Professional Documents
Culture Documents
Ijert Ijert: Mobile Computing
Ijert Ijert: Mobile Computing
Mobile Computing
1. 2.
T.SIVARANJANI, S.LAVANYA , 3. N.DIVYA, 4.R.BAGYALAKSHMI
UG-SCHOLARS, 3.ASSTPEEE, 4.ASSOCPEEE
DEPARTMENT OF EEE
EMAIL ID:sivaranjanidurai@gmail.com lavanyasivaraman26@gmail.com
Contact no:8344887486 9976050233
KNOWLEDGE INSTITUTE OF TECHNOLOGY, KAKAPALAYAM, SALEM-637504.
security standards comparable to that found is distributed mobile systems lie. The following section is an explanation
systems or central systems. of the different types of distributed systems ranging from
KEYWORDS:MobileComputing,Nomadic,Traditional the traditional type to nomadic, ad-hoc and finally
distribution system, Security issues unambiquitous ones.
92
International Journal Of Engineering Research and Technology(IJERT), AAMT-2013 Conference Proceedings
National Conference on Advances in Assistive and Main Stream Technologies for Persons with Special Needs
operating systems, executing on different hardware Mobile security or mobile phone security has
platforms),fault-tolerance (recover from faults without become increasingly important in mobile computing. It is
halting the whole system) and finally resource-sharing of particular concern as it relates to the security of personal
(some form of access control). information now stored on the Smartphone. More and more
2.2 NOMADIC DISTRIBUTED SYSTEM users and businesses use Smartphone as communication
This kind of system is composed of a set of mobile tools but also as a means of planning and organizing their
devices and a core infrastructure with fixed and wired work and private life. Within companies, these
nodes. Mobile devices move from location to location, technologies are causing profound changes in the
while maintaining a connection to the fixed network. There organization of information systems and therefore they
are problems that arise from such shifts in location. The have become the source of new risks. Indeed, Smartphone
mobile host has a home IP address and thus any packets collect and compile an increasing amount of sensitive
sent to the mobile host will be delivered to the home information to which access must be controlled to protect
network and not the foreign network where the mobile host the privacy of the user and the intellectual property of the
is currently located. Such problem can be solved by company.
forwarding packets to the foreign network with the help of All Smartphone, as computers, are preferred targets
Mobile IP. Nevertheless, Mobile IP also suffers from of attacks. These attacks exploit weaknesses related to
efficiency (routing issues), QoS, security (authentication of smart phones that can come from means of communication
mobile host at foreign network and end-to-end security like SMS, MMS, Wi-Fi-networks, and GSM. There are
required) and wireless access (reduced capacity) problems. also attacks that exploit software vulnerabilities from both
These systems are susceptible to the uncertainty of the web browser and operating system. Finally, there are
location, a repeated lack of connections and the migration forms of malicious software that rely on the weak
into different physical and logical environments while knowledge of average users.
operating. However, compared to ad-hoc 5.LIMITATIONS
networks, nomadic systems still have comparatively 5.1 Range & Bandwidth
reliable connections and services since most of these are Mobile Internet access is generally slower than direct
actually supported by the fixed infrastructure (“backbone”) cable connections, using technologies such as GPRS
of the network. The non-functional requirements mainly and EDGE, and more recently HSDPA and HSUPA
differ, compared to the traditional distributed systems, in 3G and 4G networks. These networks are usually
the heterogeneity (affected by the presence of both fixed available within range of commercial cell phone
RRTT
and mobile devices across the network as well as the towers. Higher speed wireless LANs are inexpensive
variations in technologies (e.g.: wireless)), resource sharing but have very limited range.
(must take into account different issues when the resources 5.2 Security standards
need to be discovered) and fault tolerance of the system When working mobile, one is dependent on
IIJJEE
(considered to be quite the norm). Quality and provision of public networks, requiring careful use of VPN.
these resources must be carefully considered too. Security is a major concern while concerning the
mobile computing standards on the fleet. One can
3. THEORY IN MOBILE easily attack the VPN through a huge number of
COMPUTING networks interconnected through the line.
5.3 Power consumption:
This section is only an introductory section so it will not go When a power outlet or portable generator is not available,
into any detail other than state what the current trend of mobile computers must rely entirely on battery power.
search in these fields related to mobile computing are. Combined with the compact size of many mobile devices,
this often means unusually expensive batteries must be
3.1 Models used to obtain the necessary battery life.
Models permit the precise description of existing languages 5.4Transmission interferences:
and system semantics. In fact, they enable the formal Weather, terrain, and the range from the nearest signal
reasoning about the correctness of such semantics. Models point can all interfere with signal reception. Reception in
are very much used to emphasize parallels and distinctions tunnels, some buildings, and rural areas is often poor.
among various forms of mobility (logical and physical) and 5.6. Potential health hazard
are concerned with the formulation of appropriate People who use mobile devices while driving are often
abstractions useful in specification and evaluation of such distracted from driving and are thus assumed more likely to
mobile systems. Models are mainly concerned with the be involved in traffic accidents(While this may seem
characteristics of mobile units such as the unit of mobility obvious, there is considerable discussion about whether
(who is allowed to move), its location (where a mobile unit banning mobile device use while driving reduces accidents
is positioned in space) and its context (determined by the or not) Cell phones may interfere with sensitive medical
current location of mobile units). There are many existing devices. Questions concerning mobile phone radiation and
models and many more are still in research. health have been raised.
Random mobility model(s) 5.7 Human interface with device
Markovian model Screens and keyboards tend to be small, which may make
Exponential Correlated Random Model them hard to use. Alternate input methods such as speech
Nomadic Community Model or handwriting recognition require training.
6. APPLICATIONAL ISSUES
4.SECURITY ISSUES IN MOBILE COMPUTING
93
International Journal Of Engineering Research and Technology(IJERT), AAMT-2013 Conference Proceedings
National Conference on Advances in Assistive and Main Stream Technologies for Persons with Special Needs
The applications includes in mobile computing are as 6.3. Data compression considerations
follows, As the bandwidth of wireless network is scarce &
6.1 Technical Design inexpensive it is necessary to compress data to get the
First comes the Technical Design Issues, which maximum out of this bandwidth. This is usually done in the
consist of network design, capacity planning, response time modem by going beyond the modem hardware in reducing
calculations, data compression considerations, system the quantity of traffic on wireless networks using client
availability design and security issues. The technical design application programs.
plays a key role in a mobile computing project and offers 6.4 .System availability Design
unique challenges to the system professionals. Rather than sticking on with the general base station
6.2 Network Design: hardware & network controllers, redundancy & message
Issues regarding Wireless LAN design and Wide switches are typically built on fault-tolerant platforms.
Area Radio Network Design which network design Public shared network providers must be approached for
comprises are discussed below. details of their redundancies. MCSS is another vital
6.2.1.Wireless LAN design issues component that badly needs inbuilt redundancy.
The number of mobile users who will use wireless
LAN and the number of them active during the
peak period.
The types of LAN application accessed by them.
(Keeping in mind that wireless LANs will not be
acceptable for the intended users as they operate at
much slower speeds than wired LANs).
Use of notebook with a wireless NIC as a primary
and user device.
Roaming areas, location & range of needed access
point.
Impact of construction materials in single 7. ADVANTAGES:-
penetration.
Preferred technology-spread spectrum or 1. Selling a product or service in quicker time.
frequency hopping. 2.Streamline business process.
RRTT
Radio frequency interference from any other 3.Reducing transaction cost from one a/c to
devices in office, factory or campus etc. another a/c.
6.2.2. Wide Area Radio Network Design Issues 4.Competitive pricing.
The need of building a private radio network.
IIJJEE
94
International Journal Of Engineering Research and Technology(IJERT), AAMT-2013 Conference Proceedings