Mobile computing' is a form of human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing has three aspects: mobile communication, mobile hardware, and mobile software. The first aspect addresses communication issues in ad-hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. The second aspect is on the hardware, e.g., mobile devices or device components. The third aspect deals with the characteristics and requirements of mobile applications.
Contents |
Mobile computing is "taking a computer and all necessary files and software out into the field."[1]
"Mobile computing: being able to use a computing device even when being mobile and therefore changing location. Portability is one aspect of mobile computing."[2]
"Mobile computing is the ability to use computing capability without a pre-defined location and/or connection to a network to publish and/or subscribe to information ." Uwe Vieille, ACM.org
Mobile Computing is a variety of wireless devices that has the mobility to allow people to connect to the internet, providing wireless transmission to access data and information from where ever location they may be.
Many types of mobile computers have been introduced since the 1990s including the:
Many commercial and government field forces deploy a ruggedized portable computer such as the Panasonic Toughbook, MobileDemand xTablet or larger rack-mounted computers with their fleet of vehicles. This requires the units to be anchored to the vehicle for driver safety, device security, and ergonomics. Ruggedized computers are rated for severe vibration associated with large service vehicles and off-road driving and the harsh environmental conditions of constant professional use such as in emergency medical services, fire, and public safety.
Other elements that enable the unit to function in vehicle:
Several specialized manufacturers such as First Mobile Technologies, National Products Inc (Ram Mounts), Gamber Johnson and LedCo build mounts for vehicle mounting of computer equipment for a wide range of vehicles. The mounts are built to withstand the harsh conditions and maintain ergonomics.
Specialized installation companies specialize in designing the mount design, assembling the parts, and installing them in a safe and consistent manner away from airbags, vehicle HVAC controls, and driver controls. Frequently installations will include a WWAN modem, power conditioning equipment, transceiver antennae mounted external to the vehicle, and WWAN/WLAN/GPS/etc.
As oppose to the benefits of being able to access information from any location through wireless transmission, there is it faults with the need for security protection. In a wireless mobile communication environment, the messages transmitted over the wireless medium are more susceptible to eavesdropping than in a wired network. Also, it is possible for any user to access the mobile communication system using false identity.
In order to provide security from eavesdropping or false identities, systems use encryption. which provides confidentiality of the messages sent over wireless channel and to authenticate. The main idea is to conceal the content of the messages before transmitting them in clear (radio signals).
There are several categories of portable computing devices that can run on batteries but are not usually classified as laptops: portable computers, keyboardless tablet PCs, Internet tablets, PDAs, ultra mobile PCs (UMPCs) and smartphones.
A portable computer is a general-purpose computer that can be easily moved from place to place, but cannot be used while in transit, usually because it requires some "setting-up" and an AC power source. The most famous example is the Osborne 1. Portable computers are also called a "transportable" or a "luggable" PC.
A tablet computer that lacks a keyboard (also known as a non-convertible tablet) is shaped like slate or a paper notebook, features a touchscreen with a stylus and handwriting recognition software. Tablets may not be best suited for applications requiring a physical keyboard for typing, but are otherwise capable of carrying out most tasks that an ordinary laptop would be able to perform.
A personal digital assistant (PDA) is a small, usually pocket-sized, computer with limited functionality. It is intended to supplement and to synchronize with a desktop computer, giving access to contacts, address book, notes, e-mail and other features.
A PDA with a web browser is an Internet tablet, an Internet appliance in tablet form. Unlike a tablet PC, an Internet tablet does not have much computing power and its applications suite is limited, and it can not replace a general purpose computer. Internet tablets typically feature an MP3 and video player, a web browser, a chat application and a picture viewer.
An ultra mobile PC is a full-featured, PDA-sized computer running a general-purpose operating system.
A smartphone has a wide range of features and installable applications.
A carputer is a computing device installed in an automobile. It operates as a wireless computer, sound system, GPS, and DVD player. It also contains word processing software and is bluetooth compatible.[6]
A Fly Fusion Pentop Computer is a computing device the size and shape of a pen. It functions as a writing utensil, MP3 player, language translator, digital storage device, and calculator.[7]
Boundaries that separate these categories are blurry at times. For example, the OQO UMPC is also a PDA-sized tablet PC; the Apple eMate had the clamshell form factor of a laptop, but ran PDA software. The HP Omnibook line of laptops included some devices small more enough to be called ultra mobile PCs. The hardware of the Nokia 770 internet tablet is essentially the same as that of a PDA such as the Zaurus 6000; the only reason it's not called a PDA is that it does not have PIM software. On the other hand, both the 770 and the Zaurus can run some desktop Linux software, usually with modifications.
Wireless data connections used in mobile computing take three general forms.[8] Cellular data service uses technologies such as GSM, CDMA or GPRS, and more recently 3G networks such as W-CDMA, EDGE or CDMA2000.[9][10] These networks are usually available within range of commercial cell towers. Wi-Fi connections offer higher performance,[11] may be either on a private business network or accessed through public hotspots, and have a typical range of 100 feet indoors and up to 1000 feet outdoors.[12] Satellite Internet access covers areas where cellular and Wi-Fi are not available[13] and may be set up anywhere the user has a line of sight to the satellite's location,[14] which for satellites in geostationary orbit means having an unobstructed view of the southern sky.[8] Some enterprise deployments combine networks from multiple cellular networks or use a mix of cellular, Wi-Fi and satellite.[15] When using a mix of networks, a mobile virtual private network (mobile VPN) not only handles the security concerns, but also performs the multiple network logins automatically and keeps the application connections alive to prevent crashes or data loss during network transitions or coverage loss.[16][17]
|