Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

mobile computing notes, Lecture notes of Mobile Computing

mobile computing notes for engineering students

Typology: Lecture notes

2017/2018

Uploaded on 10/02/2018

amit-kumar-47
amit-kumar-47 🇮🇳

3.6

(5)

2 documents

1 / 299

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1
r
Jagannath Institute of Management Sciences
Lajpat Nagar
Mobile Computing
BCA- VI sem.
Unit-1
Introduction to Mobile Computing
The rapidly expanding technology of cellular communication, wireless LANs, and
satellite services will make information accessible anywhere and at any time. Regardless of
size, most mobile computers will be equipped with a wireless connection to the fixed part of
the network, and, perhaps, to other mobile computers. The resulting computing
environment, which is often referred to as mobile or nomadic computing, no longer requires
users to maintain a fixed and universally known position in the network and enables almost
unrestricted mobility. Mobility and portability will create an entire new class of applications
and, possibly, new massive markets combining personal computing and consumer
electronics.
A technology that allows transmission of data, via a computer, without having to be
connected to a fixed physical link. Mobile voice communication is widely established
throughout the world and has had a very rapid increase in the number of subscribers to the
various cellular networks over the last few years. An extension of this technology is the
ability to send and receive data across these cellular networks. This is the principle of
mobile computing. Mobile data communication has become a very important and rapidly
evolving technology as it allows users to transmit data from remote locations to other remote
or fixed locations.
Mobile Computing is an umbrella term used to describe technologies that enable
people to access network services anyplace, anytime, and anywhere.
There are 2 aspects of mobile computing
User mobility: users communicate “anytime, anywhere, with anyone” (example:
read/write email on web browser). User mobility refers to a user who has access to the same
or similar telecommunication services at different places, i.e.,the user can be mobile, and the
services will follow him or her.
Device portability: devices can be connected anytime, anywhere to the network. With
device portability, the communication device moves .Many mechanisms in the network and
inside the device have to make sure that communication is still possible while the device is
moving.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b
pf5c
pf5d
pf5e
pf5f
pf60
pf61
pf62
pf63
pf64

Partial preview of the text

Download mobile computing notes and more Lecture notes Mobile Computing in PDF only on Docsity!

r

Jagannath Institute of Management Sciences

Lajpat Nagar

Mobile Computing

BCA- VI sem.

Unit-

Introduction to Mobile Computing

The rapidly expanding technology of cellular communication, wireless LANs, and satellite services will make information accessible anywhere and at any time. Regardless of size, most mobile computers will be equipped with a wireless connection to the fixed part of the network, and, perhaps, to other mobile computers. The resulting computing environment, which is often referred to as mobile or nomadic computing , no longer requires users to maintain a fixed and universally known position in the network and enables almost unrestricted mobility. Mobility and portability will create an entire new class of applications and, possibly, new massive markets combining personal computing and consumer electronics. A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. • Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. • Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations.

Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere.

There are 2 aspects of mobile computing

  • – User mobility : users communicate “anytime, anywhere, with anyone” (example: read/write email on web browser). User mobility refers to a user who has access to the same or similar telecommunication services at different places, i.e.,the user can be mobile, and the services will follow him or her.
  • Device portability: devices can be connected anytime, anywhere to the network. With device portability, the communication device moves .Many mechanisms in the network and inside the device have to make sure that communication is still possible while the device is moving.

A communication device can exhibit any one of the following characteristics:

Fixed and wired : This configuration describes the typical desktop computer in an office. Neither weight nor power consumption of the devices allow for mobile usage. The devices use fixed networks for performance reasons.

Mobile and wired : Many of today’s laptops fall into this category; users carry the laptop from one hotel to the next, reconnecting to the company’s network via the telephone network and a modem.

Fixed and wireless : This mode is used for installing networks, e.g., in historical buildings to avoid damage by installing wires, or at trade shows to ensure fast network setup.

Mobile and wireless : This is the most interesting case. No cable restricts the user, who can roam between different wireless networks. Most technologies discussed in this book deal with this type of device and the networks supporting them. Today’s most successful example for this category is GSM with more than 800 million users.

APPLICATIONS OF MOBILE COMPUTING

In many fields of work, the ability to keep on the move is vital in order to utilise time efficiently. The importance of Mobile Computers has been highlighted in many fields of which a few are described below: a. Vehicles: Music, news, road conditions, weather reports, and other broadcast information are received via digital audio broadcasting (DAB) with 1.5 Mbit/s. For personal communication, a universal mobile telecommunications system (UMTS) phone might be available offering voice and data connectivity with 384 kbit/s. The current position of the car is determined via the global positioning system (GPS). Cars driving in the same area build a local ad-hoc network for the fast exchange of information in emergency situations or to help each other keep a safe distance. In case of an accident, not only will the airbag be triggered, but the police and ambulance service will be informed via an emergency call to a service provider. Buses, trucks, and trains are already transmitting maintenance and logistic information to their home base, which helps to improve organization (fleet management), and saves time and money.

b. Emergencies : An ambulance with a high-quality wireless connection to a hospital can carry vital information about injured persons to the hospital from the scene of the accident. All the necessary steps for this particular type of accident can be prepared and specialists can be consulted for an early diagnosis. Wireless networks are the only means of communication in the case of natural disasters such as hurricanes or earthquakes. In the worst cases, only decentralized, wireless ad-hoc networks survive.

c. Business : Managers can use mobile computers say, critical presentations to major customers. They can access the latest market share information. At a small recess, they can revise the presentation to take advantage of this information. They can communicate with the office about possible new offers and call meetings for discussing responds to the

  1. Network Issues: discovery of the connection-service to destination and connection stability.
  2. Interoperability issues: the varying protocol standards.
  3. (^) Security constraints: Not only can portable devices be stolen more easily, but the radio interface is also prone to the dangers of eavesdropping. Wireless access must always include encryption, authentication, and other security mechanisms that must be efficient and simple to use.

A SIMPLIFIED REFERENCE MODEL

The Figure shows a personal digital assistant (PDA) which provides an example for a wireless and portable device. This PDA communicates with a base station in the middle of the picture. The base station consists of a radio transceiver (sender and receiver) and an interworking unit connecting the wireless link with the fixed link. The communication partner of the PDA, a conventional computer, is shown on the right-hand side.The figure shows the protocol stack implemented in the system according to the reference model. End-systems , such as the PDA and computer in the example, need a full protocol stack comprising the application layer, transport layer, network layer, data link layer, and physical layer. Applications on the end-systems communicate with each other using the lower layer services. Intermediate systems , such as the interworking unit, do not necessarily need all of the layers. As (according to the basic reference model) only entities at the same level communicate with each other (i.e., transport with transport, network with network) the end- system applications do not notice the intermediate system directly in this scenario. The following paragraphs explain the functions of each layer in more detail in a wireless and mobile environment.

A Simplified Reference Model

Physical layer : This is the lowest layer in a communication system and is responsible for the conversion of a stream of bits into signals that can be transmitted on the sender side. The physical layer of the receiver then transforms the signals back into a bit stream. For wireless communication, the physical layer is responsible for frequency selection, generation of the carrier frequency, signal detection (although heavy interference may disturb the signal), modulation of data onto a carrier frequency and (depending on the transmission scheme) encryption.

Data link layer : The main tasks of this layer include accessing the medium, multiplexing of different data streams, correction of transmission errors, and synchronization (i.e., detection of a data frame). Altogether, the data link layer is responsible for a reliable point-to- point connection between two devices or a point-to-multipoint connection between one sender and several receivers.

Network layer : This third layer is responsible for routing packets through a network or establishing a connection between two entities over many other intermediate systems. Important functions are addressing, routing, device location, and handover between different networks.

Transport layer : This layer is used in the reference model to establish an end-to-end connection. Quality of service, flow and congestion control are relevant, especially if the transport protocols known from the Internet, TCP and UDP, are to be used over a wireless link.

Application layer : Finally, the applications (complemented by additional layers that can support applications) are situated on top of all transmission oriented layers. Functions are service location, support for multimedia applications, adaptive applications that can handle the large variations in transmission characteristics, and wireless access to the world-wide web using a portable device.

Cellular systems

Cellular systems for mobile communications implement SDM. Each transmitter, typically called a base station , covers a certain area, a cell. Cell radii can vary from tens of meters in buildings, and hundreds of meters in cities, up to tens of kilometers in the countryside. The shape of cells are never perfect circles or hexagons (as shown in Figure 2.41), but depend on the environment (buildings, mountains, valleys etc.), on weather conditions, and sometimes even on system load. Typical systems using this approach are mobile telecommunication systems (see chapter 4), where a mobile station within the cell around a base station communicates with this base station and vice versa.

In this context, the question arises as to why mobile network providers install several thousands of base stations throughout a country (which is quite expensive) and do not use powerful transmitters with huge cells like, e.g., radio stations, use.

Advantages of cellular systems with small cells are the following:

Higher capacity : Implementing SDM allows frequency reuse. If one transmitter is far away from another, i.e., outside the interference range, it can reuse the same frequencies. As most mobile phone systems assign frequencies to certain users (or certain hopping patterns), this frequency is blocked for other users. But frequencies are a scarce resource and, the number of concurrent users per cell is very limited. Huge cells do not allow for more users. On the contrary, they are limited to less possible users per km2. This is also the reason for using very small cells in cities where many more people use mobile phones. ● Less transmission power : While power aspects are not a big problem for base stations, they are indeed problematic for mobile stations. A receiver far away from a base station would need much more transmit power than the current few Watts. But energy is a serious problem for mobile handheld devices. ● Local interference only : Having long distances between sender and receiver results in even more interference problems. With small cells, mobile stations and base stations only have to deal with ‘local’ interference. ● Robustness : Cellular systems are decentralized and so, more robust against the failure of single components. If one antenna fails, this only influences communication within a small area.

Disadvantages of cellular systems with small cells are the following:

Infrastructure needed : Cellular systems need a complex infrastructure to connect all base stations. This includes many antennas, switches for call forwarding, location registers to find a mobile station etc, which makes the whole system quite expensive.  Handover needed : The mobile station has to perform a handover when changing from one cell to another. Depending on the cell size and the speed of movement, this can happen quite often. ● Frequency planning : To avoid interference between transmitters using the same frequencies, frequencies have to be distributed carefully. On the one hand, interference should be avoided, on the other, only a limited number of frequencies is available.

Advantages and Disadvantages of cellular systems

To avoid interference, different transmitters within each other’s interference range use FDM. If FDM is combined with TDM (see Figure 2.19), the hopping pattern has to be coordinated. The general goal is never to use the same frequency at the same time within the interference range (if CDM is not applied). Two possible models to create cell patterns with minimal interference are shown in Figure 2.41. Cells are combined in clusters – on the left side three cells form a cluster, on the right side seven cells form a cluster. All cells within a cluster use disjointed sets of frequencies. On the left side, one cell in the cluster uses set f1, another cell f2, and the third cell f3. In real-life transmission, the pattern will look somewhat different. The hexagonal pattern is chosen as a simple way of illustrating the model. This pattern also shows the repetition of the same frequency sets. The transmission power of a sender has to be limited to avoid interference with the next cell using the same frequencies. To reduce interference even further (and under certain traffic conditions, i.e., number of users per km2) sectorized antennas can be used. Figure 2.42 shows the use of three sectors per cell in a cluster with three cells. Typically, it makes sense to use sectorized antennas instead of omni- directional antennas for larger cell radii.

GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS (GSM)

GSM is the most successful digital mobile telecommunication system in the world today. It is used by over 800 million people in more than 190 countries. GSM permits the integration of different voice and data services and the interworking with existing networks. Services make a network interesting for customers. The primary goal of GSM was to provide a mobile phone system that allows users to roam throughout Europe and provides voice services compatible to ISDN and other PSTN systems.

GSM SERVICES ( OR) MOBILE SERVICES

GSM permits the integration of different voice and data services and the interworking with existing networks. Services make a network interesting for customers. GSM has defined three different categories of services: bearer, tele, and supplementary services. These are described in the following subsections. Figure 4.3 shows a reference model for GSM services. A mobile station (MS) is connected to the GSM public land mobile network (PLMN) via the Um interface. (GSM-PLMN is the infrastructure needed for the GSM network.) This network is connected to transit networks, e.g., integrated services digital network (ISDN) or traditional public switched telephone network (PSTN). There might be an additional network, the source/destination network, before another terminal TE is connected. Bearer services now comprise all services that enable the transparent transmission of data between the interfaces to the network, i.e., S in case of the mobile station, and a similar interface for the other terminal (e.g., S0 for ISDN terminals). Interfaces like U, S, and R in case of ISDN have not been defined for all networks, so it depends on the specific network which interface is used as a reference for the transparent transmission of data. In the classical GSM model, bearer services are connection-oriented and circuit- or packet-switched. These services only need the lower three layers of the ISO/OSI reference model. Within the mobile station MS, the mobile termination (MT) performs all network specific tasks (TDMA, FDMA, coding etc.) and offers an interface for data transmission (S) to the terminal TE which can then be network independent. Depending on the capabilities of TE, further interfaces may be needed, such as R, according to the ISDN reference model (Halsall, 1996). Tele services are application specific and may thus need all seven layers of the ISO/OSI reference model. These services are specified end-to-end, i.e., from one terminal TE to another.

GSM has defined three different categories of services: bearer, tele and supplementary services.

1. Bearer services : GSM specifies different mechanisms for data transmission, the original GSM allowing for data rates of up to 9600 bit/s for non-voice services. Bearer services permit transparent and non-transparent, synchronous or asynchronous data transmission. Transparent bearer services only use the functions of the physical layer (layer 1) to transmit data. Data transmission has a constant delay and throughput if no transmission errors occur. Transmission quality can be improved with the use of forward error

correction (FEC) , which codes redundancy into the data stream and helps to reconstruct the original data in case of transmission errors. Transparent bearer services do not try to recover lost data in case of, for example, shadowing or interruptions due to handover. Non-transparent bearer services use protocols of layers two and three to implement error correction and flow control. These services use the transparent bearer services, adding a radio link protocol (RLP). This protocol comprises mechanisms of high-level data link control (HDLC) , and special selective-reject mechanisms to trigger retransmission of erroneous data.

Using transparent and non-transparent services, GSM specifies several bearer services for interworking with PSTN, ISDN, and packet switched public data networks (PSPDN) like X.25, which is available worldwide. Data transmission can be full-duplex, synchronous with data rates of 1.2, 2.4, 4.8, and 9.6 kbit/s or full-duplex, asynchronous from 300 to 9,600 bit/s. Clearly, these relatively low data rates reflect the assumption that data services will only constitute some small percentage of the overall traffic. While this is still true of GSM networks today, the relation of data and voice services is changing, with data becoming more and more important.

2. Tele services : GSM mainly focuses on voice-oriented tele services. These comprise encrypted voice transmission, message services, and basic data communication with terminals as known from the PSTN or ISDN (e.g., fax). The primary goal of GSM was the provision of high-quality digital voice transmission. Special codecs (coder/decoder) are used for voice transmission, while other codecs are used for the transmission of analog data for communication with traditional computer modems used in, e.g., fax machines. Another service offered by GSM is the emergency number (eg 911, 999). This service is mandatory for all providers and free of charge. This connection also has the highest priority, possibly pre-empting other connections, and will automatically be set up with the closest emergency center. A useful service for very simple message transfer is the short message service (SMS) , which offers transmission of messages of up to 160 characters. Sending and receiving of SMS is possible during data or voice transmission. It can be used for “serious” applications such as displaying road conditions, e-mail headers or stock quotes, but it can also transfer logos, ring tones, horoscopes and love letters.

The successor of SMS, the enhanced message service (EMS) , offers a larger message size, formatted text, and the transmission of animated pictures, small images and ring tones in a standardized way. But with MMS, EMS was hardly used. MMS offers the transmission of larger pictures (GIF, JPG, WBMP), short video clips etc. and comes with