommendations, and augmented reality (AR)
applications. AI algorithms will become smarter, enabling devices to
understand and anticipate user needs, resulting in more personalized
and context-aware experiences.
4. Augmented and Virtual Reality: Mobile devices will continue to
evolve as platforms for augmented reality (AR) and virtual reality
(VR) experiences. Advancements in hardware, such as more
powerful processors and improved display technologies, will
enable immersive AR/VR applications for gaming, education,
training, and entertainment.
5. Foldable and Flexible Displays: Mobile devices with foldable and
flexible displays have already entered the market, and they are
expected to become more common in the future. These devices offer a
larger screen real estate while maintaining portability, allowing users
to enjoy a tablet-like experience that can easily fit into their pockets.
6. Enhanced Security and Privacy: As mobile devices store and access
increasing amounts of sensitive data, there will be a greater emphasis
on security and privacy measures. This includes biometric
authentication, encrypted communications, and improved protection
against malware and data breaches.
7. Wearable Technology: Mobile computing will extend beyond
smartphones and tablets, integrating with wearable devices such as
smartwatches, fitness trackers, and smart glasses. These devices will
seamlessly interact with mobile applications, providing real-time data
and expanding the capabilities of mobile computing in various
domains, including health, fitness, and productivity.
8.Edge Computing: With the growth of connected devices and IoT
applications, there will be a greater need for localized data processing
and reduced reliance on cloud computing. Edge computing brings
computing power closer to the source of data, reducing latency and
enabling faster response times for mobile applications.
17
9. Extended Battery Life: Battery technology will continue to improve,
extending the battery life of mobile devices. Advancements in
battery capacity,

efficiency, and fast-charging technologies will address one of the


primary concerns of mobile users and enable longer usage times
between charges. 10.Contextual Computing: Mobile devices will
become more adept at understanding and adapting to the user's
context. By leveraging sensors, location data, and AI algorithms,
devices will proactively provide relevant information and services
based on the user's surroundings, preferences, and
activities.

Mobile Computing - Current Trends


3G
3G or third generation mobile telecommunications is a generation of
standards for mobile phones and mobile telecommunication services
fulfilling the International Mobile Telecommunications-2000 (IMT-
2000) specifications by the International Telecommunication Union.
Application services include wide-area wireless voice telephone, mobile
Internet access, video calls and mobile TV, all in a mobile environment.
Global Positioning System (GPS)

The Global Positioning System (GPS) is a space-based satellite


navigation system that provides location and time information in all
weather, anywhere on or near the Earth, where there is an unobstructed
line of sight to four or more GPS satellites. The GPS program provides
critical capabilities to military, civil and commercial users around the
18
world. In addition, GPS is the backbone for modernizing the global air
traffic system, weather, and location services.
Long Term Evolution (LTE)
LTE is a standard for wireless communication of high-speed data for
mobile phones and data terminals. It is based on the GSM/EDGE and
UMTS/HSPA network technologies, increasing the capacity and speed
using new modulation techniques. It is related with the implementation
of fourth Generation (4G) technology.
WiMAX
WiMAX (Worldwide Interoperability for Microwave Access) is a
wireless communications standard designed to provide 30 to 40
megabit-per-second data rates, with the latest update providing up to 1
Gbit/s for fixed stations. It is a part of a fourth generation or 4G
wireless-communication technology. WiMAX far surpasses the 30-
meter wireless range of a conventional Wi-Fi Local Area Network
(LAN), offering a metropolitan area network with a signal radius of
about 50 km. WiMAX offers data transfer rates that can be superior to
conventional cable-modem and DSL connections, however, the
bandwidth must be shared among multiple users and thus yields lower
speed in practice.
Near Field Communication
Near Field Communication (NFC) is a set of standards for smartphones
and similar devices to establish radio communication with each other by
touching them together or bringing them into close proximity, usually
no more than a few centimeters. Present and anticipated applications
include contactless transactions, data exchange, and simplified setup of
more complex communications such as Wi-Fi. Communication is also
possible between an NFC device and an unpowered NFC chip, called a
"tag".

Personal Digital Assistant (PDA)


19
The main purpose of this device is to act as an electronic organizer or
day planner that is portable, easy to use and capable of sharing
information with your computer systems.
PDA is an extension of the PC, not a replacement. These systems are
capable of sharing information with a computer system through a
process or service known as synchronization. Both devices will access
each other to check for changes or updates in the individual devices.
The use of infrared and Bluetooth connections enables these devices to
always be synchronized.

With PDA devices, a user can browse the internet, listen to audio
clips, watch video clips, edit and modify office documents, and many
more services. The device has a stylus and a touch sensitive screen for
input and output purposes.
Smartphones
This kind of phone combines the features of a PDA with that of a
mobile phone or camera phone. It has a superior edge over other kinds
of mobile phones.
Smartphones have the capability to run multiple programs concurrently.
These phones include high-resolution touch screens, web browsers that
can access and properly display standard web pages rather than just
mobile-optimized sites, and high-speed data access via Wi-Fi and high-
speed cellular broadband.

20
The most common mobile Operating Systems (OS) used by modern
smartphones include Google's Android, Apple's iOS, Nokia's Symbian,
RIM's BlackBerry OS, Samsung's Bada, Microsoft's Windows Phone,
and embedded Linux distributions such as Maemo and MeeGo. Such
operating systems can be installed on different phone models, and

typically, each device can receive multiple OS software updates over its
lifetime.

Tablet PC and iPads


This mobile device is larger than a mobile phone or a PDA and
integrates into a touch screen and is operated using touch sensitive
motions on the screen. They are often controlled by a pen or by the
touch of a finger. They are usually in slate form and are light in weight.
Examples would include ipads, Galaxy Tabs, Blackberry Playbooks
etc.

21
They offer the same functionality as portable computers. They support
mobile computing in a far superior way and have enormous processing
horsepower. Users can edit and modify document files, access high
speed internet, stream video and audio data, receive and send e-mails,
attend/give lectures, and presentations among its very many other
functions. They have excellent screen resolution and clarity.

Mobile Computing - Security Issues


Mobile computing has its fair share of security concerns as any other
technology. Due to its nomadic nature, it is not easy to monitor the
proper usage. Users might have different intentions on how to utilize
this privilege. Improper and unethical practices such as hacking,
industrial espionage, pirating, online fraud, and malicious destruction
are some but few of the problems experienced by mobile computing.

Another big problem plaguing mobile computing is credential


verification. As other users share username and passwords, it poses as a
major threat to security. This being a very sensitive issue, most
companies are very reluctant to implement mobile computing to the
22
dangers of misrepresentation.
The problem of identity theft is very difficult to contain or eradicate.
Issues with unauthorized access to data and information by hackers, is
also an enormous problem. Outsiders gain access to steal vital data from
companies, which is a major hindrance in rolling out mobile computing
services.
No company wants to lay open their secrets to hackers and other
intruders, who will in turn sell the valuable information to their
competitors. It's also important to take the necessary precautions to
minimize these threats from taking place. Some of those measures
include −
 Hiring qualified personnel.
 Installing security hardware and software
 Educating the users on proper mobile computing ethics
 Auditing and developing sound, effective policies to govern mobile
computing
 Enforcing proper access rights and permissions

23
Conclusion
Today’s mobile computing technologies have gone notches
higher in comparison to yester years. Users can nowadays work
comfortably from any location as long as they are connected to
a secure network. Mobile computing has become a major part
Of Information. and Technology world.
Mobile functionality is available now, but performance remains an
issue that will need to be addressed. It is certain that mobile
computing will control the world’s economies soon. There is still
much room to grow and much work to be done to get technology to
the desired heights.
By the year 2020, the use of mobile computing in health care will
extend average life spans by 20 to 25 years. Implanted wireless
devices will continuously monitor our health, enabling the
medical profession to treat most diseases in their absolute
infancy. Mobile computing will also be used to monitor our diet
and its effects on our health, control unhealthy habits such as
smoking and alcohol consumption, and enable us to maximize the
effects of exercise. Diseases such as diabetes will be virtually
controlled through wireless monitoring and corrective-action
devices, which will automatically adjust insulin levels without the
patient even knowing. -- Phil Asmundson, deputy managing
director of the Technology, Media & Telecommunications Group,
Deloitte & Touché LLP, Stamford, Conn., office

Today's computing has rapidly grown from being confined to a


single location. With mobile computing, people can work from
the comfort of any location they wish to as long as theconnection
and the security concerns are properly factored. In the same
light, the presence of high- speed connections have also
promoted the use of mobile computing. Being an ever growing
and emerging technology, mobile computing will continue to be
a core service in computing and Information Communication
and Technology.

24

You might also like