0 ratings0% found this document useful (0 votes) 35 views7 pagesUnit1 Mobile Computing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
-Mosire Computin
are
"Probl (a) What is mobile computing? Write down the
applications of mobile computing.
(8) What is adaptation in mobile computing? Explain
‘mechanism of adaptation. (EU. 2017)
SoL(a) Mobile Computing : Mobile Computing is human
“eomputer interaction by which a computer is expected tbe
transported during normal usage. Mobile computing ystems
| are distributed systems in which communication i facilitated
through networks.
“Applications of Mobile Computing
ice
2
ic mail/paging
1 Transmission of news, road condition.
Salesman :
‘Mobile computing system i acoriplex system consisting
‘of both hardware and software components, Its behavior
could be represented by a trajectory in a multidimensional
space where each dimension represents a domain of
acceptable values (called acceptance region) for a particular
‘context atiribute. The system's state can be represented by
1 point in this N-dimensional space with co-ordinates that
take values from discrete or continuous scales.
Proactivity of the system is determined by its
foresee changes, control them and remain wit
‘cceptance regions where the system is stable. Proactivity
is based on past patterns and history as well as forecasting
and what-if analysis
ability can be measured by S = @Sb! |Sf where ©
and | are wei influenced by context while Sb and Sf are
metrics-variables measuring behavioural and functional
aspects of stability. Developing ways tomeasure and control
is one of the important issues for future research.
(or synonymously adaptability) and stability are
closely related, interdependent and are in a functional
relationship
S=f(A)
where, A is the measure of adaptivity ofthe system.
General systems theory could be used for describing
and analyzing stable adaptable systems. The monitoring
‘component is an important part of the system. Continuous
monitoring of the environment and the system’s states
determines when the adaptation will be applied. When the
system's current state (that is, all the attribute variables of
the current context) is within the I~ subspace, the system is
considered stable.
When as a result of reaction to internal and/or external
changes one or more variables fall outside the respective
‘vicinity, the adaptation mechanism will generate one or more
4 action/events to stabilize the system. °
Scanned with CamScanner‘When the trajectory segment lies within the Z-subspate,
it is wot necessary to apply adaptation engine except when
the forward analysis detects poteatia! future fluctuations, for
instance, a possible blackout in a tiinne! and consequent
‘change into a disconnected state.
Mechanism of Adaptation: Themechenisms for adaptation
1. Adapting Funetionality = In this approach the
functionality of the computational entities re changed as per
the operating conditions. Ex. Extended C$ model. The CS
paradigm is widely used for disritwed computing In standard
‘CS model, the rolesof client and seryer‘are defined at debign
time & do not change at run time: There are a small nuniter
of servers that provide services like access to databases,
Webpages, temporary IP addres allocation ete. A client or
middleware dynamically selects the server to fulfill the
service. A server may or may not msintain stat ofthe clients
to which t provides services. The state information maintained
may be soft or hard. The soft sute information has to be
periodically refreshed where as hard state information once
saved, has tobe deleted later explicitly. Soft state i useful in
dynamic configurations and alsoia protocols such as, RSVP.
(Resource Reservation Protocol) and Internet Group
Management Protocol (IGMP).
2. Adapting Data : In this the quality of data is varied. Itis
ifficult to provide both high performance and high quality
information in a mobile computingenvironment. The remote
server maintains a reference copy of the original data item.
When resource are plentiful, original copy is referred,
otherwise deta fidelity is compromised.
Data fidelity has many dimension:
+ Video-data —frame rate and image quality.
* Spatial data such as topographic maps minimum feature
size,
* Telemetry data ~sampling ate and timeliness,
‘The incorporation of adaptations in applications is done
42s follows: All adaptive programs should be able to find
changes in environment. Either program can itself detect
changes or incorporate some meckanism such as middleware
Jayer or operating system. Ex.: a TCP (Transmission Control
Protocol) client adapts its transmissions window size by seeing
‘congestion in network.
‘The mechanism of incorporating adaptation is :
Once we establish the need for
‘operating system features and libraries, and interacting with
cather mecharismas such as intelligent use of proxies. There
are yatious apporaches (0.incorporating adaptation in an
application, such as using adhoc methods to achieve the nee
ofthe application, using tools specific to applications (eg,
Web browser proxy method), and using general adaptation
tools such as toolkits and operating system features, However,
in the curent state ofthe art, most mechansims only work
the elient side, some work atthe server, and afew help wit
anything in between,
Prob.2 What ismobility management? Explain location
‘mariagement principle and techniques. RU. 2017)
| nentennidieimhaeeeneneniemeeamameieemeeeneee
Sol. Mobility Management : Mobility Management (MM)|
contains functions for registration, authentication,
ing and the provision of a
‘Temporary Mobile Subscriber Identity (TMSI) that replaces
tional Mobile Subscriber Identity (IMSI) and which}
of an MS user over the air interface,
While the IMSI identifies a user, the TMS| is valid only in the}
current location area of a VLR. MM offers a reliable]
‘connection to the next higher layer.
Management Principle and Techniques = In
location managemerit schemes, several databases called
registrars are used to maintain information lke service profil
and preference of nodes. single location register called HLR|
(Home Location Register) maintains local information ofall
the mobile nodes in the network. The search and update
operations are performed as follows:
‘The location of a mobile node means the latest cell in
which the mobile node was last registered. For each mobile
node m, the HLR maintains a mobility binding (m, c), where
cis latest cell known to HLR, The location information of
in HLR in updates as follows:
* When mobite node is switched on, HLR i
‘current location ofm, Show in fig, (a) the mobile node m’s
location is sent to location server. The registration message
travels via base station of cell to location server.
_* When handoff occurs, HLR gets to know the cell 1D}
where the mobile node is moving. In fig (b), mobile node
‘moves from cell eto cel d, so the cell dis registered,
*To find location ofa mobile nodes firstly HLR is visited
tacts base station of cell in mobility binding form.
ion searches for mobile m in cell. Lf m isin ¢
then it responds and a, connection is
(©) illustrates messaging between various
Scanned with CamScannerBut, if mobile mode is switched off (fig.(€)) connection
cannot be established.
It may also happen that HLR does not return the most
recent location. This might happen if cell is switched it
between the time iiiformation was obtained from HLR an
cell c paged for it.
Each cell has a VLR (Visitor Location Register) thag
keeps records of all the mobile nodes that currently are in
that cel
Location management in channel allocation is done as
follows
Different dynamic schemes bear different update rates
and search costs, Assuming that each update bears unit (1)
cost and search cost is proportional to number of cells
searched. If fis the average call frequency to mobile node,
than 1/, isthe average mean time between calls toa mobile
node. A time based scheme performs, on average UT=1/TF,
update between two calls, Let v be the maximum speed of
mobile node, then radius vx min (¢,T) célls, area is to be
searched considering center to be the tast known location of
mobile node.
>
Prob.3 Discuss principles and techniques of location
‘management in regards of mobile computing.(RT.U, 2016)
OR
Explain the principles and techniques for location
. management. (RTU.2015, 2014)
OR
How location management is identified in HLR-VLR and
in Channel allocation in cellular system, — {R.T.U. 2012
RSol. Refer t0 Prob.2.
Prob.d Discuss public communication services location
‘management with suitable example. (R.TU, 20162013, 12]
OR
What is mobility management? Briefly explain PCS
location management scheme: IR-7U 2018)
nt Scheme : Public
Communication Service (PCS) networks emplay a cellular
architecture. It divides its service area, say a large city into 2
number contiguous small cells as shown in Fig. The coverage
of a cell, may vary from a few hundred meters to a few
kilometers, Though regular hexagonal cells are drawn, the
size and shape ofthe cells may vary depending onthe situation,
©, uneven terrain oF buildings in the service area
‘Communications to or from al the fobite hosts within a cell
are via the base station, installed around the center of the
(@) Another mobile wants to fipd wa failure cate
Fig, : Search and registration in basic location management
# sonbnige ‘
=
=
:
=
L
Scanned with CamScannerTo optimize these costs, a compromise between
the above two extreme approaches of paging and updating is
neighboring cells (base stations) are
on areas (LAS). Thus, the whole PCS
1a few number of LAs. Whenever a
mobile user crosses the boundary of a LA, it reports (updates).
‘On the other hand, the system pages all the cells of the LA,
from where the mobile user had updated last. This simple
approach or slight variations of it are prevailing at present.
eee
Prob What do you mean by mobile computing? Explain
pp ommunication that levels cheaper
‘As an incoming call comes to 2 mobile use, the system
has to locate the receiving host first to get him connected.
Thus the network has to sead 2 signal to cells, where the
‘user is probably located, and to find where he exactly is. This | iz with various adaptability issues. (REU.2016)
process is called terminal paging. orn short paging. oz
If all the cells are paged simultaneously, then the user weaea .
oneness pkey Cc ic toilet | E>PSnNE Troe mleemeb MY dceee rotten De To
Tee at | computing ITU 200,
ategy. In case of
i oR
J enormous signaling traffic w: svolved, even | What is mobile computing? Explain mobile computing
for moderately large networks in order to avoid such acosty | related adaptability issues. ITU 2015)
paging, the mobile user has to report its location time to time OR
to the system, so that the sysiem knows his where abouts. | waar are the issues in ecuhet boien
This process of reporting is called location update. Forthe | geraiy aes meni
system to be always aware of the present location of the
mobile host, this update should be done every time the MH
crosses the boundary of a cell. But, as in PCS network the
cell size is small, if mobile user has to report its location.
everytime it crosses the boundary ofa cell, lot of channel
resource as well as system processing resource will be
consumed. Infact, itis show by simulation, that if for each
cell crossing there isan update message, the signaling traffic
due to updating alone would contribute about 70% additional
—————
Sol. Mobile Computing : Refer fo Prob.1(a).
The issues in mobile computing ae
1. Mobile computers are resources poor: Mobile
Computers require electrical energy supplied by battery
because Batteries can store only finite amount of energy,
they must be replaced or recharged. This impacts the
designing of hardware and software components in mobile
computers
2. Mobile computers are less reliable and secures:
Mobile Computers are likely to be lost, stolen or damaged,
3. Mobile connectivity wires in performance
(bandwidth & latency) and reliability: Voluntary and
involuntary disconnections are common. Bandwidth varies,
‘overtime and space.
4. Transmission interferences: Weather, terrain and
the range from the nearest signal point can interfere with
signal reception. Reception in tunnels, some building and rural
areais poor.
‘5. Potential health hazards: People using mobile
evices while driving may be distracted while driving and
say involve in accidents,
6. Human interface with device: Screens and
‘keyboards tend tobe small, which may make them had to
se. =
VvrIwrwTyT Tey w ewer weer wr we
Scanned with CamScanneraccess technique must be designed for users to overcome
‘these limitations of bandwidth, latency, disconnected operation
Prob.6 What is mability management? Describe
mechanism for adaptation. rr. 2016) | andstll satisfy user's expectations
OR 3. Mobility Constraints
Explain mechanisms for adaptation and incorporating Mobility is about moving around, This movement
adaptation. ‘1RTU.2015, 2013) | can be in one of the following spaces with respect to users.
(i) Physical space movement: In this space is
‘when a user changes his/her physical location, This can affect
network connection (disconnection, Poor connectivity) while
the user is working. Network connection has to adapt to this”
behavior of user movement by re-connecting user with
respect to new location. Data and file operations have also
toadapt by supporting disconnection filepperationas inthe
Coda fite system.
(i)Information space: Consists ofa large number
of applications and data files scatter in the Intemet. Movement
here corresponds to selecting an application or a data file.
Applicaton and their data have to adapt to user's
operating environment to perform their task efficiently. One
way to accomplish this is by caching of data on the local
machine as being done in the HTTP/1.1 protocol to reduce
redundant www information traffic and hence improve
network utilization.
(iii) Conhection space: It is the huge network of
links that connect between various’ computer platforms.
Movement in this space corresponds to selecting route
between links and selecting 2 specific type platform.
Adaptation in this space can be achieved by avoiding
‘congested links and selecting shortest path between two poiris
when delivering information. :
a:
Prob.9 Define Mobile Computing. Explain mechanism
‘for adaptation and incorpotation adaplations. RC. 2012),
Sol. Mobility Management : Refer 10 Prob,2.
The Mechsnisms for Adaptation : Refer 10
Prob. (by.
Prob.7 What-is mobile computing? Describe mechanism |
{for adaptation. RU. 2014)
Sol. Mobile Computing : Refer 10 Prob.1(a)
The Mechanisms for Adaptation : Refer fo Prob.1(b).
Sol, Mobile Computing : Refer 10 Prob. (a).
Mobile computing environment has three main components
Which affect their performance. These ae:
1, Mobile Devices Constraints
Due to their limited size, mobile devices will continue
to have limited resources such as processor speed, memory
| Sol Mobile Computing : Refer to Prab.1(a).
Mechasiisins for‘Adaptation and incorporating
‘Adaptation : Refer 10 Prob.1().
a
Probst0 What do you understand by mobility management ?
Sol. Mobility Management + Refer to 02.
———_———
Probll What isthe significancesheed vf ocation update
procedure ?
Scanned with CamScannerSol. AGSM or UMTS network, lke all cellular networks is a
radio network of individual cells known as base stations. Each
base station covers a small geographical area which is part
‘of & uniquely identified location area. By integrating the
coverage of each of these base stations, a cellular network
provides a radio coverage over s much wider area. A group
‘of base stations is named a location area or a routing area.
‘The location update procedure allows a mobile device
to inform the cellular network, whenever it moves from one
location area tothe nex. Mobiles ae responsible for detecting
location area codes. When & mobile finds thatthe location
area code is different from ts last update, it performs another
update by sending tothe network, a location update request,
together with its previous location and its Temporary Mobile
‘Subscriber Identity (TMSI).
There are several reasons why a mobile may provide
updated location information to the network. Whenever a
tmobile is switched on or off the network may require it to
perform an IMSI attach or IMSI detach location update
procedure, Also, each mobile is required to regularly report
«its location at set time interval using 2 periodic location
update procedure, Whenever a mobile moves from one
Jocation are to the next while not ona calla random location
Update is required. This is also required ofa stationary mobile
that reselects coverage from a cell in a different location
area because of signal fade, Thus @ subscriber has reliable
access to the network and may be reached with call while
enjoying the freedom of mobility within the whole coverage
™
‘When a subscriber is paged in an attempt to deliver a
‘call or SMS and the subscriber does not reply to that page
then the subscriber is marked as absent in both the Mobile
‘Switching Center / Visitor Location Register (MSC/VLR)
‘and the Home Location Register (HLR). Mobile Not
Reachable Flag (MNRF) is set. The next time the mobile
performs a location update the HLR is updsted and the mobile
not reachable fag is cleared.
Prob.12 Write short note on?
(a) TMS!
@) Roaming
(©) Location area
(d) Routing area
. :
Sol.(n) The Temporary Mobile Subscriber Identity
(CTMSI) is the identity that is most commonly sent between
(E-Tech. (ViIr'Sem.) CS. Solved Papers)
the mobile and the network. TMSI is randomly assigned by
the VLR to every trobile in the area, the moment itis switched
‘on: The number is Ideal to a location area and so it has to be’
updated each time the mobile moves to a new geographical
area,
The network can also change the TMSI of the mobile
‘atany time, Itnormally does so in order to avoid the subscriber
from being identified and tracked by eavesdroppers on the
radio interface. This makes it difficult to trace which mobile
is which, except briefly, when the mobile is just switched on
cor when the data in the mobile becomes invalid for one reason
or another. At that point, the global “Intemational Mobile
Subscriber Identity” (IMSI) must be sent to the network,
The IMSI is sent as rarely as possible to avoid itbeing identified,
and tracked.
A key use of the TMSI is in paging a mobile. Paging is
the one-to-one communication between the mobile and the
tase station, The most important use of broadeast information
is to set up channels for paging, Every cellular system has a
broadcast mechanism to distribute such information to a
plurality of mobiles.
Size of TMS is 4 octet with full hexadecimal digits and
can’t be all 1 because the SIM uses 4 octets with all bits
‘equal to Ito indicate that no valid TMSI is available,
Sol.(b) Roaming is one of the fundamental mobility
management procedures of all cellular networks. Roaming is
defined asthe ability fora cellular customer to automatically
make and receive voice calls, send and receive data or access
other services, including home data services when travelling
outside the geographical coverage area of the home network
by means of using a visited network, This can be done by
using a communication terminal or else just by using the
subscriber identity in the visited network. Roaming is
technically supported by mobility management, authentication,
authorization and billing procedures,
SoL{c) A location area is a set of base stations that are
svouped together o optimise signalling. Typically, tens oreven
hundreds of base stations share a single Base Station Controller
(BSC) in GSM or a Radio Network Controller (RNC) in
UMTS, the intelligence behind the base stations, The BSC
handles allocation of radio channels, receives measurements.
{from the mobife phones and controls handovers from base
station to base station.
‘To cach location area, a untqye aumber called a location
area code is assigned. The location area code is broadcast,
‘by each base station known as a Base Transceiver Station
(BTS) in GSM ora Node B in UMTS at regular intervals,
Scanned with CamScannerfetile Computing}
‘th GSM, the mobiles cannot communicate directly with
“actvether but have-to be channeled through the BTSs. In
(MTS networks, if no Node,B is accessible to a mobile, it
‘illlnoube able to make any connections at all.
Ifthe location areas are very large, there will be many
nobiles operating simultaneously, resulting in very high peging
traffic; as every paging request has to be broadcast to every
‘bese-Station in the location area. This wastes bandwidth and
ron the mobile by requiring it to listen for broadcast
tnessaes too much ofthe time, [fon the-other hand, there
ste too many small location areas, the mobile must contact
tie network very often for changes of location which will
also drain the mobile's battery,
Sold) The routing aren i the PS domain equivalent ofthe
{ocation area. A routing area is normally a subdivision of a
Jocation area, Routing areas are used by mobiles which are
[GPRS-attached. GPRS (General Packet Radio Services),
|GSMis,new:data transmission technology, is optimized for
bursty data communication services, such as wireless internet
intranet and multimedia services. Itis also known as GSM-
IP (Internet Protocol) because it will connect users directly
to Internet Service Providers (ISP).
The bursty nature of packet ta
paging messages are expected per mobile and soit is worth
knowing the location of the mobile more accurately than it
would be with traditional circuit-switched traffic, A change
from routing area to routing area (called a Routing Area
Update) is done in an almost identical way to.a change
from location grea to location area, The main difference is
that the Sehying GPRS Support Node (SGSN) is the element
involved. Mea
yeans that more
— eT
Prob.13 Explain the concept of adaptability in mobile
computing.
‘ol. Adaptation in Mobile Computing : Refer o Prob, 1(b).
gga
Scanned with CamScanner
L