SlideShare a Scribd company logo
1 of 49
IT6601 – MOBILE COMPUTING
UNIT – I INTRODUCTION
KAVIYA P
Assistant Professor
Kamaraj College of Engineering & Technology
Mobile Computing
• What is computing?
• The capability to automatically carry out certain processing related to service
invocations on a remote computer .
• What is the mobility ?
• The capability to change location while communicating to invoke computing
service at some remote computers.
• What is mobile computing?
• Ability to compute remotely while on the move. It is possible to access
information from anywhere and at anytime.
• A simple definition could be:
• Mobile Computing is using a computer (of one kind or another) while on the
move
• Another definition could be:
• Mobile Computing is when a (work) process is moved from a normal fixed
position to a more dynamic position.
• A third definition could be:
• Mobile Computing is when a work process is carried out somewhere where it
was not previously possible.
• Mobile Computing is an umbrella term used to describe technologies
that enable people to access network services anyplace, anytime, and
anywhere.
Mobile Computing
• Encompasses two separate and distinct concepts:
• Mobile communication & computing
• Computing denotes the capability to automatically carry out certain
processing related to service invocations on a remote computer.
• Communication provides the capability to change location while
communication to invoke computing services at some remote
computers
• Advantage: Flexibility to the users.
Mobile computing vs Wireless networking
• Mobile computing is based on wireless networking and helps to
invoke computing services on remote servers while on the move.
• So Wireless networking is an important and necessary ingredient of
mobile computing.
• Mobile computing also requires the applications themselves – their
design and development, the hardware at the client and server sides
Classification of Wireless networks
Wireless networks
• Wireless networks can be classified into basic types
• Infrastructure network -One is extension of wired networks. It uses
fixed infrastructure such as base station to provide single hop wireless
communication with wired network as shown in figure 2.1.
• Two-hop cellular communication as shown in figure 3.
Fig 3. Two-hop cellular communication
Ad Hoc network: It does not use any fixed infrastructure and is based on
multi-hop wireless communication as shown in figure 2.2
Applications of Mobile Computing
• Stock Information Collection/Control
• Emergency services
• For Estate Agents
• In courts
• In companies
• Credit Card Verification
• Taxi/Truck Dispatch
• Electronic Mail/Paging
• Vehicles
• transmission of news, road condition, weather, music via DAB
• personal communication using GSM
• position via GPS
• local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy
• vehicle data (e.g., from busses, high-speed trains) can be transmitted in advance for
maintenance
• Medical
• Nurses/Doctors in Medical offices are now using Wireless Tablet PCs/WLAN to collect and share
patient information.
• Sales
• Sales representatives are using Tablet PCs with Smart phones for presentation,
transmitting/access information among office, hotel, and customer location.
• Emergencies
• Early transmission of patient data to the hospital, current status, first diagnosis
• Provide mobile infrastructure in dealing with Natural Disaster (earthquake, hurricane, fire),
terrorist attacks, war, ...
Characteristics of Mobile Computing
• Ubiquity – The ability of a user to perform computation from anywhere and at
anytime. (Eg: Business Notifications)
• Location awareness – Many applications requires or value additions by location
based services. (Eg: Traffic Control Applications – GPS)
• Adaptation - Ability to adjust to bandwidth fluctuations without inconveniencing
the user. Fluctuations can arise due to a number of factors such as handoff,
obstacles, environmental noise, etc.
• Broadcast - Efficient delivery of data can be made simultaneously to hundreds of
mobile users. (Eg: Advertising information by a taxi service provider)
• Personalization – Services in a mobile environment can be easily personalized
according to a user’s profile.
Structure of Mobile Computing Application
• A mobile computing application is usually structured in terms of the
functionalities implemented .
• As shown in the figures 2.3 and 2.4 the three tiers are named
presentation tier, application tier and data tier.
• Presentation tier
• The topmost level, concerns the user interface.
• It facilitates the users to issue requests and to present the results meaningfully.
• It includes web browsers and client programs.
• This layer usually includes web browsers and customized client programs for
dissemination of information and collection of data from the user.
• Application tier
• It is responsible for making logical decisions and performing calculations.
• It also moves and processes data between the presentation and data layers.
• It performs the processing of user input, obtaining information and then making
decisions.
• Implemented using Java, .NET services, cold fusion etc.
• The implementation of this layer and functionality provided by this layer should be
database independent.
• Implemented on a fixed server.
• Data tier
• Responsible for data storage, access and manipulation.
• Often it contains database.
• The information is stored and retrieved from the database.
• But, when only small amounts of data need to be stored, a file system can be used.
• Implemented on a fixed server.
Advantages & Disadvantages
Advantages:
• Location Flexibility
• User Mobility
• Device Portability
• Saves Time
• Enhanced Productivity
• Entertainment
Disadvantages:
• Expensive
• Power Consumption
• Small Screen Display
• Slow Internet Speed
• Risky to carry
• Security Concerns
• Communication depends upon
network
MAC PROTOCOLS
MEDIA ACCESS CONTROL(MAC)
• The MAC protocol is a sub-layer of the data link layer protocol and it
directly invokes the physical layer protocol.
• A channel-access scheme is also based on a multiple access protocol
and control mechanism, also known as media access control (MAC).
• This protocol deals with issues such as addressing, assigning multiplex
channels to different users, and avoiding collisions.
Responsibility and objective of MAC Protocol
• Responsibility: Enforce discipline in the access of a shared channel
when multiple nodes contend to access that channel.
• Objective: Maximization of the utilization of the channel and
minimization of average latency of transmission.
Properties Required of MAC Protocols
• The design of a MAC protocol depends upon the specific environment
in which it is intended to operate and the specific characteristics of
the application for which it is being designed.
• A good MAC protocol needs to possess the following features:
• It should implement some rules that help to enforce discipline when multiple
nodes contend for a shared channel.
• It should help maximize the utilization of the channel.
• Channel allocation needs to be fair. No node should be discriminated against
at any time and made to wait for an unduly long time for transmission.
• It should be capable of supporting several types of traffic having different
maximum and average bit rates.
• It should be robust in the face of equipment failures and changing network
conditions.
Wireless MAC Protocols: Some Issues
• It is difficult to implement a collision detection scheme in a
wireless environment, since collisions are hard to be
detected.
• In infrastructure-less networks, the issue of hidden and
exposed terminals make a MAC protocol extremely
inefficient.
The Hidden Terminal Problem
• Wireless stations have transmission ranges and not all stations are
within radio range of each other.
• Simple CSMA will not work!
• C transmits to B.
• If A “senses” the channel, it will not hear C’s transmission and falsely
conclude that A can begin a transmission to B.
• Create a very difficult and important arbitration problem that a MAC
protocol needs to resolve.
Figure 4-26.(a)The hidden station problem. (b) The exposed station problem.
The Exposed Station Problem
• The inverse problem.
• B wants to send to C and listens to the channel.
• When B hears A’s transmission, B falsely assumes that it
cannot send to C.
• It leads to inefficient spectrum usage as well as unnecessary
transmission delays.
Taxonomy of MAC Protocols
A Taxonomy of MAC Protocols
Fixed Assignment Schemes
Fixed Assignment Schemes
• Frequency Division Multiple Access (FDMA)
• Time Division Multiple Access (TDMA)
• Code Division Multiple Access (CDMA)
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
• The available bandwidth is divided into many narrower frequency bands called
channels.
• For full duplex communication to take place, each user is allocated with
• Forward link – Communicating from it to BS.
• Reverse link – Communication from BS to it.
• Thus, each user making a call is allocated two unique frequency bands (channels)
for transmitting and receiving signals during the call.
• When the user is underway, no other user would be allocated the same frequency
band to make a call.
• Unused transmission time in a frequency band that occurs when the allocated
caller pauses between transmissions, or when no user is allocated a band, goes
idle and is wasted.
• FDMA does not achieve high channel utilization.
Time Division Multiple Access (TDMA)
Time Division Multiple Access (TDMA)
• TDMA is an access method in which multiple nodes are allotted different time
slots to access the same physical channel.
• The timeline is divided into fixed-sized time slots and these are divided among
multiple nodes who can transmit.
• Note that in this case, all sources use the same channel, but take turns in
transmitting.
• Time slots are allocated to users in a round robin manner.
• Unused time slots go idle, leading to low channel utilization.
Code Division Multiple Access (CDMA)
Code Division Multiple Access (CDMA)
• Multiple users are allotted different codes that consists of sequences of 0 and 1 to
access the same channel.
• In CDMA, multiple users use the same frequency at the same time and no time
scheduling is applied.
• The bandwidth of this medium is much larger than the space that would be
allocated to each packet transmission during FDMA and the signals can be
distinguished from each other by means of a special coding schemes that is used.
• This is done with the help of a frequency spreading code known as the m-bit
pseudo-noise (PN) code sequence.
• Using m bits, 2^m-1 different codes can be obtained.
• From these codes, each user will use only one code.
• A code for a user should be orthogonal to the codes assigned to other nodes.
Fixed Assignment Schemes
Random Assignment Schemes
Random Assignment Schemes
• ALOHA
• Slotted ALOHA
• CSMA
• CSMA/CD
• CSMA/CA
ALOHA
• A simple protocol.
• If a node has data to send, it begins to transmit.
• Pure ALOHA does not check whether the channel is busy before transmitting.
• If the frame is successfully reaches the destination, the next frame is sent.
• If the frame fails to be received at the destination, it is sent again.
• The simple ALOHA scheme works acceptably, when the chances of contention are
small. (i.e., when a small number of senders send data infrequently)
• The collisions can become unacceptably high if the number of contenders for
transmission is high.
Slotted ALOHA
• An improvement over pure ALOHA.
• The chances of collisions are attempted to be reduced by enforcing the following
restrictions.
• Time is divided into equal sized slots in which a packet can be sent.
• The size of pocket is restricted.
• A node wanting to send packet, can start to do so only at the beginning of a slot.
• Employs beacon signals to mark the beginning of a slot, at which point the nodes
having data to send can start to transmit.
• Does not work well if the number of stations contending to send data is high.
• In such case CSMA scheme works better.
Carrier Sense Multiple Access (CSMA)
• Carrier Sense Multiple Access
• sense carrier
• if idle, send
• wait for ack
• If there isn’t one, assume there was a collision, retransmit
• Vulnerable period: one tprop
Extension of CSMA
• The extension of CSMA are the collision detection CSMA/CD and the
collision avoidance CSMA/CA techniques.
• Why CA and CD?
• Difficult to detect collisions in a radio environment – why?
• A transmitting station cannot effectively distinguish incoming weak signals
from noise and the effects of its own transmission; need a full duplex radio to
listen and transmit on same frequency (not true in FDD systems)
• Hidden station problem:
• Two mutually far away stations A and C want to send to B.
• At A and C, channel appears idle
• But collision occurs at B
CSMA/CD
• CSMA/CD multi-access control protocol.
1. Each station listens before it transmits.
2. If the channel is busy, it waits until the channel goes idle, and
then it transmits.
3. If the channel is idle it transmits immediately. Continue
sensing.
4. If collision is detected, transmit a brief jamming signal, then
cease transmission, wait for a random time, and retransmit.
• collision detection is not by waiting for an ACK
CSMA/CA
• Prevent collision at the moment they are most likely occur, when bus is released
after a packet transmission.
• During the time a node is transmitting on the channel, several nodes might be
wanting to transmit and waiting for it to become free.
• The moment the transmitting node completes its transmission and would all
starts transmitting at the same time.
• To overcome in the collision avoidance scheme, all nodes are forced to wait for a
random time and then sense the medium again before starting their
transmission.
• If the medium is sensed to be busy, further random amount of time and so on.
• Thus the chance of two nodes starting to transmit at the same time would be
greatly reduced.
Reservation Based Schemes
Reservation Based Schemes
• Basic form of the reservation scheme is RTS/CTS scheme.
• A sender transmits an RTS (Ready to Send) packet to the receiver
before the actual data transmission.
• On receiving this the receiver sends CTS (Clear to Send) packet.
• The actual data transfer commences only after that.
• The other nodes sharing the medium sense the CTS packet, they
refrain from transmitting until the transmission from the sending
node is completes.
Contention-based protocol
• MACA(Multiple Access Collision Avoidance) Protocol
• MACA solves the hidden/ exposed terminal problems
• When a node wants to transmit a data packet, it first transmit a RTS (Request To
Send) frame.
• The receiver node, on receiving the RTS packet, if it is ready to receive the data
packet, transmits a CTS (Clear to Send) packet.
• Once the sender receives the CTS packet without any error, it starts transmitting
the data packet.
• If a packet transmitted by a node is lost, the node uses the binary exponential
back-off (BEB) algorithm to back off a random interval of time before retrying.
• The binary exponential back-off mechanism used in MACA might starves flows
sometimes. The problem is solved by MACAW.
MACA Protocol
The MACA protocol.
 A sending an RTS to B.
 B responding with a CTS to A.
MACA Examples
• MACA avoids the problem of
hidden terminals
• A and C want to send to B
• A sends RTS first
• C waits after receiving CTS from B
• MACA avoids the problem of
exposed terminals
• B wants to send to A, C to another
terminal
• now C does not have to wait for it
cannot receive CTS from A

More Related Content

What's hot

Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile ComputingMadhuri Badgujar
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computingaazeem689
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communicationssivakumar m
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 
Location Based services
Location Based servicesLocation Based services
Location Based servicesFraj Alshahibi
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network ArchitecturePawandeep Singh
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6Ramesh Babu
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmissionAnuj Rajput
 
IT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I IntroductionIT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I Introductionpkaviya
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
cellular wireless networks
cellular wireless networkscellular wireless networks
cellular wireless networkschiju chinnu
 

What's hot (20)

Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computing
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communications
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Location Based services
Location Based servicesLocation Based services
Location Based services
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network Architecture
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
Infrared and radio transmission
Infrared and radio transmissionInfrared and radio transmission
Infrared and radio transmission
 
IT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I IntroductionIT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I Introduction
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
cellular wireless networks
cellular wireless networkscellular wireless networks
cellular wireless networks
 

Similar to IT6601 - Introduction to Mobile Computing

Similar to IT6601 - Introduction to Mobile Computing (20)

unit-1 notes
unit-1 notesunit-1 notes
unit-1 notes
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
Networking for MBA
Networking for MBANetworking for MBA
Networking for MBA
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Data Dissemination and Synchronization
Data Dissemination and SynchronizationData Dissemination and Synchronization
Data Dissemination and Synchronization
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networks
 
Computer networks
Computer networksComputer networks
Computer networks
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
CN-Unit 1.pptx
CN-Unit 1.pptxCN-Unit 1.pptx
CN-Unit 1.pptx
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
MC PPT.pptx
MC PPT.pptxMC PPT.pptx
MC PPT.pptx
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
Modem technology
Modem technologyModem technology
Modem technology
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 

More from pkaviya

IT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database ConnectivityIT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database Connectivitypkaviya
 
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfIT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfpkaviya
 
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and ScriptingIT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and Scriptingpkaviya
 
IT2255 Web Essentials - Unit II Web Designing
IT2255 Web Essentials - Unit II  Web DesigningIT2255 Web Essentials - Unit II  Web Designing
IT2255 Web Essentials - Unit II Web Designingpkaviya
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfBT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfpkaviya
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bankpkaviya
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IIpkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT ICS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT Ipkaviya
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT Vpkaviya
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVpkaviya
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIIpkaviya
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II pkaviya
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit Ipkaviya
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V pkaviya
 

More from pkaviya (20)

IT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database ConnectivityIT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database Connectivity
 
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfIT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
 
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and ScriptingIT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
 
IT2255 Web Essentials - Unit II Web Designing
IT2255 Web Essentials - Unit II  Web DesigningIT2255 Web Essentials - Unit II  Web Designing
IT2255 Web Essentials - Unit II Web Designing
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfBT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bank
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V
 
CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT II
 
CS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT ICS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT I
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IV
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit III
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit I
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

IT6601 - Introduction to Mobile Computing

  • 1. IT6601 – MOBILE COMPUTING UNIT – I INTRODUCTION KAVIYA P Assistant Professor Kamaraj College of Engineering & Technology
  • 2. Mobile Computing • What is computing? • The capability to automatically carry out certain processing related to service invocations on a remote computer . • What is the mobility ? • The capability to change location while communicating to invoke computing service at some remote computers. • What is mobile computing? • Ability to compute remotely while on the move. It is possible to access information from anywhere and at anytime.
  • 3. • A simple definition could be: • Mobile Computing is using a computer (of one kind or another) while on the move • Another definition could be: • Mobile Computing is when a (work) process is moved from a normal fixed position to a more dynamic position. • A third definition could be: • Mobile Computing is when a work process is carried out somewhere where it was not previously possible. • Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere.
  • 4. Mobile Computing • Encompasses two separate and distinct concepts: • Mobile communication & computing • Computing denotes the capability to automatically carry out certain processing related to service invocations on a remote computer. • Communication provides the capability to change location while communication to invoke computing services at some remote computers • Advantage: Flexibility to the users.
  • 5. Mobile computing vs Wireless networking • Mobile computing is based on wireless networking and helps to invoke computing services on remote servers while on the move. • So Wireless networking is an important and necessary ingredient of mobile computing. • Mobile computing also requires the applications themselves – their design and development, the hardware at the client and server sides
  • 6. Classification of Wireless networks Wireless networks • Wireless networks can be classified into basic types • Infrastructure network -One is extension of wired networks. It uses fixed infrastructure such as base station to provide single hop wireless communication with wired network as shown in figure 2.1. • Two-hop cellular communication as shown in figure 3.
  • 7.
  • 8. Fig 3. Two-hop cellular communication
  • 9. Ad Hoc network: It does not use any fixed infrastructure and is based on multi-hop wireless communication as shown in figure 2.2
  • 10. Applications of Mobile Computing • Stock Information Collection/Control • Emergency services • For Estate Agents • In courts • In companies • Credit Card Verification • Taxi/Truck Dispatch • Electronic Mail/Paging
  • 11. • Vehicles • transmission of news, road condition, weather, music via DAB • personal communication using GSM • position via GPS • local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy • vehicle data (e.g., from busses, high-speed trains) can be transmitted in advance for maintenance • Medical • Nurses/Doctors in Medical offices are now using Wireless Tablet PCs/WLAN to collect and share patient information. • Sales • Sales representatives are using Tablet PCs with Smart phones for presentation, transmitting/access information among office, hotel, and customer location. • Emergencies • Early transmission of patient data to the hospital, current status, first diagnosis • Provide mobile infrastructure in dealing with Natural Disaster (earthquake, hurricane, fire), terrorist attacks, war, ...
  • 12. Characteristics of Mobile Computing • Ubiquity – The ability of a user to perform computation from anywhere and at anytime. (Eg: Business Notifications) • Location awareness – Many applications requires or value additions by location based services. (Eg: Traffic Control Applications – GPS) • Adaptation - Ability to adjust to bandwidth fluctuations without inconveniencing the user. Fluctuations can arise due to a number of factors such as handoff, obstacles, environmental noise, etc. • Broadcast - Efficient delivery of data can be made simultaneously to hundreds of mobile users. (Eg: Advertising information by a taxi service provider) • Personalization – Services in a mobile environment can be easily personalized according to a user’s profile.
  • 13. Structure of Mobile Computing Application • A mobile computing application is usually structured in terms of the functionalities implemented . • As shown in the figures 2.3 and 2.4 the three tiers are named presentation tier, application tier and data tier.
  • 14.
  • 15. • Presentation tier • The topmost level, concerns the user interface. • It facilitates the users to issue requests and to present the results meaningfully. • It includes web browsers and client programs. • This layer usually includes web browsers and customized client programs for dissemination of information and collection of data from the user. • Application tier • It is responsible for making logical decisions and performing calculations. • It also moves and processes data between the presentation and data layers. • It performs the processing of user input, obtaining information and then making decisions. • Implemented using Java, .NET services, cold fusion etc. • The implementation of this layer and functionality provided by this layer should be database independent. • Implemented on a fixed server.
  • 16. • Data tier • Responsible for data storage, access and manipulation. • Often it contains database. • The information is stored and retrieved from the database. • But, when only small amounts of data need to be stored, a file system can be used. • Implemented on a fixed server.
  • 17. Advantages & Disadvantages Advantages: • Location Flexibility • User Mobility • Device Portability • Saves Time • Enhanced Productivity • Entertainment Disadvantages: • Expensive • Power Consumption • Small Screen Display • Slow Internet Speed • Risky to carry • Security Concerns • Communication depends upon network
  • 19. MEDIA ACCESS CONTROL(MAC) • The MAC protocol is a sub-layer of the data link layer protocol and it directly invokes the physical layer protocol. • A channel-access scheme is also based on a multiple access protocol and control mechanism, also known as media access control (MAC). • This protocol deals with issues such as addressing, assigning multiplex channels to different users, and avoiding collisions.
  • 20. Responsibility and objective of MAC Protocol • Responsibility: Enforce discipline in the access of a shared channel when multiple nodes contend to access that channel. • Objective: Maximization of the utilization of the channel and minimization of average latency of transmission.
  • 21. Properties Required of MAC Protocols • The design of a MAC protocol depends upon the specific environment in which it is intended to operate and the specific characteristics of the application for which it is being designed. • A good MAC protocol needs to possess the following features: • It should implement some rules that help to enforce discipline when multiple nodes contend for a shared channel. • It should help maximize the utilization of the channel. • Channel allocation needs to be fair. No node should be discriminated against at any time and made to wait for an unduly long time for transmission. • It should be capable of supporting several types of traffic having different maximum and average bit rates. • It should be robust in the face of equipment failures and changing network conditions.
  • 22. Wireless MAC Protocols: Some Issues • It is difficult to implement a collision detection scheme in a wireless environment, since collisions are hard to be detected. • In infrastructure-less networks, the issue of hidden and exposed terminals make a MAC protocol extremely inefficient.
  • 23. The Hidden Terminal Problem • Wireless stations have transmission ranges and not all stations are within radio range of each other. • Simple CSMA will not work! • C transmits to B. • If A “senses” the channel, it will not hear C’s transmission and falsely conclude that A can begin a transmission to B. • Create a very difficult and important arbitration problem that a MAC protocol needs to resolve.
  • 24. Figure 4-26.(a)The hidden station problem. (b) The exposed station problem.
  • 25. The Exposed Station Problem • The inverse problem. • B wants to send to C and listens to the channel. • When B hears A’s transmission, B falsely assumes that it cannot send to C. • It leads to inefficient spectrum usage as well as unnecessary transmission delays.
  • 26. Taxonomy of MAC Protocols
  • 27. A Taxonomy of MAC Protocols
  • 29. Fixed Assignment Schemes • Frequency Division Multiple Access (FDMA) • Time Division Multiple Access (TDMA) • Code Division Multiple Access (CDMA)
  • 31. Frequency Division Multiple Access (FDMA) • The available bandwidth is divided into many narrower frequency bands called channels. • For full duplex communication to take place, each user is allocated with • Forward link – Communicating from it to BS. • Reverse link – Communication from BS to it. • Thus, each user making a call is allocated two unique frequency bands (channels) for transmitting and receiving signals during the call. • When the user is underway, no other user would be allocated the same frequency band to make a call. • Unused transmission time in a frequency band that occurs when the allocated caller pauses between transmissions, or when no user is allocated a band, goes idle and is wasted. • FDMA does not achieve high channel utilization.
  • 32. Time Division Multiple Access (TDMA)
  • 33. Time Division Multiple Access (TDMA) • TDMA is an access method in which multiple nodes are allotted different time slots to access the same physical channel. • The timeline is divided into fixed-sized time slots and these are divided among multiple nodes who can transmit. • Note that in this case, all sources use the same channel, but take turns in transmitting. • Time slots are allocated to users in a round robin manner. • Unused time slots go idle, leading to low channel utilization.
  • 34. Code Division Multiple Access (CDMA)
  • 35. Code Division Multiple Access (CDMA) • Multiple users are allotted different codes that consists of sequences of 0 and 1 to access the same channel. • In CDMA, multiple users use the same frequency at the same time and no time scheduling is applied. • The bandwidth of this medium is much larger than the space that would be allocated to each packet transmission during FDMA and the signals can be distinguished from each other by means of a special coding schemes that is used. • This is done with the help of a frequency spreading code known as the m-bit pseudo-noise (PN) code sequence. • Using m bits, 2^m-1 different codes can be obtained. • From these codes, each user will use only one code. • A code for a user should be orthogonal to the codes assigned to other nodes.
  • 38. Random Assignment Schemes • ALOHA • Slotted ALOHA • CSMA • CSMA/CD • CSMA/CA
  • 39. ALOHA • A simple protocol. • If a node has data to send, it begins to transmit. • Pure ALOHA does not check whether the channel is busy before transmitting. • If the frame is successfully reaches the destination, the next frame is sent. • If the frame fails to be received at the destination, it is sent again. • The simple ALOHA scheme works acceptably, when the chances of contention are small. (i.e., when a small number of senders send data infrequently) • The collisions can become unacceptably high if the number of contenders for transmission is high.
  • 40. Slotted ALOHA • An improvement over pure ALOHA. • The chances of collisions are attempted to be reduced by enforcing the following restrictions. • Time is divided into equal sized slots in which a packet can be sent. • The size of pocket is restricted. • A node wanting to send packet, can start to do so only at the beginning of a slot. • Employs beacon signals to mark the beginning of a slot, at which point the nodes having data to send can start to transmit. • Does not work well if the number of stations contending to send data is high. • In such case CSMA scheme works better.
  • 41. Carrier Sense Multiple Access (CSMA) • Carrier Sense Multiple Access • sense carrier • if idle, send • wait for ack • If there isn’t one, assume there was a collision, retransmit • Vulnerable period: one tprop
  • 42. Extension of CSMA • The extension of CSMA are the collision detection CSMA/CD and the collision avoidance CSMA/CA techniques. • Why CA and CD? • Difficult to detect collisions in a radio environment – why? • A transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission; need a full duplex radio to listen and transmit on same frequency (not true in FDD systems) • Hidden station problem: • Two mutually far away stations A and C want to send to B. • At A and C, channel appears idle • But collision occurs at B
  • 43. CSMA/CD • CSMA/CD multi-access control protocol. 1. Each station listens before it transmits. 2. If the channel is busy, it waits until the channel goes idle, and then it transmits. 3. If the channel is idle it transmits immediately. Continue sensing. 4. If collision is detected, transmit a brief jamming signal, then cease transmission, wait for a random time, and retransmit. • collision detection is not by waiting for an ACK
  • 44. CSMA/CA • Prevent collision at the moment they are most likely occur, when bus is released after a packet transmission. • During the time a node is transmitting on the channel, several nodes might be wanting to transmit and waiting for it to become free. • The moment the transmitting node completes its transmission and would all starts transmitting at the same time. • To overcome in the collision avoidance scheme, all nodes are forced to wait for a random time and then sense the medium again before starting their transmission. • If the medium is sensed to be busy, further random amount of time and so on. • Thus the chance of two nodes starting to transmit at the same time would be greatly reduced.
  • 46. Reservation Based Schemes • Basic form of the reservation scheme is RTS/CTS scheme. • A sender transmits an RTS (Ready to Send) packet to the receiver before the actual data transmission. • On receiving this the receiver sends CTS (Clear to Send) packet. • The actual data transfer commences only after that. • The other nodes sharing the medium sense the CTS packet, they refrain from transmitting until the transmission from the sending node is completes.
  • 47. Contention-based protocol • MACA(Multiple Access Collision Avoidance) Protocol • MACA solves the hidden/ exposed terminal problems • When a node wants to transmit a data packet, it first transmit a RTS (Request To Send) frame. • The receiver node, on receiving the RTS packet, if it is ready to receive the data packet, transmits a CTS (Clear to Send) packet. • Once the sender receives the CTS packet without any error, it starts transmitting the data packet. • If a packet transmitted by a node is lost, the node uses the binary exponential back-off (BEB) algorithm to back off a random interval of time before retrying. • The binary exponential back-off mechanism used in MACA might starves flows sometimes. The problem is solved by MACAW.
  • 48. MACA Protocol The MACA protocol.  A sending an RTS to B.  B responding with a CTS to A.
  • 49. MACA Examples • MACA avoids the problem of hidden terminals • A and C want to send to B • A sends RTS first • C waits after receiving CTS from B • MACA avoids the problem of exposed terminals • B wants to send to A, C to another terminal • now C does not have to wait for it cannot receive CTS from A