You are on page 1of 7

COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)

ISSN:2320-0790

Challenging Issues and Limitations of Mobile


Computing
Kusuma Kumari B.M, Assistant Professor, Department of Computer Science
University College of Science, Tumkur University, Tumkur

Abstract: Mobile computing is becoming increasingly important due to the rise in the
number of portable computers and the desire to have continuous network connectivity to the
Internet irrespective of the physical location of the node. Mobile computing has fast beco me
an important new paradigm in today's world of networked computing systems. Ranging from
wireless laptops to cellular phones and WiFi/Bluetooth-enabled PDA's to wireless sensor
networks, mobile computing has become ubiquitous in its impact on the people daily lives.
The goal of this paper is to point out some of the limitations, constraints, mobility, challenges
and applications of mobile computing.

Keywords: constraints, mobility, challenges, applications, limitations

1. Introduction network computing paradigm, called mobile


computing, which allows the users access
Mobile Computing [1]: A technology that information and collaborate with others
allows transmission of data, via a computer, while on the move [2]. Wireless mobile
without having to be connected to a fixed networks are typically characterized by
physical link. The term "Mobile computing" severe constraints on resources, such as
is used to describe the use of computing bandwidth and battery power, and by rapid
devices, which usually interact in some fluctuations in availability of these
fashion with a central information system-- resources; this makes it difficult for the
while away from the normal, fixed system software to provide guaranteed
workplace. Mobile computing technology quality-of-service at levels required by
enables the mobile worker to create, access, many distributed and collaborative
process, store and communicate information applications. Also, due to mobility of the
without being constrained to a single clients or the users, users may be
location. By extending the reach of an disconnected from the network often and the
organization's fixed information system, users may also voluntarily switch off to save
mobile computing enables interaction with battery power; thus, management of this
organizational personnel that were disconnection is a critical issue in designing
previously disconnected. mobile networks. Further, user mobility
The combination of wireless communication adds a new dimension to be distributed
infrastructure and portable computing operating systems which has implications
devices has laid the foundation for a new for specification, design, verification and

554
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)

implementation of both system and The underlying physical layer, however, is


application software [3]. A challenging at liberty to utilize either wired or wireless
issue is to determine the interface and the transmission. The mobile and stationary
guarantees that the system software must agents are located at geographically
provide to the developers of both location- dispersed sites. While both stationary and
independent and location-dependent mobile nodes may have computing and
applications on mobile networks [4]. This communication needs, the relative weights
has resulted in research on adaptive and frequency are problem-specific. In
applications and system software which can addition, the system must be designed to
gracefully respond to changes in operating accommodate evolutionary growth. That is,
conditions [5]. the system must continue to function and
deliver relatively undiminished performance
There are several articles which have as the cumulative number of stationary and
identified the fundamental challenges in mobile entities increases with time.
mobile computing. Mobile systems are (i)
resource poor (ii) less secure (iii) have poor 2. Constraints of Mobility
connectivity to the wired infrastructure and
(iv) have less energy since they are powered Mobile computing is characterized by four
by battery. In order to deal with these constraints:
characteristics the mobile systems should
employ dynamic adaptation schemes. One Mobile computing is characterized by four
of the implications is that the solutions constraints:
developed for mobile systems should be  Mobile elements are resource-poor
interoperable since as mobile clients move relative to static elements.
one domain to another they should be able For a given cost and level of
to operate in the new domain. The mission technology considerations of weight,
of mobile computing is to allow users to power, size and ergonomics will
access any information using any device exact a penalty in computational
over any network at anytime. resources such as processor speed,
memory size, and disk capacity.
In general, a mobile-computing network While mobile elements will improve
may be characterized as follows. It consists in absolute ability, they will always
of multiple mobile agents that require access be resource-poor relative to static
to (i) information generated at multiple elements.
geographically dispersed sites and (ii)
computing engines to execute their  Mobility is inherently hazardous.
decisions. It may be include one or more A Wall Street stockbroker is more
stationary agents that perform information likely to be mugged on the streets of
acquisition and propagation to the mobile Manhattan and have his laptop
agents. While a static interconnection stolen than to have his workstation
network may link the stationary agents, a in a locked office be physically
dynamic interconnection network will subverted. In addition to security
connect the mobile agents to the stationary concerns, portable computers are
nodes. The mobile nodes may connect to more vulnerable to loss or damage.
specific nodes asynchronously, i.e., at
irregular intervals of time, to acquire  Mobile connectivity is highly
information, and following completion they variable in performance and
will disconnect. The use of the term reliability.
connection in this context refers to the Some buildings may offer reliable,
transport layer in the ISO-OSI terminology. high-bandwidth wireless

555
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)

connectivity while others may only knows the current location of a


offer low-bandwidth connectivity. mobile computer.
Outdoors, a mobile client may have  Forwarding Pointers: This method
to rely on a low-bandwidth wireless places a copy of the new address at
network with gaps in coverage. the old location. Each message is
forwarded along the chain of
 Mobile elements rely on a finite pointers leading to the mobile
energy source. computer. This requires an active
While battery technology will entity at the old address to receive
undoubtedly improve over time, the and forward messages.
need to be sensitive to power
consumption will not diminish. Traditional computers do not move, hence
Concern for power consumption location dependent information such as the
must span many levels of hardware local name server, available printers etc. can
and software to be fully effective. be configured statically. A mechanism is
needed for mobile computers to obtain
configuration data appropriate to the present
3. Mobility location. There may be a need to obtain
information on other mobile devices, and
The volatility of some information is this may cause a breach of security. Privacy
increased with the ability to change will need to be maintained in some cases
locations while connected to the network. where location information of a user maybe
Certain data that may have been considered misused.
static for stationary computing now
becomes dynamic for mobile computing. 4. Challenges of Mobile Computing
As mobile computers change location, they
will use different network access points, or The need for mobile computing leads to
'addresses'. To communicate with a mobile design challenges in several areas.
computer, its latest address must be known.
Several techniques may be used to 4.1 Disconnection
determine the current network address of a Today’s computer systems often depend
mobile unit. heavily on a network and may cease to
function during network failures. For
 Selective Broadcast: If a mobile example, distributed file systems may lock
computer is known to be in a set of up waiting for other servers, and
cells, then a message could be applications process may fail altogether if
'broadcasted' to these known cells the network stays down too long. Network
asking the required mobile unit to failure is a greater concern in mobile
reply with its current network computing than in traditional computing
address. because wireless communication is so
 Central Services: A logically susceptible to disconnection. Designers
centralised database contains the must decide whether to spend available
current addresses of all mobile units. resources on the network, trying to prevent
Whenever a mobile computer disconnections, or to spend them trying to
changes its address, it sends a enable systems to cope with disconnections
message to update the database. more gracefully and work around them
 Home Bases: This is essentially the where possible. The more autonomous a
limiting case of distributing a central mobile computer, the better it can tolerate
service, i.e. only a single server network disconnection. For example, certain
applications can reduce communication by

556
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)

running entirely locally on the mobile unit Network bandwidth is divided among the
rather than by splitting the application and users sharing a cell. The deliverable
the user interface across the network. In bandwidth per user, therefore, is an
environments with frequent disconnections, important measure of network capacity in
it is better for a mobile device to operate as addition to the raw transmission bandwidth.
a stand-alone computer than as a portable Improving network capacity means
terminal. installing more wireless cells to service a
In some cases, both round-trip latency and user population.
short disconnections can be hidden by There are two ways to do this: overlap cells
asynchronous operation. The X11 Window on different wavelengths, or reduce
system uses this technique to achieve good transmission ranges so that more cells fit in
performance. With the synchronous remote a given area [6].
procedure call paradigm, the client waits for The scalability of the first technique is
a reply after each request; in asynchronous limited because the electromagnetic
operation, a client sends multiple requests spectrum available for public consumption
before asking for acknowledgement. is scarce. This technique is more flexible,
Similarly, prefetching and delayed write- however, because it allows software to
back also decouple the act of allocate bandwidth among users. The
communication from the actual time a second technique is generally preferred. It is
program consumes or produces data, arguably simpler, reduces power
allowing it to proceed during network requirements, and may decrease signal
disconnections. These techniques, therefore, corruption because there are fewer objects
have the potential to mask some network in the environment to interact with. Also, it
failures. The coda file system provides a involves a hardware trade off between
good example of how to handle network bandwidth and coverage area: Transceivers
disconnections, although it is designed for covering less area can achieve higher
today’s notebook computers in which bandwidths. Certain software techniques
disconnections may be less frequent, more can also help cope with the low bandwidth
predictable, and longer lasting than in of wireless links. Modems typically use
mobile computing. Information from the compression to increase their effective
user’s profile helps in keeping the best bandwidth, sometimes almost doubling
selection of files in an on-board cache. It is throughput. Because bulk operations are
important to cache whole files rather than usually more efficient than many short
blocks of files so that entire files can be read transfers, buffering can improve bandwidth
during a disconnection. When the network usage by making large requests out of many
reconnects, Coda attempts to reconcile the short ones. Buffering in conjunction with
cache with the replicated master repository. compression can further improve throughput
With Coda, files can be modified even because larger blocks compress better.
during disconnections. More conservative When available bandwidth does not satisfy
file systems disallow this to prevent the demand, processes the user is waiting
multiple users from making inconsistent for should be given priority. Backups should
changes. Of course, not all network be performed only with “leftover”
disconnections can be masked. In these bandwidth. Mail can be trickle fed onto the
cases, good user interfaces can help by mobile computer slowly before the user is
providing feedback about which operations notified. Although these techniques do not
are unavailable because of network increase effective bandwidth, they improve
disconnections. user satisfaction just the same.

4.2 Low Bandwidth 4.3 High bandwidth variability

557
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)

Mobile computing designs also contend Precisely because connection to a wireless


with much greater variation in network link is so easy, the security of wireless
bandwidth than do traditional designs. communication can be compromised much
Bandwidth can shift one to four orders of more easily than that of wired
magnitude, depending on whether the communication, especially if transmission
system is plugged in or using wireless extends over a large area. This increases
access. An application can approach this pressure on mobile computing software
variability in one of three ways: it can designers to include security measures.
assume high-bandwidth connections and Security is further complicated if users are
operate only while plugged in, it can assume allowed to cross security domains. For
low bandwidth connections and not take example, a hospital may allow patients with
advantage of higher bandwidth when it is mobile computers to use nearby printers but
available, or it can adapt to currently prohibit access to distant printers and
available resources, providing the user with resources designated for hospital personnel
a variable level of detail or quality. For only [8]. Secure communication over
example, a video-conferencing application insecure channels is accomplished by
could display only the current speaker or all encryption, which can be done in software.
the participants, depending on the available Security depends on a secret encryption key
bandwidth. Different choices make senses known only to the authorized parties.
for different applications. Managing these keys securely is difficult,
but it can be automated by software.
4.4 Heterogeneous network
In contrast to most stationary computers, 5. Limitations of Mobile Computing
which stay connected to a single network,
mobile computers encounter more 1. Insufficient Bandwidth: Mobile Internet
heterogeneous network connections in access is generally slower than direct cable
several ways. First, as they leave the range connections, using technologies such as
of one network transceiver and switch to GPRS and EDGE, and more recently 3G
another, they may also need to change networks. These networks are usually
transmission speeds and protocols. Second, available within range of commercial cell
in some situations a mobile computer may phone towers. Higher speed wireless LANs
have access to several network connections are inexpensive but have very limited range.
at once, for example, where adjacent cells
overlap or where it can be plugged in for 2. Security Standards: When working
concurrent wired access. Also, mobile mobile, one is dependent on public
computers may need to switch interfaces, networks, requiring careful use of Virtual
for example, when going between indoors Private Network (VPN). Security is a major
and outdoors. Infrared interfaces cannot be concern while concerning the mobile
used outside because sunlight drowns out computing standards on the fleet. One can
the signal. Even with radio frequency easily attack the VPN through a huge
transmission, the interface may still need to number of networks interconnected through
change access protocols for different the line.
networks, for example, when switching
from cellular coverage in the country. This 3. Power consumption: When a power
heterogeneity makes mobile networking outlet or portable generator is not available,
more complex than traditional networking mobile computers must rely entirely on
[7]. battery power. Combined with the compact
size of many mobile devices, this often
4.5. Security risks means unusually expensive batteries must
be used to obtain the necessary battery life.

558
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)

Mobile computing should also look into 2. Emergency Services:


Greener IT [9], in such a way that it saves Ability to receive information on the move
the power or increases the battery life. is vital where the emergency services are
4. Transmission interferences: Weather, involved. Information regarding the address,
terrain, and the range from the nearest signal type and other details of an incident can be
point can all interfere with signal reception. dispatched quickly, via a Cellular Digital
Reception in tunnels, some buildings, and Packet Data (CDPD) system using mobile
rural areas is often poor. computers, to one or several appropriate
mobile units, which are in the vicinity of the
5. Potential health hazards : People who incident.
use mobile devices while driving are often
distracted from driving are thus assumed 3. In courts:
more likely to be involved in traffic Defense counsels can take mobile
accidents. Cell phones may interfere with computers in court. When the opposing
sensitive medical devices. There are counsel references a case which they are not
allegations that cell phone signals may familiar, they can use the computer to get
cause health problems. direct, real-time access to on- line legal
database services, where they can gather
6. Human inte rface with device: Screens information on the case and related
and keyboards tend to be small, which may precedents. Therefore mobile computers
make them hard to use. Alternate input allow immediate access to a wealth of
methods such as speech or handwriting information, making people better informed
recognition require training. and prepared.

6. Applications of Mobile Computing 4. In companies:


Managers can use mobile computers in, say,
Mobile working infrastructure can deliver critical presentations to major customers.
real time business benefits, companies of all They can access the latest market share
sizes are walking up to the fact that they can information. At a small recess, they can
improve productivity and increase profits by revise the presentation to take advantage of
giving employees remote access to mission this information. They can communicate
critical corporate IT system. The importance with the office about possible new offers
of Mobile Computers [10] has been and call meetings for discussing responds to
highlighted in many fields of which a few the new proposals. Therefore, mobile
are described below: computers can leverage competitive
advantages.
1. For Estate Agents:
Estate agents can work either at home or out 5. Credit Card Verification:
in the field. With mobile computers they can At Point of Sale (POS) terminals in shops
be more productive. They can obtain current and supermarkets, when customers use
real estate information by accessing credit cards for transactions, the
multiple listing services, which they can do intercommunication is required between the
from home, office or car when out with bank central computer and the POS
clients. They can provide clients with terminal, in order to effect verification of
immediate feedback regarding specific the card usage, can take place quickly and
homes or neighborhoods, and with faster securely over cellular channels using a
loan approvals, since applications can be mobile computer unit. This can speed up the
submitted on the spot. Therefore, mobile transaction process and relieve congestion at
computers allow them to devote more time the POS terminals.
to clients.

559
COMPUSOFT, An international journal of advanced computer technology, 3 (2), February-2014 (Volume-III, Issue-II)

7. Conclusion Systems and Applications, New


Orleans LA, February, 1999.
Mobile computing offers significant benefits [4] J. R. Lorch and A. J. Smith. “Software
for organizations that choose to integrate the strategies for portable computer
technology into their fixed organizational energy management”, IEEE Personnel
information system. Mobile computing is Communication, 5(3): 60-73, June
made possible by portable computer 1998.
hardware, software, and communications [5] Adnan Al-bar and Ian Wakeman, “A
systems that interact with a non- mobile Survey of Adaptive Applications in
organizational information system while Mobile Computing”, in Proceedings of
away from the normal, fixed workplace. the Second IEEE Workshop
Mobile computing is a versatile and [6] M. Satyanarayanan, “Fundamentals
potentially strategic technology that Challenges in Mobile Computing”, in A CM
improves information Symposium on Principles of Distributed
Computing, 1995.
[7] P.J. McCann and G.C. Roman,
References:
“Compositional Programming
[1]http://acsupport.europe.umuc.edu/~meink
Abstractions for Mobile Computing”,
ej/inss690/zimmerman/INSS%20690%
IEEE Trans. on Software Engineering,
20CC%20
24(2): 97-110, February 1998.
%20Mobile%20Computing.htm.
[8] Anup Talukdar, et al., “On
[2] G.S. Blair, “The role of open
accommodating mobile hosts in an
implementation and reflection
Integrated Services Packet Network”,
supporting mobile applications”, in
IEEE Infocom, April 1997, pp.1048-
Proceedings of the 9th International
1055.
Workshop on Database and Expert
[9] CiiT International Journal of
Systems Applications, 1998.
Networking and Communication
[3] J. Flinn and M. Satyanarayanan,
Engineering,Vol 3,0974-9713/CIIT–
“Powerscope: A tool for profiling the
IJ-2504. Digital Object Identifier No:
energy usage of mobile applications”,
NCE122011001
in Proceedings of the Second IEEE
[10]
Workshop on Mobile Computing
http://www.doc.ic.ac.uk/~nd/surprise_
96/journal/vol1/ vk5/article1.html

560

You might also like