Mobile computing

from Wikipedia, the free encyclopedia

Mobile computing is a type of human-machine interaction in which the device used is portable during use. Mobile computing comprises mobile communication , mobile hardware and software. Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols , data formats and specific technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

Definitions

Mobile computing is a technology that allows data, voice or images to be transmitted using a computer or other wireless device without having to be physically connected. Mobile computing mainly includes mobile communication and mobile hardware.

equipment

Some of the most popular mobile computing devices are:

  • Portable computers, compact and lightweight units that contain a full keyboard and are primarily used to use software that can be parameterized, such as laptops, notebooks, notepads, etc.
  • Cell phones that have only a limited keyboard, primarily for voice communication, but not limited to that, such as cell phones, smartphones, phablets, etc.
  • Smart cards , which can contain various applications, primarily intended as a means of payment, for travel or as security access
  • Wearable computers , mostly limited to a few function keys, primarily intended for software agents, such as watches, bracelets, necklaces, buttonless implants, etc.

The existence of these classes should be long-lasting and complement each other in personal use. None of the classes are intended to replace another in all characteristics of use.

Other types of mobile computing devices that have appeared since the 1990s:

  • Portable computer (discontinued), a simple computer that can be easily moved from place to place but cannot be used on the way. This is mostly due to the fact that it has to be set up in some way and requires a power connection. The best-known example is the Osborne 1. Portable computers are also called "transportable" or "luggable" PCs.
  • Personal Digital Assistant / Enterprise Digital Assistant (PDA) (discontinued), a small computer with limited functionality. It should complement a desktop PC and synchronize with it in order to get access to contacts, address books, notes, emails and other information.
  • Ultra-Mobile PC (discontinued), a fully functional computer the size of a PDA running a general-purpose operating system.
  • Laptops combine the components, input and output options and capabilities of a desktop PC including screen, speakers, keyboard and pointing device in one unit.
  • Smartphones have a large number of functions and offer many options for installing additional applications ( apps ) on them.
  • Robots are mostly electro-mechanical machines that are controlled by a computer program. They can vary from a humanoid shape to medical surgical robots, drones and microscopic nano-robots.
  • Tablet computers do not have a keyboard and are shaped like a blackboard or notebook. Instead of a physical keyboard, tablets have a touchscreen with a kind of virtual keyboard, a stylus or software for handwriting recognition. Tablets are not necessarily the best choice for applications that require a lot of writing, but otherwise they can do most of the tasks of a normal laptop.
  • Wearable computers are small electronic devices that the user can wear under, with or over clothing. Examples of today's wearables are activity trackers such as Fitbit or Google Glasses.
  • Carputer are installed in all cars. They work as wireless computers, sound systems, GPS and DVD players, contain speech processing and are compatible with Bluetooth.
  • Pentop (discontinued) is a calculating device the shape and size of a pen. It works as a writing instrument, MP3 player, voice translator, digital storage device, and calculator.
  • Application- specific computers are computers that are tailored for an application.

The boundaries between these categories are sometimes very fluid.

restrictions

  • Range and bandwidth: Mobile Internet access is generally slower than direct cable connections. Technologies used here are GPRS or EDGE , currently also HSDPA and HSUPA , 3G and 4G networks, as well as the new 5G network. These networks can usually be reached within the range of a commercial cell phone network. High-speed wireless networks are inexpensive but have a very limited range.
  • Security standards: If you work on the go, you are dependent on public networks, which makes careful use of a VPN connection necessary. With regard to mobile computing standards, security is very important. A VPN connection can be attacked very quickly across numerous networks.
  • Power consumption: If there is no power outlet or a portable generator available, mobile devices only have to get by on their internal battery. This in connection with the compact size of mobile devices often means the use of very expensive batteries in order to obtain the necessary long battery life.
  • Transmission interference : Weather, terrain and the range of the next signal point can all affect signal reception. Reception in tunnels, some buildings and rural areas is often very poor.
  • Potential Health Risks: People who use the mobile devices while driving are often distracted from driving and may therefore be more likely to be involved in road accidents. (Although this seems obvious, there is still some debate as to whether banning the use of mobile devices while driving would actually reduce the number of accidents.) Cell phones can also affect sensitive medical devices. There was also the question of the health effects of mobile radiation.
  • Human-device interface: Screens and keyboards are usually very small, which makes them difficult to use. Alternative input methods, such as voice input or handwriting recognition, require practice.

Computers in vehicles or entire fleets

Many commercial or government forces use rugged portable computers within their fleets. This requires a firm connection between the device and the vehicle for driver safety, device safety and ergonomics . Robust computers are designed for strong vibrations in connection with large service vehicles and off-road journeys, as well as for the conditions of continuous professional use in emergency medical , fire or public safety matters. Other circumstances that can affect its function in vehicles:

  • Operating temperature : A vehicle cabin can often have temperature ranges from −29 ° C to 60 ° C. The computers must be able to withstand these temperatures during operation. Typical fan-based cooling systems have a limit of 35 ° C to 38 ° C ambient temperature and temperatures below freezing point require heating devices to bring the components up to operating temperature.
  • Vibrations: Vibrations can reduce the service life of computer components, especially storage devices such as HDDs .
  • Visibility: Standard screens can be very difficult to read in bright sunlight.
  • Touchscreen: Users of touchscreens often use them without taking off their gloves.
  • Batteries for high temperatures: Lithium-ion batteries are sensitive to high temperatures when charging. A computer that is to be used in such a mobile environment must be designed in such a way that it has a high-temperature charging function and only charges the battery to 85% or less.
  • External antennas: External antenna connections go through a typical metal vehicle cabin, which would block a wireless connection. It also enables more suitable external communication and navigation equipment to be used.

Security issues

Mobile security is becoming more and more important in the field of mobile computing. Special attention is needed as it concerns the security of personal information that has now been stored on the smartphone . More and more users and companies are using smartphones as a means of communication, but also as a tool for planning and organizing work and private life. In companies, these technologies cause profound changes in the organization of information systems and have thus become a source of new risks. Smartphones store an increasing amount of sensitive information, access to which must be controlled to protect user privacy and corporate intellectual property . All smartphones and computers are targets of attacks. These attacks use weaknesses in smartphones that come from communication channels such as SMS , MMS , Wi-Fi networks or GSM . There are also attacks that exploit software weaknesses in web browsers and operating systems. There is also malware based on the poor knowledge of the average user. Various countermeasures have been developed and applied to smartphones, from various layers of security within the software to the dissemination of information to end users. There are good ways to monitor all levels, from user design to operating system development , software layers , and downloadable apps.

Mobile data communication

Wireless data connections used in mobile computing come in three different forms. Mobile data services use technologies such as GSM , CDMA or GPRS or 3G networks such as W-CDMA , EDGE or CDMA2000 or currently 4G networks such as LTE or LTE-Advanced . These networks are usually reachable within the range of commercial radio towers . Wi-Fi connections offer higher performance and can be reached either via a private network or via public hot spots . They typically have a range of around 30 meters indoors and up to 300 meters outdoors. Satellite connections cover areas in which mobile networks or Wi-Fi connections are not available and can be established wherever the satellite can be targeted . For satellites in geostationary orbit , this means having an undisturbed view of the southern sky. Some companies combine networks from multiple mobile networks or use a mixture of mobile network, Wi-Fi and satellite connection. If a mixture of networks is used, a mobile VPN not only takes care of the security risks , but also takes over the login process into the various networks and maintains the connection of the application in order to prevent connection or data loss during network changes or supply gaps.

Mobile computing as a subject

Mobile computing has established itself as a subject at universities. Bachelor degrees in Mobile Computing are available at the following universities:

See also

Individual evidence

  1. Carputer Articles on Engadget Engadget. AOL. Retrieved March 30, 2016.
  2. ^ Gear Diary, "The FLY Fusion Pentop Computer Review. October 07, 2007. Retrieved March 30, 2016.
  3. Hands Free Cell Phones No Safer, Insurance Study Claims. Accessed March 30, 2016.
  4. Study: Distractions, not phones, cause car crashes CNET. CBS Interactive. Retrieved March 30, 2016.
  5. Getting to Know Wireless Networks and Technology Lachu Aravamudhan, Stefano Faccin, Risto Mononen, Basavaraj Patil, Yousuf Saifullah, Sarvesh Sharma, Srinivas Sreemanthula.InformIT. Retrieved March 30, 2016
  6. ^ What really is a Third Generation (3G) Mobile Technology ITU. Retrieved March 30, 2016.
  7. ^ Wireless Network Industry Report Jim Geier. Wireless Nets Ltd. Retrieved March 30, 2016.
  8. ^ Satellite Internet Bradley Mitchell. Retrieved March 30, 2016.
  9. Mobile VPN: Closing the Gap Lisa Phifer. SearchMobileComputing.com, July 16, 2006. Retrieved March 30, 2016.
  10. ^ Lost Connections Roger Cheng. The Wall Street Journal, December 11, 2007. Retrieved March 30, 2016.