What is Mobile Computing

Mobile Computing is the technology that allows users to share data such as documents, audio, video, message, etc., without connecting with the central network or server or through any physical link. It allows users to perform tasks anytime and anywhere using mobile computation devices. These devices can communicate with each other through wired or wireless.

In a mobile computing system, a group of devices can connect with each other through mobile communication protocols. Those devices that use mobile Computing for computation are known as mobile. Smartphones, portable laptops, tablet PCs, Personal Digital Assistants are some of the examples of mobile computing devices.

Some Basics Theories involved in mobile Computing are as follows:

  • Mobile Communication: How do mobiles communicate with each other? Mobile computing devices use radio waves to share data, and these signals are transmitted through the air to the device that is capable of transmitting and receiving the same kind of signals. Infrastructure is built to achieve a seamless and reliable connection between mobile computing devices that refers to how the devices are placed, how the services and bandwidth are being used, and protocols for sharing data faster and error-free. The aim is to make a collision-free system so that there is no collision between the system devices using the same service and bandwidth.
  • Mobile hardware: Mobile hardware includes all the mobile computing devices such as smartphones, keypad phones, tablets, iPad, portable laptops, etc. These devices should have a receptor that senses the signals and can receive them. These devices can communicate with each other in full-duplex means they can send and receive the signals simultaneously using the existing network and protocols. As a result, they do not need to wait for other devices to wait for a device to finish the transmission for the other device to start communication.
  • Mobile Software: We require system and application software to use mobile hardware. System software allows you to use the system hardware and application software provides you with an interactive graphical user interface that runs on the system hardware. This software is built to make it user-friendly for such portable devices. As a result, users can easily communicate from anywhere and do not attach to a single location. Examples of system software are iOS, Windows, Android, Linux, Unix, etc. Examples of application software are WhatsApp, Word, File Manager, calculation and communication software such as calculator, phone, etc., video and music player software, etc.

In Mobile Computing, along with mobile phones, different devices are built to support mobile Computing. We can categorize them into the following categories.

  1. Smartphones: Smartphones are one of the most advanced technologies that support multitasking. Smartphones support more feathers than personal digital assistants (PDA) devices. Some of the features of smartphones are listed below:
  • Portable: A user can carry their smartphone anywhere and use it for computation.
  • Multitasking: Smartphones are capable of running multiple programs simultaneously.
  • Easy to Access: Smartphones are operable via screen touch, and they are less-complex devices. Application software makes smartphones easier to access, perform computation, and browse web applications.
  • Internet Connectivity: Smartphones also support internet connectivity. A user can connect to the internet using mobile data or wi-fi, which gives a great advantage to a user to connect and share data with the world.
  • Multiple OS: Smartphones can support more than one OS, depending on how it was built. Different kinds of Operating systems are available in the market that we can install on these phones.
  1. iPads or Tabs: These devices are greater in size than smartphones and provide a high-resolution screen. They support all the smartphone features such as high internet connectivity, browsing, streaming, etc. They are operated via a screen-touch feature. They are more powerful devices than smartphones. Users can use these devices to edit documents, video and audio streaming, attend meetings, transfer data, etc. They support the same features as a portable computer and support mobile Computing.
  1. Personal Device Assistant (PDA): These devices are used as electronic organizers and planners. These portable devices can share data with computer systems using the process or service known as synchronization. They use Bluetooth and infrared to establish the connection, and Bluetooth and infrared connections help the devices be synchronized. A user can use PDA to access the internet, listen to audio clips, watch videos, and edit documents. A PDA also supports screen-touch for input-output processes.

Advantages of Mobile Computing

  1. Portable Devices: Mobile computing devices are portable in nature. Every user can take their devices and work from anywhere while the connection is available. This feature allows users to perform their different tasks simultaneously without being in a fixed location. Some of the Main advantages of Mobile Computing are as follow:
  2. Faster and Save Time: These devices are built for different users; one can hold a faster mobile computing device than the other as needed. These devices allow faster editing and sharing of files and data through wired or wireless connections. These features of mobile computing devices save a lot of time, such as traveling time. It also reduces unnecessary expenses and is used for telecommuting.
  3. More Productive: Mobile computing devices are more productive than many other devices. These devices are used from any location depending on the work and internet connectivity, and the users can benefit from them and increase the productivity of their work conveniently.
  4. Help in Business development: A mobile computing device allows users to do business-related work. These devices are used to store big companies' data secure business meetings using video and audio conference calls that reduce travel expenses and presentations. These devices also provide a one-to-one and many-to-many secured connection to share information and links without worrying about data loss and security breaches. These devices are also useful in making secured authentication or login security system. And this system can be controlled from anywhere, and whosoever has access can control it and allow the only legitimate user to enter or access the system.
  5. Used for entertainment purposes: One can use a mobile computing device for entertainment purposes. A mobile computing device can stream, record, edit, and store audio and video files. One can use these features to share the audio and video files with others. These features are more useful with the availability of an internet connection. When a high-speed internet connection is available, one can use it for entertainment purposes, such as browsing videos and audios from different platforms, watching and browsing news on YouTube, websites, etc.
  6. Used for Research: With the availability of different and advanced features, mobile computing devices are also used for research purposes. One can use these devices to analyze their data from their convenient place such as home or workplace, and one can carry these devices to collect on-field data as they are portable in nature. It gives a great advantage to the researchers, especially those doing field research, and they can collect and analyze the collected data where they are collected or at the office.
  7. Tracking: These devices also support the Global Positioning System (GPS), which is useful in tracking. If one loses their device, they can easily track the location where it was lost from anywhere and can bring it back. As a result, the data and expenses loss can be settled.
  8. Communication Purpose: These devices are used to communicate with others. They provide a fast one-to-one or many-to-many communication network that allows for faster sharing of information and data between different clients and business leaders. They also support sim cards which are used for communication.
  9. Advanced Secured System: Any security breach could result in a big loss in money, time, customers, data, partners, the company’s future models, plans, etc. Especially, companies with the maximum number of centers, branches, and clients have higher risks of the security breach. These security breach risks are reduced by using updated mobile devices and advanced security systems.
  10. Short message service (SMS): An SMS helps reduce the communication gap between two individuals. The great advantage of SMS is that it helps keep users updated about new offers, individual updates, and other services. A company uses SMS to share the new details of the company's product and service with customers.

Disadvantages of Mobile Computing

Some disadvantages arise with mobile Computing. Some main disadvantages are described below:

  1. Required Internet Connection: Anyone requires an internet connection to benefit from mobile devices. Low signals and bad weather disconnect these users from others, and in the longer term, it could lead to a big loss. Also, having an internet connection is costly, and you need to pay a significant amount of money for the same. And it is not possible to have internet connectivity everywhere.
  2. Charging Issues: These devices are only operable on a battery. Updated and new devices come with longer battery backup. Using these devices for the long term without having a charging connection is difficult. Sudden battery down can be scary, especially when communicating with clients and business leaders. And one cannot use a mobile computing device with no battery charger, and if you are away from your home and office where there is no power connection, it makes it difficult for a user to charge their device and use it.
  3. Security issues: There are some security issues with mobile Computing too. Mobile devices must connect to the internet, which gives a cyber attacker many opportunities to attack the devices and steal the data. The attackers can attacker the devices using different methods. They can send malicious links through messages or emails. The same malicious link can be present on any unsafe website, or they can hack the social media accounts after finding id and password. Always protect yourself from any malicious activities and use different login credentials for each account.
  4. Not easy to use: One will find it difficult to use if someone is unfamiliar with such technology. Once a person gets exposure to the features, it becomes easy for the particular person to use. Sometimes complex devices are built for a particular group of people, and they are provided training to use the devices in the right way. These devices are generally built for defense teams and high-profile communities.
  5. Wrong use: Anyone can use these devices to perform malicious activities. A VPN service has its pros and cons. One of the features is it supports the virtual private network (VPN) service. This feature allows users to hide their identities and use the internet as anonymous users. This feature is used for good and bad purposes. Using the VPN services, one can protect its identity from being stolen, and one can access unauthorized or illegal content.
  6. Traffic and Bandwidth issues: Often, cybercriminals use a group of compromised computers (Mobile Computing Devices) known as a botnet to attack the target server. They send a large volume of traffic to the target server and make it unavailable for legitimate users. They also consume all the bandwidth available, and other users do not get access to the particular service. And one more thing: some apps in our phone run in the background without our knowledge, consume all the data, and increase the expenses or mobile bill. We can easily find such apps, and further, we can block or uninstall them.

Types of Mobile Computing

Different types of Mobile Computing Technologies/Services are as follow:

  1. Short Messaging Service (SMS): It is a text messaging service supported by mobiles, tabs, and other mobile devices. One of the best communication protocols allows users to communicate with others or send and receive text or voice messages. It was originated as a part of the Global system for mobile communication (GSM) series of standards. SMS is user-friendly and an effective way of wireless communication. The short messaging service does not require an internet connection and allows users to send short messages of not more than 160 characters in lesser time.
  2. Global Positioning Service (GPS): The satellite-based navigation system is global positioning. We use this service to get traffic updates and find the best route for our destination in daily life. Using this service, one can find lost things and help everyone on their way to their destination means using this service, anyone can find the location of their destination. The Global positioning system consists of three main parts; one is the satellite that orbits around earth at an amplitude approximately of 20,200 km, the second one is control stations that keep an eye on the satellite's working and make sure everything is going. The last one is the users or receivers. Our mobile devices receive the information, and also, our vehicles have receivers.
  3. 4G Technology: It is defined as the 4th generation of mobile technology or broadband cellular technology. After 2G and 3G of mobile technology, we use the most advanced technology, i.e., the 4G of broadband cellular network, which many network service providers provide and build 5G. We have sometimes seen 4G LTE, nothing but a single type of 4G network. Since 4G has come, it has changed the way of using mobiles and networks in a very short time. 3G is faster than the 2G network and slower than the 4G network. Using the 4G network, we share the data efficiently and fast from one end of the world to the other end. 4G has made our life easier and saves us valuable time. One of the great advantages of 4G technology is no matter how big our data is. We can easily share at high speed from everywhere.
  4. Wireless Local Loop (WLL): The WLL system is, also known as fixed radio or fixed wireless access (FWA), connects a user to the local telephone station using a wireless link. It uses radio signal or wireless network technology instead of copper cable to connect. There are two types of WLL systems one is Narrowband WLL, which replaces the existing telephone services, and one is broadband WLL that provides a high-speed voice and data connection. It can handle the high-speed data traffic in the local loop system. WLL phones are connected similarly to the code division multiple access (CDMA) cell phones.