You are on page 1of 15

MOBILE COMPUTING

AND
NETWORK SECURITY

1
Contents
 Introduction
 Latest trends
 Technology
 Architecture
 Applications
 Network
 limitations

2
MOBILE COMPUTING
Mobile computing is a generic term describing one’s ability to
use technology while moving. Mobile computing can be
seen as an integration of portable computers and wireless
networks.

Mobile computing produces:


 Portable computers in computer industry.

 Wireless communication in telecommunications.

3
Portability
A portable computing device is a general purpose computer that
can be easily moved from place to place.

The implications of portability are


 Small size

 Weight

 Dependence on battery

 Lower power consumption

4
Wireless communication

Security Concerns
– Authentication is critical
» Normal network point
of attachment is a wall tap
» Wireless access makes
network attachment too easy
– Exposure to over-the-air
wiretapping
» Any transmitter can also
be a receiver!
» Some wireless networks
provide secure air links

5
Latest trends
Mobile computing devices are becoming smaller, lighter and
more powerful than their predecessors. two prominent classes
of mobile computing devices are
 Palm OS
 Pocket Pc

These devices are capable of simple word processing,


spreadsheet applications, web browsing and address
management.

6
Technology
Mobile computing embraces
a host of portable
technologies. From
notebook computers to
personal digital assistants
(PDA)

7
Architecture
Mobility services can be
classified into 3 groups.
 Common mobility
services (CMS)
 Mobility management
services (MMS)
 Special mobility
services (SMS)

8
Applications

9
Network
Most handheld computers come with built in infrared ports that
can be used to exchange information with a network or a
computer at short range. some of the networking examples are
Bluetooth, Wi-Fi, infrared data association, ultra wide band
radio.

Network design comprises are


 Wireless LAN design issues

 Wide area radio network design issues

10
Network security

Common security breaches of mobile computing applications


include,
• Network by criminal elements.
• Physical breach security at communication centers mainly
unmanned base stations.
• Interception of credit card authorization over wireless
network.
• Careful security considerations including on-the-air
encryption & firewalls must be used.

11
Limitations in mobile
computing
 Insufficient bandwidth
 Security standards
 Power consumption
 Transmission Interferences
 Potential Health Hazards
 Human Interface with devices

12
Quality of data in mobile
computing
 Mobile computing enables immediate validation of the data
 It reduces the transcription error for survey like applications
 Using networking, information can be made available in near
real-time
 Very fast turn around time from data collection to analysis
and reporting. This can translate into significant cost saving

13
Conclusion
Mobile computers offer many new options,
however there are difficulties to consider.
Generally, wireless laptops cost 50% to 100%
more than their desktop counterparts. Laptops
are also harder to upgrade most proprietary
hardware components that limit future options.

14
Queries

15

You might also like