SlideShare a Scribd company logo
Mobile Technologies
Unit 2
DESIGN MOBILE COMPUTING
ARCHITECTURE
Ms. Swapnali Pawar
Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Index
• Mobile Communication
• Characteristics of Mobile Communication
Device
• Features of Mobile Communication
• Applications of Mobile Communication
• Advantages of Mobile Communication
• A simplified reference model
Mobile Communication
Mobile Communication is the use of technology that
allows us to communicate with others in different
locations without the use of any physical connection
(wires or cables). Mobile communication makes our
life easier, and it saves time and effort.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Characteristics of Mobile Communication
Device
● Fixed and wired:
This configuration describes the typical desktop computer in an office. Neither weight
nor power consumption of the devices allow for mobile usage. The devices use fixed
networks for performance reasons.
● Mobile and wired:
Many of today’s laptops fall into this category; users carry the laptop from one hotel
to the next, reconnecting to the company’s network via the telephone network and a
modem.
● Fixed and wireless:
This mode is used for installing networks, e.g., in historical buildings to avoid damage
by installing wires, or at trade shows to ensure fast network setup. Another example is
bridging the last mile to a customer by a new operator that has no wired
infrastructure and does not want to lease lines from a competitor.
● Mobile and wireless:
This is the most interesting case. No cable restricts the user, who can roam between
different wireless networks. Today’s most successful example for this category is GSM
with more than 800 million users.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
1. High capacity load balancing:
Each wired or wireless infrastructure must incorporate high
capacity load balancing.High capacity load balancing means,
when one access point is overloaded, the system will actively
shift users from one access point to another depending on the
capacity which is available.
Features of Mobile Communication
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
2.Scalability
The growth in popularity of new wireless devices continuously increasing
day by day. The wireless networks have the ability to start small if
necessary, but expand in terms of coverage and capacity as needed -
without having to overhaul or build an entirely new network.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
3. Network management system:
Now a day, wireless networks are much more complex and
may consist of hundreds or even thousands of access
points, firewalls, switches, managed power and various
other components.The wireless networks have a smarter
way of managing the entire network from a centralized
point.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
4. Role based access control
Role based access control (RBAC) allows you to assign roles based on what, who,
where, when and how a user or device is trying to access your network.
Once the end user or role of the devices is defined, access control policies or rules
can be enforced.
•Indoor as well as outdoor coverage options:
It is important that your wireless system has the capability of adding indoor
coverage as well as outdoor coverage.
•Network access control:
Network access control can also be called as mobile device registration. It is
essential to have a secure registration.
Network access control (NAC) controls the role of the user and enforces policies.
NAC can allow your users to register themselves to the network. It is a helpful
feature that enhances the user experience.
•Mobile device management:
Suppose, many mobile devices are accessing your wireless network; now think
about the thousands of applications are running on those mobile devices.
How do you plan on managing all of these devices and their applications,
especially as devices come and go from your business?
Mobile device management can provide control of how you will manage access
to programs and applications. Even you can remotely wipe the device if it is lost
or stolen.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
• Roaming: You don't need to worry about dropped
connections, slower speeds or any disruption in service as
you move throughout your office or even from building to
building wireless needs to be mobile first.
Roaming allows your end-users to successfully move from
one access point to another without ever noticing a dip in a
performance.
For example: allowing a student to check their mail as they
walk from one class to the next.
• Redundancy: The level or amount of redundancy your
wireless system requires depends on your specific
environment and needs.
For example: A hospital environment will need a higher
level of redundancy than a coffee shop. However, at the
end of the day, they both need to have a backup plan in
place.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
5.Proper Security means using the right firewall
The backbone of the system is your network firewall. With
the right firewall in place you will be able to:
• See and control both your applications and end users.
• Create the right balance between security and
performance.
• Reduce the complexity with:
Antivirus protection.
Deep Packet Inspection (DPI)
Application filtering
• Protect your network and end users against known and
unknown threads including:
Zero- day.
Encrypted malware.
Ransomware.
Malicious botnets.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
6.Switching:
Basically, a network switch is the traffic cop of your wireless
network which making sure that everyone and every device
gets to where they need to go.
Switching is an essential part of every fast, secure wireless
network for several reasons:
• It helps the traffic on your network flow more efficiently.
• It minimizes unnecessary traffic.
• It creates a better user experience by ensuring your
traffic is going to the right places.
Applications of Mobile Communication
1. Vehicles
2. Emergencies
3. Business
4. Replacement of wired networks
5. Infotainment and more
6. Location dependent services
7. Mobile and wireless devices
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
1. Vehicles
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Business
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Advantages of Mobile Communication
 Flexibility:
 Wireless communication enables the people to communicate with each other regardless of
location. There is no need to be in an office or some telephone booth in order to pass and
receive messages.
 Cost effectiveness:
 In wireless communication, there is no need of any physical infrastructure (Wires or cables)
or maintenance practice. Hence, the cost is reduced.
 Speed:
 Improvements can also be seen in speed. The network connectivity or the accessibility was
much improved in accuracy and speed.
 Accessibility:
 With the help of wireless technology easy accessibility to the remote areas is possible. For
example, in rural areas, online education is now possible. Educators or students no longer
need to travel to far-flung areas to teach their lessons.
 Constant connectivity:
 Constant connectivity ensures that people can respond to emergencies relatively quickly.
For example, a wireless device like mobile can ensure you a constant connectivity though
you move from place to place or while you travel, whereas a wired landline can't.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
A simplified reference model
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
● Physical layer:
This is the lowest layer in a communication system and is responsible for the
conversion of a stream of bits into signals that can be transmitted on the sender
side. The physical layer of the receiver then transforms the signals back into a bit
stream. For wireless communication, the physical layer is responsible for
frequency selection, generation of the carrier frequency, signal detection
(although heavy interference may disturb the signal), modulation of data onto a
carrier frequency and (depending on the transmission scheme) encryption. These
features of the physical layer are mainly discussed in chapter 2, but will also be
mentioned for each system separately in the appropriate chapters.
● Data link layer:
The main tasks of this layer include accessing the medium, multiplexing of
different data streams, correction of transmission errors, and synchronization
(i.e., detection of a data frame). Chapter 3 discusses different medium access
schemes. A small section about the specific data link layer used in the presented
systems is combined in each respective chapter. Altogether, the data link layer is
responsible for a reliable point-topoint connection between two devices or a point-
to-multipoint connection between one sender and several receivers.
A simplified reference model
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
● Network layer:
This third layer is responsible for routing packets through a network or
establishing a connection between two entities over many other intermediate
systems. Important topics are addressing, routing, device location, and handover
between different networks. Chapter 8 presents several solutions for the network
layer protocol of the internet (the Internet Protocol IP). The other chapters also
contain sections about the network layer, as routing is necessary in most cases.
● Transport layer:
This layer is used in the reference model to establish an end-to-end connection.
Topics like quality of service, flow and congestion control are relevant, especially
if the transport protocols known from the Internet, TCP and UDP, are to be used
over a wireless link.
● Application layer:
Finally, the applications (complemented by additional layers that can support
applications) are situated on top of all transmissionoriented layers. Topics of
interest in this context are service location, support for multimedia applications,
adaptive applications that can handle the large variations in transmission
characteristics, and wireless access to the world wide web using a portable
device. Very demanding applications are video (high data rate) and interactive
gaming (low jitter, low latency).
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar

More Related Content

What's hot

Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
vihangshah12
 
Future of mobile technology
Future of mobile technologyFuture of mobile technology
Future of mobile technology
mktgmobile
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
Ed Dodds
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
Swapnali Pawar
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
Pallepati Vasavi
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
Universitas Teknokrat Indonesia
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
Madhuri Badgujar
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computingcegonsoft1999
 
Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)
cegonsoft1999
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
raksharao
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
Nitin Ujgare
 
WAP
WAPWAP
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
Sudipto Rocksandrules
 
Mobile computing
Mobile computingMobile computing
Mobile computing
lalit arora
 
Mobile technology for learning
Mobile technology for learningMobile technology for learning
Mobile technology for learning
Suganthi Nadar
 

What's hot (20)

Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Future of mobile technology
Future of mobile technologyFuture of mobile technology
Future of mobile technology
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Manika
ManikaManika
Manika
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
 
Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
 
WAP
WAPWAP
WAP
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile technology for learning
Mobile technology for learningMobile technology for learning
Mobile technology for learning
 

Similar to Design computing architecture ~ Mobile Technologies

Mobile computing
Mobile computingMobile computing
Mobile computing
Rishabh Gupta
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
VENNILAV6
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
Durgarao Gundu
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
 
Understanding Network Switches- .pdf
Understanding Network Switches- .pdfUnderstanding Network Switches- .pdf
Understanding Network Switches- .pdf
InfoRIPRASAITSolutio
 
smart grid
smart gridsmart grid
smart grid
Gundu Durgarao
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
eSAT Publishing House
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
IRJET Journal
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
gouse_1210
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
eSAT Journals
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobility
eSAT Publishing House
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET Journal
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
JIEMS Akkalkuwa
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
theijes
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
ShohanaakterKakon
 
Handoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesHandoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet services
ITM Universe - Vadodara
 
H010524049
H010524049H010524049
H010524049
IOSR Journals
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 

Similar to Design computing architecture ~ Mobile Technologies (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Understanding Network Switches- .pdf
Understanding Network Switches- .pdfUnderstanding Network Switches- .pdf
Understanding Network Switches- .pdf
 
smart grid
smart gridsmart grid
smart grid
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobility
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 
Handoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesHandoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet services
 
H010524049
H010524049H010524049
H010524049
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 

More from Swapnali Pawar

Unit 3 introduction to android
Unit 3 introduction to android Unit 3 introduction to android
Unit 3 introduction to android
Swapnali Pawar
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile Computing
Swapnali Pawar
 
Introduction to ios
Introduction to iosIntroduction to ios
Introduction to ios
Swapnali Pawar
 
Fresher interview tips demo
Fresher interview tips demoFresher interview tips demo
Fresher interview tips demo
Swapnali Pawar
 
View & index in SQL
View & index in SQLView & index in SQL
View & index in SQL
Swapnali Pawar
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
Swapnali Pawar
 
Android Introduction
Android IntroductionAndroid Introduction
Android Introduction
Swapnali Pawar
 
SQL JOINS
SQL JOINSSQL JOINS
SQL JOINS
Swapnali Pawar
 
Exception Handling
Exception Handling Exception Handling
Exception Handling
Swapnali Pawar
 
Mobile Technology 3
Mobile Technology 3Mobile Technology 3
Mobile Technology 3
Swapnali Pawar
 
Web Programming& Scripting Lab
Web Programming& Scripting LabWeb Programming& Scripting Lab
Web Programming& Scripting Lab
Swapnali Pawar
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1
Swapnali Pawar
 
web programming & scripting 2
web programming & scripting 2web programming & scripting 2
web programming & scripting 2
Swapnali Pawar
 
web programming & scripting
web programming & scriptingweb programming & scripting
web programming & scripting
Swapnali Pawar
 

More from Swapnali Pawar (14)

Unit 3 introduction to android
Unit 3 introduction to android Unit 3 introduction to android
Unit 3 introduction to android
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile Computing
 
Introduction to ios
Introduction to iosIntroduction to ios
Introduction to ios
 
Fresher interview tips demo
Fresher interview tips demoFresher interview tips demo
Fresher interview tips demo
 
View & index in SQL
View & index in SQLView & index in SQL
View & index in SQL
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
 
Android Introduction
Android IntroductionAndroid Introduction
Android Introduction
 
SQL JOINS
SQL JOINSSQL JOINS
SQL JOINS
 
Exception Handling
Exception Handling Exception Handling
Exception Handling
 
Mobile Technology 3
Mobile Technology 3Mobile Technology 3
Mobile Technology 3
 
Web Programming& Scripting Lab
Web Programming& Scripting LabWeb Programming& Scripting Lab
Web Programming& Scripting Lab
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1
 
web programming & scripting 2
web programming & scripting 2web programming & scripting 2
web programming & scripting 2
 
web programming & scripting
web programming & scriptingweb programming & scripting
web programming & scripting
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Design computing architecture ~ Mobile Technologies

  • 1. Mobile Technologies Unit 2 DESIGN MOBILE COMPUTING ARCHITECTURE Ms. Swapnali Pawar Swapnali Pawar
  • 2. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Index • Mobile Communication • Characteristics of Mobile Communication Device • Features of Mobile Communication • Applications of Mobile Communication • Advantages of Mobile Communication • A simplified reference model
  • 3. Mobile Communication Mobile Communication is the use of technology that allows us to communicate with others in different locations without the use of any physical connection (wires or cables). Mobile communication makes our life easier, and it saves time and effort. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 4. Characteristics of Mobile Communication Device ● Fixed and wired: This configuration describes the typical desktop computer in an office. Neither weight nor power consumption of the devices allow for mobile usage. The devices use fixed networks for performance reasons. ● Mobile and wired: Many of today’s laptops fall into this category; users carry the laptop from one hotel to the next, reconnecting to the company’s network via the telephone network and a modem. ● Fixed and wireless: This mode is used for installing networks, e.g., in historical buildings to avoid damage by installing wires, or at trade shows to ensure fast network setup. Another example is bridging the last mile to a customer by a new operator that has no wired infrastructure and does not want to lease lines from a competitor. ● Mobile and wireless: This is the most interesting case. No cable restricts the user, who can roam between different wireless networks. Today’s most successful example for this category is GSM with more than 800 million users. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 5. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 1. High capacity load balancing: Each wired or wireless infrastructure must incorporate high capacity load balancing.High capacity load balancing means, when one access point is overloaded, the system will actively shift users from one access point to another depending on the capacity which is available. Features of Mobile Communication
  • 6. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 2.Scalability The growth in popularity of new wireless devices continuously increasing day by day. The wireless networks have the ability to start small if necessary, but expand in terms of coverage and capacity as needed - without having to overhaul or build an entirely new network.
  • 7. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 3. Network management system: Now a day, wireless networks are much more complex and may consist of hundreds or even thousands of access points, firewalls, switches, managed power and various other components.The wireless networks have a smarter way of managing the entire network from a centralized point.
  • 8. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 4. Role based access control Role based access control (RBAC) allows you to assign roles based on what, who, where, when and how a user or device is trying to access your network. Once the end user or role of the devices is defined, access control policies or rules can be enforced. •Indoor as well as outdoor coverage options: It is important that your wireless system has the capability of adding indoor coverage as well as outdoor coverage. •Network access control: Network access control can also be called as mobile device registration. It is essential to have a secure registration. Network access control (NAC) controls the role of the user and enforces policies. NAC can allow your users to register themselves to the network. It is a helpful feature that enhances the user experience. •Mobile device management: Suppose, many mobile devices are accessing your wireless network; now think about the thousands of applications are running on those mobile devices. How do you plan on managing all of these devices and their applications, especially as devices come and go from your business? Mobile device management can provide control of how you will manage access to programs and applications. Even you can remotely wipe the device if it is lost or stolen.
  • 9. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar • Roaming: You don't need to worry about dropped connections, slower speeds or any disruption in service as you move throughout your office or even from building to building wireless needs to be mobile first. Roaming allows your end-users to successfully move from one access point to another without ever noticing a dip in a performance. For example: allowing a student to check their mail as they walk from one class to the next. • Redundancy: The level or amount of redundancy your wireless system requires depends on your specific environment and needs. For example: A hospital environment will need a higher level of redundancy than a coffee shop. However, at the end of the day, they both need to have a backup plan in place.
  • 10. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 5.Proper Security means using the right firewall The backbone of the system is your network firewall. With the right firewall in place you will be able to: • See and control both your applications and end users. • Create the right balance between security and performance. • Reduce the complexity with: Antivirus protection. Deep Packet Inspection (DPI) Application filtering • Protect your network and end users against known and unknown threads including: Zero- day. Encrypted malware. Ransomware. Malicious botnets.
  • 11. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 6.Switching: Basically, a network switch is the traffic cop of your wireless network which making sure that everyone and every device gets to where they need to go. Switching is an essential part of every fast, secure wireless network for several reasons: • It helps the traffic on your network flow more efficiently. • It minimizes unnecessary traffic. • It creates a better user experience by ensuring your traffic is going to the right places.
  • 12. Applications of Mobile Communication 1. Vehicles 2. Emergencies 3. Business 4. Replacement of wired networks 5. Infotainment and more 6. Location dependent services 7. Mobile and wireless devices MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 13. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 14. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 15. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 16. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 17. 1. Vehicles MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 18. Business MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 19. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 20. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 21. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 22. Advantages of Mobile Communication  Flexibility:  Wireless communication enables the people to communicate with each other regardless of location. There is no need to be in an office or some telephone booth in order to pass and receive messages.  Cost effectiveness:  In wireless communication, there is no need of any physical infrastructure (Wires or cables) or maintenance practice. Hence, the cost is reduced.  Speed:  Improvements can also be seen in speed. The network connectivity or the accessibility was much improved in accuracy and speed.  Accessibility:  With the help of wireless technology easy accessibility to the remote areas is possible. For example, in rural areas, online education is now possible. Educators or students no longer need to travel to far-flung areas to teach their lessons.  Constant connectivity:  Constant connectivity ensures that people can respond to emergencies relatively quickly. For example, a wireless device like mobile can ensure you a constant connectivity though you move from place to place or while you travel, whereas a wired landline can't. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 23. A simplified reference model MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 24. ● Physical layer: This is the lowest layer in a communication system and is responsible for the conversion of a stream of bits into signals that can be transmitted on the sender side. The physical layer of the receiver then transforms the signals back into a bit stream. For wireless communication, the physical layer is responsible for frequency selection, generation of the carrier frequency, signal detection (although heavy interference may disturb the signal), modulation of data onto a carrier frequency and (depending on the transmission scheme) encryption. These features of the physical layer are mainly discussed in chapter 2, but will also be mentioned for each system separately in the appropriate chapters. ● Data link layer: The main tasks of this layer include accessing the medium, multiplexing of different data streams, correction of transmission errors, and synchronization (i.e., detection of a data frame). Chapter 3 discusses different medium access schemes. A small section about the specific data link layer used in the presented systems is combined in each respective chapter. Altogether, the data link layer is responsible for a reliable point-topoint connection between two devices or a point- to-multipoint connection between one sender and several receivers. A simplified reference model MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 25. ● Network layer: This third layer is responsible for routing packets through a network or establishing a connection between two entities over many other intermediate systems. Important topics are addressing, routing, device location, and handover between different networks. Chapter 8 presents several solutions for the network layer protocol of the internet (the Internet Protocol IP). The other chapters also contain sections about the network layer, as routing is necessary in most cases. ● Transport layer: This layer is used in the reference model to establish an end-to-end connection. Topics like quality of service, flow and congestion control are relevant, especially if the transport protocols known from the Internet, TCP and UDP, are to be used over a wireless link. ● Application layer: Finally, the applications (complemented by additional layers that can support applications) are situated on top of all transmissionoriented layers. Topics of interest in this context are service location, support for multimedia applications, adaptive applications that can handle the large variations in transmission characteristics, and wireless access to the world wide web using a portable device. Very demanding applications are video (high data rate) and interactive gaming (low jitter, low latency). MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 26. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar