Mobile Computing Unit 2 Notes
Mobile Computing Unit 2 Notes
Introduction
Wireless networking refers to the technology that enables devices to communicate without
using physical cables. Instead of relying on wired connections like Ethernet, wireless
networks utilize radio waves, infrared, or satellite signals to transmit data. Wireless
networking has revolutionized communication, enabling mobility, scalability, and ease of
connectivity in various applications, including personal, enterprise, and industrial networks.
A wireless network consists of devices that communicate over airwaves rather than through
cables. The fundamental components include:
• Wireless Access Points (WAPs): Devices that allow wireless devices to connect to a
wired network.
Wireless networking can be categorized into different types based on range, technology, and
application:
A WLAN connects devices within a limited geographical area, such as a home, office, or
campus. It typically operates on the IEEE 802.11 (Wi-Fi) standard. WLANs provide mobility
and ease of installation compared to wired networks.
A WPAN connects devices within a short range (typically a few meters). Technologies used
include:
• Bluetooth: Operates in the 2.4 GHz frequency band, used for short-range
communication between devices.
WWAN provides network access over large geographic areas using cellular technologies (3G,
4G, 5G). It is commonly used for mobile internet and remote connectivity.
Wi-Fi is the most widely used wireless networking technology. It operates on multiple
frequency bands (2.4 GHz, 5 GHz, and 6 GHz) and supports different standards:
• 802.11b/g: Operates on the 2.4 GHz band, offering broader coverage but lower
speeds.
• 802.11n: Uses MIMO (Multiple Input Multiple Output) for higher speeds and
improved reliability.
• 802.11ac/ax (Wi-Fi 6): Enhances performance with better efficiency and increased
speed.
2. Bluetooth
• 5G: Offers ultra-high speed, low latency, and improved network capacity.
NFC enables close-range wireless communication, commonly used for contactless payments
and data transfer between devices.
Wireless networks are vulnerable to security threats due to the open nature of
communication channels. Key security measures include:
1. Encryption
Encryption protects data from unauthorized access. Common encryption standards include:
2. Authentication
Authentication mechanisms verify the identity of users and devices. Common methods
include:
IDPS monitors network traffic to detect and prevent unauthorized access or malicious
activities.
4. Firewalls
Firewalls act as barriers between trusted and untrusted networks, filtering incoming and
outgoing traffic based on predefined rules.
• Mobility: Users can access the network from anywhere within range.
Wireless networking is evolving with new technologies to enhance speed, security, and
efficiency. Some trends include:
Introduction
Wireless Local Area Network (WLAN) is a type of wireless network that allows devices to
connect and communicate without the need for physical cables. WLANs use radio waves to
enable communication between devices, providing mobility, flexibility, and ease of
deployment compared to traditional wired networks. WLANs are widely used in homes,
offices, universities, and public places to provide internet access and facilitate seamless
communication.
A WLAN consists of several components that work together to enable wireless connectivity.
These include:
• Access Points (APs): Devices that transmit and receive wireless signals, acting as a
bridge between wired and wireless networks.
• Wireless Network Interface Cards (WNICs): Hardware in computers, smartphones,
and other devices that enable wireless communication.
• Routers: Devices that direct data traffic between networks and enable internet
access.
Types of WLAN
1. Infrastructure Mode
In this mode, devices communicate through access points (APs) connected to a wired
network. This is the most common type of WLAN and is used in homes, offices, and public
spaces.
2. Ad-Hoc Mode
In an ad-hoc WLAN, devices communicate directly with each other without the need for an
access point. This mode is useful for temporary networks, such as file sharing between
laptops or gaming setups.
3. Enterprise WLAN
Enterprise WLANs are large-scale networks designed for businesses, universities, and
institutions. They often use multiple access points and advanced security measures to
manage large numbers of users efficiently.
Public WLANs, also known as Wi-Fi hotspots, are available in public places like cafes,
airports, and libraries. They provide internet access to users within a specific range.
WLANs operate on the IEEE 802.11 standard, commonly known as Wi-Fi. Different versions
of the standard have been developed to improve speed, range, and security:
• 802.11n: Introduces MIMO (Multiple Input Multiple Output) for higher speeds up to
600 Mbps.
• 802.11ac: Operates at 5 GHz with speeds up to 1 Gbps.
• 802.11ax (Wi-Fi 6): Enhances efficiency, speed, and capacity for modern networks.
WLANs use radio frequency signals to transmit data between devices and access points. The
process involves:
2. The access point authenticates the device and grants network access.
4. The access point forwards data to the router or internet for further communication.
Security in WLAN
Since WLANs transmit data over the air, they are vulnerable to security threats. Common
security measures include:
1. Encryption
2. Authentication
Firewalls and intrusion detection systems (IDS) monitor and filter network traffic to prevent
unauthorized access and attacks.
Advantages of WLAN
Challenges of WLAN
• Interference: Other electronic devices and physical obstacles can disrupt signals.
Future of WLAN
• Wi-Fi 6E: Utilizes the 6 GHz band for improved speed and efficiency.
Introduction
Medium Access Control (MAC) plays a crucial role in wireless networking by regulating how
devices share the communication medium. Unlike wired networks, where dedicated links
exist between nodes, wireless networks use a shared transmission medium, leading to
several challenges. This document explores the key MAC issues in wireless networks,
including collision, hidden terminal problems, exposed terminal problems, and fairness.
Collisions occur when multiple devices attempt to transmit data simultaneously, causing
interference and data loss. In wireless networks, collisions are more problematic than in
wired networks because:
• Lack of Collision Detection: Unlike Ethernet, where CSMA/CD (Carrier Sense Multiple
Access with Collision Detection) is used, wireless networks cannot listen while
transmitting, making collision detection difficult.
• Signal Propagation Delays: Due to varying distances between devices, signals take
different times to reach the receiver, increasing the likelihood of overlapping
transmissions.
To address collisions, wireless networks use CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance):
• Backoff Mechanism: After detecting a busy channel, a device waits for a random
time before attempting retransmission.
The hidden terminal problem occurs when two devices (A and C) are out of each other's
range but within the range of a common access point (B). If A transmits data to B while C
also transmits to B (unaware of A’s transmission), collisions can occur at B.
Solution:
• RTS/CTS Mechanism: Helps notify all devices within range about ongoing
transmissions to avoid collisions.
The exposed terminal problem occurs when a device refrains from transmitting
unnecessarily due to the presence of another transmission nearby. For example, if A is
transmitting to B and C wants to send data to D, C may sense A’s transmission and wrongly
assume that it cannot transmit, leading to reduced network efficiency.
Solution:
• Use of RTS/CTS with Adaptive Power Control: Helps distinguish between interfering
transmissions and independent communications.
4. Fairness in MAC
Fairness ensures that all devices get an equal opportunity to access the wireless channel.
Common fairness issues include:
• Starvation: Some nodes may dominate channel access while others struggle to
transmit.
Solution:
• Weighted Fair Queuing (WFQ): Ensures fair distribution of bandwidth.
Introduction
IEEE 802.11 is a set of wireless networking standards developed by the Institute of Electrical
and Electronics Engineers (IEEE) to define wireless local area network (WLAN)
communication. These standards specify protocols for wireless data transmission, frequency
bands, security mechanisms, and performance enhancements. Since its inception in 1997,
IEEE 802.11 has undergone multiple revisions to improve speed, efficiency, and security.
IEEE 802.11 has evolved through multiple amendments, each enhancing various aspects of
wireless communication. Below are the major versions:
The original 802.11 standard operated at 2.4 GHz with a maximum data rate of 2 Mbps. It
used Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum
(DSSS) for signal transmission.
• Access Points (APs): Provide connectivity between STAs and the wired network.
MAC layer controls access to the wireless medium and ensures efficient data transmission.
Key MAC techniques include:
• Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): Avoids data
collisions by sensing the channel before transmitting.
• Integration with 5G: Seamless connectivity between cellular and Wi-Fi networks.
Wireless communication has revolutionized the way devices connect and exchange data.
Since multiple devices share the same communication medium in a wireless network,
Multiple Access Protocols play a crucial role in managing access efficiently. These protocols
ensure fair usage, reduce collisions, and enhance network performance.
In this article, we will explore the different types of Wireless Multiple Access Protocols,
their working principles, advantages, and challenges.
Multiple Access Protocols are mechanisms that allow multiple devices to transmit and
receive data over a shared communication channel without excessive interference. Wireless
networks, unlike wired ones, do not have a dedicated path for each device. Instead, all
nodes share the radio frequency spectrum, leading to potential issues such as collisions,
congestion, and fairness in data transmission.
To overcome these challenges, Wireless Multiple Access Protocols are designed to ensure
efficient communication among multiple users. These protocols mainly fall under three
categories:
3. Channelization Protocols
Random Access Protocols allow devices to transmit data whenever they have data to send.
These protocols work on the principle of contention, meaning that devices compete for
access to the channel. If two or more devices transmit simultaneously, a collision occurs, and
retransmission is required.
ALOHA is one of the earliest random access protocols. It has two variants:
• Pure ALOHA: Devices transmit data whenever they want. If a collision occurs, the
sender waits for a random period and retransmits. The main disadvantage is the high
probability of collisions, limiting efficiency to about 18%.
• Slotted ALOHA: Time is divided into discrete slots, and devices can only send data at
the beginning of a slot. This reduces collisions and improves efficiency to around
37%.
CSMA improves upon ALOHA by listening to the channel before transmitting. If the channel
is idle, transmission occurs; otherwise, the device waits. There are different types of CSMA:
• Non-Persistent CSMA: If the channel is busy, the device waits for a random time
before sensing again.
• 1-Persistent CSMA: If the channel is busy, the device continuously senses and
transmits immediately when it becomes free.
• CSMA/CD (Used in Ethernet): Devices detect collisions while transmitting and stop
sending immediately. This is ineffective in wireless networks because collisions
cannot always be detected due to the hidden terminal problem.
Controlled Access Protocols ensure that only one device transmits at a time, reducing
collisions and improving efficiency. These protocols work well for high-traffic networks but
introduce additional overhead due to scheduling.
A. Polling
A central controller (like a router or base station) asks each device whether it has data to
send. If the device has data, it is granted access to the channel. This method ensures fairness
but increases delay.
B. Token Passing
A token (a special control message) circulates in the network. Only the device holding the
token can transmit. Once the transmission is done, the token is passed to the next device.
This method eliminates collisions but increases complexity. Example: Token Ring Networks.
4. Channelization Protocols
Channelization protocols divide the available bandwidth into separate channels, allowing
multiple devices to transmit simultaneously without interference.
• The available bandwidth is divided into separate frequency bands, and each device
gets a dedicated frequency.
• Used in analog cellular networks (1G) and some satellite communication systems.
• Time is divided into slots, and each device is assigned a specific time slot to transmit.
• Efficient but suffers from synchronization issues and time slot wastage when a user
is idle.
• All devices transmit over the same frequency spectrum but use different unique
codes (spread spectrum technique).
• Provides high capacity and security but requires complex signal processing.
D. Orthogonal Frequency Division Multiple Access (OFDMA)
• An advanced form of FDMA where frequency bands are divided into subcarriers,
allowing multiple users to transmit simultaneously.
Collision Implementation
Protocol Efficiency Examples
Handling Complexity
Low (~18-
ALOHA High collisions Simple Satellite networks
37%)
Reduces
CSMA Medium Moderate Wi-Fi (802.11)
collisions
2. Hidden and Exposed Terminal Problems – In wireless networks, some devices may
not detect each other, leading to collisions (hidden terminal) or unnecessary waiting
(exposed terminal).
3. Synchronization Issues – TDMA requires precise time synchronization, which can be
difficult in distributed systems.
1. Introduction to WAP
Wireless Application Protocol (WAP) is a standard for enabling mobile devices (such as
phones and PDAs) to access the internet and other network services. It was introduced to
overcome the limitations of early mobile networks, such as low bandwidth, high latency,
and limited processing power of mobile devices.
WAP provides a platform-independent framework for accessing the web, similar to how
HTTP works for wired internet. It was primarily used in 2G and early 3G networks before
being replaced by more advanced technologies like HTML5 and responsive web design in
modern smartphones.
The WAP architecture is designed to work in a wireless environment and consists of multiple
layers that function similarly to the OSI model. It ensures that mobile devices can interact
with web services efficiently. The architecture includes the following key components:
2. WAP Gateway
4. Wireless Network
Each component plays a crucial role in processing and delivering WAP-based content. Below
is a layered structure of the WAP architecture:
The WAP architecture follows a layered approach similar to TCP/IP and OSI models:
Equivalent OSI
WAP Layer Function
Layer
Transaction Layer
Transport Supports reliable and unreliable data transmission.
(WTP)
Transport Layer Network + Maps WAP to different wireless bearers (GSM, CDMA,
(WDP) Transport etc.).
Each of these layers plays a vital role in handling wireless internet browsing, messaging, and
data transfer. Let's examine each component in detail.
• The user agent is the mobile phone, PDA, or any other wireless device capable of
accessing WAP-based content.
• It contains a WAP browser (similar to a web browser) that interprets WML (Wireless
Markup Language) pages.
• The browser interacts with a WAP Gateway to fetch and display content.
B. WAP Gateway
• Acts as an intermediary between the mobile device and the web server.
• Converts WAP requests (binary format) from mobile devices into HTTP requests for
the internet.
• Compresses and optimizes data to handle low bandwidth and high latency issues of
wireless networks.
• The origin server hosts websites and web applications, typically running HTTP and
WAP services.
• Stores WML pages, images, and scripts that are accessed by mobile users.
• Responds to requests from the WAP Gateway and delivers WAP-compatible content.
D. Wireless Network
• The wireless network provides data connectivity between the mobile device and the
WAP Gateway.
• The Wireless Data Protocol (WDP) ensures compatibility across different network
types.
• Includes:
o WML (Wireless Markup Language) – Similar to HTML but optimized for small
screens.
• Ensures WAP works across various bearer services (GSM, GPRS, CDMA, etc.).
1. User Request
o The web server processes the request and retrieves WML content.
o The content is sent back to the WAP Gateway.
4. Data Optimization
o The WAP Gateway compresses and encodes the content to optimize it for
mobile devices.
• Optimized for Wireless Networks – Works efficiently over low-bandwidth and high-
latency networks.
• Efficient Data Transfer – Uses compression and encoding to reduce data size.
• Slow Data Speeds – WAP was designed for 2G networks, making it slower compared
to modern technologies.
1. Introduction to Mobile IP
• Mobile IP allows devices to remain reachable and connected while moving across
networks.
• It is crucial for applications like VoIP, video conferencing, and mobile computing.
2. Mobile IP Architecture
Mobile IP is defined by IETF RFC 5944 and consists of three main components:
1. Mobile Node (MN) – A device (such as a smartphone or laptop) that moves between
networks while maintaining the same IP address.
2. Home Agent (HA) – A router in the mobile node’s home network that tracks its
location and forwards data to its current location.
3. Foreign Agent (FA) – A router in a visited (foreign) network that assists the mobile
node in registering and forwarding data.
Supporting Components
• Correspondent Node (CN) – Any device that communicates with the mobile node
(e.g., a web server).
• Care-of Address (CoA) – A temporary IP address assigned to the mobile node when it
moves to a foreign network.
3. Working of Mobile IP
• It receives advertisements from the Home Agent (HA) or Foreign Agent (FA).
Step 2: Registration
• The HA acknowledges the request and updates the MN’s new location.
Step 3: Tunneling
• When the Correspondent Node (CN) sends data to the MN, it is first delivered to the
Home Agent.
• The HA encapsulates the data in an IP tunnel and forwards it to the Foreign Agent
(FA).
• The FA then delivers the data to the MN using the Care-of Address (CoA).
• The MN can respond directly to the CN or route data through the HA.
4. Tunneling in Mobile IP
Types of Tunneling
5. Handoff in Mobile IP
A handoff (or handover) occurs when a mobile device moves from one network to another.
Mobile IP supports two types of handoff:
1. Hard Handoff
2. Soft Handoff
o The mobile node connects to the new network before leaving the old one.
6. Advantages of Mobile IP
Seamless Mobility – Users can move between networks without losing connection.
Continuous Communication – VoIP, video calls, and online applications work without
disruption.
Transparency – Applications work without modification.
Scalability – Supports millions of mobile devices worldwide.
7. Limitations of Mobile IP
Triangular Routing Problem – Data travels through the Home Agent, causing delays.
Security Risks – Mobile IP is vulnerable to attacks like spoofing and session hijacking.
Latency – Frequent handoffs can introduce delays.
Battery Drain – Continuous scanning and registration consume device power.
9. Applications of Mobile IP