Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
38 views70 pages

Mobile Computing

Mobile Computing is a technology that enables wireless data transmission between devices, allowing users to access information remotely without physical connections. It encompasses mobile communication, hardware, and software, and includes various types of communication configurations. While it offers advantages like increased productivity and portability, it also faces challenges such as security issues and higher costs associated with wireless mediums.

Uploaded by

VIKAS GOYAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views70 pages

Mobile Computing

Mobile Computing is a technology that enables wireless data transmission between devices, allowing users to access information remotely without physical connections. It encompasses mobile communication, hardware, and software, and includes various types of communication configurations. While it offers advantages like increased productivity and portability, it also faces challenges such as security issues and higher costs associated with wireless mediums.

Uploaded by

VIKAS GOYAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 70

MOBILE COMPUTING

Introduction
 Mobile Computing is a technology that provides an environment
that enables users to transmit data from one device to another
device without the use of any physical link or cables.

 It allows transmission of data, voice and video via a computer or


any other wireless-enabled device without being connected to a
fixed physical link. In this technology, data transmission is done
wirelessly with the help of wireless devices such as mobiles,
laptops etc.

 This is only because of Mobile Computing technology that you


can access and transmit data from any remote locations without
being present there physically. Mobile computing technology
provides a vast coverage diameter for communication. It is one
of the fastest and most reliable sectors of the computing
technology field.
 The concept of Mobile Computing can be
divided into three parts:

1. Mobile Communication
2. Mobile Hardware
3. Mobile Software
Mobile Communication
 It specifies a framework that is responsible for
the working of mobile computing technology.

 It refers to an infrastructure that ensures


seamless and reliable communication among
wireless devices. This framework ensures the
consistency and reliability of communication
between wireless devices.

 Its framework consists of communication


devices such as protocols, services, bandwidth
Types of Mobile communication

 Fixed and Wired


 Fixed and Wireless
 Mobile and Wired
 Mobile and Wireless
 Fixed and Wired: In Fixed and Wired
configuration, the devices are fixed at a
position, and they are connected through a
physical link to communicate with other
devices.
For Example, Desktop Computer.

 Fixed and Wireless: In Fixed and Wireless


configuration, the devices are fixed at a
position, and they are connected through a
wireless link to make communication with other
devices.

For Example, Communication Towers, WiFi router


 Mobile and Wired: In Mobile and Wired
configuration, some devices are wired, and
some are mobile. They altogether make
communication with other devices.
For Example, Laptops.

 Mobile and Wireless: In Mobile and


Wireless configuration, the devices can
communicate with each other irrespective
of their position. They can also connect to
any network without the use of any wired
device.
For Example, WiFi Dongle.
Mobile Hardware

 Mobile hardware consists of mobile


devices or device components that can
be used to receive or access the service
of mobility. Examples of mobile hardware
can be smartphones, laptops, portable
PCs, tablet PCs, Personal Digital
Assistants, etc.
Mobile Software

 Mobile software is a program that runs on


mobile hardware.

 This is the operating system for the


appliance of mobile devices.
Fixed vs. Wireless Networks in Mobile
Computing

Wireless Networks Fixed Networks

There is no requirement of any In Fixed Networks, a physical


physical configuration in the configuration is required in any
wireless network. condition.
The data loss rate is high in In Fixed Networks, a perfect link is
Wireless Networks. established between the devices,
so; the data loss rate is very low.
In Wireless Networks, the data In Fixed Networks, the rate of data
transmission rate is comparatively transmission is high, so it provides
low, so it provides less speed. high speed.
Latency is high in Wireless There is no issue of latency in
Networks, which finally results in Fixed Networks because there is a
more delay. perfect connection established
between the devices that provide
less delay.
The Wireless Networks may be Fixed Networks connections are
hacked; that's why the security is highly secured.
always low in this type of network.
Advantages
1. Increase in Productivity- Mobile devices can be used out in the
field of various companies, therefore reducing the time and cost for
clients and themselves.

2- Entertainment- Mobile devices can be used for entertainment


purposes, for personal and even for presentations to people and clients.

3- Portability- this would be one of the main advantages of mobile


computing, you are not restricted to one location in order for you to get
jobs done or even access email on the go

4- Cloud Computing- This service is available for saving documents on


a online server and being able to access them anytime and anywhere
when you have a connection to the internet and can access these files
on several mobile devices or even PCs at home.
Issues occurred in Mobile Computing.

 Costly due to Wireless Medium


 Issue due to Device Mobility
 Security Issues in Mobile Computing
 Restrictive regulation of frequency
 Higher delay
 Higher loss rates
 Low –high bandwidth variability.
Mobile Computing
Functions
 We can define a computing environment as
mobile if it supports one or more of the following
characteristics:

1. User Mobility: – User should be able to move


from one physical location to another location and
use the same service. – The service could be in the
home network or a remote network. – Example
could be a user moves from London to New York
and uses Internet to access the corporate
application the same way the user uses in the
home office
2. Network Mobility: – User should be able to
move from one network to another network
and use the same service.

Example could be a user moves from Hong


Kong to New Delhi and uses the same GSM
phone to access the corporate application
through WAP (Wireless Application Protocol).
In home network he uses this service over
GPRS (General Packet Radio Service)
whereas in Delhi he accesses it over the GSM
network.
3. Bearer Mobility: – User should be able to
move from one bearer to another and use
the same service.

Example could be a user was using a


service through WAP bearer in his home
network in Bangalore. He moves to
Coimbatore, where WAP is not supported,
he switch over to voice or SMS(Short
Message Service) bearer to access the
same application.
4. Device Mobility: –User should be able to
move from one device to another and use
the same service.

Example could be sales representatives


using their desktop computer in home
office. During the day while they are on the
street they would like to use their Palmtop
to access the application.
5. Session Mobility: – A user session should be
able to move from one user-agent environment
to another.

Example could be a user was using his service


through a CDMA (Code Division Multiple Access)
IX network. The user entered into the basement
to park the car and got disconnected from his
CDMA network. User goes to home office and
starts using the desktop. The unfinished session
in the CDMA device moves from the mobile
device to the desktop computer.
6. Service Mobility: – User should be able to
move from one service to another.

Example could be a user is writing a mail.


To complete the mail user needs to refer to
some other information. In a desktop PC,
user simply opens another service
(browser) and moves between them using
the task bar. User should be able to switch
amongst services in small footprint wireless
devices like in the desktop.
Wireless telephony
 1G: Analog Cellular Networks
1G Technology

 It basically was a network with only voice call capabilities

 In 1979, 1G was launched commercially in Tokyo city


of Japan by NTT DoCoMo firm.

 1G is an analog technology and the phones generally had


poor battery life and voice quality was large without much
security, and would most often experience dropped calls.

 The maximum speed of 1G was 2.4 Kbps.

 1G technology wasn't fully digital. This led to insecurity of


phone calls.
 Due to less frequency bandwidth for 1G, data
transmission speed was too low and was only feasible for
phone calls as they take low data to carry the intended
signals.

 There was only one medium for communication, phone


call to convey your message to the other person.

 Mobile phones were big and thick in size due to bigger


antennas that needed to catch requisite data traversing
in space.

 Also mobile phones had lower battery life because data


transmission used to take lots of energy. The other big
drawback was roaming that was not supported in 1G
technology meaning you could not use other countries'
networks. After 10 long years of 1G technology, 2G was
launched
Drawbacks of 1G:

 Poor voice quality


 Poor battery life
 Large phone size
 No security
 Limited capacity
 Poor reliability
2G: Digital Networks

 Use of digital transmission instead of analog transmission

 a new variant to communication, as SMS text messaging


became possible, initially on GSM networks and eventually on
all digital networks.

 consume less battery power

 Digital coding improves the voice clarity and reduces noise in


the line.

 Digital signals are considered environment friendly. Digital


encryption has provided secrecy and safety to the data and
voice calls.
 Better voice quality, more than one medium to
communicate brought a new change in wireless
communication technology.

 With data encryption method, transmission became more


efficient and fast with better quality and data security. Only
a particular recipient could receive the intended message
via encryption technique.

 The mobile phone size also reduced to some extent.

 Battery life improved due to digitization of data transmission


which usually took less energy to transmit.

 GSM (Global Systems for Mobile) based on TDMA (Time


Division Multiplexing Access) and CDMA (Code Division
Multiplexing Access).

 Data transmission speed was also increased to 14.4 kbps


compared to 3-4 kbps in 1G.
3G

 4 times quicker than the old 2G standards.

 With initial speeds of around 200kbps and steady


transformation of the technological innovations saw
maximum speeds of up to 7.2 Mbps.

 faster data-transmission speeds so you could use for


video calling and mobile internet.

 It enabled smartphones to provide


Faster communication
Send/receive large emails and texts
Provide fast web browsing
Video streaming and more security
 3G utilizes packet switching data
transmission rather than circuit
switching.

 Data is broken down into small pieces or


packets and then sent to the destination.
Using this method of transmission greatly
increases the speed, allowing one to send
data through multiple channels in parallel
rather than one channel in series.
4G
 It supports mobile web access like 3G but also
gaming services, HD mobile TV, Video
Conferencing, 3D TV and other services that
demand higher speeds.

 All IP packet switch network domains are used for


4G compliance which means all transmission is
based on Internet Protocol. Here, data is given the
highest priority.

 The maximum speed of a 4G network when the


device is moving is 100 Mbps or 1 Gbps for low
mobility communication like when stationary or
walking.
CELLULAR SYSTEM
 Cells
 Cell clustering
 Cell splitting
 Frequency reuse
 Handoff
CELL
 In all cellular systems, land area is divided into a
number of cells each with its radio service.

 cells are hexagonal in shape.

 Each cell uses a frequency range that is not used


by its adjacent cells. However frequencies may be
reused in non-adjacent cells.

 At the center of each cell is a base station through


which mobile phones and other mobile devices
transmit data and voice.
Cellular architecture
 A cell is a pictorial representation of the area
covered by Base Station (BS).

 A base station is that point where all our


wireless phones are connected to on a carrier
network .
Cell clustering
 A cluster is a group of cells.

 Generally, clustering is done in such a way that no two


adjacent cells operate on the same frequency.

 This is done to ensure minimal interference between two


adjacent cells, as well as to address the frequency spectrum
availability problem.

 If we consider the cells to be hexagonal, the minimum


number of cells to be present in a cluster is seven.
Cell splitting
 To cater to a large number of users in densely populous
areas, such as cities, the cells are further divided into
sub-cells, and this process is known as cell splitting.

 The sub-cells have antennas that have been reduced in


height to sufficiently cover the whole sub-cell region.

 This, in turn, increases the capacity of the cell.

 But splitting the cell into smaller parts can lead to


interference, as the band of frequencies in use within a
cell is the same.
Why??
 The main aim of the cell is to maximize
the available frequency channel and
hence accommodate more users.
 To achieve this, two main techniques are
applied and these are:

Frequency reuse and handover


Frequency reuse
 Frequencies used in a given cell area will be
simultaneously reused at a different cell which is
geographically separated.

 Frequency reuse is a technique for making use


of the same set of frequencies and or channels
in the same communication environment with
the sole aim of increasing bandwidth and
capacity of the system.

 The frequency set used in one cell can be found


in another cell but the spacing between the cells
must be in such a way that interference would
 For example, a typical seven-cell pattern can be
considered.

 Total available frequency resources are divided


into seven parts, each part consisting of a
number of radio channels and allocated to a cell
site. In a group of 7 cells, available frequency
spectrum is consumed totally. The same seven
sets of frequency can be used after certain
distance.
Handoff
 The process of handoff is used when users
moves from cell to cell.

 Handoff is a process in cellular communication


for automatically transferring the call from one
radio frequency to the other, without
interrupting the user’s conversation.

 Maintaining cellular connectivity even while the


subscriber moves from one location to another,
across the cells, poses a problem as each cell
operates at a different frequency.
Hard Handoff
 Hard Handoff is a technique that requires the
user’s connection to be broken before connecting
to another while switching between two BTS

 “break before make”.


Advantages

 Hard Handovers are cheaper as they


require only one channel to be active at a
time.

 Used in applications that can afford slight


delays, such as VoIP, Internet, and WiMAX
Soft handoff
 Soft Handoff is a feature where a cellular device gets
connected to two or more cell BTS (or cell sectors) at the
same time.

 “make before break”.


Advantages

 It provides better Quality Assurance as a


channel is always on stand by in case of
power loss in any other channel.

 More than one repeater can send and


receive signals to transmit signals to and
from mobiles, increasing transfer speed.

 Delay is very low


GSM
 Global System for Mobile (GSM) is a
second generation cellular standard
developed to cater voice services and
data delivery using digital modulation .

 Why ?
 Higher digital voice quality.
 Low cost alternatives for making calls and
sms.
GSM SERVICES
 Tele-services
 Bearer or Data Services
 Supplementary services
TELE SERVICES•
 Telecommunication services that enable
voice communication via mobile phones
BEARER SERVICES
 Include various data services for
information transfer between GSM and
other networks like PSTN, ISDN etc.
 Short Message Service (SMS) - up to 160
character alphanumeric data
transmission to/from the mobile terminal
 Voice
 mail
SUPPLEMENTARY
SERVICES
 Call related services :
 Call Waiting- Notification of an incoming call
while on the handset
 Call Hold- Put a caller on hold to take another
call
 Call Barring- All calls, outgoing calls, or
incoming calls
 Call Forwarding- Calls can be sent to various
numbers defined by the user
 Multi Party Call Conferencing - Link multiple
calls together
GSM Architecture
1. Mobile Station (MS)

MS grant access to the GSM network. It


contains the following two components.

 Mobile Equipment (ME)


 Subscriber Identity Module (SIM)
 Mobile Equipment:
 Hardware used by the subscriber to access
the network.
 Uniquely identified by IMEI number.

 Subscriber Identity Module (SIM):


 Smartcard containing the International Mobile
Subscriber Identity (IMSI).
 Allows user to send & receive calls and
received other subscribed services.
BSS
Consists of 2 parts: -
 Base Transceiver Station (BTS)

 Base Station Controller (BSC)


BASE TRANSCEIVER STATION (BTS)
 The BTS houses the radio transceivers that define a cell
and handles the radio link protocols with the MS.

 The BTS corresponds to the transceivers and antennas


used in each cell of the network.

 A BTS is usually placed in the center of a cell.

 Its transmitting power defines the size of a cell. Each BTS


has between 1 and 16 transceivers, depending on the
density of users in the cell. Each BTS serves as a single
cell.

 Handles Speech Encoding, Encryption, Multiplexing and


Modulation/ Demodulation of radio signals
BASE STATION CONTROLLER (BSC)
 Allocation of Channels.
 Frequency Administration.
 Controls the power transmission.
 Handovers from one BTS to another.
 It assigns and releases frequencies and
time slots for the MS.
NETWORK & SWITCHING SUB-
SYSTEM (NSS)
 The main part of which is the Mobile
Switching Center (MSC), performs the
switching of calls between the mobile and
other fixed or mobile network users, as
well as the management of mobile
services such as authentication.

Consists of different components as: -


Mobile Switching Centre (MSC) - Gateway
Mobile Switching Centre (GMSC) - HLR &
VLR - AuC & EIR
MOBILE SWITCHING CENTRE (MSC)
 Performs Call Routing, Call set-up and
basic switching functions.
 The MSC performs the switching of calls
between the mobile and other fixed or
mobile network users
 Registration, authentication, location
updating, handovers, and call routing to a
roaming subscriber.
 Communicates with HLR, VLR & other
MSCs.
HLR
 HLR contains a database for subscriber
specific information such as IMSI, current
location of the MS, roaming restrictions
etc.

 When an individual buys a subscription in


the form of SIM, then all the information
about this subscription is registered in
the HLR of that operator.
VLR
 The VLR is a database that contains temporary
information about subscribers that is needed by the
MSC in order to service visiting subscribers.

 The VLR is always integrated with the MSC.

 When a mobile station roams into a new MSC area, the


VLR connected to that MSC will request data about the
mobile station from the HLR.

 Later, if the mobile station makes a call, the VLR will


have the information needed for call setup without
having to interrogate the HLR each time.
EIR &AUC
 The Authentication Center is a protected database
that stores a copy of the secret key stored in each
subscriber's SIM card, which is used for
authentication and ciphering of the radio channel.

 The Equipment Identity Register (EIR) is a


database that contains a list of all valid mobile
equipment on the network, where its International
Mobile Equipment Identity (IMEI) identifies each
MS. An IMEI is marked as invalid if it has been
reported stolen or is not type approved.
Mobile computing architecture
Presentation Layer (UI):
 This layer presents data to the user and optionally permits
data manipulation and data entry, also this layer requests the
data form Business layer.

 This layer accomplished through use of Dynamic HTML and


client-side data sources and data cursors.
 This is user facing System in the first tier. This is the layer of
agent application and system.

 These applications run on the client device and offer all the
user interface.

 This tier is responsible for presenting the information to the


end user.

 Presentation Tier include web browsers (like Mozilla, Internet


Explorer etc…)WAP browsers and customized client programs.
Business Logic Layer:
 The business logic acts as the server for client requests from
workstations. It acts according Business rules fetch or insert data
through the Data Layer.

 In turn, it determines what data is needed (and where it is located) and


acts as a client in relation to a third tier of programming that might be
located on a local or mainframe computer.

 Because these middle-tier components are not tied to a specific client,


they can be used by all applications and can be moved to different
locations, as response time and other rules require.

 It performs the business logic of processing user input , obtaining data,


and making decision.

 In certain case, this layer will do the transcoding of data for appropriate
rendering in the presentation Tier.

 In mobile computing environment in addition to the business logic there


are quite a few additional management function that need to be
performed
 These function relate to decision on renderinal ,
network management , security, data store access,
etc.

 Most of these function are implemented using


different middleware software.

 Middleware frame work is defined as a layer of


software, which sits in middle between the operating
system and the user facing software.

 Using this middle ware , the application will be able


to access data from any source.  Data source ca be
text files, spreadsheets or a network, relational ,
indexed, hierarchical, XML database, object
database, etc
3. Data Access Layer:
 The third tier of the 3-tier system is made up of the
DBMS that provides all the data for the above two layers.

 This is the actual DBMS access layer.

 Avoiding dependencies on the storage mechanisms


allows for updates or changes without the application
tier clients being affected by or even aware of the
change.

 he Data Tier is used to store data needed by the


application and acts as a repository for both temporary
and permanent data.
 These can range from sophisticate relational database,
legacy hierarchical database , to even simple text files.
Design constraints
1. Decide if you will a rich client, a thin client or rich
internet application.
2. Determine the device types you will support
3. Design considering occasionally connected, limited
bandwidth scenario when required.
4. Design a UI appropriate for mobile device, taking
into account platform constraints.
5. Don’t worry about device platform
6. Storage
7. Battery
8. Graphics
9. Cloud
WCDMA architecture
Why wcdma
spreading
Spreading principle
Example 2

You might also like