Preview

Mobile Database

Powerful Essays
Open Document
Open Document
2490 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Database
MOBILE DATABASE

CONTENTS

| Page No. | i. Abstract | 3 | 1. Introduction | 3 | 2. Background | 4 | 3. Mobile Database Architecture | 5 | 4. Technique to Secure database 4.1 Data Synchronization 4.2 Mobile transaction 4.3 Embedded database 4.4 Authentication from the Web Server 4.5 Data Privacy 4.6 Adaptability to Middleware 4.7 Communication 4.8 Data Encryption at client side | 67788991010 | 5. Resisting the attack | 10 | 6. Conclusion | 11 | ii. Reference | 12 |

Abstract This report is on the results of mobile database. As there was decrease in normal computing devices with consummations of the power, which lead to the concept of wireless i.e. mobile computing. This objective of this report is to check the status of mobile database and to identify research of it. In early 90’s, the work for the mobile database started. Secure data transfer was the main reason introducing wireless PDA, mobile phones, etc. which is connected to nearest mobile station and from there how the data gets transfer from remote access area in the secure manner. This report gives you the complete outline of the participation of the mobile users in synchronization, mobile transaction, data confidentiality, and middleware adaptability.

1. Introduction

There was a field in technology, were computing was the only option for some period of time. As the technologies got developed, the birth of new era with highly dynamic referred as mobile computing. This concept got developed as now a day is decrease in size of machinery and increase in computing users, which are in demand for these machinery to become part of their everyday life. (Thomas Hardjono 1995)

As these mobile computing technologies are evolving day by day, there are different classes of mobile applications, which can be distinguished, from the data management requirement. The common example today is the Mobile Client

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    There are thousands of applications that have been developed for mobile devices which perform a myriad of tasks and processes. In the beginning most of these applications were games. Businesses later joined the mobile revolution and developed their own business based applications to run on these mobile devices. Many mobile business applications can now streamline business processes, reduce operational processing times and provide better customer service. The mobile revolution has forced many industries to reengineer their business processes…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Week 10 Term Paper

    • 3259 Words
    • 10 Pages

    In this term paper, I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to processing server without users having to use a desktop system. Next, I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Following the examination the challenges of developing applications that run on mobile devices because of the small screen size. Then I will describe the methods that can be used to decide which platform to support. Afterward I will discuss ways of providing high availability given that a mobile application requires high availability because of end users needing to have continuous access to IT and IS systems. Last but not least, I will discuss methods of making mobile devices more secure, since mobile devices are subjected to hacking at a higher rate than non-mobile devices.…

    • 3259 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Las 432 Outline

    • 712 Words
    • 3 Pages

    Introduction: Mobile technology is the technology used for cellular communication. It has developed extensively in the past couple of years and the development hasn’t stopped. Mobile technology has had a great impact on the economy, political interests and personal lives of the people, however, it has some cultural and political restrictions and geographical limitations.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ever since the introduction of the first mobile computer device, there has been a growing need and want for more and more mobile computing devices. Once users got the first taste of harnessing the power of the mobile device that was all they needed. Today, you cannot walk down any public road or walk into a public building without seeing users talking and connecting to the internet via mobile devices.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Mobile System Paper

    • 706 Words
    • 2 Pages

    Mobile applications was one of the most intriguing and intelligent things that could have been invented or designed. Mobile applications is software that is designed and made to run on cellular phones such as smartphones, Androids, iPhones, Windows phones, Blackberry phones and phones of that sort. Mobile applications are not only designed and engineered just for phones, they are also designed for tablet computers and anything that is a mobile device.…

    • 706 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Mobile computing and social networks are part of the daily lives of millions of Americans. “48% of American adults own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking at a higher rate than non-mobile devices, methods of making mobile devices more secure will be examined.…

    • 3631 Words
    • 15 Pages
    Better Essays
  • Better Essays

    Today’s technologies allow users to prove their authenticity and with data encryptions allow data to be transmitted safely over the medium. Data encryption should be at a satisfactory level of security to protect against intruders, thus data integrity have been compromised. User authentication must also be present with the encryption and data transmission process to ensure that the data sent are received by authorized receiver. Other than data encryption, a good firewall should also be implemented on the database server to avoid external intruders from accessing unauthorized…

    • 1704 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Mobile computing has revolutionized the way we do business, shop and communicate. Let’s break down briefly how mobile computing has an effect on each of the Porter’s five forces.…

    • 494 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mobile computing is a generic term used to refer to a variety of devices that allow people to access data and information from where ever they are.…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Mobile Computing

    • 1181 Words
    • 5 Pages

    If you were to ask someone 15 years ago what Mobile Computing was they would not of had an answer. Today Mobile computing is one of the most popular ways to use a computing device. Mobile computing is simply a term to describe accessing the internet on the go anytime, anyplace and anywhere. With devices becoming easier to use and more accessible mobile computing is becoming more and more popular every day. Take a look around you and you’re almost guaranteed to see someone on a mobile device checking a social network site and sending an e-mail. “Mobile computing will be the buzz of the next century. From our first breath, as soon as the umbilical cord is cut, the individual is free and untethered. To be tethered is unnatural and soon to be unnecessary for computing environments. Consumers want personalized wireless computing services while they are mobile, and companies want to make money offering those services. The infantile paradigm of mobile computing is opening up new markets never dreamed of before. We are presently at the cusp of the mobile multimedia era. Mobile computing has many advantages but also has many limitations.” (Helal, 2002)…

    • 1181 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    There is a rapid development of technology, mobile phones nowadays can do so much more than merely cellular communication. They have become smarter, not only name-wise, but also application-wise. Incorporating wireless data access technology, mobile phone has brought communications to another level offering mobility to the formerly fixed internet service. Web browsing, online video streaming, emailing and instant messaging previously monopolized by computers are now penetrated by third-generation mobile phones. The wireless data standards are the keys to the world of World Wide Web. The advancement in technology is stated below.…

    • 6751 Words
    • 28 Pages
    Powerful Essays
  • Satisfactory Essays

    In many cases your application may have both client side storage and server side storage and your application will manage the flow of data between the client and server. Many mobile applications are data-centric, and are designed to replace pocket atlases, dictionaries, and references, as well as create new digital pocket references for data that changes dynamically by leveraging technologies that did not exist in these form factors before.…

    • 255 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Today, in the present world of new and advance technologies, mobile devices such as smartphones are rapidly emerging and the demands for this devices are twice as fast as its emerging. One of the ingredients or reasons that make this devices so demanded are its uses through the applications installed in this devices. In this time there are millions of it. Most of this applications are made with the different types of algorithms and this is the reasons behind the success of this applications.…

    • 12464 Words
    • 43 Pages
    Powerful Essays
  • Good Essays

    Mobile computing is human-computer interaction by which a computer is expected to be transported during normal usage.Mobile computing involves mobile communication,mobile hardware, and mobile software.It may form a wireless personal network or a piconet.There are three different classes of mobile computing such a portable computers,Mobile phones and wearable computers.Many types of mobile computers have been introduced since the 1990s including the smartphone , tablet computer and ultra-mobile PC.…

    • 993 Words
    • 6 Pages
    Good Essays