Got a tricky question? Receive an answer from students like you! Try us!

Mobile Computing and Mobile Computing Security - Essay Example

Only on StudentShare
Author : zemlakhayley

Summary

Mobile computing involves the use of computing and communications devices to transfer data and other forms of communications even without a direct physical link between the source and recipient device (Shriraghavan et al, 2003). It is also refers to use the use of compact, portable computing devices such as laptops, pocket computers, Personal Digital Assistants (PDA's) and other similar devices that use wireless technology ("Mobile computing", 2006).

Extract of sample
Mobile Computing and Mobile Computing Security

Today, a whole variety of 'mobile computing platforms' such as in-dash VGA displays and automobile computers which feature a variety of applications and functions such as global positioning systems (GPS) and radar detection systems are available for the mass market ("Mobile computing", 2006).
Some mobile computing devices use WLAN (Wireless Local Area Network) as their means to communicate and acquire data. A WLAN is a LAN (Local Area Network) connected through radio or other wireless means. One of the advantages of using a WLAN is the flexibility it offers to overcome restrictions of physically connected networks to space restrictions. It is easy, wire-free and simple to use. WLAN allows data access without having to "jack-in" or plug to a wired network (Shriraghavan et al, 2003).
Wireless Local Area Network (WLAN) transmits and receives data through fixed line network called access points. An area called a "hotspot" results from the area covered by each of the access points. Each access point serves numerous subscribers and they alter their 'access points' as they transfer from one point to another. ...
Download paper

Related Essays

mobile computing and wireless communication
This exploratory approach towards making things small yet sophisticated promises much more for the future. While analyzing the evolution [2] of mobile technology, it can be safely assumed that the size and power consumption patterns are on a decline while the bandwidths available for communication will continue to increase. Such trends lead us to believe that mobile communication is bound to play an increasingly important role in everyday life through a variety of new applications often referred to as "ubiquitous or pervasive" computing. The emergence of powerful portable computing devices,…
10 pages (2510 words)
Current mobile computing and the benefits
The upshot for today’s business has been reduced cost brought about by greater productivity and less need for traditional brick-and-mortar office spaceAs businesses continue to catch on to these potential benefits, the mobile computing industry is expected to continue its strong growth. “A 2005 survey of large enterprises by Forrester Research found that more firms are providing traditional desktop users with laptops, and analyst firm Gartner forecasts that the mobile computing industry is likely to see double-digit growth over the next few years, with nearly 87 million units expected to…
2 pages (502 words)
Umts and Mobile Computing
Mobility and mobile computing is playing an increasing role in human-computer interaction research and design as a result of the ever growing range of technology now supporting mobility. Mobile computers, laptops, tablet PCs, PDAs, cellular phones, and hybrids are all devices intended to support mobility of users, and the proliferation of wireless network access like WLAN, UMTS, GPRS, and GMS all support mobile computing. Effective resource management and reliable equipment are essential for optimum performance in any organization. Both depend upon accurate, timely management of massive…
11 pages (2761 words)
Mobile Device Management
Mobile device management has the capacity to remotely upgrade itself by changing a bit of its system's settings; it ensures security, data transfer, user friendliness and discourages sensitive information theft, fabrication or any other illegal act of company's policy.…
10 pages (2510 words)
Pervasive Computing in Security
Authentication is the process of proving that you are who you say you are and establishing proof of identity. Authentication can be achieved through the use of passwords, smart cards, biometrics, or a combination thereof.…
7 pages (1757 words)
The impact of mobile computing on the enterprise"
It was a one-to-one relationship if seen from the constructive perspective. Negative points were summed up in the losses incurred on the company’s part whereby these message boards and the like didn’t help the business from any fiscal outlook. Many big companies like Microsoft, WebEx, Intraspect and the like have been facing barriers as concerns with the interaction between the employees who are spread in different locations. These companies were in the need to put up such a system, which could eliminate excessive and undue business travels and easily provide for interaction and more so…
24 pages (6024 words)
Ubiquitous Computing
The subject of ubiquitous computing is interesting going by the way technological advancements are revolutionizing life, making it simpler and yet making people get vulnerable to virtual attacks.…
5 pages (1255 words)