| |
|[pic] |
| |
|Cebu Institute of Technology - University College of Computer Studies |
| |
|Mobile Computing | Vic Noe Ivan Borla.,BS Computer …show more content…
Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f. …show more content…
Let 's face it: nothing beats a clipboard or a legal pad when you 're standing in a patient 's room or leaning on the hood of a car. A pen tablet computer might just change your mind. It 's the same convenient form as a clipboard but with the power of a full-featured PC and an eye-opening color screen. Suddenly, you 're tapping up records from a database, scribbling down client info, wowing customers with custom suggestions or advice for them based on their purchase history .All this with the same natural ease of a clipboard. True PC portability: it 's finally