Mobile Computing and Mobile Computing Security - Essay Example

Only on StudentShare

Extract of sample
Mobile Computing and Mobile Computing Security

Today, a whole variety of 'mobile computing platforms' such as in-dash VGA displays and automobile computers which feature a variety of applications and functions such as global positioning systems (GPS) and radar detection systems are available for the mass market ("Mobile computing", 2006).
Some mobile computing devices use WLAN (Wireless Local Area Network) as their means to communicate and acquire data. A WLAN is a LAN (Local Area Network) connected through radio or other wireless means. One of the advantages of using a WLAN is the flexibility it offers to overcome restrictions of physically connected networks to space restrictions. It is easy, wire-free and simple to use. WLAN allows data access without having to "jack-in" or plug to a wired network (Shriraghavan et al, 2003).
Wireless Local Area Network (WLAN) transmits and receives data through fixed line network called access points. An area called a "hotspot" results from the area covered by each of the access points. Each access point serves numerous subscribers and they alter their 'access points' as they transfer from one point to another. ...Show more

Summary

Mobile computing involves the use of computing and communications devices to transfer data and other forms of communications even without a direct physical link between the source and recipient device (Shriraghavan et al, 2003). It is also refers to use the use of compact, portable computing devices such as laptops, pocket computers, Personal Digital Assistants (PDA's) and other similar devices that use wireless technology ("Mobile computing", 2006).
Author : zemlakhayley
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Mobile Computing and Mobile Computing Security"
with a personal 20% discount.
Grab the best paper

Related Essays

Mobile computing and wireless communication
The mobile instruments are now coming in a range of shapes and sizes with features adding up day by day, thanks to the continuing trend towards integration of more and more electronic circuits. This trend of miniaturizing Integrated Circuits has led to the availability of low-power embedded processors and radios as well, further strengthening the communication ability of the man on the move.
10 pages (2500 words) Essay
Current mobile computing and the benefits
The upshot for today’s business has been reduced cost brought about by greater productivity and less need for traditional brick-and-mortar office space.As businesses continue to catch on to these potential benefits, the mobile computing industry is expected to continue its strong growth.
2 pages (500 words) Essay
Umts and Mobile Computing
The paper describes how these requirements were realized in an architecture for local mobility, and how the architecture can be implemented in the health care domain and the costs involved in it and the various benefits gained from it.
11 pages (2750 words) Essay
Mobile Device Management
This technology has improved a lot and has room for improvement and advancement more than the normal enterprise LAN, and much secure. It ensures safe mobility of the mobile devices of the enterprise network and allows hundreds of devices to be attached and configured with numerous remote users and remote network destinations.
10 pages (2500 words) Essay
Pervasive Computing in Security
This incorporation highlights the needs of perfect security of computing devices and sensors that provides new concepts of protective measures like never thought before. The best example of such measures is the concept of "smart cards" and "Biometrics". Pervasive computing enables researchers to think the best possible security aspects to minimize the threats of computer and cyber crime that leads towards the killer applications, cyber-criminals as computer culprits take advantage of the vulnerabilities present in the traditional computing environments.
7 pages (1750 words) Essay
The impact of mobile computing on the enterprise"
Such an optimistic belief was shared among the circles of web prophets. The answer to this sanguine approach was one of a ‘yes’ and another of a ‘no’. Positive in the sense that people could post their own reviews, convey the finer points what the company does not
24 pages (6000 words) Essay
Ubiquitous Computing
Ubiquitous computing can be accessed casually and often involves invisible computing devices. Ubiquitous computing is mostly mobile or
5 pages (1250 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT