Content area
Full Text
ABSTRACT
Mobile computing is humancomputer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad-hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications. Whenever we talk of the type of services we want to get while we are moving from one place to the other so that the important works which we one person is doing should not get effected. In today's time it is also important to have a close look on the architecture of the mobile computing devices so that the errors while moving from one cell to the other leading to the uninterrupted services. In this paper I have tried to study the different layers present in the architecture of the mobile computing devices. Different layers has various important features, various drawbacks has to be discussed for the uninterrupted services.
Keywords: computing, architecture, drawback
I. Introduction
Mobile Computing can be defined as:
* Mobile computing is "taking a computer and all necessary files and software out into the field."
* "Mobile computing is the ability to use computing capability without a pre-defined location and/or connection to a network to publish and/or subscribe to information."
The tremendous advances in wireless data communication and mobile computing have created a new computing paradigm that promises to provide services anytime and anywhere for everyone. Such an environment enables users to access a wide range of services and applications using a large variety of mobile and ubiquitous devices. Voice and video streaming, file transfers, notification and localization are some examples of applications developed for this environment. In this diverse, dynamic and complex scenario, it is not appropriate to create static specifications for ubiquitous applications. Designers and developers should consider, for instance, hardware limitations, data communication properties, QoS requirements, and security demands when designing services for pervasive environments. Unfortunately, all this information is not promptly available beforehand what leads to a very difficult and challenging design. In any wireless technology, risks are inherent. Some of them are similar to those of wired networks, some are...