SlideShare a Scribd company logo
1 of 96
Mobile Computing
R. DENIS,
Assistant Professor,
PG Department of Computer Science,
Sacred Heart College (Autonomous),
Tirupattur.
What Is Mobile Computing?
2
• What is computing?
Operation of computers
• What is the mobile?
That someone /something can move or be moved easily and quickly from place
to place
• What is mobile computing?
Users with portable computers still have network connections while they move
• A simple definition could be:
Mobile Computing is using a computer (of one kind or another) while on the move
• Another definition could be:
Mobile Computing is when a (work) process is moved from a normal fixed position
to a more dynamic position.
• A third definition could be:
Mobile Computing is when a work process is carried out somewhere where it
was not previously possible.
Comparison to Wired Net.
3
• Wired Networks
- high bandwidth
- low bandwidth variability
- can listen on wire
- high power machines
- high resource machines
- need physical access(security)
- low delay
- connected operation
• Mobile Networks
- low bandwidth
- high bandwidth variability
- hidden terminal problem
- low power machines
- low resource machines
- need proximity
- higher delay
- disconnected operation
Why Go Mobile?
4
• Enable anywhere/anytime connectivity
• Bring computer communications to areas without
pre-existing infrastructure
• Enable mobility
• Enable new applications
• An exciting new research area
Mobile Computing Vs Wireless Networking
5
MC –Denotes accessing information and remote computational services while on the move.
WN –Provides the basic communication infrastructure necessary to make this possible.
Mobile Computing:
Mobile computing is based on wireless networking.
Subsumes (counts, lists) the area of wireless networking.
6
Wireless Networking:
It helps one to invoke computing services on remote servers while on the move:
like., Office, home, conference, hotel…etc.,
It is an important intergradient (component) of mobile computing.
It’s classified into two basic types:
1. Extension of Wired Networks.
-It uses fixed infrastructure
- Base stations to provide single hop wireless communication.
-With a wired network.
2. An ad hoc Network.
-It does not use any fixed infrastructure.
-It’s based on Multi-hop Wireless communication.
-It’s also known as Mobile Ad hoc Network(MANET).
New Forms of Computing
7
Mobile Computing Functions
8
User Mobility
Network Mobility
Bearer Mobility
Device Mobility
Session Mobility
Service Mobility
Host Mobility
Types of Wireless Devices
9
• Laptops
• Palmtops
• PDAs
• Cell phones
• Pagers
• Sensors
Apple’s Newton
The Palm
10
Motorola Marco The Pocket PC
11
12
13
14
15
16
17
18
Applications for mobile computing
19
20
Enable the business initiatives by supporting mobility of
Customers
Suppliers and Businesses
Employees
Mobile computing applications
Wireless messaging (e.g., SMS)
Mobile ecommerce (M-Commerce) and its variants
Positional commerce (p-commerce) .
Voice commerce (v-commerce).
Television commerce (T-Commerce)
Mobile ebusiness applications (MEBAs), e.g., M-CRM, M-portal
Specialized applications
Location sensitive apps
Wireless sensor network apps
Mobile agent apps
Two views:
Mobile applications are fundamentally new applications.
Mobility is another dimension of the existing applications
Mobile Computing - Characteristics
21
– Mobile devices
• Laptops
• Palmtops
• Smart cell phones
– Requirements
• Data access:
– Anywhere
– Anytime
• Nomadic users
– Constraints
• Limited ressources
• Variable connectivity:
– Performance
– Reliability
Ubiquity
Location Awareness
Adaptation
Broadcast
Personalization
Ability of a user to perform computations from anywhere and at any time.
Can provide information about the current location of a user to a tracking station. GPS
Implies the ability of a system to adjust bandwidth fluctuation without
inconveniencing the user.
Efficient delivery of data can be made simultaneously to hand reads of mobile users.
Services in a mobile environment can be easily personalized according to a user’s
profile.
22
23
Three tiers.
Presentation Tier:
•User Interface.
•The users to issue requests and to present the result to the them meaningfully..
•Run on a client’s Computer.
•This layer includes web browser and customized client programs.
Application Tier:
•It’s make logical decisions and performing calculation.
•It’s move data between the presentation layer and data layers.
•It performs the processing of user input,obtaining information and then making decisions.
•Implemented using technologies. (ex:java,.net,..etc.,)
•Implementation and functionality should be database independent.
•Implemented on a fixed server.
Data Tier:
•responsible for providing the basic facilities of data storage ,access ,and manipulation.
•information is stored and retrieved from this database.
•implemented on affixed server.
Cellular systems generations
• 1G (first generation) – voice-oriented systems based on analog technology; ex.: Advanced
Mobile Phone Systems (AMPS) and cordless systems
• 2G (second generation) - voice-oriented systems based on digital technology; more efficient
and used less spectrum than 1G; ex.: Global System for Mobile (GSM) and US Time
Division Multiple Access (US-TDMA)
• 3G(third generation) – high-speed voice-oriented systems integrated with data services; ex.:
General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA)
• 4G (fourth generation) – still experimental, not deployed yet; based on Internet protocol
networks and will provide voice, data and multimedia service to subscribers
Frequency reuse
• is a method used by service providers to improve the efficiency of a
cellular network and to serve millions of subscribers using a limited radio
spectrum
• is based on the fact that after a distance a radio wave gets attenuated and
the signal falls bellow a point where it can no longer be used or cause any
interference
• a transmitter transmitting in a specific frequency range will have only a
limited coverage area
• beyond this coverage area, that frequency can be reused by another
transmitter
Network Cells
• the entire network coverage area is divided into cells based on the principle of
frequency reuse
• a cell = basic geographical unit of a cellular network; is the area around an
antenna where a specific frequency range is used; is represented graphically as
a hexagonal shape, but in reality it is irregular in shape
• when a subscriber moves to another cell, the antenna of the new cell takes over
the signal transmission
• a cluster is a group of adjacent cells, usually 7 cells; no frequency reuse is
done within a cluster
• the frequency spectrum is divided into subbands and each subband is used
within one cell of the cluster
• in heavy traffic zones cells are smaller, while in isolated zones cells are larger
Network cells (2)
Types of cells
• macrocell – their coverage is large (aprox. 6 miles in
diameter); used in remote areas, high-power transmitters and
receivers are used
• microcell – their coverage is small (half a mile in diameter)
and are used in urban zones; low-powered transmitters and
receivers are used to avoid interference with cells in another
clusters
• picocell – covers areas such as building or a tunnel
Other cellular concepts
• handover = moving a call from one zone (from the transmitter-
receiver from one zone) to another zone due to subscriber’s
mobility
• roaming = allowing the subscriber to send/receive calls outside
the service provider’s coverage area
Cellular services
• voice communication
• Short Messaging Service (SMS)
• Multimedia Messaging Service (MMS)
• Global Positioning System (GPS)
• Wireless Application Protocol (WAP) – to access
the Internet
Cellular network components
Cellular network components (2)
• BTS (Base Transceiver Station) – main component of a cell and it connects the
subscribers to the cellular network; for transmission/reception of information it uses
several antennas spread across the cell
• BSC (Basic Station Controller) – it is an interface between BTSs and it is linked to
BTSs by cable or microwave links; it routes calls between BTSs; it is also
connected to the MSC
• MSC (Mobile Switching Center) – the coordinator of a cellular network, it is
connected to several BSCs, it routes calls between BSCs; links the cellular network
with other networks like PSTN through fiber optics, microwave or copper cable
Components of a cellular phone
(MSU – Mobile Subscriber Unit)
• radio transceiver – low power radio transmitter and receiver
antenna, usually located inside the phone
• control circuitry – formats the data sent to and from the BTS;
controls signal transmission and reception
• man-machine interface – consists from a keypad and a
display; is managed by the control circuitry
• Subscriber Identity Module (SIM) – integrated circuit card
that stores the identity information of subscriber
• battery, usually Li-ion, the power unit of the phone
Global System
for
Mobile Communication
(GSM)
GSM Services
System Architecture of GSM
GSM Security
34
What is GSM?
35
What is GSM?
36
GSM Services
37
GSM Supplementary Services
38
GSM Supplementary Services
39
GSM Supplementary Services
40
41
42
43
44
45
46
47
48
49
GSM Security
• Security in GSM is broadly supported at three levels:
• Operator’s level
• Customer’s level
• System level
• These three levels help to oversee aspects such as correct
billing to the customer, avoiding fraud, protecting services and
ensuring anonymity.
50
• Authentication
• The purpose of authentication is to protect the network
against unauthorized use.
• Confidentiality
• A GSM network protects voice, data and sensitive signaling
information against eavesdropping on the radio path.
• Anonymity
• A GSM network protects against someone tracking the
location of a user or identifying calls made to or from the
user by eavesdropping on the radio path.
51
52
53
54
55
56
57
Universal Mobile Telecommunication (UMTS)
• The UMTS was developed mainly for countries with GSM
networks
• It is expected that all GSM networks will be upgraded to
UMTS networks.
• In these networks, coverage is provided by a combination of
various cell sizes, ranging from “in building” pico cells to
global cells provided by satellites.
58
• The UMTS networks are different from the 2G networks in the
following respects:
• High speech quality:
• In addition to speech , the UMTS supports the advanced data and
information services and can be called a true multimedia network.
• Higher data rate:
• The UMTS supports 2Mbps data rate, which is much higher than that
supported by the 2G mobile systems.
• Virtual home environment:
• A user roaming from his network to other UMTS networks will not feel
any discomfort.
59
UMTS Network Architecture:
• The UMTS network architecture can be divided into three
main elements:
• User Equipment (UE):
• The User Equipment (UE) is the name by which a cell
phone is referred to.
• Radio Network Subsystem(RNS):
• The RNS is the equivalent of the BSS in GSM.
• It provides and manages the wireless interface for the
overall network.
60
• Core Network:
• The core network is the equivalent of the GSM Network
Switching Subsystem (NSS).
61
MAC Protocols
(Medium Access Protocol)
• The primary responsibility of a MAC protocol is to enforce
discipline
• In the access of a shared channel when multiple nodes contend to
access the same channel.
• The MAC protocol is a sublayer of the data link layer protocol and it
directly invokes the physical layer protocol.
• At the same time, two other objectives of any MAC protocol are
• Maximization of the utilization of the channel
• Minimization of average latency of transmission
62
Properties Required of MAC Protocols:
• The design of a MAC protocol depends upon the specific environment and the specific
design requirements.
• In a general sense a good MAC protocol needs to possess the following features:
• It should implement some rules that help to enforce discipline
• It should help maximize the utilization of the channel
• Channel allocation needs to be fair.
• It should be capable of supporting several types of traffic having different maximum
and average bit rates.
• It should be robust in the face of equipment failures and changing network conditions.
• At present, IEEE 802.11 has emerged as a popular and standard MAC protocol for
wireless network.
• Wireless networks can be divided mainly into categories:
• Infrastructure-based wireless network
• Infrastructure-less wireless network 63
64
65
66
67
68
69
70
71
72
Random Assignment Schemes
• There are number of random
assignment schemes that are
used in MAC protocols.
• ALOHA
• Pure ALOHA
• Slotted ALOHA
• CSMA
• CSMA/CD
• CSMA/CA
73
74
75
76
77
78
79
80
81
82
83
84
Reservation Based Schemes
85
86
87
88
89
90
91
92
Key Mechanism in Mobile IP
Three basic Mechanisms are used,
 Discovering the care of address
 Registering the care of address
 Tunnelling to the care of address
93
Discovering the care of address
o Each mobile node uses a protocol to identify the respective home
and foreign agents
o Discovery process consists of following important steps
 The mobile agents advertise their presence by periodically broadcasting the agent
advertisement messages
 The mobile node receiving the msg. observes whether it is from home or foreign
agent.
 If the MN doesn’t wants to wait for adv. It can send solicitation msg . That will be
responded by the agent.
94
Registering the care of address
o If a MN discovers that it is on the home network, it
operates without requiring any mobility services.
o Else it goes for the registration process
 MN on new n/w sends registration req. msg to its FA, which
consist of Permanent IP and IP of the HA
 FA takes node forwards it to its HA registration req. msg which
consist of Permanent IP of MN and IP of FA
 HA updates the mobility binding by associating the care of
address of the mobile with its home address
 Then HA sends ack to FA
 FA in turn updates its visitors list
95
Tunnelling to the care of address
• Takes place to forward an IP datagram from the home agent to
the care of address which involves
 When a HA receives a packet addressed to a mobile host it forwards the
packet to the care of address (COA) using IP within IP (Encapsulation)
 Using the above method the HA inserts a new IP header in front of the
IP header of any datagram
 Destination address is set to the care of address
 Source address is set to the home agents address
96

More Related Content

What's hot

Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ippriya Nithya
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile ComputingKABILESH RAMAR
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksBikash Kumar
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Types of wireless communication technologies
Types of wireless communication technologiesTypes of wireless communication technologies
Types of wireless communication technologiesMohamed Ahmed
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmissionAnuj Rajput
 
Wireless network planning and operation
Wireless network planning and operationWireless network planning and operation
Wireless network planning and operationRAVIKIRAN ANANDE
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Networkvasanthimuniasamy
 
OKUMURA, HATA and COST231 Propagation Models
OKUMURA, HATA and COST231 Propagation ModelsOKUMURA, HATA and COST231 Propagation Models
OKUMURA, HATA and COST231 Propagation ModelsMohammed Abuibaid
 

What's hot (20)

Gprs ppt
Gprs pptGprs ppt
Gprs ppt
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Cellular network
Cellular networkCellular network
Cellular network
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Types of wireless communication technologies
Types of wireless communication technologiesTypes of wireless communication technologies
Types of wireless communication technologies
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
 
Internship ppt on bsnl
Internship ppt on bsnlInternship ppt on bsnl
Internship ppt on bsnl
 
Wireless network planning and operation
Wireless network planning and operationWireless network planning and operation
Wireless network planning and operation
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Handover
HandoverHandover
Handover
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 
OKUMURA, HATA and COST231 Propagation Models
OKUMURA, HATA and COST231 Propagation ModelsOKUMURA, HATA and COST231 Propagation Models
OKUMURA, HATA and COST231 Propagation Models
 
Telecommunication
TelecommunicationTelecommunication
Telecommunication
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Telecommunication and networks
Telecommunication and networksTelecommunication and networks
Telecommunication and networks
 

Viewers also liked

Viewers also liked (20)

Cap4 2 agentes formadores do relevo_internos
Cap4 2 agentes formadores do relevo_internosCap4 2 agentes formadores do relevo_internos
Cap4 2 agentes formadores do relevo_internos
 
Besto handling-system-co
Besto handling-system-coBesto handling-system-co
Besto handling-system-co
 
Platos del oriente venezolano
Platos del oriente venezolanoPlatos del oriente venezolano
Platos del oriente venezolano
 
Analisis nutricional de receta
Analisis nutricional de recetaAnalisis nutricional de receta
Analisis nutricional de receta
 
Glosario prolee web
Glosario prolee webGlosario prolee web
Glosario prolee web
 
Projection of Solids
Projection of SolidsProjection of Solids
Projection of Solids
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Relatoria de la biografia
Relatoria de la biografiaRelatoria de la biografia
Relatoria de la biografia
 
El método deliberativo.
El método deliberativo.El método deliberativo.
El método deliberativo.
 
Projections of Planes
Projections of PlanesProjections of Planes
Projections of Planes
 
Distancing
DistancingDistancing
Distancing
 
Subitización1 2-3(puntos)
Subitización1 2-3(puntos)Subitización1 2-3(puntos)
Subitización1 2-3(puntos)
 
Keller boot camp 3 meaning
Keller boot camp 3   meaningKeller boot camp 3   meaning
Keller boot camp 3 meaning
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Presentación Prezi
Presentación Prezi Presentación Prezi
Presentación Prezi
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 
Csi pavia notizie_n_10_del_14.03.17
Csi pavia notizie_n_10_del_14.03.17Csi pavia notizie_n_10_del_14.03.17
Csi pavia notizie_n_10_del_14.03.17
 
Pastoral. Trobada intercol.legial. Fem Camí 2017
Pastoral. Trobada intercol.legial. Fem Camí 2017Pastoral. Trobada intercol.legial. Fem Camí 2017
Pastoral. Trobada intercol.legial. Fem Camí 2017
 
A importância da oratória em todas as áreas da vida
A importância da oratória em todas as áreas da vidaA importância da oratória em todas as áreas da vida
A importância da oratória em todas as áreas da vida
 
Autobiografía
AutobiografíaAutobiografía
Autobiografía
 

Similar to Mobile Computing Complete Introduction

Similar to Mobile Computing Complete Introduction (20)

Mobile computing
Mobile computing Mobile computing
Mobile computing
 
Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020
 
CS8601 Unit-1.pptx
CS8601 Unit-1.pptxCS8601 Unit-1.pptx
CS8601 Unit-1.pptx
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 
Module 2_ GSM Mobile services.pptx
Module 2_  GSM Mobile services.pptxModule 2_  GSM Mobile services.pptx
Module 2_ GSM Mobile services.pptx
 
cellular communication
cellular communicationcellular communication
cellular communication
 
GSM TECHNOLOGIES-ARCHITECTURE.pptx
GSM TECHNOLOGIES-ARCHITECTURE.pptxGSM TECHNOLOGIES-ARCHITECTURE.pptx
GSM TECHNOLOGIES-ARCHITECTURE.pptx
 
Early Mobile Telephone System Architecture.docx
Early Mobile Telephone System Architecture.docxEarly Mobile Telephone System Architecture.docx
Early Mobile Telephone System Architecture.docx
 
1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt
 
WAP
WAPWAP
WAP
 
M2M.pptx
M2M.pptxM2M.pptx
M2M.pptx
 
GSM TECHNOLOGIES-ARCHITECTURE.pptx
GSM TECHNOLOGIES-ARCHITECTURE.pptxGSM TECHNOLOGIES-ARCHITECTURE.pptx
GSM TECHNOLOGIES-ARCHITECTURE.pptx
 
Nsu notes-unit-i
Nsu notes-unit-iNsu notes-unit-i
Nsu notes-unit-i
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
10700119013_abir.pptx
10700119013_abir.pptx10700119013_abir.pptx
10700119013_abir.pptx
 
Cellular_Net.pdf
Cellular_Net.pdfCellular_Net.pdf
Cellular_Net.pdf
 
Types o Wireless Networks in computer networks
Types o Wireless Networks in computer networksTypes o Wireless Networks in computer networks
Types o Wireless Networks in computer networks
 
MOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptxMOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptx
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Mobile Computing Complete Introduction

  • 1. Mobile Computing R. DENIS, Assistant Professor, PG Department of Computer Science, Sacred Heart College (Autonomous), Tirupattur.
  • 2. What Is Mobile Computing? 2 • What is computing? Operation of computers • What is the mobile? That someone /something can move or be moved easily and quickly from place to place • What is mobile computing? Users with portable computers still have network connections while they move • A simple definition could be: Mobile Computing is using a computer (of one kind or another) while on the move • Another definition could be: Mobile Computing is when a (work) process is moved from a normal fixed position to a more dynamic position. • A third definition could be: Mobile Computing is when a work process is carried out somewhere where it was not previously possible.
  • 3. Comparison to Wired Net. 3 • Wired Networks - high bandwidth - low bandwidth variability - can listen on wire - high power machines - high resource machines - need physical access(security) - low delay - connected operation • Mobile Networks - low bandwidth - high bandwidth variability - hidden terminal problem - low power machines - low resource machines - need proximity - higher delay - disconnected operation
  • 4. Why Go Mobile? 4 • Enable anywhere/anytime connectivity • Bring computer communications to areas without pre-existing infrastructure • Enable mobility • Enable new applications • An exciting new research area
  • 5. Mobile Computing Vs Wireless Networking 5 MC –Denotes accessing information and remote computational services while on the move. WN –Provides the basic communication infrastructure necessary to make this possible. Mobile Computing: Mobile computing is based on wireless networking. Subsumes (counts, lists) the area of wireless networking.
  • 6. 6 Wireless Networking: It helps one to invoke computing services on remote servers while on the move: like., Office, home, conference, hotel…etc., It is an important intergradient (component) of mobile computing. It’s classified into two basic types: 1. Extension of Wired Networks. -It uses fixed infrastructure - Base stations to provide single hop wireless communication. -With a wired network. 2. An ad hoc Network. -It does not use any fixed infrastructure. -It’s based on Multi-hop Wireless communication. -It’s also known as Mobile Ad hoc Network(MANET).
  • 7. New Forms of Computing 7
  • 8. Mobile Computing Functions 8 User Mobility Network Mobility Bearer Mobility Device Mobility Session Mobility Service Mobility Host Mobility
  • 9. Types of Wireless Devices 9 • Laptops • Palmtops • PDAs • Cell phones • Pagers • Sensors Apple’s Newton
  • 10. The Palm 10 Motorola Marco The Pocket PC
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. Applications for mobile computing 19
  • 20. 20 Enable the business initiatives by supporting mobility of Customers Suppliers and Businesses Employees Mobile computing applications Wireless messaging (e.g., SMS) Mobile ecommerce (M-Commerce) and its variants Positional commerce (p-commerce) . Voice commerce (v-commerce). Television commerce (T-Commerce) Mobile ebusiness applications (MEBAs), e.g., M-CRM, M-portal Specialized applications Location sensitive apps Wireless sensor network apps Mobile agent apps Two views: Mobile applications are fundamentally new applications. Mobility is another dimension of the existing applications
  • 21. Mobile Computing - Characteristics 21 – Mobile devices • Laptops • Palmtops • Smart cell phones – Requirements • Data access: – Anywhere – Anytime • Nomadic users – Constraints • Limited ressources • Variable connectivity: – Performance – Reliability Ubiquity Location Awareness Adaptation Broadcast Personalization Ability of a user to perform computations from anywhere and at any time. Can provide information about the current location of a user to a tracking station. GPS Implies the ability of a system to adjust bandwidth fluctuation without inconveniencing the user. Efficient delivery of data can be made simultaneously to hand reads of mobile users. Services in a mobile environment can be easily personalized according to a user’s profile.
  • 22. 22
  • 23. 23 Three tiers. Presentation Tier: •User Interface. •The users to issue requests and to present the result to the them meaningfully.. •Run on a client’s Computer. •This layer includes web browser and customized client programs. Application Tier: •It’s make logical decisions and performing calculation. •It’s move data between the presentation layer and data layers. •It performs the processing of user input,obtaining information and then making decisions. •Implemented using technologies. (ex:java,.net,..etc.,) •Implementation and functionality should be database independent. •Implemented on a fixed server. Data Tier: •responsible for providing the basic facilities of data storage ,access ,and manipulation. •information is stored and retrieved from this database. •implemented on affixed server.
  • 24. Cellular systems generations • 1G (first generation) – voice-oriented systems based on analog technology; ex.: Advanced Mobile Phone Systems (AMPS) and cordless systems • 2G (second generation) - voice-oriented systems based on digital technology; more efficient and used less spectrum than 1G; ex.: Global System for Mobile (GSM) and US Time Division Multiple Access (US-TDMA) • 3G(third generation) – high-speed voice-oriented systems integrated with data services; ex.: General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA) • 4G (fourth generation) – still experimental, not deployed yet; based on Internet protocol networks and will provide voice, data and multimedia service to subscribers
  • 25. Frequency reuse • is a method used by service providers to improve the efficiency of a cellular network and to serve millions of subscribers using a limited radio spectrum • is based on the fact that after a distance a radio wave gets attenuated and the signal falls bellow a point where it can no longer be used or cause any interference • a transmitter transmitting in a specific frequency range will have only a limited coverage area • beyond this coverage area, that frequency can be reused by another transmitter
  • 26. Network Cells • the entire network coverage area is divided into cells based on the principle of frequency reuse • a cell = basic geographical unit of a cellular network; is the area around an antenna where a specific frequency range is used; is represented graphically as a hexagonal shape, but in reality it is irregular in shape • when a subscriber moves to another cell, the antenna of the new cell takes over the signal transmission • a cluster is a group of adjacent cells, usually 7 cells; no frequency reuse is done within a cluster • the frequency spectrum is divided into subbands and each subband is used within one cell of the cluster • in heavy traffic zones cells are smaller, while in isolated zones cells are larger
  • 28. Types of cells • macrocell – their coverage is large (aprox. 6 miles in diameter); used in remote areas, high-power transmitters and receivers are used • microcell – their coverage is small (half a mile in diameter) and are used in urban zones; low-powered transmitters and receivers are used to avoid interference with cells in another clusters • picocell – covers areas such as building or a tunnel
  • 29. Other cellular concepts • handover = moving a call from one zone (from the transmitter- receiver from one zone) to another zone due to subscriber’s mobility • roaming = allowing the subscriber to send/receive calls outside the service provider’s coverage area
  • 30. Cellular services • voice communication • Short Messaging Service (SMS) • Multimedia Messaging Service (MMS) • Global Positioning System (GPS) • Wireless Application Protocol (WAP) – to access the Internet
  • 32. Cellular network components (2) • BTS (Base Transceiver Station) – main component of a cell and it connects the subscribers to the cellular network; for transmission/reception of information it uses several antennas spread across the cell • BSC (Basic Station Controller) – it is an interface between BTSs and it is linked to BTSs by cable or microwave links; it routes calls between BTSs; it is also connected to the MSC • MSC (Mobile Switching Center) – the coordinator of a cellular network, it is connected to several BSCs, it routes calls between BSCs; links the cellular network with other networks like PSTN through fiber optics, microwave or copper cable
  • 33. Components of a cellular phone (MSU – Mobile Subscriber Unit) • radio transceiver – low power radio transmitter and receiver antenna, usually located inside the phone • control circuitry – formats the data sent to and from the BTS; controls signal transmission and reception • man-machine interface – consists from a keypad and a display; is managed by the control circuitry • Subscriber Identity Module (SIM) – integrated circuit card that stores the identity information of subscriber • battery, usually Li-ion, the power unit of the phone
  • 34. Global System for Mobile Communication (GSM) GSM Services System Architecture of GSM GSM Security 34
  • 41. 41
  • 42. 42
  • 43. 43
  • 44. 44
  • 45. 45
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. GSM Security • Security in GSM is broadly supported at three levels: • Operator’s level • Customer’s level • System level • These three levels help to oversee aspects such as correct billing to the customer, avoiding fraud, protecting services and ensuring anonymity. 50
  • 51. • Authentication • The purpose of authentication is to protect the network against unauthorized use. • Confidentiality • A GSM network protects voice, data and sensitive signaling information against eavesdropping on the radio path. • Anonymity • A GSM network protects against someone tracking the location of a user or identifying calls made to or from the user by eavesdropping on the radio path. 51
  • 52. 52
  • 53. 53
  • 54. 54
  • 55. 55
  • 56. 56
  • 57. 57
  • 58. Universal Mobile Telecommunication (UMTS) • The UMTS was developed mainly for countries with GSM networks • It is expected that all GSM networks will be upgraded to UMTS networks. • In these networks, coverage is provided by a combination of various cell sizes, ranging from “in building” pico cells to global cells provided by satellites. 58
  • 59. • The UMTS networks are different from the 2G networks in the following respects: • High speech quality: • In addition to speech , the UMTS supports the advanced data and information services and can be called a true multimedia network. • Higher data rate: • The UMTS supports 2Mbps data rate, which is much higher than that supported by the 2G mobile systems. • Virtual home environment: • A user roaming from his network to other UMTS networks will not feel any discomfort. 59
  • 60. UMTS Network Architecture: • The UMTS network architecture can be divided into three main elements: • User Equipment (UE): • The User Equipment (UE) is the name by which a cell phone is referred to. • Radio Network Subsystem(RNS): • The RNS is the equivalent of the BSS in GSM. • It provides and manages the wireless interface for the overall network. 60
  • 61. • Core Network: • The core network is the equivalent of the GSM Network Switching Subsystem (NSS). 61
  • 62. MAC Protocols (Medium Access Protocol) • The primary responsibility of a MAC protocol is to enforce discipline • In the access of a shared channel when multiple nodes contend to access the same channel. • The MAC protocol is a sublayer of the data link layer protocol and it directly invokes the physical layer protocol. • At the same time, two other objectives of any MAC protocol are • Maximization of the utilization of the channel • Minimization of average latency of transmission 62
  • 63. Properties Required of MAC Protocols: • The design of a MAC protocol depends upon the specific environment and the specific design requirements. • In a general sense a good MAC protocol needs to possess the following features: • It should implement some rules that help to enforce discipline • It should help maximize the utilization of the channel • Channel allocation needs to be fair. • It should be capable of supporting several types of traffic having different maximum and average bit rates. • It should be robust in the face of equipment failures and changing network conditions. • At present, IEEE 802.11 has emerged as a popular and standard MAC protocol for wireless network. • Wireless networks can be divided mainly into categories: • Infrastructure-based wireless network • Infrastructure-less wireless network 63
  • 64. 64
  • 65. 65
  • 66. 66
  • 67. 67
  • 68. 68
  • 69. 69
  • 70. 70
  • 71. 71
  • 72. 72 Random Assignment Schemes • There are number of random assignment schemes that are used in MAC protocols. • ALOHA • Pure ALOHA • Slotted ALOHA • CSMA • CSMA/CD • CSMA/CA
  • 73. 73
  • 74. 74
  • 75. 75
  • 76. 76
  • 77. 77
  • 78. 78
  • 79. 79
  • 80. 80
  • 81. 81
  • 82. 82
  • 83. 83
  • 84. 84
  • 86. 86
  • 87. 87
  • 88. 88
  • 89. 89
  • 90. 90
  • 91. 91
  • 92. 92
  • 93. Key Mechanism in Mobile IP Three basic Mechanisms are used,  Discovering the care of address  Registering the care of address  Tunnelling to the care of address 93
  • 94. Discovering the care of address o Each mobile node uses a protocol to identify the respective home and foreign agents o Discovery process consists of following important steps  The mobile agents advertise their presence by periodically broadcasting the agent advertisement messages  The mobile node receiving the msg. observes whether it is from home or foreign agent.  If the MN doesn’t wants to wait for adv. It can send solicitation msg . That will be responded by the agent. 94
  • 95. Registering the care of address o If a MN discovers that it is on the home network, it operates without requiring any mobility services. o Else it goes for the registration process  MN on new n/w sends registration req. msg to its FA, which consist of Permanent IP and IP of the HA  FA takes node forwards it to its HA registration req. msg which consist of Permanent IP of MN and IP of FA  HA updates the mobility binding by associating the care of address of the mobile with its home address  Then HA sends ack to FA  FA in turn updates its visitors list 95
  • 96. Tunnelling to the care of address • Takes place to forward an IP datagram from the home agent to the care of address which involves  When a HA receives a packet addressed to a mobile host it forwards the packet to the care of address (COA) using IP within IP (Encapsulation)  Using the above method the HA inserts a new IP header in front of the IP header of any datagram  Destination address is set to the care of address  Source address is set to the home agents address 96

Editor's Notes

  1. Operation of computers (oxfords advance learner’s dictionary)
  2. Nomadic Computing: The computing environment is nomadic and moves along with the mobile user. • This is true for both local and remote services. Pervasive Computing: A computing environment, which is pervasive in nature and can be made available in any environment. Ubiquitous Computing: A disappearing (nobody will notice its presence) everyplace computing environment. User will be able to use both local and remote services.
  3. Bearer : Example could be a user was using a service through WAP bearer in his home network in Bangalore. He moves to Coimbatore, where WAP is not supported, he switch over to voice or SMS(Short Message Service) bearer to access the same application. Session :Example could be a user was using his service through a CDMA (Code Division Multiple Access) IX network. The user entered into the basement to park the car and got disconnected from his CDMA network. User goes to home office and starts using the desktop. The unfinished session in the CDMA device moves from the mobile device to the desktop computer.
  4. Broad Cast :Those near a railway station, may be sent advertising information by a taxi service operator.