SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Unit-2
Wireless/Mobile Computing Technologies
Computing Technologies are the technologies that are used to manage, process,
and communicate the data. Wireless simply means without any wire i.e. connecting
with other devices without any physical connection. Wireless computing is
transferring the data or information between computers or devices that are not
physically connected to each other and having a “wireless network connection”. For
example, mobile devices, Wi-Fi, wireless printers and scanners, etc. Mobiles are not
physically connected but then too we can transfer data.
There are some wireless/mobile computing technologies given below:
1. Global System for Mobile Communications (GSM):
GSM is a Current circuit-switched wireless data communication technology. It is
established in Europe by ETSI (European Telecommunications Standards Institute)
in the mid-1980s. GSM network has 4 different parks that who’s functions are
different: Mobile Station, BSS (Base Station Subsystem), NSS (Network Switching
Subsystem), OSS (Operation and Support Subsystem).
Code-Division Multiple Access (CDMA):
CDMA is a type of wireless computing technology. It is developed during World
War II. This technology is mostly used as it provides better network quality, more
storage capacity for voice and data communications than TDMA, decreases system
noise and interference using power control, provides more security by encoding
the user transmission data into a unique code.
Wireless in Local Loop (WLL):
WLL is a widely used technology for wireless communication systems. It is also
called a Fixed Wireless Loop. WLL is very easy to develop and less time is required
to install, very cost-effective as wireless systems are less expensive because the cost
of cable installation is not added.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Short Message Service (SMS):
SMS is originally created for a phone/mobile that uses GSM Global System for
Mobile communication). This service is used to send text messages even without
the Internet connection between two or more mobile devices. This technique is
very easy, user-friendly, comfortable and the most effective means of wireless
communication.
Wireless LAN (Wireless Local Area Network)
WLAN stands for Wireless Local Area Network. WLAN is a local area network that
uses radio communication to provide mobility to the network users while
maintaining the connectivity to the wired network. A WLAN basically, extends a
wired local area network. WLANs are built by attaching a device called the access
point (AP) to the edge of the wired network. Clients communicate with the AP
using a wireless network adapter which is similar in function to an ethernet
adapter. It is also called a LAWN is a Local area wireless network.
WLAN Architecture
Components in Wireless LAN architecture as per IEEE standards are as follows:
1. Stations: Stations consist of all the equipment that is used to connect all
wireless LANs. Each station has a wireless network controller.
2. Base Service Set (BSS): It is a group of stations communicating at the
physical layer.
3. Extended Service Set (ESS): It is a group of connected Base Service Set
(BSS).
4. Distribution Service (DS): It connects all Extended Service Set (ESS).
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Types of WLANs
As per IEEE standard WLAN is categorized into two basic modes, which are as
follows:
1. Infrastructure: In Infrastructure mode, all the endpoints are connected to a
base station and communicate through that; and this can also enable
internet access. A WLAN infrastructure can be set up with: a wireless router
(base station) and an endpoint (computer, mobile phone, etc). An office or
home Wi-Fi connection is an example of Infrastructure mode.
2. Ad Hoc: In Ad Hoc mode WLAN connects devices without a base station,
like a computer workstation. An Ad Hoc WLAN is easy to set up it provides
peer-to-peer communication. It requires two or more endpoints with built-in
radio transmission.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
MAC Issues
Ad hoc wireless networks are included portable nodes that trade packets by
sharing a typical communicate radio channel. Because of the constraints of this
channel, the data transmission to be shared among the nodes is constrained.
Responsibilities of MAC Protocol:
Network overhead should be low.
Efficiently allocate the bandwidth.
Distributed MAC operation.
Power control mechanism should be present.
Maximum utilization of channel.
Hidden and Exposed problem should be removed.
Nodes should be sync with time.
Design issues of MAC Protocol:
Bandwidth Efficiency –
Quality of Service Support –
Synchronization –
Hidden Terminal Problem –
Exposed Terminal Problem –
IEEE 802.11
The IEEE 802.11 standard, commonly known as Wi-Fi, outlines the architecture
and defines the MAC and physical layer specifications for wireless LANs (WLANs).
Wi-Fi uses high-frequency radio waves instead of cables for connecting the
devices in LAN. Given the mobility of WLAN nodes, they can move unrestricted
within the network coverage zone. The 802.11 structure is designed to
accommodate mobile stations that participate actively in network decisions.
Furthermore, it can seamlessly integrate with 2G, 3G, and 4G networks.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Important Terminologies of IEEE 802.11
Station
Access Point
Distribution System
SSID (Service Set Identifier)
SDU
PDU
Network Interface Controller
Bluetooth
Bluetooth is used for short-range wireless voice and data communication. It is a
Wireless Personal Area Network (WPAN) technology and is used for data
communications over smaller distances. This generation changed into being
invented via Ericson in 1994. It operates within the unlicensed, business, scientific,
and clinical (ISM) bands from 2.4 GHz to 2.485 GHz.
Key Features of Bluetooth
The transmission capacity of Bluetooth is 720 kbps.
Bluetooth is a wireless technology.
Bluetooth is a Low-cost and short-distance radio communications standard.
Bluetooth is robust and flexible.
The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
The architecture of Bluetooth defines two types of networks:
Piconet
Piconet is a type of Bluetooth network that contains one primary node called the
master node and seven active secondary nodes called slave nodes.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Scatternet
It is formed by using various piconets. A slave that is present in one piconet can
act as master or we can say primary in another piconet.
Applications of Bluetooth
It can be used in wireless headsets, wireless PANs, and LANs.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
It can connect a digital camera wireless to a mobile phone.
It can transfer data in terms of videos, songs, photographs, or files from one
cell phone to another cell phone or computer.
It is used in the sectors of medical healthcare, sports and fitness, Military.
Advantages
It is a low-cost and easy-to-use device.
It can also penetrate through walls.
It creates an Ad-hoc connection immediately without any wires.
It is used for voice and data transfer.
Disadvantages
It can be hacked and hence, less secure.
It has a slow data transfer rate of 3 Mbps.
Bluetooth communication does not support routing.
Wireless multiple access protocols
Multiple Access Protocols are methods used in mobile computing to control how
data is transmitted when multiple devices are trying to communicate over the
same network. These protocols ensure that data packets are sent and received
efficiently, without collisions or interference. They help manage the network traffic
so that all devices can share the communication channel smoothly and effectively.
Who is Responsible for the Transmission of Data?
The Data Link Layer is responsible for the transmission of data between two
nodes. Its main functions are:
Data Link Control
Multiple Access Control
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
What is TCP (Transmission Control Protocol)?
Transmission Control Protocol (TCP) is a connection-oriented protocol for
communications that helps in the exchange of messages between different
devices over a network. It is one of the main protocols of the TCP/IP suite.
In OSI model, it operates at the transport layer(Layer 4). It lies between
the Application and Network Layers which are used in providing reliable delivery
services. The Internet Protocol (IP), which establishes the technique for sending
data packets between computers, works with TCP.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Features of TCP
Segment Numbering System
Connection Oriented
Full Duplex
Flow Control
Error Control
Congestion Control
Advantages of TCP
It is a reliable protocol.
It provides an error-checking mechanism as well as one for recovery.
It gives flow control.
It makes sure that the data reaches the proper destination in the exact order
that it was sent.
Disadvantages of TCP
TCP is made for Wide Area Networks; thus, its size can become an issue for
small networks with low resources.
TCP runs several layers so it can slow down the speed of the network.
It is not generic in nature. It cannot represent any protocol stack other than
the TCP/IP suite. E.g., it cannot work with a Bluetooth connection.
Data broadcasting
Broadcasting in computer network is a group communication, where a sender
sends data to receivers simultaneously. This is an all − to − all communication
model where each sending device transmits data to all other devices in the
network domain.
The ways of operation of broadcasting may be −
A high-level operation in a program, like broadcasting in Message Passing
Interface.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
A low-level networking operation, like broadcasting on Ethernet.
Broadcasting is shown in the following figure –
Mobile Internet Protocol (or Mobile IP)
Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that
allows users to move from one network to another with the same IP address. It ensures
that the communication will continue without the user's sessions or connections being
dropped. Imagine having a phone number that stays the same no matter where you go.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Mobile IP works similarly, ensuring that even if your device changes its network
connection, it can still communicate without interruption.
Basic Terminologies Related to Mobile IP
A Mobile Node (MN)
A Home Network
Home Agent (HA)
Home Address
Foreign Network
A Foreign Agent (FA)
The Correspondent Node (CN)
Care-of Address (COA)
Foreign Agent COA
Co-Located COA
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
WAP - Architecture
WAP is designed in a layered fashion, so that it can be extensible, flexible, and scalable.
As a result, the WAP protocol stack is divided into five layers −
Layers of WAP Protocol
Application Layer
Wireless Application Environment (WAE). This layer is of most interest to content
developers because it contains among other things, device specifications, and the
content development programming languages, WML, and WMLScript.
Session Layer
Transaction Layer
Security Layer
Wireless Transport Layer
Transport Layer
Note that the mobile network bearers in the lower part of the figure above are not part
of the WAP protocol stack.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Protocol Stack
In mobile computing, a protocol stack refers to a structured set of protocols that
enable communication between devices and networks, particularly in wireless
environments. These protocols are layered, each with specific functions, working
together to facilitate data transmission, routing, and other networking tasks.
Key Aspects of Protocol Stacks in Mobile Computing:
Layering: Protocol stacks are organized into layers, each responsible for
specific aspects of communication.
Functions: Each layer has specific tasks, such as data formatting,
routing, and error correction.
Wireless Communication: Protocol stacks are crucial for enabling
wireless communication between mobile devices and networks,
including technologies like Wi-Fi, cellular networks, and Bluetooth.
Examples: Common protocol stacks include TCP/IP, which is used for
internet communication, and specialized stacks for wireless technologies
like Bluetooth and cellular (e.g., 4G/LTE, 5G).
Examples of Protocol Stacks in Mobile Computing:
Bluetooth: A short-range wireless communication protocol used for
devices like smartphones, headphones, and speakers.
LTE (Long Term Evolution): A cellular technology standard widely used for
mobile data communication.
Wi-Fi: A wireless networking technology used for connecting devices to
networks.
5G: The latest generation of cellular networks, offering faster speeds and
wider coverage.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Application Environment
Wireless Application Environment (WAE), the uppermost layer in the WAP stack,
provides an environment that enables a wide range of applications to be used on
the wireless devices. We have earlier discussed about the WAP WAE
programming model. In this chapter, we will focus on the various components of
WAE.
Components of WAE
Addressing Model
A syntax suitable for naming resources stored on servers. WAP use the same
addressing model as the one used on the Internet that is Uniform Resource
Locators (URL).
Wireless Markup Language (WML)
A lightweight markup language designed to meet the constraints of a wireless
environment with low bandwidth and small handheld devices. The Wireless
Markup Language is WAP's analogy to HTML used on the WWW. WML is based
on the Extensible Markup Language (XML).
WMLScript
A lightweight scripting language. WMLScript is based on ECMAScript, the same
scripting language that JavaScript is based on. It can be used for enhancing
services written in WML in the way that it to some extent adds intelligence to the
services; for example, procedural logic, loops, conditional expressions, and
computational functions.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Wireless Telephony Application (WTA, WTAI)
A framework and programming interface for telephony services. The Wireless
Telephony Application (WTA) environment provides a means to create telephony
services using WAP.
Application
Mobile computing, the use of computing devices while on the move, finds
applications across various sectors. It enables users to access information, connect
with others, and perform tasks remotely. Some key areas where mobile computing
is utilized include business operations, healthcare, education, and entertainment.
Business and Productivity:
Mobile CRM:
Businesses use mobile Customer Relationship Management (CRM) systems to
manage customer interactions and data on the go.
Field Operations:
Field workers can access information, update records, and perform tasks remotely,
improving efficiency and productivity.
Remote Work:
Mobile computing enables employees to work from anywhere, boosting flexibility
and productivity.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Mobile Payment Systems:
Mobile devices are used for secure transactions and payments.
I. Healthcare
II. Education
III. Entertainment
IV. Other Applications
Faculty Signature