Computer Science Research Paper on the Many Aspects of Mobile Business Computing

The Many Aspects of Mobile Business Computing

The mobile computing world is characterized by constant migration for survival. The term mobility is a symbol of desire of moving towards resources or the movement from scarcity. Mobile computing is a platform for creating and managing information free from temporal as well as spatial constraints. The freedom from the constraints gives the user accessibility to process the desired information from different points. The user or the mobile device does not have any impact on information management capabilities of mobile platform. Mobile computing discipline originates from personal communications, which refers to a great variety of the wireless services over small terminal for instance cell phones. Mobile computing is more about physical as well as logical computing businesses that transfer system data from a specific point to another.

In mobile computing small and portable devices are used across wireless networks that are connected to a common server. The devices range from laptops, notebooks computers, tablets, PDAs, and palmtops among other mobile devices (Christophe et al. 120). The phones have a device that receives radio signals installed for the transmission of electronic data. The device also gives mobility to users by creating access and processing of information without worrying of a single or common location. This makes transmission of data and other important electronic information faster and easy hence, users can move from one area to another withoutbeing disconnected as long as they are within the network. With mobile computing, you can receive mails, share files and access the internet regardless of your location.

Among the different computing aspects are mobile communication, hardware and software. In mobile communication translation of data from single fixed points to portable networks occurs. For instance, there is conversion of LAN to Wireless communication.  The mobile hardware refers to the different portable equipment that is easy to carry around for instance PDAs, phones as well as laptops (Friedman et al. 167). Under mobile software, there is integration of application software, which can easily work in those mobile platforms and devices. The three aspects are encompassed in mobile computing. With the coming of mobile computing, users have been able to use their devices as they move. This mobility has given many people the flexibility of moving from one point to another without being disconnected from the main server.

Furthermore, high-end users can be connected regardless of their location in the world with the use of satellite- based technology. On the other side, the network is not easily affordable and it may take more time before it is fully embraced. Mobile computing has many advantages compared to other systems. In the first place, it is mobile and it can help users when they are on the move. This mobility ensures that, it is easy to use such connections without having to think much about connections as connection works from a common server. Additionally, the networks are easy to set up, as they do not need any physical infrastructure for connection. Wires are not useful for connecting as you just need wireless connection that does jot rely on the use of cables. Mobile computing also offers the capability of easily moving from one mobile device to another network with ease (Regalado & Antonio 70). This is simply because it does not need any specific or fixed connection. Mobile network cannot be affected by any disaster and is always stable than any other network during such times as it can remain alive and working through out without any problems of data and information transmission.

Permanent networks cannot offer such advantage, as they are fixed and not easily portable. They can be interfered with during times of disasters making communication hard during such instances. Ad-hoc networks can easily be created during disaster management or even military operations without setting up mobile infrastructure, as it does not rely on any support. Mobile computing has also eased the means of communication and sharing of information between mobile users as it gives every user a chance to communicate on the move. This way, people are able to save a significant amount of time working as they can communicate even when travelling. The fixed mobile network cannot provide this advantage, as there is need for infrastructural support and without it, communication will always be impaired (Ularuet al 46). Mobile co putting is also effective in terms of costs as there is no money need to do installation unlike networks that need wires to function. This has increased effectiveness and efficiency of data transfer and communication.

However, mobile computing has some few challenges and users must beware of them when they are using the products. The first limitation is in terms of bandwidth, which is a major challenge to its users. Since the number of mobile devices is increasing everyday and the bandwidth is no changing, there is crowding in the mobile network and in turn, the network becomes slower than other wired transmissions (Vizard &Michael 10). Moreover, transmission can be interfered with because of factors like fog, dust, buildings and other barriers, which can reduce the signals. This can make communication difficult and give users a hard time. Another challenge is the size of mobile devices, which makes its hard to improve their performance while obeying their size limitations as they have to portable (Christophe et al 117). While doing mobile computing, there are different constraints that users face including technical problems. In some instances like using mobile phone dependent on the public network, leaks may result posing security issues therefore proper use of VPNs is crucial. Moreover, power is consumed in the process because the grid cannot be used and the only reliable source is battery power. The batteries may be very expensive costing the users a lot of money. It is due to this reason that battery power should be carefully used to ensure that the technology could be utilized better. Weather, terrain issues, and distance of limited connection are other challenges that are associated with the technologies. Another shortfall of the technology is that, reception of network in tunnels or buildings can be very poor. There is no potential health effect linked to the cellular emissions.

Health problems can result from electromagnetic interferences although the problems are yet to be proven. Well, the first step to cure should be precaution when handling such technology. Training can help in the case of handling the computing devices to minimize the problems. The devices rely on batteries to keep them alive. Therefore, powerful batteries are required to keep are needed for a longer service. Manufacturing heavy batteries that can keep charge for a long time is not easy because portability of the devices does not allow that. Mobile devices are also easy to hack and very strong security standards must be maintained to keep the devices secure across the line of data transmission. The small sizes if the devise and the limited number of keys gives the users many difficulties making life usage hard (Yoo & Youngjin 222).

The strength in the signal of the network keeps on changing constantly and this leads to breakdowns in connections. The varying signal strength slows mobile connection and this posses some difficulties to the users. The mobile devices require systems to be put in place so that they can connect to other mobile devices in the same network. There is also a bad effect on the heath of humans because of the dangerous signals emitted by the devices. The scraps of the devices and the used batteries can pollute the environment when they are dumped as waste. This is a challenge to environmentalsustainabilityinitiatives.

The world of mobile computers is tremendously spreading compared to the other consumer technologies. In the USA for instance, smartphones have created another label that consumers and researchers are referring to as the “late majority” and close to half of the approximated mobile phone-users have the technology (Friedman et al. 179). The mobile voice communication has been extensively established across the globe and the number of subscribers is increasing day by day over the various cellular networks in the past few decades. Mobile computing is advantageous since it easy to send as well as receive data on the networks. The technology has evolved rapidly allowing users to exchange data even in remote areas or in fixed locations. This characteristic has given many people in business a chance to communicate as they are on the move. The current cellularnetwork architecture has gone through a number of changes before attaining stability. In the first place, telephony set off after the cellular technology was introduced which, led to the effectiveutilization of frequencies making connections wide and fit for many users. Although analogue technology was widely used in the 1980’s, the digital age replaced it in the 1990’s with the coming of the GSM technology, which became a widely acceptable system across the world (Regalado 68).

The cellular network is made up of mobile users that are interlinked and connected to a common fixed point and allows access to network. This technology is incorporated in a different transceivers referred to as Base Station whereby every BS should be ;located in a strategic position to cover a certain area thus the name cellular communication. The MSC or the mobile switching center consists of a number of cells assembled together and it corresponds to a BSs communication through the MSC. MSC is responsible for routing as well as switching from originator-designator. It performs the management of the MSC by routing, setting up, and terminating calls. The frequencies that make up the MSC are different and they vary from one cellular network to another (Ularuet al 46). Each of the cells has some channels that are linked to it which are assigned to different subscribers.

Data communication refers to the exchange of data over network communication. Data encompasses different applications that include transfer of files, facsimile, mail, and internet access over the WWW (ben). This kind of communication has been realizedusingdifferent networks like PSTN, ISD and ATM modes. Such networks are either digital or analogue and theyuse either circuit or packet switching. Circuit refers to a switching where data uses a prescribed route from one user to another. If such links are busy, there is no proper transfer of information and messages, whichresults to failure or delays in transmission. In packet switching, there is a better use of the current network through splitting of messages into packets (Yoo & Youngjin 213). Different packets contain information of the sender or receiver.

The invention of mobility in data communication needed a shift from the PSDN to networks that are compatible with mobile phones. One of the commonly used is the virtual circuit system. This means that packets can be channeled through a common and it needs use of muchequipment.The mobility that was implemented across data communication has had a very great influence in communication over voice communication. The mobiletechnology givesusers a chance to move from one point to another without having to remain in static point.

The current mobile communications is greatly dominated by the CDPD technology ad other alternative technologies such as Wireless, Radio and cellular. This technology has more advantages compared to the others. Its principle is found in its usage of free time within voice signals. Another advantage of the system is that the idle time is not chargeable and cost of transmittingis low compared to other networks. It can be a very useful network for business individuals today.

The system makes connection easy for both fixed and mobile device users as it uses a fixed link across the network. Conversely, fixed users have a common link attached to the CDPD and it is easy to connect to existing networks through the network (Yoo & Youngjin 227). Service coverage remains a crucial aspect in the provision of efficient wiring solutions to mobile users with this method to achieve the objective. Data packets in this instance are put voice frequencies at the idle time on the signals in the hierarchical network. The CDPD hierarchy consists of different levels. The first part is the Mobile user interface. This is a system that is used for transmitting data as well as voice signals connected to the RF modem, which can either forward or reverse channels through the MSK modulation. In the hierarchy is also the mobile data base point or the MDBS. Each cell in the reception area has MDBS used in detecting idle time across the voice channels to relay data from mobile units to mobile data intermediate system.

In detecting idle time, a scanning receiver is used to detect voice traffic by taking measurement of signal length on a certain frequency and then it detects idle channel. Relaying data packets across the network creates RF links between end users and the units. The two channels are significant in realizing a bidirectional communication. One of the channels works in the forward way and the other unit work in the reverse direction and the units on the reverse link cannot network with each other. The Digital Sense Access is important when accessing reverse channels. The protocol gives way to collision of two packets of data along a certain channel that can be easily detected on the mobile unit to relay transmissions. The speed of MDBS makes the CDPD invisible to the cellular network and makes sure that there is no interference on the transmission on the voice channels.  Mobile data intermediate system forms a group of MDBS that are under the control of different cells across the network reception area within the higher level of the hierarchy. 

The CDPD network is very reliable and some actions are required to make it work excellently. First is the user authentication, which is a procedure that scans the identity of a subscriber over the radio path in the network. User anonymity represents the identity of a user within a network. Fraud prevention is also required to protect users against impersonation and fraud. Data protection is also essential as it helps in hiding the identification key within the network for maximum data security. Mobile computing has many areas of application and it has been a prime mover of businesses in the world today (Yoo & Youngjin 213-231). Mobile computing is essential in many fields s it helps in effective use of time and resources. Proper utilization of resources ensures that there is substantial saving in transportation and other costs. The technology has been helpful in many businesses such as real estate, emergency services, in courts, in companies, stock control, and credit card verifications.

Furthermore, wireless carries are making money on a great scale. Globally, around 1000 mobile companies make more than $ 1.3 trillion revenue per year and this is multiple times the revenue of Google, Microsoft, and Apple Inc (Christophe et al 120). In the present world, viewing the lines on technology analyst’s cancel and collide is turning out to be a spectator sport with smartphones outselling personal computers and touchscreens selling more than keyboards in the industry. This is evident even on Google search where many people are using their smartphones to do searches instead of their PCs. Large mobile companies are reacting to this with very huge and bold steps.

Mobile computing world gives certain physical computer businesses, which shift locations when needed. The logical entity represents instances of running applications or even mobile agents, which are essential for automatic configuration of devices. Apparently, this makes mobile agents flexible to migrate wherever they want over the internet.

Different wideband platforms and other data systems are developed and they can accommodate internet as well as multimedia services. Such systems cannot be incorporated within this subject. Wireless channels are essential in processing information between different computing platforms. Further, the units are free from spatial constraints. This means that a user is able to move from one position to another while being connected to a server. Temporal as well as spatial flexibility is a powerfulplatform that allows users to access the data storage and processing site regardless of the location (Friedman et al. 169). Offices usually use this capability in setting their offices across different locations without having to move or create another network in those locations.

Mobile computing has evolved over a long period and it is not just quick as many people may think. The followingcan be used as a summary of the historical milestones recorded in the mobile computing systems. In 1928, the mobile radio system was invented. It was a simple system, which was first used in Detroit at a police station (Ularu et al 40-52). Furthermore, 1935 marked the invention and testing of the frequency modulation system. The mobile system also developed and in 1943, the mobile telephone service was introduced. This system was a composition of broadcast system using a power transmitter. The system was also followed by limited cellular networks which saw the implementation o the first mobile radio platform for connecting with telephone numbers from a fixed point. In the 1950’s the paging system came into use and it is during this period that Bell Labs were used to check cellular techniques. In 1970, FCC selected spectrum space, which incorporated cellular systems, and the advance mobile platform was discovered. In 1983, cellular service was introduced in Chicago.

In facilitating data management and other activities, mobile computing system laptops, cell phones are useful for personal digital assistance. In the current technological advancement only gives users with limited information processing capabilities although it is expanding to capture other mobile devices. Mobile connectivity provides a wide spectrum existing between two points in a wireless channel that can be easily used without spatial constraints (Yoo & Youngjin 213-231).

Nomadic computing can be defined as limited migrations where by migration usually occurs at a slow speed inside a building. Other forms of nomadic access can be interleaved user relocation patterns and indoor connection. For instance, it can be said that users who carry laptops that use DIAL UP broadband connections also engage in nomadic computing. If a user wants access to a specific network like internet, wireless WAN system telephone, which is a bit slower, is suitable alternative. Furthermore, high speed LANs are not readily available but only on specific web platforms.

The future of mobile computing looks bright and exceedinglyexciting with the promising technological advancement in integrated circuitry, increase in computer processing speed, and artificial intelligence (Friedman, Jon, and Daniel 159-180). With the increasing emphasis of small mobile PCs, mobile computers can practically be reduced to a small size that can be hand held. Artificial intelligence also is used as personal secretaries for receiving emails, paging, and change individuals schedule depending on the message. Mobile computing will further a great impact on the working lifestyles of many people as it is possible to work from home instead of commuting which is also beneficial to the environment because pollution will be reduced. The mobility aspects will also be applicable to people in different spheres such as interaction through mobile stations.

Mobile computing can be termed as generic that explains the ability of people to use technology as they move unlike portable computer devices. Distributedcomputing relies on static network of wires and therefore it is more secure in comparison with the other computing mechanisms.

Works Cited

Christophe, Benoit, et al. “Mobile Execution Environment For Non-Intermediated Content Distribution.” Bell Labs Technical Journal 15.4 (2011): 117-134

Friedman, Jon, and Daniel V. Hoffman. “Protecting Data On Mobile Devices: A Taxonomy Of Security Threats To Mobile Computing And Review Of Applicable Defenses.” Information Knowledge Systems Management 7.1/2 (2008): 159-180

Regalado, Antonio. “Mobile Computing Is Just Getting Started.” Technology Review 116.3 (2013): 69-70

Ularu, Elena Geanina, et al. “Mobile Computing And Cloud Maturity – Introducing Machine Learning For ERP Configuration Automation.” InformaticaEconomica 17.1 (2013): 40-52

Vizard, Michael. “Mobile Computing May Be The Best Gift For The Channel.” Channel Insider (2013): 1.

Yoo, Youngjin. “Computing In Everyday Life: A Call For Research On Experiential Computing.” MIS Quarterly 34.2 (2010): 213-231.