SlideShare a Scribd company logo
Wireless & Mobile
  Computing

  Submitted by : Manika Gandhi
                115325
            Company
               N1
            LOGO
Company
 LOGO        Contents

1.Wireless communication          7.CDMA & DAMA

2.Effects of device portability   8.Wireless networks

3.Mobile computing platform       9.CSMA problems

4.Wireless & fixed networks       10.Hidden terminal problem

5.Wireless management             11.Applications

6.Building blocks                 12.Security concerns
Company
LOGO      Mobile/wireless communication

 Two aspects of mobility:

  user mobility: users communicate
   (wireless) “anytime, anywhere, with
   anyone”

  device portability: devices can be
   connected anytime, anywhere to the
   network
Company
LOGO
Company
LOGO      Effects of device portability

  Power consumption
  –limited computing power, low quality
   displays
  –loss of data with higher probability
  Limited user interfaces
  –compromise between size of fingers and
   portability
  –character/voice recognition, abstract
   symbols
Company
LOGO            MobileComputing Platforms Platforms
                  Mobile Computing

                                                       Server
  Mobile Device                                        (Web Server, eMail server,
  (Cell Phone, PDA, Pocket PC)                         Mainframe)

       Application                                             Application

          Middleware                                           Middleware
           Services               Mobile                        Services
                                  Computing
    Local      Network            Platform                 Local     Network
   Platform    Transport                                  Platform   Transport
   Services    Services                                   Services   Services



                           Physical Wireless Network
                     (Antennas, Transceivers, Base Stations,
                       Cellular Networks, 802.11 LANs,
                       Satellites)
Company
LOGO       Wireless v/s fixed networks

    Higher loss rates due to interference
    Restrictive regulationsTEXTfrequencies
                   TEXT
                             of       TEXT


    Low transmission rates
    Higher delays, higher jitter
    Lower security, simpler active attacking
    Always shared medium
Company
LOGO               Wireless Management & Business
               STRATEGIC PLANNING
               • Business Strategy Analysis
               •Analyzing Business Processes and Business Workflows
               •Mobile Application Identification and Selection.


                                         CAPABILITY EVALUATION
ORGANIZING/STAFFING                      •Wireless Infrastructure Planning
. Mobile Virtual Teams                   •Capacity Planning & Traffic Engineering
. Mobile Real-time Enterprises           •Resource and Cost Estimation



MONITORING AND CONTROL
                                            DEVELOPMENT AND DEPLOYMENT
•Wireless fault and
                                            • Mobile application development
 performance management
                                            • Wireless infrastructure development
•Wireless Security and                      Outsourcing the Wireless Infrastructure
 configuration management
Company
   LOGO         The Building Blocks of Mobile Computing
Drivers

                                                        •Wireless Business,
                Mobile Business, Government, and Life   Regulations, and
                                                        Standards
                    Mobile Computing Applications


                                                        •Architectures and
                                                        Integration
                     Mobile Computing Platforms
                   (Wireless Middleware, Mobile IP)
                                                        •Wireless Security


                           Wireless Networks            •Management and
                  (Wireless LANs, Cellular Networks,    Support
                   Satellites, Wireless Local Loops)


     Enablers
Company
LOGO      Demand Assignment Multiple Access
  In a DAMA protocol, nodes first reserve
   slots which they intend to use for
   broadcasting.

  Each round of broadcast is preceded by a
   reservation round.

  DAMA protocols are widely used in
   satellite communication and increasingly
   being used in wireless networking.
Company
LOGO      Code Division Multiplexing
  CDMA has been adopted for the 3G
   mobile phone technology.

  CDMA is not very suitable for ad hoc
   networking as we cannot expect
   specialized hardware/software support at
   the nodes.

  TDMA and its variations are most suitable
   for ad hoc networking.
Company
 LOGO                        Wireless Networks
                               Wireless Networks




  Wireless LANs                 Wireless MANs               Wireless WANs



                               Wireless                 Cellular    Satellite      Paging
Personal          Business     Local Loops              Networks    Systems        Networks
Area              LANs         (Fixed Wireless)
Networks

Example1:         Example1:      Example1:        Example1:        Example1:       Example1:
Bluetooth         802.11b        LMDS             GSM, 9.6 Kbps,   Motorola        FLEX,
1 Mbps,           11 Mbps,       37 Mbps,         wide coverage    Iridium
10 Meters         100 Meters                                                       1.2 Kbps
                                 2-4 Km                            up to 64 Mbps
                                                  Example2:        globally
Other examples:   Other          Example2:        3G, 2 Mbps,                      Example2:
wireless sensor   examples:      FSO              wide coverage    Example 2:      ReFLEX,
networks, UWB     802.11g,       1.25 Gbps                         Deep space      6.4Kbps
                  HiperLAN2      1-2 KM                            communication
Company
LOGO         Physical layers in wireless networks

       Use a medium that has neither absolute nor readily
        observable boundaries outside which stations are
        unable to receive frames
       Are unprotected from outside signals
       Communicate over a medium significantly less
        reliable than wired PHYs
       Have dynamic topologies
       Lack full connectivity and therefore the assumption
        normally made that every station (STA) can hear
        every other STA in invalid (I.e., STAs may be “hidden”
        from each other)
       Have time varying and asymmetric propagation
        properties
Company
LOGO      CSMA Problems in Wireless Network

  Collision detection is easy in wired networks but
   difficult in wireless medium

  With only one antenna, nodes can only listen or
   send

  Full duplex radios are extremely expensive

  CSMA gives rise to hidden terminal and exposed
   terminal problems
Company
LOGO      Hidden Terminal Problem
  Wireless transmission is usually short
   range. Even if the medium is free near the
   transmitter, it may not be free near the
   intended receiver.



              A        B        C


                    Collision
                      at B
Company
LOGO      Message Loss due to Collision
  Using CSMA in wireless medium results in
   message loss and requires retransmission of
   lost messages.

  A node spends much more energy while
   receiving or transmitting messages. Hence,
   retransmission wastes a lot of energy.

  The other alternative is to use a reservation
   based TDM protocol.
Company
LOGO      Applications I

 Mobile, pervasive, ubiquitous, nomadic
  computing
 Computing anytime anywhere
                          TEXT

 Distributed computing, CORBA TEXT
 Cellular and satellite networks
 Ad hoc networks: rescue, battlefield, conference
 Sensor networks: monitoring environment to
  detect object movement or presence of
                        TEXT
  chemicals, fire, temperature reports
 Mesh networks;: rooftop networks for multi-hop
  wireless Internet access
Company
LOGO       Applications II

  Vehicles
 –transmission of news, road condition, weather, music
 –personal communication using GSM
 –position via GPS
 –local ad-hoc network with vehicles close-by to prevent
  accidents, guidance system, redundancy
 –vehicle data (e.g., from busses, high-speed trains) can be
  transmitted in advance for maintenance
  Emergencies
 – early transmission of patient data to the hospital
 – replacement of a fixed infrastructure in case of
   earthquakes, hurricanes, fire etc.
Company
LOGO             Security Concerns
  Authentication is critical
 » Normal network point of attachment is a wall
   tap
 » Wireless access makes network attachment
   too easy
  Exposure to over-the-air wiretapping
 » Any transmitter can also be a receiver
 » Some wireless networks provide secure air
   links
 » Made more difficult by spread spectrum
   technologies
Company
LOGO




          Thanks

More Related Content

What's hot

Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
Sergio Bedoya Fernandez
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
itsjadu
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
Universitas Teknokrat Indonesia
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Jennifer Polack
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
Nitin Ujgare
 
Wireless communication systems-classifications
Wireless communication systems-classificationsWireless communication systems-classifications
Wireless communication systems-classifications
pulugurtha venkatesh
 
Basic concepts of wireless communication system
Basic concepts of wireless communication systemBasic concepts of wireless communication system
Basic concepts of wireless communication system
Bogs De Castro
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
Madhuri Badgujar
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Don Norwood
 
Wireless communaction
Wireless communactionWireless communaction
Wireless communaction
অজানা মন
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
 
Pan seminar
Pan seminarPan seminar
Pan seminar
Naveen Vyas
 
Pan
PanPan
Mobile computing seminar
Mobile computing seminarMobile computing seminar
Mobile computing seminar
Meenakshi Devi
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
Sudipto Rocksandrules
 
Wireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawWireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu Gebeyeaw
Mulatu Gebeyaw
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologies
Akhil Sabu
 
introduction to data comunication
introduction to data comunicationintroduction to data comunication
introduction to data comunication
Ravi Patel
 
The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)
ainizbahari97
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
Fatma Ala'a
 

What's hot (20)

Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
 
Wireless communication systems-classifications
Wireless communication systems-classificationsWireless communication systems-classifications
Wireless communication systems-classifications
 
Basic concepts of wireless communication system
Basic concepts of wireless communication systemBasic concepts of wireless communication system
Basic concepts of wireless communication system
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
 
Wireless communaction
Wireless communactionWireless communaction
Wireless communaction
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
Pan
PanPan
Pan
 
Mobile computing seminar
Mobile computing seminarMobile computing seminar
Mobile computing seminar
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Wireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawWireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu Gebeyeaw
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologies
 
introduction to data comunication
introduction to data comunicationintroduction to data comunication
introduction to data comunication
 
The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 

Viewers also liked

Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Daniela Mazza
 
Wireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computingWireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computing
Subhashini Sundaram
 
Gi fi
Gi fiGi fi
Space robotics(my seminor) final
Space robotics(my seminor) finalSpace robotics(my seminor) final
Space robotics(my seminor) final
Ankur Pathak
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
 
Space robotics
Space roboticsSpace robotics
Gi fi Technology
Gi fi TechnologyGi fi Technology
Gi fi Technology
Roshan Patra
 
Gi fi seminar Report
Gi fi seminar ReportGi fi seminar Report
Gi fi seminar Report
Shivam Joshi
 
Gi fi technology finl ppt
Gi fi technology finl pptGi fi technology finl ppt
Gi fi technology finl ppt
Tapesh Chalisgaonkar
 
Gi-Fi ppt presentation
Gi-Fi ppt presentationGi-Fi ppt presentation
Gi-Fi ppt presentation
Ankit Satnalika
 
5g wireless systems
5g wireless systems5g wireless systems
5g wireless systems
Amar
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
Niki Upadhyay
 

Viewers also liked (12)

Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
 
Wireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computingWireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computing
 
Gi fi
Gi fiGi fi
Gi fi
 
Space robotics(my seminor) final
Space robotics(my seminor) finalSpace robotics(my seminor) final
Space robotics(my seminor) final
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
Space robotics
Space roboticsSpace robotics
Space robotics
 
Gi fi Technology
Gi fi TechnologyGi fi Technology
Gi fi Technology
 
Gi fi seminar Report
Gi fi seminar ReportGi fi seminar Report
Gi fi seminar Report
 
Gi fi technology finl ppt
Gi fi technology finl pptGi fi technology finl ppt
Gi fi technology finl ppt
 
Gi-Fi ppt presentation
Gi-Fi ppt presentationGi-Fi ppt presentation
Gi-Fi ppt presentation
 
5g wireless systems
5g wireless systems5g wireless systems
5g wireless systems
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 

Similar to Manika

Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...
Pieter Geldenhuys
 
cellular communications-1
   cellular communications-1   cellular communications-1
cellular communications-1
Jaya Prakash
 
Ishiriya Wireless Technologies-ARM Wireless
Ishiriya Wireless Technologies-ARM WirelessIshiriya Wireless Technologies-ARM Wireless
Ishiriya Wireless Technologies-ARM Wireless
bhadrah
 
5G 2
5G 25G 2
5G 2
IGDTUW
 
4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview
Sigit Priyanggoro
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
cheqala5626
 
Wireless
Wireless Wireless
4G Network
4G Network4G Network
4G Network
Abbas Hashmi
 
Dwika Vision
Dwika VisionDwika Vision
Dwika Vision
videinc
 
Lecture1
Lecture1Lecture1
Lecture1
sameena29
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devices
Unhappy Verse
 
5g technology ppt
5g technology ppt5g technology ppt
5g technology ppt
DANISHAMIN950
 
Fourth generation
Fourth generationFourth generation
Fourth generation
Areeb Akhlaq
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
SumanPramanik7
 
1.pptx
1.pptx1.pptx
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
Justino Lourenço
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPL
bhattsipl
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
Dr Shashikant Athawale
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
jitendra k Singh
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
anjansubbarao
 

Similar to Manika (20)

Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...
 
cellular communications-1
   cellular communications-1   cellular communications-1
cellular communications-1
 
Ishiriya Wireless Technologies-ARM Wireless
Ishiriya Wireless Technologies-ARM WirelessIshiriya Wireless Technologies-ARM Wireless
Ishiriya Wireless Technologies-ARM Wireless
 
5G 2
5G 25G 2
5G 2
 
4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Wireless
Wireless Wireless
Wireless
 
4G Network
4G Network4G Network
4G Network
 
Dwika Vision
Dwika VisionDwika Vision
Dwika Vision
 
Lecture1
Lecture1Lecture1
Lecture1
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devices
 
5g technology ppt
5g technology ppt5g technology ppt
5g technology ppt
 
Fourth generation
Fourth generationFourth generation
Fourth generation
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
 
1.pptx
1.pptx1.pptx
1.pptx
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPL
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Manika

  • 1. Wireless & Mobile Computing Submitted by : Manika Gandhi 115325 Company N1 LOGO
  • 2. Company LOGO Contents 1.Wireless communication 7.CDMA & DAMA 2.Effects of device portability 8.Wireless networks 3.Mobile computing platform 9.CSMA problems 4.Wireless & fixed networks 10.Hidden terminal problem 5.Wireless management 11.Applications 6.Building blocks 12.Security concerns
  • 3. Company LOGO Mobile/wireless communication Two aspects of mobility:  user mobility: users communicate (wireless) “anytime, anywhere, with anyone”  device portability: devices can be connected anytime, anywhere to the network
  • 5. Company LOGO Effects of device portability  Power consumption –limited computing power, low quality displays –loss of data with higher probability  Limited user interfaces –compromise between size of fingers and portability –character/voice recognition, abstract symbols
  • 6. Company LOGO MobileComputing Platforms Platforms Mobile Computing Server Mobile Device (Web Server, eMail server, (Cell Phone, PDA, Pocket PC) Mainframe) Application Application Middleware Middleware Services Mobile Services Computing Local Network Platform Local Network Platform Transport Platform Transport Services Services Services Services Physical Wireless Network (Antennas, Transceivers, Base Stations, Cellular Networks, 802.11 LANs, Satellites)
  • 7. Company LOGO Wireless v/s fixed networks  Higher loss rates due to interference  Restrictive regulationsTEXTfrequencies TEXT of TEXT  Low transmission rates  Higher delays, higher jitter  Lower security, simpler active attacking  Always shared medium
  • 8. Company LOGO Wireless Management & Business STRATEGIC PLANNING • Business Strategy Analysis •Analyzing Business Processes and Business Workflows •Mobile Application Identification and Selection. CAPABILITY EVALUATION ORGANIZING/STAFFING •Wireless Infrastructure Planning . Mobile Virtual Teams •Capacity Planning & Traffic Engineering . Mobile Real-time Enterprises •Resource and Cost Estimation MONITORING AND CONTROL DEVELOPMENT AND DEPLOYMENT •Wireless fault and • Mobile application development performance management • Wireless infrastructure development •Wireless Security and Outsourcing the Wireless Infrastructure configuration management
  • 9. Company LOGO The Building Blocks of Mobile Computing Drivers •Wireless Business, Mobile Business, Government, and Life Regulations, and Standards Mobile Computing Applications •Architectures and Integration Mobile Computing Platforms (Wireless Middleware, Mobile IP) •Wireless Security Wireless Networks •Management and (Wireless LANs, Cellular Networks, Support Satellites, Wireless Local Loops) Enablers
  • 10. Company LOGO Demand Assignment Multiple Access  In a DAMA protocol, nodes first reserve slots which they intend to use for broadcasting.  Each round of broadcast is preceded by a reservation round.  DAMA protocols are widely used in satellite communication and increasingly being used in wireless networking.
  • 11. Company LOGO Code Division Multiplexing  CDMA has been adopted for the 3G mobile phone technology.  CDMA is not very suitable for ad hoc networking as we cannot expect specialized hardware/software support at the nodes.  TDMA and its variations are most suitable for ad hoc networking.
  • 12. Company LOGO Wireless Networks Wireless Networks Wireless LANs Wireless MANs Wireless WANs Wireless Cellular Satellite Paging Personal Business Local Loops Networks Systems Networks Area LANs (Fixed Wireless) Networks Example1: Example1: Example1: Example1: Example1: Example1: Bluetooth 802.11b LMDS GSM, 9.6 Kbps, Motorola FLEX, 1 Mbps, 11 Mbps, 37 Mbps, wide coverage Iridium 10 Meters 100 Meters 1.2 Kbps 2-4 Km up to 64 Mbps Example2: globally Other examples: Other Example2: 3G, 2 Mbps, Example2: wireless sensor examples: FSO wide coverage Example 2: ReFLEX, networks, UWB 802.11g, 1.25 Gbps Deep space 6.4Kbps HiperLAN2 1-2 KM communication
  • 13. Company LOGO Physical layers in wireless networks  Use a medium that has neither absolute nor readily observable boundaries outside which stations are unable to receive frames  Are unprotected from outside signals  Communicate over a medium significantly less reliable than wired PHYs  Have dynamic topologies  Lack full connectivity and therefore the assumption normally made that every station (STA) can hear every other STA in invalid (I.e., STAs may be “hidden” from each other)  Have time varying and asymmetric propagation properties
  • 14. Company LOGO CSMA Problems in Wireless Network  Collision detection is easy in wired networks but difficult in wireless medium  With only one antenna, nodes can only listen or send  Full duplex radios are extremely expensive  CSMA gives rise to hidden terminal and exposed terminal problems
  • 15. Company LOGO Hidden Terminal Problem  Wireless transmission is usually short range. Even if the medium is free near the transmitter, it may not be free near the intended receiver. A B C Collision at B
  • 16. Company LOGO Message Loss due to Collision  Using CSMA in wireless medium results in message loss and requires retransmission of lost messages.  A node spends much more energy while receiving or transmitting messages. Hence, retransmission wastes a lot of energy.  The other alternative is to use a reservation based TDM protocol.
  • 17. Company LOGO Applications I  Mobile, pervasive, ubiquitous, nomadic computing  Computing anytime anywhere TEXT  Distributed computing, CORBA TEXT  Cellular and satellite networks  Ad hoc networks: rescue, battlefield, conference  Sensor networks: monitoring environment to detect object movement or presence of TEXT chemicals, fire, temperature reports  Mesh networks;: rooftop networks for multi-hop wireless Internet access
  • 18. Company LOGO Applications II  Vehicles –transmission of news, road condition, weather, music –personal communication using GSM –position via GPS –local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy –vehicle data (e.g., from busses, high-speed trains) can be transmitted in advance for maintenance  Emergencies – early transmission of patient data to the hospital – replacement of a fixed infrastructure in case of earthquakes, hurricanes, fire etc.
  • 19. Company LOGO Security Concerns  Authentication is critical » Normal network point of attachment is a wall tap » Wireless access makes network attachment too easy  Exposure to over-the-air wiretapping » Any transmitter can also be a receiver » Some wireless networks provide secure air links » Made more difficult by spread spectrum technologies
  • 20. Company LOGO Thanks