Mobile Computing Technology

Mobile computing Technology refers to the definition of multiple layers between user application interfaces, devices, and network hardware. A well-defined architecture is necessary for systematic calculations and access to data and software objects.

Mobile computing usually implies wireless transmission but, wireless transmission does not imply mobile computing. Mobile computing follows some of the attributes. List of attributes are mentioned in this earlier post.

3-Tier Architecture of Mobile computing:-




Each tier is distributed to a different place or places in a network. These tiers do not necessarily correspond to physical locations on various computers on a network, but rather to logical layers of the application.

This is only because of Mobile Computing technology that you can access and transmit data from any remote locations without being present there physically. Mobile computing technology provides a vast coverage diameter for communication. It is one of the fastest and most reliable sectors of the computing technology field.

The concept of Mobile Computing can be divided into three parts:

  • Mobile Communication
  • Mobile Hardware
  • Mobile Software

Mobile Communication

  Mobile Communication Specifies a framework that is responsible for the working of mobile computing technology. In this case, mobile communication refers to an infrastructure that ensures seamless and reliable communication among wireless devices. This framework ensures the consistency and reliability of communication between wireless devices.

 Mobile Hardware

Mobile hardware consists of mobile devices or device components that can be used to receive or access the service of mobility. Examples of mobile hardware can be smartphones, laptops, portable PCs, tablet PCs, Personal Digital Assistants, etc.

Mobile Software

Mobile software is a program that runs on mobile hardware. This is designed to deal capably with the characteristics and requirements of mobile applications. This is the operating system for the appliance of mobile devices. In other words, you can say it the heart of the mobile systems. This is an essential component that operates the mobile device.

Mobile Computing Tutorial

Trust model 

    The basic idea consists of building a trust information system that allows nodes to learn based on the information exchanged with other nodes. The main goal is to make nodes self-configuring, self-adaptive, self-optimized. As a result, nodes are capable of making their own decisions. Moreover, nodes might use the trust information to detect and isolate malicious nodes. The proposed model can be divided in two distinct layers. The Learning layer is responsible for gathering and converting information into knowledge. The Trust layer defines how to assess the trust level using knowledge information provided by the Learning layer. Both layers can interact with all other layers. In this paper, we only describe the Trust layer. 

Nodes with power or storage constrains can choose not to implement the entire trust system. We define three operation modes. Nodes with low power/storage capacity can operate in the simple mode, where they only use the main trust table. Nodes with a medium capacity operate in the intermediate mode, where nodes exchange trust information using the REP protocol and store the trust table of neighbor nodes. In the advanced mode, nodes implement the same features used in intermediate mode and also use the ATT to keep track of additional parameters. 

Comments

Post a Comment

Popular posts from this blog

Website Traffic Analysis