Mobile Computing and Mobile Computing Security

Undergraduate
Essay
Miscellaneous
Pages 6 (1506 words)
Download 0
Mobile computing involves the use of computing and communications devices to transfer data and other forms of communications even without a direct physical link between the source and recipient device (Shriraghavan et al, 2003). It is also refers to use the use of compact, portable computing devices such as laptops, pocket computers, Personal Digital Assistants (PDA's) and other similar devices that use wireless technology ("Mobile computing", 2006).

Introduction

Today, a whole variety of 'mobile computing platforms' such as in-dash VGA displays and automobile computers which feature a variety of applications and functions such as global positioning systems (GPS) and radar detection systems are available for the mass market ("Mobile computing", 2006).
Some mobile computing devices use WLAN (Wireless Local Area Network) as their means to communicate and acquire data. A WLAN is a LAN (Local Area Network) connected through radio or other wireless means. One of the advantages of using a WLAN is the flexibility it offers to overcome restrictions of physically connected networks to space restrictions. It is easy, wire-free and simple to use. WLAN allows data access without having to "jack-in" or plug to a wired network (Shriraghavan et al, 2003).
Wireless Local Area Network (WLAN) transmits and receives data through fixed line network called access points. An area called a "hotspot" results from the area covered by each of the access points. Each access point serves numerous subscribers and they alter their 'access points' as they transfer from one point to another. ...
Download paper
Not exactly what you need?

Related papers

mobile computing and wireless communication
This exploratory approach towards making things small yet sophisticated promises much more for the future. While analyzing the evolution [2] of mobile technology, it can be safely assumed that the size and power consumption patterns are on a decline while the bandwidths available for communication will continue to increase. Such trends lead us to believe that mobile communication is bound to play…
Current Mobile Computing and The Benefits
As businesses continue to catch on to these potential benefits, the mobile computing industry is expected to continue its strong growth. “A 2005 survey of large enterprises by Forrester Research found that more firms are providing traditional desktop users with laptops, and analyst firm Gartner forecasts that the mobile computing industry is likely to see double-digit growth over the next few…
Umts and Mobile Computing
Mobility and mobile computing is playing an increasing role in human-computer interaction research and design as a result of the ever growing range of technology now supporting mobility. Mobile computers, laptops, tablet PCs, PDAs, cellular phones, and hybrids are all devices intended to support mobility of users, and the proliferation of wireless network access like WLAN, UMTS, GPRS, and GMS all…
Mobile Internet Protocol
However, the higher-level protocols require IP address of a host to be fixed for identifying connections'. IP protocol is therefore a necessary element of the network activities. In this context, many companies that activate in the area of IT technology and especially those which provide network - related services offer to their customers the chance to use Internet even when they are far from…
Mobile Device Management
Mobile device management has the capacity to remotely upgrade itself by changing a bit of its system's settings; it ensures security, data transfer, user friendliness and discourages sensitive information theft, fabrication or any other illegal act of company's policy.…
Mobile Computing and Mobile Computing Security
Today, a whole variety of 'mobile computing platforms' such as in-dash VGA displays and automobile computers which feature a variety of applications and functions such as global positioning systems (GPS) and radar detection systems are available for the mass market ("Mobile computing", 2006).…
Pervasive Computing in Security
Authentication is the process of proving that you are who you say you are and establishing proof of identity. Authentication can be achieved through the use of passwords, smart cards, biometrics, or a combination thereof.…