As more and more people enjoy the various brought by mobile computing, it is becoming a global trend in today's world. at the same time, securing mobile computing has been paid increasing attention. During the last decade in the size of computing machinery, coupled with the increase in their computing power has lend to the development of the concept of mobile computing. It allows mobile users versatile communication with other people and expedient notification of important events, much more flexibility them with cellular phones. The many issues to be dealt with stem from three essential properties of mobile computing: communication, mobility and portability. Mobile Computing defines that a device which permits the flow of transmission of data from one computer to another by never been connected to the Physical link layers. Mobile voice communications which is in demands all over the world is having a great increment of the user subscribers to many networks protocols from last two to three years.
I.INTRODUCTION Mobile computing is human-computer interaction by which a computer is expected to be transported during normal usage. The birth of "mobile computing" has signaled a new era in the field of computing and information systems. A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. As wireless communication takes place mainly through the radio signals rather than wires, it is easier to intercept or eavesdrop on the communication channels. Therefore, it is important to provide security from all these threats. There are different kinds of issues within security like confidentiality, integrity, availability, legitimacy, and accountability that needs to be individually taken care off (2). A mobile device is a small computing device, typically small enough to be handheld (and hence also commonly known as a handheld computer or simply handheld) having a display screen with touch input and/or a miniature keyboard and weighing less than 2 pounds (0.91 kg)
The next-generation mobile network will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent personal telecommunication number (PTN) scheme is conducive to implementing such a global mobile system. In this paper, firstly we propose multi tree database architecture consists of a number of database subsystems, each of which is a three-level t also proposes indexing schemes for each type of location databases and analyzes their efficiency and cost in terms of database access time and storage requirement. Tree structure and is connected to the others only through its root. Results have revealed that the proposed database architecture for location management can effectively support the anticipated high user density in the future mobile networks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.