Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
35 views7 pages

Unit1 Mobile Computing

mobilecomp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
35 views7 pages

Unit1 Mobile Computing

mobilecomp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
-Mosire Computin are "Probl (a) What is mobile computing? Write down the applications of mobile computing. (8) What is adaptation in mobile computing? Explain ‘mechanism of adaptation. (EU. 2017) SoL(a) Mobile Computing : Mobile Computing is human “eomputer interaction by which a computer is expected tbe transported during normal usage. Mobile computing ystems | are distributed systems in which communication i facilitated through networks. “Applications of Mobile Computing ice 2 ic mail/paging 1 Transmission of news, road condition. Salesman : ‘Mobile computing system i acoriplex system consisting ‘of both hardware and software components, Its behavior could be represented by a trajectory in a multidimensional space where each dimension represents a domain of acceptable values (called acceptance region) for a particular ‘context atiribute. The system's state can be represented by 1 point in this N-dimensional space with co-ordinates that take values from discrete or continuous scales. Proactivity of the system is determined by its foresee changes, control them and remain wit ‘cceptance regions where the system is stable. Proactivity is based on past patterns and history as well as forecasting and what-if analysis ability can be measured by S = @Sb! |Sf where © and | are wei influenced by context while Sb and Sf are metrics-variables measuring behavioural and functional aspects of stability. Developing ways tomeasure and control is one of the important issues for future research. (or synonymously adaptability) and stability are closely related, interdependent and are in a functional relationship S=f(A) where, A is the measure of adaptivity ofthe system. General systems theory could be used for describing and analyzing stable adaptable systems. The monitoring ‘component is an important part of the system. Continuous monitoring of the environment and the system’s states determines when the adaptation will be applied. When the system's current state (that is, all the attribute variables of the current context) is within the I~ subspace, the system is considered stable. When as a result of reaction to internal and/or external changes one or more variables fall outside the respective ‘vicinity, the adaptation mechanism will generate one or more 4 action/events to stabilize the system. ° Scanned with CamScanner ‘When the trajectory segment lies within the Z-subspate, it is wot necessary to apply adaptation engine except when the forward analysis detects poteatia! future fluctuations, for instance, a possible blackout in a tiinne! and consequent ‘change into a disconnected state. Mechanism of Adaptation: Themechenisms for adaptation 1. Adapting Funetionality = In this approach the functionality of the computational entities re changed as per the operating conditions. Ex. Extended C$ model. The CS paradigm is widely used for disritwed computing In standard ‘CS model, the rolesof client and seryer‘are defined at debign time & do not change at run time: There are a small nuniter of servers that provide services like access to databases, Webpages, temporary IP addres allocation ete. A client or middleware dynamically selects the server to fulfill the service. A server may or may not msintain stat ofthe clients to which t provides services. The state information maintained may be soft or hard. The soft sute information has to be periodically refreshed where as hard state information once saved, has tobe deleted later explicitly. Soft state i useful in dynamic configurations and alsoia protocols such as, RSVP. (Resource Reservation Protocol) and Internet Group Management Protocol (IGMP). 2. Adapting Data : In this the quality of data is varied. Itis ifficult to provide both high performance and high quality information in a mobile computingenvironment. The remote server maintains a reference copy of the original data item. When resource are plentiful, original copy is referred, otherwise deta fidelity is compromised. Data fidelity has many dimension: + Video-data —frame rate and image quality. * Spatial data such as topographic maps minimum feature size, * Telemetry data ~sampling ate and timeliness, ‘The incorporation of adaptations in applications is done 42s follows: All adaptive programs should be able to find changes in environment. Either program can itself detect changes or incorporate some meckanism such as middleware Jayer or operating system. Ex.: a TCP (Transmission Control Protocol) client adapts its transmissions window size by seeing ‘congestion in network. ‘The mechanism of incorporating adaptation is : Once we establish the need for ‘operating system features and libraries, and interacting with cather mecharismas such as intelligent use of proxies. There are yatious apporaches (0.incorporating adaptation in an application, such as using adhoc methods to achieve the nee ofthe application, using tools specific to applications (eg, Web browser proxy method), and using general adaptation tools such as toolkits and operating system features, However, in the curent state ofthe art, most mechansims only work the elient side, some work atthe server, and afew help wit anything in between, Prob.2 What ismobility management? Explain location ‘mariagement principle and techniques. RU. 2017) | nentennidieimhaeeeneneniemeeamameieemeeeneee Sol. Mobility Management : Mobility Management (MM)| contains functions for registration, authentication, ing and the provision of a ‘Temporary Mobile Subscriber Identity (TMSI) that replaces tional Mobile Subscriber Identity (IMSI) and which} of an MS user over the air interface, While the IMSI identifies a user, the TMS| is valid only in the} current location area of a VLR. MM offers a reliable] ‘connection to the next higher layer. Management Principle and Techniques = In location managemerit schemes, several databases called registrars are used to maintain information lke service profil and preference of nodes. single location register called HLR| (Home Location Register) maintains local information ofall the mobile nodes in the network. The search and update operations are performed as follows: ‘The location of a mobile node means the latest cell in which the mobile node was last registered. For each mobile node m, the HLR maintains a mobility binding (m, c), where cis latest cell known to HLR, The location information of in HLR in updates as follows: * When mobite node is switched on, HLR i ‘current location ofm, Show in fig, (a) the mobile node m’s location is sent to location server. The registration message travels via base station of cell to location server. _* When handoff occurs, HLR gets to know the cell 1D} where the mobile node is moving. In fig (b), mobile node ‘moves from cell eto cel d, so the cell dis registered, *To find location ofa mobile nodes firstly HLR is visited tacts base station of cell in mobility binding form. ion searches for mobile m in cell. Lf m isin ¢ then it responds and a, connection is (©) illustrates messaging between various Scanned with CamScanner But, if mobile mode is switched off (fig.(€)) connection cannot be established. It may also happen that HLR does not return the most recent location. This might happen if cell is switched it between the time iiiformation was obtained from HLR an cell c paged for it. Each cell has a VLR (Visitor Location Register) thag keeps records of all the mobile nodes that currently are in that cel Location management in channel allocation is done as follows Different dynamic schemes bear different update rates and search costs, Assuming that each update bears unit (1) cost and search cost is proportional to number of cells searched. If fis the average call frequency to mobile node, than 1/, isthe average mean time between calls toa mobile node. A time based scheme performs, on average UT=1/TF, update between two calls, Let v be the maximum speed of mobile node, then radius vx min (¢,T) célls, area is to be searched considering center to be the tast known location of mobile node. > Prob.3 Discuss principles and techniques of location ‘management in regards of mobile computing.(RT.U, 2016) OR Explain the principles and techniques for location . management. (RTU.2015, 2014) OR How location management is identified in HLR-VLR and in Channel allocation in cellular system, — {R.T.U. 2012 RSol. Refer t0 Prob.2. Prob.d Discuss public communication services location ‘management with suitable example. (R.TU, 20162013, 12] OR What is mobility management? Briefly explain PCS location management scheme: IR-7U 2018) nt Scheme : Public Communication Service (PCS) networks emplay a cellular architecture. It divides its service area, say a large city into 2 number contiguous small cells as shown in Fig. The coverage of a cell, may vary from a few hundred meters to a few kilometers, Though regular hexagonal cells are drawn, the size and shape ofthe cells may vary depending onthe situation, ©, uneven terrain oF buildings in the service area ‘Communications to or from al the fobite hosts within a cell are via the base station, installed around the center of the (@) Another mobile wants to fipd wa failure cate Fig, : Search and registration in basic location management # sonbnige ‘ = = : = L Scanned with CamScanner To optimize these costs, a compromise between the above two extreme approaches of paging and updating is neighboring cells (base stations) are on areas (LAS). Thus, the whole PCS 1a few number of LAs. Whenever a mobile user crosses the boundary of a LA, it reports (updates). ‘On the other hand, the system pages all the cells of the LA, from where the mobile user had updated last. This simple approach or slight variations of it are prevailing at present. eee Prob What do you mean by mobile computing? Explain pp ommunication that levels cheaper ‘As an incoming call comes to 2 mobile use, the system has to locate the receiving host first to get him connected. Thus the network has to sead 2 signal to cells, where the ‘user is probably located, and to find where he exactly is. This | iz with various adaptability issues. (REU.2016) process is called terminal paging. orn short paging. oz If all the cells are paged simultaneously, then the user weaea . oneness pkey Cc ic toilet | E>PSnNE Troe mleemeb MY dceee rotten De To Tee at | computing ITU 200, ategy. In case of i oR J enormous signaling traffic w: svolved, even | What is mobile computing? Explain mobile computing for moderately large networks in order to avoid such acosty | related adaptability issues. ITU 2015) paging, the mobile user has to report its location time to time OR to the system, so that the sysiem knows his where abouts. | waar are the issues in ecuhet boien This process of reporting is called location update. Forthe | geraiy aes meni system to be always aware of the present location of the mobile host, this update should be done every time the MH crosses the boundary of a cell. But, as in PCS network the cell size is small, if mobile user has to report its location. everytime it crosses the boundary ofa cell, lot of channel resource as well as system processing resource will be consumed. Infact, itis show by simulation, that if for each cell crossing there isan update message, the signaling traffic due to updating alone would contribute about 70% additional ————— Sol. Mobile Computing : Refer fo Prob.1(a). The issues in mobile computing ae 1. Mobile computers are resources poor: Mobile Computers require electrical energy supplied by battery because Batteries can store only finite amount of energy, they must be replaced or recharged. This impacts the designing of hardware and software components in mobile computers 2. Mobile computers are less reliable and secures: Mobile Computers are likely to be lost, stolen or damaged, 3. Mobile connectivity wires in performance (bandwidth & latency) and reliability: Voluntary and involuntary disconnections are common. Bandwidth varies, ‘overtime and space. 4. Transmission interferences: Weather, terrain and the range from the nearest signal point can interfere with signal reception. Reception in tunnels, some building and rural areais poor. ‘5. Potential health hazards: People using mobile evices while driving may be distracted while driving and say involve in accidents, 6. Human interface with device: Screens and ‘keyboards tend tobe small, which may make them had to se. = VvrIwrwTyT Tey w ewer weer wr we Scanned with CamScanner access technique must be designed for users to overcome ‘these limitations of bandwidth, latency, disconnected operation Prob.6 What is mability management? Describe mechanism for adaptation. rr. 2016) | andstll satisfy user's expectations OR 3. Mobility Constraints Explain mechanisms for adaptation and incorporating Mobility is about moving around, This movement adaptation. ‘1RTU.2015, 2013) | can be in one of the following spaces with respect to users. (i) Physical space movement: In this space is ‘when a user changes his/her physical location, This can affect network connection (disconnection, Poor connectivity) while the user is working. Network connection has to adapt to this” behavior of user movement by re-connecting user with respect to new location. Data and file operations have also toadapt by supporting disconnection filepperationas inthe Coda fite system. (i)Information space: Consists ofa large number of applications and data files scatter in the Intemet. Movement here corresponds to selecting an application or a data file. Applicaton and their data have to adapt to user's operating environment to perform their task efficiently. One way to accomplish this is by caching of data on the local machine as being done in the HTTP/1.1 protocol to reduce redundant www information traffic and hence improve network utilization. (iii) Conhection space: It is the huge network of links that connect between various’ computer platforms. Movement in this space corresponds to selecting route between links and selecting 2 specific type platform. Adaptation in this space can be achieved by avoiding ‘congested links and selecting shortest path between two poiris when delivering information. : a: Prob.9 Define Mobile Computing. Explain mechanism ‘for adaptation and incorpotation adaplations. RC. 2012), Sol. Mobility Management : Refer 10 Prob,2. The Mechsnisms for Adaptation : Refer 10 Prob. (by. Prob.7 What-is mobile computing? Describe mechanism | {for adaptation. RU. 2014) Sol. Mobile Computing : Refer 10 Prob.1(a) The Mechanisms for Adaptation : Refer fo Prob.1(b). Sol, Mobile Computing : Refer 10 Prob. (a). Mobile computing environment has three main components Which affect their performance. These ae: 1, Mobile Devices Constraints Due to their limited size, mobile devices will continue to have limited resources such as processor speed, memory | Sol Mobile Computing : Refer to Prab.1(a). Mechasiisins for‘Adaptation and incorporating ‘Adaptation : Refer 10 Prob.1(). a Probst0 What do you understand by mobility management ? Sol. Mobility Management + Refer to 02. ———_——— Probll What isthe significancesheed vf ocation update procedure ? Scanned with CamScanner Sol. AGSM or UMTS network, lke all cellular networks is a radio network of individual cells known as base stations. Each base station covers a small geographical area which is part ‘of & uniquely identified location area. By integrating the coverage of each of these base stations, a cellular network provides a radio coverage over s much wider area. A group ‘of base stations is named a location area or a routing area. ‘The location update procedure allows a mobile device to inform the cellular network, whenever it moves from one location area tothe nex. Mobiles ae responsible for detecting location area codes. When & mobile finds thatthe location area code is different from ts last update, it performs another update by sending tothe network, a location update request, together with its previous location and its Temporary Mobile ‘Subscriber Identity (TMSI). There are several reasons why a mobile may provide updated location information to the network. Whenever a tmobile is switched on or off the network may require it to perform an IMSI attach or IMSI detach location update procedure, Also, each mobile is required to regularly report «its location at set time interval using 2 periodic location update procedure, Whenever a mobile moves from one Jocation are to the next while not ona calla random location Update is required. This is also required ofa stationary mobile that reselects coverage from a cell in a different location area because of signal fade, Thus @ subscriber has reliable access to the network and may be reached with call while enjoying the freedom of mobility within the whole coverage ™ ‘When a subscriber is paged in an attempt to deliver a ‘call or SMS and the subscriber does not reply to that page then the subscriber is marked as absent in both the Mobile ‘Switching Center / Visitor Location Register (MSC/VLR) ‘and the Home Location Register (HLR). Mobile Not Reachable Flag (MNRF) is set. The next time the mobile performs a location update the HLR is updsted and the mobile not reachable fag is cleared. Prob.12 Write short note on? (a) TMS! @) Roaming (©) Location area (d) Routing area . : Sol.(n) The Temporary Mobile Subscriber Identity (CTMSI) is the identity that is most commonly sent between (E-Tech. (ViIr'Sem.) CS. Solved Papers) the mobile and the network. TMSI is randomly assigned by the VLR to every trobile in the area, the moment itis switched ‘on: The number is Ideal to a location area and so it has to be’ updated each time the mobile moves to a new geographical area, The network can also change the TMSI of the mobile ‘atany time, Itnormally does so in order to avoid the subscriber from being identified and tracked by eavesdroppers on the radio interface. This makes it difficult to trace which mobile is which, except briefly, when the mobile is just switched on cor when the data in the mobile becomes invalid for one reason or another. At that point, the global “Intemational Mobile Subscriber Identity” (IMSI) must be sent to the network, The IMSI is sent as rarely as possible to avoid itbeing identified, and tracked. A key use of the TMSI is in paging a mobile. Paging is the one-to-one communication between the mobile and the tase station, The most important use of broadeast information is to set up channels for paging, Every cellular system has a broadcast mechanism to distribute such information to a plurality of mobiles. Size of TMS is 4 octet with full hexadecimal digits and can’t be all 1 because the SIM uses 4 octets with all bits ‘equal to Ito indicate that no valid TMSI is available, Sol.(b) Roaming is one of the fundamental mobility management procedures of all cellular networks. Roaming is defined asthe ability fora cellular customer to automatically make and receive voice calls, send and receive data or access other services, including home data services when travelling outside the geographical coverage area of the home network by means of using a visited network, This can be done by using a communication terminal or else just by using the subscriber identity in the visited network. Roaming is technically supported by mobility management, authentication, authorization and billing procedures, SoL{c) A location area is a set of base stations that are svouped together o optimise signalling. Typically, tens oreven hundreds of base stations share a single Base Station Controller (BSC) in GSM or a Radio Network Controller (RNC) in UMTS, the intelligence behind the base stations, The BSC handles allocation of radio channels, receives measurements. {from the mobife phones and controls handovers from base station to base station. ‘To cach location area, a untqye aumber called a location area code is assigned. The location area code is broadcast, ‘by each base station known as a Base Transceiver Station (BTS) in GSM ora Node B in UMTS at regular intervals, Scanned with CamScanner fetile Computing} ‘th GSM, the mobiles cannot communicate directly with “actvether but have-to be channeled through the BTSs. In (MTS networks, if no Node,B is accessible to a mobile, it ‘illlnoube able to make any connections at all. Ifthe location areas are very large, there will be many nobiles operating simultaneously, resulting in very high peging traffic; as every paging request has to be broadcast to every ‘bese-Station in the location area. This wastes bandwidth and ron the mobile by requiring it to listen for broadcast tnessaes too much ofthe time, [fon the-other hand, there ste too many small location areas, the mobile must contact tie network very often for changes of location which will also drain the mobile's battery, Sold) The routing aren i the PS domain equivalent ofthe {ocation area. A routing area is normally a subdivision of a Jocation area, Routing areas are used by mobiles which are [GPRS-attached. GPRS (General Packet Radio Services), |GSMis,new:data transmission technology, is optimized for bursty data communication services, such as wireless internet intranet and multimedia services. Itis also known as GSM- IP (Internet Protocol) because it will connect users directly to Internet Service Providers (ISP). The bursty nature of packet ta paging messages are expected per mobile and soit is worth knowing the location of the mobile more accurately than it would be with traditional circuit-switched traffic, A change from routing area to routing area (called a Routing Area Update) is done in an almost identical way to.a change from location grea to location area, The main difference is that the Sehying GPRS Support Node (SGSN) is the element involved. Mea yeans that more — eT Prob.13 Explain the concept of adaptability in mobile computing. ‘ol. Adaptation in Mobile Computing : Refer o Prob, 1(b). gga Scanned with CamScanner L

You might also like