Pen-Based Mobile Computing

2009 ◽  
pp. 998-1003
Author(s):  
Bernie Garret

The original idea of a portable computer is credited to Alan Kay of the Xerox Palo Alto Research Center who suggested the idea in the 1970s (Kay, 1972a, 1972b; Kay & Goldberg, 1977). He envisioned a notebook-sized portable computer named the “Dynabook” that could be used for all of the user’s information needs and using wireless network capabilities for connectivity.

Author(s):  
B. Garret

The original idea of a portable computer is credited to Alan Kay of the Xerox Palo Alto Research Center who suggested the idea in the 1970s (Kay, 1972a, 1972b; Kay & Goldberg, 1977). He envisioned a notebook-sized portable computer named the “Dynabook” that could be used for all of the user’s information needs and using wireless network capabilities for connectivity.


Author(s):  
Bernard Mark Garrett

The original idea of a portable computer has been credited to Alan Kay of the Xerox Palo Alto Research Center, who suggested this idea in the 1970s (Kay, 1972a, 1972b; Kay & Goldberg, 1977). He envisioned a notebook-sized, portable computer named the Dynabook that could be used for all of the user’s information needs and used wireless network capabilities for connectivity.


2019 ◽  
Vol 118 (7) ◽  
pp. 27-33
Author(s):  
P.Prasanya Devi ◽  
R.S. Kannan ◽  
M. Ravindran

In this paper, we describe Wireless networks have seen unprecedented rise in their size and number of users in recent years. This unprecedented rise is attributed to the rise in the number of mobile computing devices. Moreover the amount of data that is handled by these wireless networks has increased in recent years. One such wireless network that is widely used but is still prone to attacks is WiFi. Wi-Fi protocol (IEEE 802.11), over the years has been upgraded many times, but these upgrades have mainly resulted in increase in the overall data rate of the communication. Little has been done to improve the security of the protocol. This research focuses on inherent flaws in Wired Equivalent Privacy protocol (WEP) used by the 802.11 standard, Temporal Key Integrity Protocol (TKIP) which is considered an interim solution to legacy 802.11 equipment. The demand for ubiquitous personal communications is driving the development of wireless networks that can accommodate mobile voice and data users who move throughout buildings, cities, or countries. The objective of this chapter is to provide the fundamentals of wireless networks so that the general readers can be able to easily grasp some of the ideas in this area.


Author(s):  
Mahabubul Alam ◽  
Salam Salloum ◽  
Mohammad Husain

Network management is a critical component in both wired and wireless network. In wireless networks, the network dynamics changes rapidly and the network management information needs to be updated frequently. Due to its structured form and ease of usage in communication, eXtensible Markup Language (XML) is preferred as a configuration and logging tool in network management. However, it is convenient to use relational databases such as SQL to store and process data of wireless network management where frequent updates are necessary. In this paper, the authors show an automated method of converting XML documents to store in relational. We have implemented a proof of concept and compared performance to existing approach.


2000 ◽  
Vol 1 (4) ◽  
pp. 705-714
Author(s):  
Urs Von Burg

In 1973 at Xerox's Palo Alto Research Center (Xerox PARC), one of the first local area networking (LAN) technologies was invented: Ethernet. Today, Ethernet is the dominant LAN standard but, as is the case with most other information technologies, Ethernet was neither the only available alternative nor a technology well suited for all networking needs from the outset. In fact, when it was first commercialized in 1980, Ethernet was a relatively expensive, high-end technology, suited for connecting minicomputers or workstations but too expensive for connecting microcomputers or personal computers (PCs), soon to be the largest LAN market.


Sign in / Sign up

Export Citation Format

Share Document