Mobile Computing is the ability to transport an interactable computer during use. Mobile Computing deals with mobile communication/hardware/software. Mobile computers have their drawbacks, some of them include: Slow connection due to indirect connection to the internet, Safety risks due to frequent use of public networks, Weak working span due to inconstant access to a power generator, Mostly anything can interfere with the connection, May cause potential health hazards and The inconvenience with using the input. More and more users and businesses use smartphones as communication tools but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like SMS, MMS, wifi networks, and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. Finally, there are forms of malicious software that rely on the weak knowledge of average users. Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps. A cellular network or mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station. In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth within each cell. When joined together these cells provide radio coverage over a wide geographic area. This enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.) to communicate with each other and with fixed transceivers and telephones anywhere in the network, via base stations, even if some of the transceivers are moving through more than one cell during transmission. Cellular networks offer a number of advantages over alternative solutions: flexible enough to use the features and functions of almost all public and private networks, increased capacity, reduced power use, larger coverage area, reduced interference from other signals.
How can mobile networks be made safer?
What are the future prospects of mobile computing?
How does Ad hoc work?Link 1 Link 2 Link 3 Link 4