SlideShare a Scribd company logo
1 of 34
MOBILE COMMUNICATION
INTRODUCTION
Noorbhasha Junnubabu
Table of Contents
1. Introduction
1.1. Applications
1.1.1 Vehicles
1.1.2 Emergencies
1.1.3 Business
1.1.4 Replacement of wired networks
1.1.5 Infotainment and more
1.1.6 Location dependent services
1.1.7 Mobile and wireless devices
1.2. A short history of wireless communication
1.3. A market for mobile communications
1.4. Some open research topics
1.5. A simplified reference model
1.6. Overview
1. Introduction
• What will computers look like in ten years?
– No one can make a wholly accurate prediction, but as a general
feature, most computers will certainly be portable.
• How will users access networks with the help of computers or other
communication devices?
– An ever-increasing number without any wires, i.e., wireless.
• How will people spend much of their time at work, during vacation?
– Many people will be mobile– already one of the key
characteristics of today’s society.
1. Introduction
• There are two different kinds of mobility:
– User mobility
– Device portability.
• User mobility refers to a user who has access to the same or similar
telecommunication services at different places, i.e., the user can be
mobile, and the services will follow him or her.
• Example: simple call-forwarding solutions known from the
telephone or computer desktops supporting roaming.
• With device portability, the communication device moves (with or
without a user). Many mechanisms in the network and inside the
device have to make sure that communication is still possible while
the device is moving.
• A typical example for systems supporting device portability is the
mobile phone system, where the system itself hands the device from
one radio transmitter to the next if the signal becomes too weak.
1. Introduction
• With regard to devices, the term wireless is used. This only
describes the way of accessing a network or other communication
partners, i.e., without a wire.
• A communication device can thus exhibit one of the following
characteristics:
– Fixed and wired: This configuration describes the typical
desktop computer in an office. Neither weight nor power
consumption of the devices allow for mobile usage.
– Mobile and wired: Many of today’s laptops fall into this
category.
– Fixed and wireless: This mode is used for installing networks,
e.g., in historical buildings to avoid damage by installing wires.
– Mobile and wireless: No cable restricts the user, who can roam
between different wireless networks.
1.1. Applications
1.1. Applications
1.1.1 Vehicles :
Today’s cars already comprise some, but tomorrow’s cars will
comprise many wireless communication systems and mobility aware
applications.
– Music, news, road conditions, weather reports, and other
broadcast information are received via digital audio broadcasting
(DAB) with 1.5 Mbit/s.
– For personal communication, a universal mobile
telecommunications system (UMTS) phone might be available
offering voice and data connectivity with 384 kbit/s.
– For remote areas, satellite communication can be used, while the
current position of the car is determined via the global
positioning system (GPS).
1.1. Applications
– Cars driving in the same area build a local ad-hoc network for
the fast exchange of information in emergency situations or to
help each other keep a safe distance.
– In case of an accident, not only will the airbag be triggered, but
the police and ambulance service will be informed via an
emergency call to a service provider.
– In the future, cars will also inform other cars about accidents via
the ad-hoc network to help them slow down in time, even before
a driver can recognize an accident.
– Buses, trucks, and trains are already transmitting maintenance
and logistic information to their home base, which helps to
improve organization (fleet management), and saves time and
money.
1.1. Applications
1.1.2 Emergencies :
Just imagine the possibilities of an ambulance with a high-
quality wireless connection to a hospital. Vital information about
injured persons can be sent to the hospital from the scene of the
accident. All the necessary steps for this particular type of accident
can be prepared and specialists can be consulted for an early
diagnosis.
– Wireless networks are the only means of communication in the
case of natural disasters such as hurricanes or earthquakes.
– In the worst cases, only decentralized, wireless ad-hoc networks
survive.
1.1. Applications
1.1.3 Business :
A travelling salesman today needs instant access to the
company’s database: to ensure that files on his or her laptop reflect
the current situation, to enable the company to keep track of all
activities of their travelling employees, to keep databases consistent
etc. With wireless access, the laptop can be turned into a true mobile
office, but efficient and powerful synchronization mechanisms are
needed to ensure data consistency.
1.1. Applications
1.1.4 Replacement of wired networks :
In some cases, wireless networks can also be used to replace
wired networks, e.g., remote sensors, for tradeshows, or in historic
buildings.
– Due to economic reasons, it is often impossible to wire remote
sensors for weather forecasts, earthquake detection, or to provide
environmental information. Wireless connections, e.g., via
satellite, can help in this situation.
– Tradeshows need a highly dynamic infrastructure, but cabling
takes a long time and frequently proves to be too inflexible.
– Other cases for wireless networks are computers, sensors, or
information displays in historical buildings, where excess
cabling may destroy valuable walls or floors. Wireless access
points in a corner of the room can represent a solution.
1.1. Applications
1.1.5 Infotainment and more :
Internet everywhere? Not without wireless networks! Imagine a
travel guide for a city. Static information might be loaded via CD-
ROM, DVD, or even at home via the Internet.
But wireless networks can provide up-to-date information at
any appropriate location. The travel guide might tell you something
about the history of a building downloading information about a
concert in the building at the same evening via a local wireless
network.
Another growing field of wireless network applications lies in
entertainment and games to enable, e.g., ad-hoc gaming networks as
soon as people meet to play together.
1.1. Applications
1.1.6 Location dependent services :
– Location aware services
• what services, e.g., printer, fax, phone, server etc. exist in the local
environment.
– Follow-on services
• automatic call-forwarding, transmission of the actual workspace to
the current location.
– Information services
• push: e.g., current special offers in the supermarket.
• pull: e.g., where is the Black Forrest Cherry Cake?
– Support services
• caches, intermediate results, state information etc. follow the
mobile device through the fixed network.
– Privacy
• who should gain knowledge about the location
1.1. Applications
1.1.7 Mobile and wireless devices :
1.1. Applications
1.1.7.1 Effects of device portability :
– Power consumption
• limited computing power, low quality displays, small disks
due to limited battery capacity.
– CPU
– Loss of data
• higher probability, has to be included in advance into the
design.
– Limited user interfaces
• compromise between size of fingers and portability.
• integration of character/voice recognition, abstract symbols.
– Limited memory
• limited value of mass memories with moving parts.
• flash-memory.
1.1. Applications
1.1.7.2 Wireless networks in comparison to fixed networks :
– Higher loss-rates due to interference
• emissions of, e.g., engines, lightning.
– Restrictive regulations of frequencies
• frequencies have to be coordinated, useful frequencies are almost
all occupied.
– Low transmission rates
• local some Mbit/s, regional currently 9.6kbit/s with GSM.
– Higher delays, higher jitter
• connection setup time with GSM in the second range, several
hundred milliseconds for other wireless systems.
– Lower security, simpler active attacking
• radio interface accessible for everyone, base station can be
simulated, thus attracting calls from mobile phones
– Always shared medium
• secure access mechanisms important
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.3. A market for mobile
communications
1.3. A market for mobile
communications
1.4. Some open research topics
• Interference :
Radio transmission cannot be protected against interference
using shielding as this is done in coaxial cable or twisted pair.
• Regulations and spectrum :
Frequencies have to be coordinated, and unfortunately, only a
very limited amount of frequencies are available.
• Low bandwidth :
Although they are continuously increasing, transmission rates
are still very low for wireless devices compared to desktop systems.
• High delays, large delay variation :
A serious problem for communication protocols used in today’s
Internet (TCP/IP) is the big variation in link characteristics.
1.4. Some open research topics
• Lower security, simpler to attack :
Not only can portable devices be stolen more easily, but the
radio interface is also prone to the dangers of eavesdropping.
• Shared medium :
Radio access is always realized via a shared medium. As it is
impossible to have a separate wire between a sender and each
receiver, different competitors have to ‘fight’ for the medium.
• Ad-hoc networking :
Wireless and mobile computing allows for spontaneous
networking with prior set-up of an infrastructure. However, this
raises many new questions for research: routing on the networking
and application layer, service discovery, network scalability,
reliability, and stability etc.
1.5. A simplified reference model
1.5. A simplified reference model
• A personal digital assistant (PDA) which provides an example for a
wireless and portable device.
• This PDA communicates with a base station in the middle of the
picture.
• The base station consists of a radio transceiver (sender and receiver)
and an interworking unit connecting the wireless link with the fixed
link.
• The communication partner of the PDA, a conventional computer, is
shown on the right-hand side.
1.5. A simplified reference model
• Underneath each network element, the figure shows the protocol
stack implemented in the system according to the reference model.
• End-systems, such as the PDA and computer in the example, need a
full protocol stack comprising the application layer, transport layer,
network layer, data link layer, and physical layer.
• Applications on the end-systems communicate with each other using
the lower layer services.
• Intermediate systems, such as the interworking unit, do not
necessarily need all of the layers.
1.5. A simplified reference model
• The functions of each layer in more detail in a wireless and mobile
environment as follows,
Physical layer :
This is the lowest layer in a communication system and is
responsible for the conversion of a stream of bits into signals that
can be transmitted on the sender side. The physical layer of the
receiver then transforms the signals back into a bit stream.
For wireless communication, the physical layer is responsible for
 frequency selection
 generation of the carrier frequency
 signal detection
 modulation of data onto a carrier frequency and
 encryption
1.5. A simplified reference model
Data link layer :
The main tasks of this layer include,
 accessing the medium
 multiplexing of different data streams
 correction of transmission errors and
 synchronization.
The data link layer is responsible for a reliable point-to-point
connection between two devices or a point-to-multipoint
connection between one sender and several receivers.
1.5. A simplified reference model
Network layer :
This third layer is responsible for routing packets through a
network or establishing a connection between two entities over
many other intermediate systems. Important topics are
 addressing
 routing
 device location, and
 handover between different networks.
Transport layer :
This layer is used in the reference model to establish an end-to-
end connection. Topics like,
 quality of service
 flow and congestion control are relevant
Especially if the transport protocols known from the Internet,
TCP and UDP, are to be used over a wireless link.
1.5. A simplified reference model
Application layer :
Finally, the applications are situated on top of all transmission
oriented layers. Topics of interest in this context are,
 service location
 support for multimedia applications
 adaptive applications and
 wireless access to the world wide web using a portable device.
Very demanding applications are video (high data rate) and
interactive gaming (low jitter, low latency).
1.6. Overview

More Related Content

What's hot

User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmissionJeffery Vava
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notesDr.YNM
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link LayerAbdullaziz Tagawy
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionSaba Rathinam
 
Structure of switches
Structure of switchesStructure of switches
Structure of switchesAnam Sana
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSjunnubabu
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Sudhanshu Srivastava
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 
Embedded firmware
Embedded firmwareEmbedded firmware
Embedded firmwareJoel P
 

What's hot (20)

Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Data link layer
Data link layer Data link layer
Data link layer
 
Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notes
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Structure of switches
Structure of switchesStructure of switches
Structure of switches
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Embedded firmware
Embedded firmwareEmbedded firmware
Embedded firmware
 

Viewers also liked

Final ppt wireless
Final ppt wirelessFinal ppt wireless
Final ppt wirelessPrachi Patki
 
Mobile communication concepts
Mobile communication conceptsMobile communication concepts
Mobile communication conceptsTHANDAIAH PRABU
 
02 37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
02   37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...02   37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
02 37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...Norman Gates
 
новый год 1группа
новый год 1группановый год 1группа
новый год 1группаolesy7
 
Terra Tech Corp. Edible Garden Issue August 14, 2014
Terra Tech Corp. Edible Garden Issue August 14, 2014Terra Tech Corp. Edible Garden Issue August 14, 2014
Terra Tech Corp. Edible Garden Issue August 14, 2014Norman Gates
 
Theo pwp (5)
Theo pwp (5)Theo pwp (5)
Theo pwp (5)Theo Hall
 
FDA Tobacco Industry
FDA Tobacco IndustryFDA Tobacco Industry
FDA Tobacco IndustryNorman Gates
 
5 гр февраль
5 гр февраль5 гр февраль
5 гр февральolesy7
 
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...Camera di Commercio di Verona
 
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investireAndrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investireCamera di Commercio di Verona
 
Урок физика2
Урок физика2Урок физика2
Урок физика2Demon1994
 
Trtc stock scammers
Trtc stock scammersTrtc stock scammers
Trtc stock scammersNorman Gates
 
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investireLurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investireCamera di Commercio di Verona
 
420 Investor, Alan Brochstein CFA
420 Investor, Alan Brochstein CFA420 Investor, Alan Brochstein CFA
420 Investor, Alan Brochstein CFANorman Gates
 

Viewers also liked (20)

Final ppt wireless
Final ppt wirelessFinal ppt wireless
Final ppt wireless
 
Mobile communication concepts
Mobile communication conceptsMobile communication concepts
Mobile communication concepts
 
Marijuana banking
Marijuana bankingMarijuana banking
Marijuana banking
 
02 37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
02   37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...02   37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
02 37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
 
новый год 1группа
новый год 1группановый год 1группа
новый год 1группа
 
Us20120311744
Us20120311744Us20120311744
Us20120311744
 
Terra Tech Corp. Edible Garden Issue August 14, 2014
Terra Tech Corp. Edible Garden Issue August 14, 2014Terra Tech Corp. Edible Garden Issue August 14, 2014
Terra Tech Corp. Edible Garden Issue August 14, 2014
 
CAASA TAXTABLE 3RD EDITION
CAASA TAXTABLE 3RD EDITIONCAASA TAXTABLE 3RD EDITION
CAASA TAXTABLE 3RD EDITION
 
Theo pwp (5)
Theo pwp (5)Theo pwp (5)
Theo pwp (5)
 
FDA Tobacco Industry
FDA Tobacco IndustryFDA Tobacco Industry
FDA Tobacco Industry
 
Compplan
CompplanCompplan
Compplan
 
CAASA Tax Table 2nd Edition
CAASA Tax Table 2nd EditionCAASA Tax Table 2nd Edition
CAASA Tax Table 2nd Edition
 
5 гр февраль
5 гр февраль5 гр февраль
5 гр февраль
 
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
 
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investireAndrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
 
Austism CBD
Austism CBDAustism CBD
Austism CBD
 
Урок физика2
Урок физика2Урок физика2
Урок физика2
 
Trtc stock scammers
Trtc stock scammersTrtc stock scammers
Trtc stock scammers
 
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investireLurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
 
420 Investor, Alan Brochstein CFA
420 Investor, Alan Brochstein CFA420 Investor, Alan Brochstein CFA
420 Investor, Alan Brochstein CFA
 

Similar to MOBILE COMMUNICATION

Similar to MOBILE COMMUNICATION (20)

Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Mob ppt
Mob pptMob ppt
Mob ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
MOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptxMOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptx
 
MIS
MISMIS
MIS
 
Chapter1 computer networking
Chapter1 computer networkingChapter1 computer networking
Chapter1 computer networking
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptx
 
901721_ch1.ppt
901721_ch1.ppt901721_ch1.ppt
901721_ch1.ppt
 
901721_ch1.ppt
901721_ch1.ppt901721_ch1.ppt
901721_ch1.ppt
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
3g
3g3g
3g
 
3g
3g3g
3g
 
Manet overview
Manet overviewManet overview
Manet overview
 
Computer Networks for placements. It will help you for placement
Computer Networks for placements. It will help you for placementComputer Networks for placements. It will help you for placement
Computer Networks for placements. It will help you for placement
 
M.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxM.Sc Mobile computing.pptx
M.Sc Mobile computing.pptx
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 

More from junnubabu

Priority queue in DSA
Priority queue in DSAPriority queue in DSA
Priority queue in DSAjunnubabu
 
Data struchers and algorithms
Data struchers and algorithmsData struchers and algorithms
Data struchers and algorithmsjunnubabu
 
Multithreading in java
Multithreading in javaMultithreading in java
Multithreading in javajunnubabu
 
Exceptions handling in java
Exceptions handling in javaExceptions handling in java
Exceptions handling in javajunnubabu
 
Error and exception in python
Error and exception in pythonError and exception in python
Error and exception in pythonjunnubabu
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
Data pre processing
Data pre processingData pre processing
Data pre processingjunnubabu
 
Location based reminder
Location based reminderLocation based reminder
Location based reminderjunnubabu
 

More from junnubabu (9)

Priority queue in DSA
Priority queue in DSAPriority queue in DSA
Priority queue in DSA
 
Data struchers and algorithms
Data struchers and algorithmsData struchers and algorithms
Data struchers and algorithms
 
Multithreading in java
Multithreading in javaMultithreading in java
Multithreading in java
 
Exceptions handling in java
Exceptions handling in javaExceptions handling in java
Exceptions handling in java
 
Error and exception in python
Error and exception in pythonError and exception in python
Error and exception in python
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Data pre processing
Data pre processingData pre processing
Data pre processing
 
Location based reminder
Location based reminderLocation based reminder
Location based reminder
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

MOBILE COMMUNICATION

  • 2. Table of Contents 1. Introduction 1.1. Applications 1.1.1 Vehicles 1.1.2 Emergencies 1.1.3 Business 1.1.4 Replacement of wired networks 1.1.5 Infotainment and more 1.1.6 Location dependent services 1.1.7 Mobile and wireless devices 1.2. A short history of wireless communication 1.3. A market for mobile communications 1.4. Some open research topics 1.5. A simplified reference model 1.6. Overview
  • 3. 1. Introduction • What will computers look like in ten years? – No one can make a wholly accurate prediction, but as a general feature, most computers will certainly be portable. • How will users access networks with the help of computers or other communication devices? – An ever-increasing number without any wires, i.e., wireless. • How will people spend much of their time at work, during vacation? – Many people will be mobile– already one of the key characteristics of today’s society.
  • 4. 1. Introduction • There are two different kinds of mobility: – User mobility – Device portability. • User mobility refers to a user who has access to the same or similar telecommunication services at different places, i.e., the user can be mobile, and the services will follow him or her. • Example: simple call-forwarding solutions known from the telephone or computer desktops supporting roaming. • With device portability, the communication device moves (with or without a user). Many mechanisms in the network and inside the device have to make sure that communication is still possible while the device is moving. • A typical example for systems supporting device portability is the mobile phone system, where the system itself hands the device from one radio transmitter to the next if the signal becomes too weak.
  • 5. 1. Introduction • With regard to devices, the term wireless is used. This only describes the way of accessing a network or other communication partners, i.e., without a wire. • A communication device can thus exhibit one of the following characteristics: – Fixed and wired: This configuration describes the typical desktop computer in an office. Neither weight nor power consumption of the devices allow for mobile usage. – Mobile and wired: Many of today’s laptops fall into this category. – Fixed and wireless: This mode is used for installing networks, e.g., in historical buildings to avoid damage by installing wires. – Mobile and wireless: No cable restricts the user, who can roam between different wireless networks.
  • 7. 1.1. Applications 1.1.1 Vehicles : Today’s cars already comprise some, but tomorrow’s cars will comprise many wireless communication systems and mobility aware applications. – Music, news, road conditions, weather reports, and other broadcast information are received via digital audio broadcasting (DAB) with 1.5 Mbit/s. – For personal communication, a universal mobile telecommunications system (UMTS) phone might be available offering voice and data connectivity with 384 kbit/s. – For remote areas, satellite communication can be used, while the current position of the car is determined via the global positioning system (GPS).
  • 8. 1.1. Applications – Cars driving in the same area build a local ad-hoc network for the fast exchange of information in emergency situations or to help each other keep a safe distance. – In case of an accident, not only will the airbag be triggered, but the police and ambulance service will be informed via an emergency call to a service provider. – In the future, cars will also inform other cars about accidents via the ad-hoc network to help them slow down in time, even before a driver can recognize an accident. – Buses, trucks, and trains are already transmitting maintenance and logistic information to their home base, which helps to improve organization (fleet management), and saves time and money.
  • 9. 1.1. Applications 1.1.2 Emergencies : Just imagine the possibilities of an ambulance with a high- quality wireless connection to a hospital. Vital information about injured persons can be sent to the hospital from the scene of the accident. All the necessary steps for this particular type of accident can be prepared and specialists can be consulted for an early diagnosis. – Wireless networks are the only means of communication in the case of natural disasters such as hurricanes or earthquakes. – In the worst cases, only decentralized, wireless ad-hoc networks survive.
  • 10. 1.1. Applications 1.1.3 Business : A travelling salesman today needs instant access to the company’s database: to ensure that files on his or her laptop reflect the current situation, to enable the company to keep track of all activities of their travelling employees, to keep databases consistent etc. With wireless access, the laptop can be turned into a true mobile office, but efficient and powerful synchronization mechanisms are needed to ensure data consistency.
  • 11. 1.1. Applications 1.1.4 Replacement of wired networks : In some cases, wireless networks can also be used to replace wired networks, e.g., remote sensors, for tradeshows, or in historic buildings. – Due to economic reasons, it is often impossible to wire remote sensors for weather forecasts, earthquake detection, or to provide environmental information. Wireless connections, e.g., via satellite, can help in this situation. – Tradeshows need a highly dynamic infrastructure, but cabling takes a long time and frequently proves to be too inflexible. – Other cases for wireless networks are computers, sensors, or information displays in historical buildings, where excess cabling may destroy valuable walls or floors. Wireless access points in a corner of the room can represent a solution.
  • 12. 1.1. Applications 1.1.5 Infotainment and more : Internet everywhere? Not without wireless networks! Imagine a travel guide for a city. Static information might be loaded via CD- ROM, DVD, or even at home via the Internet. But wireless networks can provide up-to-date information at any appropriate location. The travel guide might tell you something about the history of a building downloading information about a concert in the building at the same evening via a local wireless network. Another growing field of wireless network applications lies in entertainment and games to enable, e.g., ad-hoc gaming networks as soon as people meet to play together.
  • 13. 1.1. Applications 1.1.6 Location dependent services : – Location aware services • what services, e.g., printer, fax, phone, server etc. exist in the local environment. – Follow-on services • automatic call-forwarding, transmission of the actual workspace to the current location. – Information services • push: e.g., current special offers in the supermarket. • pull: e.g., where is the Black Forrest Cherry Cake? – Support services • caches, intermediate results, state information etc. follow the mobile device through the fixed network. – Privacy • who should gain knowledge about the location
  • 14. 1.1. Applications 1.1.7 Mobile and wireless devices :
  • 15. 1.1. Applications 1.1.7.1 Effects of device portability : – Power consumption • limited computing power, low quality displays, small disks due to limited battery capacity. – CPU – Loss of data • higher probability, has to be included in advance into the design. – Limited user interfaces • compromise between size of fingers and portability. • integration of character/voice recognition, abstract symbols. – Limited memory • limited value of mass memories with moving parts. • flash-memory.
  • 16. 1.1. Applications 1.1.7.2 Wireless networks in comparison to fixed networks : – Higher loss-rates due to interference • emissions of, e.g., engines, lightning. – Restrictive regulations of frequencies • frequencies have to be coordinated, useful frequencies are almost all occupied. – Low transmission rates • local some Mbit/s, regional currently 9.6kbit/s with GSM. – Higher delays, higher jitter • connection setup time with GSM in the second range, several hundred milliseconds for other wireless systems. – Lower security, simpler active attacking • radio interface accessible for everyone, base station can be simulated, thus attracting calls from mobile phones – Always shared medium • secure access mechanisms important
  • 17. 1.2. A short history of wireless communication
  • 18. 1.2. A short history of wireless communication
  • 19. 1.2. A short history of wireless communication
  • 20. 1.2. A short history of wireless communication
  • 21. 1.2. A short history of wireless communication
  • 22. 1.2. A short history of wireless communication
  • 23. 1.3. A market for mobile communications
  • 24. 1.3. A market for mobile communications
  • 25. 1.4. Some open research topics • Interference : Radio transmission cannot be protected against interference using shielding as this is done in coaxial cable or twisted pair. • Regulations and spectrum : Frequencies have to be coordinated, and unfortunately, only a very limited amount of frequencies are available. • Low bandwidth : Although they are continuously increasing, transmission rates are still very low for wireless devices compared to desktop systems. • High delays, large delay variation : A serious problem for communication protocols used in today’s Internet (TCP/IP) is the big variation in link characteristics.
  • 26. 1.4. Some open research topics • Lower security, simpler to attack : Not only can portable devices be stolen more easily, but the radio interface is also prone to the dangers of eavesdropping. • Shared medium : Radio access is always realized via a shared medium. As it is impossible to have a separate wire between a sender and each receiver, different competitors have to ‘fight’ for the medium. • Ad-hoc networking : Wireless and mobile computing allows for spontaneous networking with prior set-up of an infrastructure. However, this raises many new questions for research: routing on the networking and application layer, service discovery, network scalability, reliability, and stability etc.
  • 27. 1.5. A simplified reference model
  • 28. 1.5. A simplified reference model • A personal digital assistant (PDA) which provides an example for a wireless and portable device. • This PDA communicates with a base station in the middle of the picture. • The base station consists of a radio transceiver (sender and receiver) and an interworking unit connecting the wireless link with the fixed link. • The communication partner of the PDA, a conventional computer, is shown on the right-hand side.
  • 29. 1.5. A simplified reference model • Underneath each network element, the figure shows the protocol stack implemented in the system according to the reference model. • End-systems, such as the PDA and computer in the example, need a full protocol stack comprising the application layer, transport layer, network layer, data link layer, and physical layer. • Applications on the end-systems communicate with each other using the lower layer services. • Intermediate systems, such as the interworking unit, do not necessarily need all of the layers.
  • 30. 1.5. A simplified reference model • The functions of each layer in more detail in a wireless and mobile environment as follows, Physical layer : This is the lowest layer in a communication system and is responsible for the conversion of a stream of bits into signals that can be transmitted on the sender side. The physical layer of the receiver then transforms the signals back into a bit stream. For wireless communication, the physical layer is responsible for  frequency selection  generation of the carrier frequency  signal detection  modulation of data onto a carrier frequency and  encryption
  • 31. 1.5. A simplified reference model Data link layer : The main tasks of this layer include,  accessing the medium  multiplexing of different data streams  correction of transmission errors and  synchronization. The data link layer is responsible for a reliable point-to-point connection between two devices or a point-to-multipoint connection between one sender and several receivers.
  • 32. 1.5. A simplified reference model Network layer : This third layer is responsible for routing packets through a network or establishing a connection between two entities over many other intermediate systems. Important topics are  addressing  routing  device location, and  handover between different networks. Transport layer : This layer is used in the reference model to establish an end-to- end connection. Topics like,  quality of service  flow and congestion control are relevant Especially if the transport protocols known from the Internet, TCP and UDP, are to be used over a wireless link.
  • 33. 1.5. A simplified reference model Application layer : Finally, the applications are situated on top of all transmission oriented layers. Topics of interest in this context are,  service location  support for multimedia applications  adaptive applications and  wireless access to the world wide web using a portable device. Very demanding applications are video (high data rate) and interactive gaming (low jitter, low latency).