MOBILE COMPUTING AND NETWORK SECURITY

1

Contents 
     

Introduction Latest trends Technology Architecture Applications Network limitations
2

MOBILE COMPUTING
Mobile computing is a generic term describing one·s ability to use technology while moving. Mobile computing can be seen as an integration of portable computers and wireless networks. Mobile computing produces:  Portable computers in computer industry.  Wireless communication in telecommunications.

3

Portability
A portable computing device is a general purpose computer that can be easily moved from place to place. The implications of portability are  Small size  Weight  Dependence on battery  Lower power consumption

4

Wireless communication
Security Concerns ² Authentication is critical » Normal network point of attachment is a wall tap » Wireless access makes network attachment too easy ² Exposure to over-the-air wiretapping » Any transmitter can also be a receiver! » Some wireless networks provide secure air links
5

Latest trends
Mobile computing devices are becoming smaller, lighter and more powerful than their predecessors. two prominent classes of mobile computing devices are  Palm OS  Pocket Pc These devices are capable of simple word processing, spreadsheet applications, web browsing and address management.

6

Technology
Mobile computing embraces a host of portable technologies. From notebook computers to personal digital assistants (PDA)

7

Architecture
Mobility services can be classified into 3 groups.  Common mobility services (CMS)  Mobility management services (MMS)  Special mobility services (SMS)

8

Applications

9

Network
Most handheld computers come with built in infrared ports that can be used to exchange information with a network or a computer at short range. some of the networking examples are Bluetooth, WiWi-Fi, infrared data association, ultra wide band radio. Network design comprises are  Wireless LAN design issues  Wide area radio network design issues

10

Network security
Common security breaches of mobile computing applications include, Network by criminal elements. Physical breach security at communication centers mainly unmanned base stations. Interception of credit card authorization over wireless network. Careful security considerations including on-the-air encryption on-the& firewalls must be used.

‡ ‡

‡ ‡

11

Limitations in mobile computing 
    

Insufficient bandwidth Security standards Power consumption Transmission Interferences Potential Health Hazards Human Interface with devices

12

Quality of data in mobile computing 
 

Mobile computing enables immediate validation of the data It reduces the transcription error for survey like applications Using networking, information can be made available in near realreal-time Very fast turn around time from data collection to analysis and reporting. This can translate into significant cost saving 

13

Conclusion
Mobile computers offer many new options, however there are difficulties to consider. Generally, wireless laptops cost 50% to 100% more than their desktop counterparts. Laptops are also harder to upgrade most proprietary hardware components that limit future options.

14

Queries

15

Sign up to vote on this title
UsefulNot useful