Professional Documents
Culture Documents
ISSN:2320-0790
Abstract: Mobile computing is becoming increasingly important due to the rise in the
number of portable computers and the desire to have continuous network connectivity to the
Internet irrespective of the physical location of the node. Mobile computing has fast beco me
an important new paradigm in today's world of networked computing systems. Ranging from
wireless laptops to cellular phones and WiFi/Bluetooth-enabled PDA's to wireless sensor
networks, mobile computing has become ubiquitous in its impact on the people daily lives.
The goal of this paper is to point out some of the limitations, constraints, mobility, challenges
and applications of mobile computing.
554
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)
555
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)
556
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)
running entirely locally on the mobile unit Network bandwidth is divided among the
rather than by splitting the application and users sharing a cell. The deliverable
the user interface across the network. In bandwidth per user, therefore, is an
environments with frequent disconnections, important measure of network capacity in
it is better for a mobile device to operate as addition to the raw transmission bandwidth.
a stand-alone computer than as a portable Improving network capacity means
terminal. installing more wireless cells to service a
In some cases, both round-trip latency and user population.
short disconnections can be hidden by There are two ways to do this: overlap cells
asynchronous operation. The X11 Window on different wavelengths, or reduce
system uses this technique to achieve good transmission ranges so that more cells fit in
performance. With the synchronous remote a given area [6].
procedure call paradigm, the client waits for The scalability of the first technique is
a reply after each request; in asynchronous limited because the electromagnetic
operation, a client sends multiple requests spectrum available for public consumption
before asking for acknowledgement. is scarce. This technique is more flexible,
Similarly, prefetching and delayed write- however, because it allows software to
back also decouple the act of allocate bandwidth among users. The
communication from the actual time a second technique is generally preferred. It is
program consumes or produces data, arguably simpler, reduces power
allowing it to proceed during network requirements, and may decrease signal
disconnections. These techniques, therefore, corruption because there are fewer objects
have the potential to mask some network in the environment to interact with. Also, it
failures. The coda file system provides a involves a hardware trade off between
good example of how to handle network bandwidth and coverage area: Transceivers
disconnections, although it is designed for covering less area can achieve higher
today’s notebook computers in which bandwidths. Certain software techniques
disconnections may be less frequent, more can also help cope with the low bandwidth
predictable, and longer lasting than in of wireless links. Modems typically use
mobile computing. Information from the compression to increase their effective
user’s profile helps in keeping the best bandwidth, sometimes almost doubling
selection of files in an on-board cache. It is throughput. Because bulk operations are
important to cache whole files rather than usually more efficient than many short
blocks of files so that entire files can be read transfers, buffering can improve bandwidth
during a disconnection. When the network usage by making large requests out of many
reconnects, Coda attempts to reconcile the short ones. Buffering in conjunction with
cache with the replicated master repository. compression can further improve throughput
With Coda, files can be modified even because larger blocks compress better.
during disconnections. More conservative When available bandwidth does not satisfy
file systems disallow this to prevent the demand, processes the user is waiting
multiple users from making inconsistent for should be given priority. Backups should
changes. Of course, not all network be performed only with “leftover”
disconnections can be masked. In these bandwidth. Mail can be trickle fed onto the
cases, good user interfaces can help by mobile computer slowly before the user is
providing feedback about which operations notified. Although these techniques do not
are unavailable because of network increase effective bandwidth, they improve
disconnections. user satisfaction just the same.
557
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)
558
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)
559
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)
560