×
ARE YOU REALLY WORKING HARD ENOUGH TO ACHIEVE YOUR GOALS?
--Your friends at LectureNotes
Close

Note for Mobile Computing - MC by shaik shabeer

  • Mobile Computing - MC
  • Note
  • nimra college of engineering and technology - ncet
  • Computer Science Engineering
  • B.Tech
  • 13 Topics
  • 1147 Views
  • 26 Offline Downloads
  • Uploaded 4 months ago
Shaik Shabeer
Shaik Shabeer
0 User(s)
Download PDFOrder Printed Copy

Share it with your friends

Leave your Comments

Text from page-1

Unit-1 Introduction: Mobile Communications, Mobile Computing – Paradigm, Promises/Novel Applications and Impediments and Architecture; Mobile and Handheld Devices, Limitations of Mobile and Handheld Devices. GSM – Services, System Architecture, Radio Interfaces, Protocols, Localization, Calling, Handover, Security, New Data Services, GPRS. Introduction to Mobile Computing The rapidly expanding technology of cellular communication, wireless LANs, and satellite services will make information accessible anywhere and at any time. Regardless of size, most mobile computers will be equipped with a wireless connection to the fixed part of the network, and, perhaps, to other mobile computers. The resulting computing environment, which is often referred to as mobile or nomadic computing, no longer requires users to maintain a fixed and universally known position in the network and enables almost unrestricted mobility. Mobility and portability will create an entire new class of applications and, possibly, new massive markets combining personal computing and consumer electronics. Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. A communication device can exhibit any one of the following characteristics:  Fixed and wired: This configuration describes the typical desktop computer in an office. Neither weight nor power consumption of the devices  allow for mobile usage. The devices use fixed networks for performance reasons.    Mobile and wired: Ma of toda ’s laptops fall into this category; users carry the laptop fro o e hotel to the  e t, re o e ti g to the o pa ’s et ork ia the telepho e  network and a modem.   Fixed and wireless: This mode is used for installing networks, e.g., in historical buildings   to avoid damage by installing wires, or at trade shows to ensure fast network setup.   Mobile and wireless: This is the most interesting case. No cable restricts the user, who can roam between different wireless networks. Most technologies discussed in this book deal ith this t pe of de i e a d the et orks supporti g the . Toda ’s ost su essful example for this category is GSM with more than 800 million users. 1

Text from page-2

APPLICATIONS OF MOBILE COMPUTING In many fields of work, the ability to keep on the move is vital in order to utilise time efficiently. The importance of Mobile Computers has been highlighted in many fields of which a few are described below: a. Vehicles: Music, news, road conditions, weather reports, and other broadcast information are received via digital audio broadcasting (DAB) with 1.5 Mbit/s. For personal communication, a universal mobile telecommunications system (UMTS) phone might be available offering voice and data connectivity with 384 kbit/s. The current position of the car is determined via the global positioning system (GPS). Cars driving in the same area build a local ad-hoc network for the fast exchange of information in emergency situations or to help each other keep a safe distance. In case of an accident, not only will the airbag be triggered, but the police and ambulance service will be informed via an emergency call to a service provider. Buses, trucks, and trains are already transmitting maintenance and logistic information to their home base, which helps to improve organization (fleet management), and saves time and money. b. Emergencies: An ambulance with a high-quality wireless connection to a hospital can carry vital information about injured persons to the hospital from the scene of the accident. All the necessary steps for this particular type of accident can be prepared and specialists can be consulted for an early diagnosis. Wireless networks are the only means of communication in the case of natural disasters such as hurricanes or earthquakes. In the worst cases, only decentralized, wireless ad-hoc networks survive. c. Business: Managers can use mobile computers say, critical presentations to major customers. They can access the latest market share information. At a small recess, they can revise the presentation to take advantage of this information. They can communicate with the office about possible new offers and call meetings for discussing responds to the new proposals. Therefore, mobile computers can leverage competitive ad a tages. A tra elli g sales a toda eeds i sta t a ess to the o pa ’s data ase: to ensure that files on his or her laptop reflect the current situation, to enable the company to keep track of all activities of their travelling employees, to keep databases consistent etc. With wireless access, the laptop can be turned into a true mobile office, but efficient and powerful synchronization mechanisms are needed to ensure data consistency. 2

Text from page-3

d. Replacement of Wired Networks: wireless networks can also be used to replace wired networks, e.g., remote sensors, for tradeshows, or in historic buildings. Due to economic reasons, it is often impossible to wire remote sensors for weather forecasts, earthquake detection, or to provide environmental information. Wireless connections, e.g., via satellite, can help in this situation. Other examples for wireless networks are computers, sensors, or information displays in historical buildings, where excess cabling may destroy valuable walls or floors. e. Infotainment: wireless networks can provide up-to-date information at any appropriate location. The travel guide might tell you something about the history of a building (knowing via GPS, contact to a local base station, or triangulation where you are) downloading information about a concert in the building at the same evening via a local wireless network. Another growing field of wireless network applications lies in entertainment and games to enable, e.g., ad-hoc gaming networks as soon as people meet to play together. Limitations of Mobile Computing    Resource constraints: Battery      Interference: Radio transmission cannot be protected against interference using shielding and result in higher loss rates for transmitted data or higher bit error rates respectively Bandwidth: Although they are continuously increasing, transmission rates are still very low for wireless devices compared to desktop systems.  Researchers look for more efficient communication protocols with low overhead.  Dynamic changes in communication environment: variations in signal power within a region,  thus link delays and connection losses  Network Issues: discovery of the connection-service to destination and connection stability    Interoperability issues: the varying protocol standards 3

Text from page-4

 Security constraints: Not only can portable devices be stolen more easily, but the radio interface is also prone to the dangers of eavesdropping. Wireless access must always include encryption, authentication, and other security mechanisms that must  be efficient and simple to use. A simplified reference model The figure shows the protocol stack implemented in the system according to the reference model. End-systems, such as the PDA and computer in the example, need a full protocol stack comprising the application layer, transport layer, network layer, data link layer, and physical layer. Applications on the end-systems communicate with each other using the lower layer services. Intermediate systems, such as the interworking unit, do not necessarily need all of the layers. A Simplified Reference Model Physical layer: This is the lowest layer in a communication system and is responsible for the conversion of a stream of bits into signals that can be transmitted on the sender side. The physical layer of the receiver then transforms the signals back into a bit stream. For wireless communication, the physical layer is responsible for frequency selection, generation of the carrier frequency, signal detection (although heavy interference may disturb the signal), modulation of data onto a carrier frequency and (depending on the transmission scheme) encryption. ● Data link layer: The main tasks of this layer include accessing the medium, multiplexing of different data streams, correction of transmission errors, and synchronization (i.e., detection of a data frame). Altogether, the data link layer is responsible for a reliable point-to-point ● 4

Lecture Notes