SlideShare a Scribd company logo
1 of 208
MOBILE COMPUTING
(IV –I B.Tech R10 Regulation)
AMRITA SAI INSTITUTE OF SCIENCE & TECHNOLOGY
RAMESH BABU PALEPU
Associate Professor
UNIT-I
• An overview of mobile communication
• Guided Transmission
• Unguided Transmission
• Signal propagation frequencies
• Antennae
• Modulation
• Modulation methods & standards for voice
oriented data communication standards
• Modulation methods & standards for data
and voice oriented data communication
standards
• Mobile computing –Novel applications &
limitations
• Mobile computing architecture
• Mobile system networks
------------------------------------------------------
-
What is a network?
Let me allow different kinds of networks
before we start our actual discussion. It is
possible to classify the net works on
various parameters, such as i)
Geographical area ii) According to the
topology iii) According to the protocols
iv) According to the data transmission v)
According to the routing vi) According to
the physical media etc..
Now we discuss about mobility- Today the
most of the computing devices are portable
that is we can easily carry the devices from
one place to another place.
The characteristic of device portability leads
to the mobility. It means ability to move.
The mobile computing means ‘the
computing systems that may easily moved
while they are being perform some
task’(computation)
There are two kinds of mobility’s.
a)User mobility - In user mobility a user can
access the same or similar services at
different places. That is the user can be
mobile, and services will follow him.
b)Device mobility - the communication
device moves with or without help of a
user. Several techniques in
communication network guarantees that
communication is even possible while
device is being moved.
• The following are the four different
characteristics exhibit by the
communication devices.
A) Fixed and wired: This category describes
the fixed desktop computers in the office,
which are      connected through the wired
network. The weight and power
consumption of these devices      does not
permit for mobility, these devices use fixed
network for information accessing
B) Mobile and wired: The most of the
portable computing devices fall within this
category. We      can easily carry these
devices (eg: laptops) from one place to
another place and      reconnecting to the
organization’s network via the telephone
lines or a modem.
C) Fixed and wireless: This kind of technique
is especially used for installing networks in
     historical places such as buildings to
avoid damages by fixing cables and other
equipment.      This method can also be
used for fastest network setup.
D) Mobile and wireless: This is the most
recent technique, in which no cable
restricts, the       user, who can roam
between different wireless networks.
Eg:GSM –Global system for       mobile
communications.
Limitations of MC:
1.Power consumption
2.Tiny Keypads
3.Small Displays
Applications of MC
1.Vehicles
2.Emergencies
3.Business
4.Replacement of Wired networks
5.Infotainment.
6.Location dependent services.
a) Follow on services
b) Location aware services
c) Privacy
d) Information services
MOBILE COMMUNICATION
• Communication is a two transmission and
reception of data, voice, or multimedia
content through a fiber, wire, or wireless
medium.
• The transmission takes place by
generating the signals according to defined
regulations, standards and protocols.
• Here the signal can be defined as variation
of voltage ‘v’ or current ‘i’ between two
points in a circuit. The values of v or i
change as function of time t.
• The signal frequency is defined as signal
voltage v or current i oscillates 109
times
between maximum and minimum values
then the electrical signal frequency f=109
Hz (1 GHz).
• The simplest representation of the signal
(s) in the form of sinusoidal function of
time, here the changes in the amplitudes
of signal are represented by s(t) which
varies sin of an angle between 0 to 360.
• S(t) = S0 sin [(2π x f x t) + θt0
Guided Transmission
• Metal wires and optical fibers are used in
guided or wired transmission of data. The
guided transmission takes place using four
types of cables.
i) Optical fibers for signals of wavelength
1.35 – 1.5 µm.
ii) coaxial cable for electrical signals of
frequency up to 500 MHz to a range of 40
m.
iii) Twisted pairs for electrical signals of up
to 100 MHz to a range of 2 Km
iv) Power lines are used for long
transmission of frequencies between
10KHz to 522 KHz.
Advantages:
• Transmission is along a directed path from
one point to another.
• Practically there is no interference of
external sources.
• A large number of sources can
simultaneously transmitted along optical
fiber, coaxial, or twisted pair by using
multiplexing and coding techniques.
Disadvantages:
• In guided transmission transmitting and
receiving points are fixed.
• The total number of interconnections
between transmitters and receivers are
limited.
UNGUIDED TRANSMISSION
• Unguided transmission or wireless
transmission is carried out through
radiated electromagnetic energy. Here the
electromagnetic energy flows in free space
in the form of MHz or GHz spectrum rage.
• Here the spectrum means the set of
frequencies.
Signal Propagation Frequencies:
• Generally electrical signals are converted
into electromagnetic radiation and then
transmitted through antennae.
• There are various frequency bands in
electromagnetic spectrum and each of one
have different transmission requirements.
• The electromagnetic signal frequency in
vacuum or air is defined as;
f = c/λ = (300/ λ)MHz [λ in meter]
• Here f in MHz and wavelength λ in meters
and c is the velocity of signal propagation,
it is 3 x106
m/s.
• The following table illustrate some wireless
transmission frequencies and their
properties;
The following are some of the signal
propagation frequencies and their
wavelengths;
1.Long wavelength radio, very low frequency
(LW):30KHz to 1 MHz wavelength in
10,000 to 300 meters.
2.Medium wavelength radio, Medium
frequency (MW):0.5 to 2 MHz and
wavelength in 600 to 150 meters.
3.Short wavelength radio, high frequency
(SW): 6 to 30MHz and wavelength in 50to
10 meters.
4. FM radio: 87.5 to 108 MHz and 3.4 to 2.8
meters wavelength then operated in 50km
range.
5. VHF: 50 to 250 MHz and wavelength in 6
to 1.2 meters.
6. UHF: 200 to 2000 MHz and wavelength in
1.5 to0.15 meters
7. Super High Microwave Frequency: 2 to 40
GHz and wavelength in 15 to 0.75 cm.
8.Extreme High Frequency(EHF): operated
above 40 GHz and wavelength in 0.75cm
to 3μm.
9. Far infrared: (1.5 to 3)x 1014
Hz and
wavelength between 1.0 μm to 2.0 μm.
10. Infrared: 0.70 to 0.40 μm wavelength
and operated (3.3 to 3.5)x 1014
Hz.
ANTENNAE
• Antennae are devices that transmit and
receive electromagnetic radiations most
function efficiently for relatively narrow
frequency ranges.
• If not properly tuned to the frequency band
in which the transmitting system
connected to it operates, the transmitted
or received signals may be impaired.
• The forms of antennae are chiefly
determined by the frequency ranges they
operate in and can vary from a single piece
of wire to a parabolic dish.
• The following diagram shows λ/2 Dipole
Antenna for wireless transmission of waves
of wavelength λ.
• It is called dipole antenna because at any
given instant at both the ends the signals
are1800 out of phase.
• The following diagram shows another
antenna of length λ/4 mounted on a long
conducting surface.
• One of the important characteristic of
antenna is radiation pattern which defines
a path on which each point will have
identical signal strength at any given
instant t.
• The radiation pattern is two types i)
Circular pattern ii) Directed pattern.
• The following diagram shows radiation
pattern of λ/2 dipole antenna in z-y and x-
z planes. It indicates signal amplitude at
an instant is identical along the circles and
antenna axis is perpendicular to the plane
of circles and tangent to both circles.
• The following diagram shows radiation
patterns of λ/4 dipole antenna in y-z and
x-z planes.
• In circular radiation pattern the radiated
energy and signal strength is equally
distributed in all directions in the plane.
• A pattern in which the signal strength is
directed along a specific direction is called
Antenna For Multiple Input Multiple Output
(MIMO):
• To explain MIMO let us consider two
sources which are physically separated by
a distance and assume one emitting red
light and other emitting green light, but
both incident on the same point (reach
same destination).
• We know that the color appears at the
incident point will be different from the
color of any one of the source, because the
beams are travel on different paths and
phase angle also different, which depends
On time and distance travelled by the
beams.
• The end resultant color determined by the
distance between the sources and phase
difference the source signals.
• Generally the resultant color has
maximum intensity than the two source
signals.
• The MIMO technology use more then one
antenna which was physically separated
and multiple antenna outputs are used for
transmission. So the resultant output is
different from each antenna output.
• So it is possible in MIMO two or more
sources’ signals can travel on different
paths, and their frequencies and phase
angles are carefully selected at receiver
ends.
• In MIMO one antenna radiating (sending)
signal in receiver direction is placed in the
vicinity of another antenna radiating in the
same direction.
• Appropriate separation between antennas
cause constructive interference between
radiations from them.
• Now the receiver got the superimposed
signal which causes increase wireless link
range. This phenomena is used to code the
signals and increase the transmitted
spectral efficiency.
• In MIMO multiple antennae can be used
for wireless communication. Assume ‘n’
antennae has separated at transmitter
side, here the distance between antennae
is significantly large.
• Now multiple wavelengths can generated
at transmitted station which causes
multiple outputs.
• These multiple outputs can thus received
at receiving station using multiple
antennae as a inputs to receiver.
• Here the receiver may have 1 or ‘m’
separated antennae. The space between
the receiver antennae is small.
• Now each receiver able to receive ‘n’
signals transmitted through ‘n’ paths. So
the signal propagates through a matrix of
‘n x m’ paths this is called MIMO.
Propagation of signals
• The wireless communication requires
reliable transmission, but it is difficult
wireless transmission rather than fixed
wired communication because the wireless
transmission may face many
complications.
• we know that now a days the antennae
size and height is very small so the
obstacles in the vicinity of antennae
certainly influence the propagation of
signals.
• We know that the propagation properties
may depend on the time, place and
weather and soon.
• To minimize the impairing effects, the
signal propagation routes are designed and
calculated by considering the various
propagation losses.
• The following things should consider
during the propagation of the signal;
a) Line of sight: It is the transmission of the
signal without refraction, diffraction and
scattering, even though transmission
losses may occur.
• We know that the strength of the signal
decreases as the square of the distance
from the transmitter. This is due to
radiated power is distributed over a large
spherical surface.
b) The signal strength may also decreases
due to attenuation. Suppose the obstacles
in the path of signal is greater in size than
the wavelength of the signal then
attenuation of signal happens.
• For example:
FM band signal transmitter 90 MHz (λ =3.3 m) faces─
attenuation of in objects of size 10 m and above
GSM 900 MHz (λ > = 33 cm) signal then it will face
attenuation in objects of size > 1 m (>> λ ~ 33 cm)
c) The signal scatters when it encounters an
obstacle of size equal or less than the
wavelength of the signal. For example GSM
signal, about 33 cm in wavelength,
scattered by an object of 30 cm or less.
d) The signal bends as the result of
diffraction from the edges of an obstacle of
size equal to or less than the wavelength.
For example GSM signal of wavelength 33
cm will diffract from an object of 33 cm or
less.
• The diffracted signal may or may not reach
the destination. It depends upon geometry
of the obstacle and separation between the
transmitter and receiver. The following
diagram shows diffraction of signal.
e) Signal reflected from the surface of an
obstacle, whose size is greater than the
wavelength of the signal.
• For example GSM 900 MHz (λ = 33 cm)
signal the transmitter signal reflects from
an object of size 10 m and above (much
greater than λ). The following diagram
shows the reflection of signal.
• The reflected signal may undergoes the
transmission delay, the delay is the
common phenomena in multi hop path.
• The delayed signals have distorted wave
forms and cause misrepresentation of
information encoded in the signal.
• We use digital signaling processing to
avoid distortion caused by delays. The
delay in reflected signal with respect to the
original direct signal is given as,
tindirect - tdirect = additional path travel in meters
3 x 108
ms-1
Modulation Methods & Standards for Voice
Oriented Data
• First generation wireless devices communicated
only voice signals the symbol 1G refers voice only.
• Second generation (2G) devices communicate voice
as well as data, it is introduced in 1988, the 2G
signals have transmit the data rates of up to 14.4
kbps.
• The 2.5G and 2.5G+ are enhancements of the
second generation and sport data rates up to 100
kbps.
• The 3G supports Higher data rates than 2G and
support voice, data, and multimedia streams.
• The 3G supports data rates of 2 Mbps or Higher for
short distances and 384 kbps for long distance
transmissions.
• High data rates in 3G Enable transfer of video clips
and faster multimedia communication.
• 4G supports the higher data rates than 3G it
facilitates streaming data for video and enables
multimedia news paper, high resolution mobile TV,
IP telephony and data rates up to 100 Mbps.
• GSM Standard: To day the most successful digital
mobile telecommunication system is G.S.M. its
original name is “Groupe speciale mobile” was
founded in 1982.
• Its name soon changed as “Global system for
mobile communications”, with specification of
procedures designed by European
Telecommunications standards Institute (ETSI) after
that the universal mobile Telecommunication
systems (UMTS) add new standards to G.S.M.
• The GSM standard for mobile telecommunication
through a cellular network at data rates of up to
14.4kbps and uses time-slices of 577 μs.
• GSM 900 standard was founded in 1988 by GSM
which uses GMSK (Gaussian Minimum Shift Keying)
modulation for transmitting 1s and 0s.
• The primary goal of G.S.M was to provide a mobile
phone system that allows users to roam seamlessly
and provide voice services compatible to ISDN and
PSTN systems.
• There are several versions in GSM depending on
various standards and different uplink and downlink
frequencies.
• GSM 900-it is initial version of GSM developed in
Europe using 890-915 MHz uplink and 935-960mhz
down link frequency.
• DCS 1800-digital cellular system is a version of GSM
using 1710-1785 MHz up link and 1805-1880 MHz
down link frequencies.
• PCS 1900- personal communication service is a
version of GSM using 1850-1910 MHz uplink and
1930-1990 MHz down link frequencies.
• GSM-R (Rail)-this version of GSM offers many
additional services which are un-available with
public GSM. It offers 19 channels for voice and data
traffic .other services are, emergency calls with
acknowledgement, voice group call service, voice
broadcast service etc.
• EGSM: Extended GSM provides an additional
spectrum of 10 MHz on both uplink and down link
channels. So the operating frequency of EGSM is
880-915 MHz uplink and 925-960 MHz downlink.
The additional 10 MHz on each side provides an
additional 50 channels of 200 KHz each.
• EGSM communication frequency spectrum lies in
three bands 900/1800/1900 MHz. this is therefore
known as tri-band.
GPRS [GSM Phase 2+ (2.5G)]: General Packet Radio
Service is a packet oriented service for data
communication of mobile devices and utilizes the
unused channels in TDMA mode in GSM network.
EDGE (Enhanced Data rates for GSM Evolution): It is a
enhancement of GSM phase 2. it uses PSK
modulation for communication for higher rates up
to 48kbps per 200 kHz channel. EGPRS (Enhanced
GPRS): It is an extension of GPRS using PSK
modulation. It enhances the data communication
rates based on EDGE and uses High Speed Circuit
Switched Data (HSCSD).
Modulation Methods & Standards for Data and Voice
Communication
• Here we describe CDMA based modulation
methods and standards for mobile communication
network used for long distance communication.
• In addition to GSM, CDMA is the most popular
mobile communication standard the initial version
of CDMA was 2.5G and most famous CDMA
standard is CDMA One (IS-95).
• Cdmaone founded in 1991 by QUALCOM, USA. It
operates at 824-849 MHz and transmit analog signal
from multiple sources.The following are some of
the 3G standards based on CDMA;
3G Partnership Project (3GPP/WCDMA): It is also
known as Wide CDMA. It supports asynchronous
operations and has a 10ms frame length with 15
slices.
• Each frame both uplink and downlink modulated by
QPSK technique and uses Direct sequence of CDMA.
3GPP2: It is a 3G partnership project 2 started in
2001. it is compatible with CDMA 2000 and CDMA
2000 1x chipping rates.
• it is mainly used for voice communication, it can
transmit circuit switched as well as packet switched
techniques.
• It supports high data rates and synchronous
operations.
Universal Mobile Telecommunication System
(UMTS):
–It supports both 3GPP and 3GPP2 and transmit
the data at the rate 100kbps to2 Mbps.
–It combines several technologies for
transmission, security and management
functions.
MOBILE COMPUTING
• Mobile computing is the process of computation on
a mobile device. In mobile computing, a set of
distributed computing systems or service provider
servers participate, connect, and synchronize
through mobile communication protocols.
• Mobile computing Provides decentralized
(distributed) computations on diversified devices,
systems, and networks, which are mobile,
synchronized, and interconnected via mobile
communication standards and protocols.
• Mobile device does not restrict itself to just one
application, such as, voice communication.
• Ubiquitous computing refers to the blending of
computing devices with environmental objects.
• A term that describes integration of computers into
practically all objects in our everyday environment,
endowing them with computing abilities.
• Ubiquitous computing is based on pervasive
computing.
• Pervasive means ‘existing in all parts of a place or
thing’.
• Pervasive computing is the next generation of
computing which takes into account the
environment in which information and
communication technology is used everywhere, by
everyone, and at all times.
• Pervasive computing Assumes information and
communication technology to be an integrated part
of all facets of our environment, such as toys,
computers, cars, homes, factories, and work-areas.
• Mobile computing Also called pervasive computing
when a set of computing devices, systems, or
networks have the characteristics of transparency,
application-aware adaptation, and have an
environment sensing ability.
Limitations of mobile computing:1.
1. Resource constraints – Battery needs and recharge
requirements are the biggest constraints of mobile
computing.
2.Interference – there may be interference in wireless
signals affecting the quality of service.
3. Bandwidth – there may be bandwidth constraints
due to limited spectrum availability at given instant
causing connection latency.
4. Dynamic changes in communication environment -
We know that there may be variations in signal
power within a region it causes link delays and
connection losses.
5. Network issues – Due to the ad hoc networks some
issues relating discovery of connection, service to
destination, and connection stability.
6. Interoperability – The varying protocol standards
available between different regions may lead to
interoperability issues.
7. Security constraints – Protocols conserving privacy
of communication may be violated. Some times
physical damage or loss of mobile device is
probable than static computing system.
MOBILE COMPUTING ARCHITECTURE
• Here we discuss the architecture requirements
for programming mobile device. This will
provide an overview of programming language
used for mobile software.
• We also discuss mobile OS required to run software
components on the hardware and OS functions.
• We represent the middleware components used in
the mobile devices and layered structure of mobile
computing components.
Programming languages: A variety of programming
languages are used for mobile application
development in mobile computing.
• One popular programming language is Java,
because of platform independent, the code
developed in java independent of CPU and OS of
the system.
• J2SE-Java 2 standard Edition and its two versions of
J2ME-Java 2 Micro Edition and Java card and J2EE-
Java 2 Enterprise Edition used for developing
mobile applications.
Functions of OS: We know that an OS enables user
to run applications without knowing hardware
specifications and functionalities.
• The mobile OS provides functions for scheduling
multiple tasks, memory management tasks,
synchronization and priority allocation.
• The mobile OS also provides interfaces for
communication between application layers,
middle ware layers and hardware.
• The mobile OS provides configurable libraries for
GUI in the device and phone API, it also provides
new application development environment.
Functions of middleware: Middleware are the
software components that link application
components with network distributed components,
mobile OS provides middleware components.
• The following are some middleware applications;
1. Discover the nearby Bluetooth device.
2. Discover nearby hotspot.
3. Achieve device synchronization with server or an
enterprise server.
4. Retrieve data from network database.
1.Adaptation of application to the platform and
service availability.
Mobile computing architectural layers: Mobile computing
architecture refers to define various layers between user
applications interfaces, devices and network hardware.
• A well defined architecture is required for
systematic computations and access data and
software objects.
• The following diagram shows mobile computing
architecture for mobile device.
• Here two adjacent layers interact with each other
and other with the help of input-output interface.
• All mobile APIs are appear at application layer and
components in middleware layer discover the
service, link the client and network service, update
database, manage the devices using remote server
software, perform client server synchronzation and
soon.
Protocols: Generally to perform interchanges between two
diversified and distributed components need protocols and
standards.
• Mobile computing use number of protocols such as
GSM 900/1800/1900, CDMA, WCDMA, HSPA,
UMTS, i-Mode, LTE and WiMax.
• Layers There are different layers in network
transmission and reception or interchange of
information. The following are some layers in
Mobile computing as per OSI model.1.Physical layer
– Sending and receiving signals
• Data link layer – multiplexing
• Network layer – Linking to destination
5.Wireless transport layer - for establish end-to-end
connectivity.
6. Wireless transport protocol
7. Wireless session protocol
8. Wireless application environment
MOBILE SYSTEM NETWORKS
• Mobile network means network for mobile
devices, it consists of mobile devices,
servers, and distributed computing
systems.
• There are three types of mobile networks;
a) Cellular networks
b) Wireless LAN networks
c) Ad hoc networks
Cellular networks: A cell is the coverage
area of a base station, connected to other
stations via wire or fiber or wirelessly
through switching centers.
• The coverage area defines a cell and its
boundaries.
• Each cell base station functions as an
access point for the mobile service.
• Each mobile device connects to the base
station of the cell which covers the current
location of the device.
• All the mobile devices within the range of a
given base station communicate with each
other through that base station only.
• The following diagram shows the cellular
network;
WLAN network & Mobile IP: Mobile devices
like pocket computers and laptops
connects to an access point. The access
point, in turn, connects to a host LAN
which links up to the Internet through a
router.
• This connectivity is established between
internet, two LANs, mobile devices, and
computers.
• The following diagram shows
communication between WLAN
• Mobile IP is an open standard defined by
Internet Engineering Task Force (IETF).
• It is based on Internet Protocol (IP), all the
communication system support IP also
support mobile IP.
Ad hoc networks: In ad hoc networks the
base stations function as gateways and The
nodes, mobile nodes, and sensor nodes
communicate among themselves using a
base station.
•The ad hoc networks deployed for routing,
target detection, service discovery, and other
needs in a mobile environment.
END OF UNIT-I
UNIT-II
MOBILE DEVICES & SYSTEMS
Cellular Networks & Frequency Reuse:
• We know that mobile communication is
mostly cellular based.
• A cell is defined as a coverage of base
station, i.e. each cell as a base station and
each base station works as a access point
for the mobile devices.
• A mobile device within the cell wirelessly
communicates with base station and other
mobile devices within the cell.
• The base stations are interconnected either
wired or wirelessly form the cellular
networks.
• In cellular network neighbouring cell uses
different frequency bands in GSM
communication technology. The
frequencies are reused in nest to nest
cells.
Cellular Networks & Mobile Smart phones:
• In the above diagram a mobile service
region is divided into cells, the size of the
cell is depend on the technology and
frequency used within the cell. For
example CDMA 950 MHz cell radius is 24
km.
• Generally all the cells in the hexagonal
shape whose base stations are at the
middle and these base stations are
compatible with ISDN or PSTN.
• A multi cellular network lead to when a
mobile unit moves from one place to
another place the communication
(connection) also switched from cell to cell,
using handover technique.
• There are so many handover techniques,
due to the handover mobile unit transition
completed without disrupting ongoing
communication.
•
Frequency reuse in networks:
• We know that each cell in the network is
surrounded by cells in all directions. So
same frequency may used at all base
stations may cause the interference, then
adjacent cell may use different frequencies.
• The FDMA technique species that there
may be at least one cell gap between the
cells which reuse the same frequency.
• For example If cell A0 is using frequency
f0, then the cells A1, A2, A3 , A4, A5 and
A6 must use different frequencies.
• Assume that cell A0 is using frequency f0
then cell A1 uses f1, cell A2 uses f2 and
cell A3 can reuse f1.
• This is because A1 and A3 are not
adjacent and there is a gap of one cell
between them. Cell A4 reuses f2, cell A5
reuses f1 and cell A6 can reuse f2.
• Three separate frequencies f0, f1 and f2
are required in case frequencies are
reused. Frequency reuse factor is 1/3.
• The frequency reuse factor(u) can be 1/3,
1/4, 1/7, 1/9 and 1/12. the cell size can
also be reduced when more frequencies are
available.
• The formula for frequency reuse distance
d = r√(3xn where r is distance between cell
centre and cell boundary and n is number
of surrounding cells.
• We observe that each cell is divided into
sectors with each sector lying in different
direction from the base station.
• Assume base station use m antennas may
form m sectors. Each antennae in different
direction and use the same frequency.
Here space division multiplexing technique
is used, and here frequency reusing factor
is m/u.
• For example GSM uses a reuse pattern
3/4 and consider total bandwidth to GSM
service is ‘b’ then the number of frequency
channels that can be used =b/u.
• Each sector in GSM using SDMA can use
the bandwidth bs= b/m x u.
Capacity enhancement in networks:
Capacity enhancement takes place due to
the followings:
1.Frequency reuse: Capacity enhancement
due to frequency reuse = k × m× u. Here k
is the enhancement due to multiplexing, m
is number of sectors formed in a cell and u
is number of adjacent cells.
2.Multiplexing is also enhances the capacity.
Different channels, users, or sources can
share a common space, time, frequency, or
code for transmitting data
3. A sector antenna can be divided into
micro-sectors and each sector is along a
specific beam transmitted by the antenna.
Window Switched beam Smart antennae
use can further enhance the capacity. An
antenna can radiate p beams in different
directions. Capacity enhancement due to
frequency reuse = p × k × m× u.
MOBILE SMART PHONES, SMART MOBILES & SYSTEMS
• Mobile phones are now smart phones
which Communicate with other phones
using a cellular service-provider network
• Packed with smart functions and are
available in smaller sizes
• Applications of mobile phones no longer
confined to telephonic communication.
• Now a days mobile can synchronize and
upload and download data to and from
PCs.
• mobile smart phones provides e-mail and
Internet connectivity.
• it can send files, click pictures and prepare
albums.
•Includes a personal information manager
(PIM), a handheld computer, and an
entertainment device.
Smart phone Features:
1. A GSM, CDMA, or tri-band wireless radio
interface to a cellular network provided by a
mobile service provider.
2. Small area LCD display.
3. A smart T9 keypad─ A smart keypad is
one that remembers previously keyed
entries.
4. T9 stands for ‘text on 9 keys’.
5. A text input system that offers an
alternative to multi-tapping for entering
textual characters on a numeric keypad.
6. Smart T9 keypads useful for creating SMS
messages and entering contact information.
7. Functions as a phone as well as a PIM ─
phone diary, address book, task-list,
calculator, alarm, and calendar.
8. Ability to send and receive SMS messages
of up to 160 characters.
9. Ability to send and receive MMS (multi
media messaging service) messages for
transmission of digital images, video clips,
and animations.
10.Provisions for games, e-commerce, and
e-ticketing.
11.Bluetooth communication with PCs and
neighboring devices.
12.Integration of location information, GPS
and maps.
Multimedia features in smart phones:
• A smart phone also offers multimedia
functionalities. play MP3 format audio and
MP4 format video files
• Some phones may also support other
formats such as WMA, AAC, etc.
• many smart phones with multimedia
features include cameras for still pictures
and video recording.
• Some phones are with multimedia features
include cameras for still pictures and video
recording. Some phones also offer picture
editing software.
•It is also Possible to watch TV on a mobile
phone using EDGE/EGPRS (3G)
connectivity. Many mobile service providers
link up with various TV channels enable
users to enjoy mobile TV on the LCD screens
of their cell phones.
• Another popular applications of
multimedia phones is gaming. Some phones
are designed with special hardware and
software components in order to supports
better gaming experience for the user with
enhanced graphics and faster interactions
among the players.
Digital music players:
• Mobile computing encompass wide range
of applications include entertainment.
• Digital music players have revolutionized
the way people listen music. These players
include software that encode music format
such as MP3, WMA, Real media etc.
• Digital music players includes media
playing hardware that play an variety of
digital media file formats.
• The capacity of music player may vary
from 128 MB to 80 GB
• Some flash memory stick based players
can store 15,000 songs or more. Most flash
based players can serve as a storage
devices.
• Now a days media players enable video as
well audio playback.
Bluetooth and Wi-Fi:
• Bluetooth was invented by the Ericsson in
1994. it provide communication as a serial
COM port emulator and is an alternative to
RS-232 data cables.
• Bluetooth network is a self configuring
network, it creates Personal Area Networks
(PANs). It transfers the data with high level
of security it able to has eight networked
devices in one picocell. ( A picocell has
10m distance).
• Bluetooth is accepted as open wireless
technology by IEEE for exchanging the
data over short distances. It uses short
wavelength radio transmissions in fixed as
well as in mobile devices.
• Wi-Fi 802.11b and 802.11n supports data
transfer of 54 Mbps, 2.4 GHz and 600 MHz
respectively.
• 802.11b uses DSSS (Direct Sequence
Spread Spectrum)/ FHSS (Frequency
Hoping Spread Spectrum) and OFDM
(Orthogonal Frequency Division Multiple
access).
Global Positioning System(GPS):
• Today mobile phones have GPS receiver
which provides the current location of user
through its service provider.
• GPS receiver receives signals transmitted
by various GPS satellites orbiting the
earth. Timing circuits of all satellites are
synchronized.
• At least three GPS satellites are in the line
of sight of any location on the globe.
Assume satellites i, j, and K are in line of
sight at a location, these satellites provide
current geographical position of a mobile
device.
• The latitude and longitude values are used
to identify name of the location in the
mobile vicinity.
• The geographical location is continuously
changed on the map on the display when
the mobile device moves.
Gyroscope & Accelerometer:
• Gyroscope is a sensor which measures the
change in velocity as well as change in
direction. This measurement are used in
mobile gaming .
• Accelerometer is a sensor which detects
linear acceleration along three axis x, y
and z. Therefore it detects up/down,
right/left and front/back accelerations by
the user.
Digital compass & Magnetometer:
• A digital compass in a mobile phone shows
the directions north, south, east and west.
It also shows the direction in which the
phone’s display is inclined. It shows how
many degrees the device is inclined from
actual location.
• Magnetometer provides 3-dimensional
interactions without touch. Software
monitors the changes in magnetic fields
around the phone ad identifies user
gestures.
Camera: Today mobile phones have up to 12
Megapixel cameras by the Carl Zeiss
optics.
• These cameras have auto focus, LED flash
for pictures and videos. The pictures are
generally bmp, gif, or png formats.
2D and 3D Graph & HDMI:
• Smart phones support 2D and 3D graphics
and High Definition Multimedia Interface
(HDMI), these are used to transfer the
digital data without compression, in this
technique bandwidth is 340 MHz and data
transfer rate is 10.2 Gbps.
• It connects to computers, set-top boxes,
DVD players, and digital television.
Handheld pocket Computers:
• Handheld computing devices may available
in many forms, one of the example is
smart phones.
• However pocket computers different from
smart phones and multimedia phones in
that they can be programmed for
customized applications .
• pocket computers offer a variety of
applications and programming tools not
included in new generation mobile phones.
•Unlike smart phones, which usually use the
text-on-nine-keys format, handheld
computers have full text keypad or a touch
screen keypad.
• Stylus generally used to enter data into
handheld devices such as PDAs and
palmtops.
• Some allow the user to write on the screen
using a stylus and incorporate special
software for handwriting recognition.
• The handheld computers include word
processors and spread sheet software as
well as PIM software it also have QWERTY
keyboards or touch screens with stylus for
data inputs.
• Pocket PCs do not CD drives and hard disk
use flash memory or micro SD card and
allow the insertion of a memory stick as a
secondary storage.
• Clock speeds of pocket computer
processors are limited up to 200 MHz due
to considerations about battery life.
•Unlike laptops and notebooks, which use
regular microcomputer operating systems,
pocket computers have specially designed
operating systems.
• OS scaled to the requirements of the
software, hardware, and peripherals used in
handheld computers.
HANDHELD DEVICES (mobile OS)
• Not only the mobile hardware and software
the mobile operating systems also revolution
ally changed from past 20 years.
• The mobile OS provide interfaces, process
allocation and management and act as a
platform for sophisticated mobile soft wares.
• The following are features of some mobile
operating systems;
Windows CE:
• Windows CE is an operating system from
Microsoft. It is a real-time operating
system meant for handheld computers and
embedded systems.
• The Windows CE kernel is different from
the kernel of desktop versions of Windows.
It is meant for computing devices with low
storage and can be run in about 1 MB of
memory.
• There are various versions of Windows CE
to support different CPUs such as NEC
MIPS, Intel Strong-ARM, AMD X86, etc.
The following are Some of the features in
Windows CE devices:
• High resolution color/ display, touch
screen and stylus keypad.
• Complex APIs in Windows CE. It gives the
user a PC like feel and Windows like GUIs.
• PIM, MS office, Internet Explorer features
on handheld mobile system.
• The Compact Flash card slots to extend
memory and extension card slots.
•OS memory requirement is large but scales
to the requirement of the device peripherals.
• Built-in microphone for voice recording.
• USB port. A cradle connects to PC (A cradle
is an attachment on which the handheld
device can rest near a PC and connects to
the PC via a USB or serial port, Bluetooth,
or infrared).
• Infrared port to communicate with mobile
phones and external modems.
• Digital camera card.
• Games.
•Microsoft Windows Media player and other
media players.
•ActiveSync for synchronizing mobile data
with PC.
Mac OS:
•Mac OS is used in Apple iPhones. It has
four abstract layers.
•The first layer is for basic operations,
second for core services, third one is media
layer and fourth is the touch layer.
•The Mac require 500 MB but actual
requirements are depending on OS version.
• Mac provide faster response to user
interfaces, this API enables manipulation
of multi touch gestures.
Symbian OS:
• Symbain most widely used operating
system for smart phones, it runs
exclusively on ARM processors and its
structure much like that of some desktop
operating systems.
• Symbian offers pre-emptive multitasking,
multithreading and Memory protection. It
initially designed for handheld devices with
limited resources, strongly emphasizes on
• Symbian OS embodies event-based
programming and when applications are not
directly concerned with events, the CPU is
switched off, such techniques are very
useful in conserving battery life.
The following are some features of symbian
devices:
• Low boot time.
• Support for WLAN.
• One click connect to Internet.
• Improves performance of smart phones.
• Intelligent network management.
• Support for You Tube.
• High end security enhancement features.
Linux OS: Generally any mobile OS designed
for specific hardware and offer a platform
for selection of software applications. But
Linux changed these situations.
• It is an Operating System which support
different kinds of hardware and software
applications.
• It is an open source OS, it enables the
user to customize their device to suit their
specific needs.
• Linux to be more secure than most other
operating systems.
•Linux support is easily available from the
many forums and associations that promote
this OS.
• Many international mobile phone
manufacturers turning to Linux for their OS
requirements.
Android OS:
• Android allows developers to write the
managed code in Java. It allows controlling
of the mobile device via Google-developed
Java libraries.
• Android is a mobile operating system that
has a modified version of the Linux. It is free
and open source software.
The following are features of Android device:
• Multi-touch feature and supports devices
with various screen sizes and resolutions.
• Virtual keyboard layout for faster and
more accurate typing.
• Communicate instantly by tapping on the
contact.
• Sync feature which enables
synchronization of the files, images
between the PC and mobile.
• Choosing from all available
communication options (Face book,
Twitter, Yahoo! Mail, Gmail, etc).
• Multiple email account synchronization,
that combines all account into a single email
inbox with option of exchange support .
•Bluetooth API allows the device to connect
to other nearby devices. This capabilities
includes the integration of features of social-
interaction and P2P communication.
• Improved camera controls with digital
zoom, a scene mode, white balance controls,
macro focus and color effects.
E-Book Reader: Adobe offers in e-book
readers in multiple languages for pocket
PC and Symbian OS based mobile devices.
• e-book reader is a software running on
computers to read e-books news papers
and magazines.
SMART SYSTEMS
• Here we discuss smart systems that have
embedded computational devices.
• Smart systems provide comfort, efficiency,
and remote access to devices and
applications, the following are some smart
systems.
Smart Cards: Smart card is small, pocket-
sized card. It has electronic processing
circuits embedded in them. It can also
function as the memory cards, meant for
storing data.
• Smart card may also have embedded
microprocessor circuit. The size, shape,
electrical characteristics, communications
protocols, command formats, and
functions are defined by the ISO/IEC 7816
and ISO/IEC 7810 standards.
• Smart cards are two types contact smart
cards and contact less smart cards
• Contact smart cards have small gold
coated pins on the chip that provide
contact with the electrical circuit of the
card reader when card is inserted in it.
• The chip size of smart cards are few
millimetres and it lies in between inner
layers of the card.
• Smart card chip includes processing unit,
memory and transceiver and the cards
have secured hardware.
• The following are some applications of
smart cards
• A card is used for financial transactions as
a credit card or ATM/debit card.
• A card can store personal ID (even photo)
and personal information.
• A card can store the medical records of the
holder. (This may provide doctors a faster
way of accessing patient-records by reading
this card through a PC).
• An employee in an enterprise uses a card
to open the security locks at work and log
in.
• A student uses a card to get books issued
from the college library.
• Smart cards do not have batteries, the
energy is provided by the card reader.
• A smart card has a fabrication key,
personalization key, and utilization lock
embedded in it.
• Fabrication key identifies a card uniquely,
the host machine, remote server uses
personalization key, to activate the
transactions for which card is intended for,
utilization lock is used to lock or unlock
the use of card.
•
•The card can communicate with the host
after appropriate interchanges for
authentication. ASK 13.56 Mbps is used for
contact-less communication at data rates of
1 Mbps.
• A metallic squared foil at the side of the
card surface acts as the antenna for
transmitting signals to a host.
•The host is a device which reads the card
and performs requested transactions. The
host connects to a PC or remote server
through a phone line, Internet leased line,
fiber line.
Smart Labels: Generally labels serve the
purpose of identifying the contents of the
package.
• A label differs from card in terms of
thickness and visibility, and it using
wireless transmission for product
identification.
• A smart label has a processor, memory,
transceiver, and antenna.
• Labels are powered by the received signals
due to wireless communication the label
need not visible when implemented in
product or package.
• The smart labels networked together using
a central reading and computational
devices.
• We use collision sense and avoidance
protocols that multiple labels are not
allocated the same ID tag and then central
server can uniquely identify each one.
• A label may use secured hardware and
server authentication software.
RFID: It is a automatic identification method
for remote storage and retrieval of data on
RFID tags.
• RFID tags are objects that are attached
onto people, products, or animals to
enable their identification using radio
waves from near by source.
• RFID usually contains integrated circuit
and antenna supports up to 115 Kbps
data transfer.
• RFID computations are limited to
transmission of tag’s content.
• Each RFID tag is monitored by hotspot
which is in the area of tag and has a line of
sight access to it.
• The hotspot has a computer and wireless
transceivers to transmit and receive
signals from RFID tag.
• The distance between RFID and hotspot is
less than 20cm then a device use NFC
protocol.
Smart Tokens: Tokens are used for
authentication purpose, such as granting
entry into a restricted area, etc.
• A smart token is an encapsulated circuit
consists of embedded processor and
memory.
• The size of the smart token is small and
use wire based protocol and communicate
16-128 kbps for connection less
communication.
• The following are some examples of smart
tokens;
1.For granting permission to employees to
enter work place.
2.Token is used to remotely open doors.
3.Defence applications.
Sensors: Sensors are electronic devices that
sense the physical environment, For
example, sensors for temperature, pressure,
light, metal, smoke, and proximity to an
object.
• Sensor sends the signals to a computer or
controller facilitate interaction of the mobile
device with the surroundings.
• The following are some examples of
sensors;
1. A CCD (charge-coupled device) camera to
identify various objects or a microphone to
recognize voices.
• Sensor for background noise is used to
control voice amplification during a call.
• Sensor for surrounding light used to
control the brightness of the LCD screen.
• The SPS (Speech Processing System)
authenticates the mobile owner then, the
SPS can also be used to dial a spoken
number and interpret and execute spoken
commands.
• A sensor for measuring the strength of the
signal received controls the amplifications of
received signals.
Actuator: Actuator receives the signals from
a controller or central computer and
accordingly activates a physical device,
appliance, or system.
• sensor actuator pair are used in control
systems, for example, a temperature sensor
and current actuator pair controls the oven
temperature.
• A light sensor and bulb current actuator
pair controls the light levels
• A pressure sensor and valve actuator pair
controls the pressure
Smart appliances: With the present
automation technology, it is possible to
control home appliance and security
systems using cell phones.
• It is possible to networked home
appliances which use the power lines are
able to carry data frequencies up to 525
KHz.
• We know that smart home devices are we
enabled services, so we are able to allot
web address (IP address) and these devices
are generally connected to the internet
through residential gateway.
• The gateway allow the user to access home
appliance from outside using WLAN,
internet, or access point of mobile service
provider.
Setup Boxes:
• A set-top box is a sophisticated computer-
based device. It has data, media, and
network processing capabilities.
• It interconnects the home TV and the
broadcasting service network. Java is the
most commonly used programming
language in a setup box.
• Setup boxes run decoding and encoding
software. There is a software component,
called a device agent, which administers
the device on behalf of the service provider.
• Setup box sends its output signal to
telephone lines, cable lines, and wireless
antennae, it also provide feedback
channels for interactive TV, web browsing.
• The setup box gets signal from wireless
antennae, cable lines, telephone lines, and
dish antennae.
LIMITATIONS OF MOBILE DEVICES
• Mobile devices are limited in various ways
such as hardware limitations, quality of
mobile service, security during
communication and transmission,
connectivity troubles, etc.
• Quality and Security of Service: Technical
restrictions and practical considerations, it
is difficult for service providers and device
manufactures to ensure that the mobile
device operations run uninterrupted.
• Accessibility: Each mobile device is
limited by accessibility constraints. For
example RFID has limited ranges and line
of sight hot spot.
• Range: Signal strength is inversely
proportional to the square of the distance
from the transmission source. In addition
to this there is degradation of signal
quality due to reflection, scattering, and
diffraction.
• Connectivity: There may be connectivity
loss or intermittent connectivity in certain
situations. The atmospheric conditions
and changes in environment affect signal
strength.
• Security: A mobile device has security
constraints. Unsolicited advertisements
and unwanted messages may delivered to
a device. Virus attacks on mobile devices
can cause a software crash or even corrupt
the hardware.
• Hackers may hack into a device and
render it functionless or threaten integrity
and security of the data stored on the
device.
• Mobility: Non-availability of an access point
or base station and other infrastructural
issues restrict the mobility of a device.
• Energy Constraints: All mobile devices have
limited energy stored in their battery. Also,
battery size and power are limited due to
considerations such as size, weight, and
bulk of mobile devices. The devices
therefore need to be recharged after short
periods of time.
• Hardware Limitations: Besides energy
limitations due to battery size, all mobile
devices face various other hardware
constraints too.
• Memory There are constraints on memory
availability. Most mobile devices do not
support hard-disk drives and CD drives
due to size limitations.
• Bandwidth: Limited bandwidth may become
an obstacle to seamless connectivity and
quality of signals, when a large number of
mobile devices simultaneously demand
network connectivity.
UNIT –III
GSM & Other 2G Architectures
Introduction to GSM: To day the most
successful digital mobile telecommunication
system is G.S.M. its original name is “Groupe
speciale mobile” was founded in 1982. Its
name soon changed as “Global system for
mobile communications”, with specification of
procedures designed by European
Telecommunications standards Institute
(ETSI) after that the universal mobile
Telecommunication systems (UMTS) add new
standards to G.S.M.
• The primary goal of G.S.M was to provide a
mobile phone system that allows users to
roam seamlessly and provide voice services
compatible to ISDN and PSTN systems.
• There are several versions in GSM depending
on various standards and different uplink
and downlink frequencies.
1. GSM 900-it is initial version of GSM
developed in Europe using 890-915 MHz
uplink and 935-960mhz down link frequency.
2. DCS 1800-digital cellular system is a version
of GSM using 1710-1785 MHz up link and
1805-1880 MHz down link frequencies.
3. PCS 1900- personal communication service
is a version of GSM using 1850-1910 MHz
uplink and 1930-1990 MHz down link
frequencies.
4. GSM-R (Rail)-this version of GSM offers
many additional services which are un-
available with public GSM. It offers 19 channels
for voice and data traffic .other services are,
emergency calls with acknowledgement, voice
group call service, voice broadcast service etc.
GSM (Mobile) services
• GSM permits the integration of different voice
and data services that compatible with existing
networks. The GSM has defined three different
categories of services these are,
1. Bearer services.
2. Tele services.
3. Supplementary services.
The following is the GSM service reference
model.
• In the service model A mobile station ’MS’ is
connected to GSM-Public Land Mobile
Network (PLMN) via Um interface. This is
further connected to transit network, such as
Integrated Services Digital Network (ISDN) or
Public Switched Telephone Network (PSTN).
• There may be additional source/destination
network before another terminal ‘TE’. within
the MT there is a mobile station MS.
• The mobile termination ’MT’ performs all
network specific tasks and also offers an
interface for data transmission to ’MS’ which
is the network independent.
Barrier Services: In classical GSM model,
bearer services are connection oriented and
circuit or packet switched. These services
only need the three lower layers of OSI
reference model. The bearer services may be
transparent and non transparent,
synchronous or asynchronous, data
transmission.
• Barrier services are again classified into;
1. Transparent Barrier Services.
2. Non Transparent Barrier Services.
3. Synchronous Services.
4. Asynchronous Services.
Transparent Barrier Services: which use the
functions of physical layer to transmit
data. Here data transmission has constant
delay and throughput if no transmission
errors occurs. To improve the quality of
transmission, this method use Forward
Error Correction (FEC)-which reconstructs
the original data incase of transmission
errors.
Non Transparent Barrier Services: which use
the second and third layer protocols to
implement errors correction and flow
control. Here we use transparent services
• This protocol contains High level Data Link
Control (HDLC) and selective-reject
technique to retransmission of erroneous
data. In Non transparent bearer service the
error rate is less than 107, but the
throughput and delay vary depending on
transmission quality.
Synchronous Data Transmission: It
indicates that the data transmitted from
transceiver at a fixed rate as the result
constant phase difference maintained
between successive data bits or frames.
• The receiver must synchronize clock rate
according the incoming data bits. The
receivers also synchronize data bits
coming in from multiple paths or stations
and compensate for the varied delays in
receiving signals.
• Handshaking is not used in synchronous
transmission of data and synchronous
data transmission is faster because there
is no waiting period during the data
transfer.
Asynchronous Data Transmission: Here the
data is transmitted by the transceiver at
variable rates as a result of constant time
intervals are not continuously maintained
between consecutive data frames. Usually
handshaking or acknowledgement of data
in asynchronous data transfer.
• Even if there is no acknowledgement when
the data flow is maintained by using FEC
and buffers. Buffers can use variable delay
in reception.
Tele Services: GSM tele services are end-to-
end that is from one terminal TE to
another, these are application specific and
need all seven layers of OSI model. The
following different tele services offered by
G.S.M.
1) telephony- The main focus of GSM is to
provide voice oriented tele services. Here
special codes are used for voice
transmission, other codes used for analog
data communication with traditional
computer modems.
2) Emergency Number- In this service, the
same number can be used throughout
specific area. It is a mandatory (compulsory)
service offered by service providers at free of
cost. This service has the highest priority
and will be set up with the closest
emergency center.
3) Short Message Service (SMS) – it is a
useful service to transfer short messages
upto160 characters. This service do not use
standard data channel of GSM, but using
unused capacity in the signaling channels.
•Sending and receiving of SMS is possible
during voice or data transmission.
4) Enhanced message service (EMS)- which
support large message size, formatted text,
animated pictures, small images and ring
tones in a standardized away. EMS never
create hurdles to MMS multimedia message
service, which offers transmission of large
pictures, short video clips etc.
 
5) Group 3 FAX- this is another Non voice
Tele service is available world wide.
• In this service FAX data is transmitted is
digital data over the analog telephone
network according to the ITU-T standards.
Supplementary services: Supplementary
services are enhancements for standard
telephony services, and may vary from
provider to provider. These services are
user identification, call redirection, call
forwarding, closed user group and
multiparty communication calls.
GSM Architecture
The GSM has hierarchical, complex, system
architecture containing many entities,
interfaces, and acronyms. A GSM system
contains three subsystems,
 
1. Radio Sub System (RSS)
2. Network and switching Sub System (NSS).
3. Operating Sub System (DSS).
 
The following is the functional architecture
of GSM.
•
• In the above figure the RSS and NSS are
connected through ‘A’ Interface and
connection to OSS through ‘O’ interface.
The ‘A’ interface is circuit-switched based
and ‘O’ interface is signaling system based.
Radio Sub System: The top level radio sub
system contains all radio specific entities,
such as base station sub system (BSS),
mobile stations (MS), and Base transceiver
station (BTS), base station controller
(BSS) .etc...
A) Base station sub system (BSS): A GSM
network contains many BSS. Each
controlled by a Base Station Controller
(BSC). The BSS performs all activities to
maintain radio connection to MS, such as
coding/decoding of voice, rate adoption, etc.
the BSS contains many BTSs.
B) Base transceiver station (BTS): A BTS
contains all radio equipment, such as
antennas, signal processing, and amplifiers
required for radio transmission, the BTS can
form a radio cell by using sectorized
antennas and it contains several MSs. The
connection between BTS and MS through
‘Um’ interface and BSC through ‘Abis’
interface.
• An ‘Um’ interface contains all techniques
for wireless transmission and ‘Abis’
interface contains 64Kbit/s connections.
C) Base station controller (BSC): It is basically
manages the BTSs. It reserves radio
frequencies, handles hand over from one
BTS to another BTS with in BSS and
performs paging of MS. The BSC also
multiplex paging of radio channels into the
fixed network connections.
 
D) Mobile Station (MS): It is independent user
equipment, contains hardware and
software of Subscriber Identity Module
(SIM), which stores all user specific data
that is relevant to GSM.
• The user can personalize MS by his /her
SIM without SIM only emergency calls are
possible.
• Any MS is identified through International
Mobile Equipment Identity (IMEI). The
device specific techniques such as theft
protection are supported by IMEI.
• The SIM have many user subscribed
identifiers, labels and services such as a
Personal Identity Number (PIN), A PIN UN
block Key (PUK), an authentication key ‘Ki’
and International Mobile Subscriber
Identity (IMSI) and Location Area
Identification (LAI).
• The MS also offers other interfaces to
users with display, loudspeaker,
microphone and programmable soft keys.
Network and Switching Sub System: The
network and switching sub system is the
heart of the GSM network, which connects
wireless networks.
•The NSS carries out handovers between
different BSSs and contain techniques for
world wide localization of users and also
supports charging, accounting, and roaming
of users between different service providers
in different countries.
• The NSS contain following switches and
databases.
A) Mobile Service switching Center (MSC): It is a
high performance digital ISDN switch,
which setup connections to other MSCs
and to the BSCs. through the ‘A’ interface.
• It is a fixed back bone network of GSM
system, which manages several BSCs in a
geographical region.
• An MSC handles all signaling needed for
connection setup, connection release and
handover of connections between MSCs,
by using the standard signaling system
No 7 (SS7).
• The MSC can also perform all
supplementary services such as call
forwarding, multiparty calls etc...
B) Home Location Register (HLR): It is the
most important database in GSM system
and stores all user relevant information.
• The HLR consists of static information
such as the mobile subscriber ISDN
number (MSISDN) and International
Mobile Subscriber Identity (IMSI).
•The HLR may also contain dynamic
information, such as, current location area
(LA) of MS, Mobile Subscriber Roaming
Number (MSRN). As soon as MS leaves its
current LA, the information in HLR is
updated. 
C) Visitor Location Register (VLR): It is a
dynamic database associated with each
MSC, which stores all important information
required for users currently in the LA.
•If new MS comes into LA the VLR is
responsible for it, copies all relevant
information of this user from HLR.
• This hierarchy of VLR and HLR avoids
frequent HLR updates and long distance
signaling of user information.
3) Operation Sub System: The operation sub
system contains the necessary functions
for network operation and maintenance.
The OSS processes network entities of its
own and access other entities through SS7
signaling. The following are some entities
in OSS.
A) Operation and Maintenance center
(OMC):
The OMC monitors and controls all other
network entities Via ‘O’ interface.
•The functions are, traffic monitoring, status
reports, subscriber and security
management, accounting and billing.
•To carry out above functions the OMC use
the concept of Telecommunication
Management Network standard (TMN) by
ITU-T (International Telecommunication
Union-Telecommunication Sector).
B) Authentication Center (AUC): An
authentication center is defined to protect
•The AUC contains algorithms for
authentication, encryption keys, and
generate values for user authentication in
HLR. Actually the AUC exists in the special
protection part of HLR. 
C) Equipment Identity Register (EIR): The
EIR is the database which stores all device
identifications (IMEI) registered for the
network.
•The EIR also contains a list of valid IMEIs
and a list of malfunctioning devices.
RADIO INTERFACES OF GSM
• The radio interface illustrates the
connection or communication between
Base Transceiver Station (BTS) and Mobile
Station (MS). It also determines the
process of channel allocation for data
transmission.
• In GSM system, the Um radio interface is
the most significant one. It contains many
mechanisms for multiplexing and media
(channel) access.
• Generally the GSM uses space division
multiple access (SDMA) with in a BTS to
establish communication between MS and
BTS. Further, the GSM uses frequency
division duplex (FDD) to separate uplink
and down link. So the GSM media access
combines both TDMA and FDMS.
• The GSM 900 uses 248 channels for
uplink and downlink, each has 200 KHz
wide. Due to the technical reasons channel
1 and 124 is not used, 32 channels are
reserved for organizational data and
remaining 90 used for customers
•That is;
Uplink channels: 124
Down link channels: 124
Total channels : 248
Organizational Data: 32
User Data: 90
Unused: 02
Total channels: 124
• The following diagram illustrates the frame
hierarchy of GSM
•
• As shown in the figure, each 248 channels
are separated by GSM-TDMA frame that is
every 200 KHz carrier (Channel) is divided
into smaller frames. The time duration the
frame is 4.155ms.
• A GSM frame is again subdivided into
eight (8) GSM time slots. The transmission
time of the GS M time slot is 577µs.
• The data is transmitted in small portions
called bursts. The above figure shows the
GSM normal burst; which indicates data
transmission within a time slot.
•The each time slot is able to transmit 148
bits which can take 546 µs the remaining
time 31 µs are used as guard space to avoid
overlapping with other bursts. The GSM
time slot is divided into;
 
Trail bits: 06
Flag bits(S) 02
Training bits 26
User data bits 114
Total bits in the GSM time slot is 148 bits.
•
• Suppose if you fill the whole slot with data
for transmission 156.25 bits with 577 µs.
so the each physical TDM channel has a
raw data rate 33.8 Kbits/s, so each radio
carrier approximately transmits 270
Kbits/s over Um interface.
• The first and last bits of time slot that is
trail bits are set to 0 (zero) can be used to
enhance the performance of receiver.
• The training bits are used to adopt the
parameters of receiver to the current path
propagation characteristics.
• The flag bits ‘S’ indicates whether data
field contains user or network data.
• In addition to the normal burst, the GSM
defines four more bursts.
1. Frequency correction burst.
2. Synchronization burst.
3. Access burst.
4. Dummy burst.
• Frequency Correction Burst: This burst
can allow the MS to correct the frequency
of local oscillator to avoid interference with
neighboring channels.
• Synchronization Burst: this is the
extension of training sequence to
synchronize the MS with the BTS in time.
• Access Burst: This is used for initial
connection setup between MS and BTS.
• Dummy Burst: It is used if no data is
available for a slot.
Logical Channel Allocation:
The GSM specifies two basic groups of
logical channels;
1. Traffic channels.
2. Control channels.
• Traffic Channels (TCH): The GSM uses
TCH to transmit user data such as voice
and fax. There are two categories of TCH
one is TCH full rate (TCH/F) and another
one is TCH half rate (TCH/H)
• The TCH/F can transmit the data with
rate 22.8 kbits/s and TCH/H transmit the
data with rate 11.4 Kbits/s. But we know
that the GSM uses 13 Kbits/s standard
rates to transmit the voice data with
quality.
• Suppose we can use TCH/H for the voice
data transmission, it doubles the capacity
of the GSM system, but the quality of the
speech decreases.
• Suppose we use TCH/F for the data
transmission the remaining capacity, that
is 22.8 – 13 Kbits/s = 9.8 Kbits/s was
used for error correction.
• The GSM uses standard codes for
transmission of voice, such as full rate (13
Kbits/s) Half rate (5.6 Kbits/s) and
Enhanced Full Rate ((EFR) for better
quality and low transmission errors.
• For higher quality of data transmission,
GSM uses Tandem Free Operation (TFO).
In this mode the two MSS are directly
exchange the voice data.
• Not only voice transmission, the data
transmission is also possible in GSM at
different data rates, example TCH/F 4.8
for 4.8 Kbits/s, TCH/F 9.6 for 9.6 kbits/s
and TCH/F 14.4 for 14.4 Kbits/s.
• The logical channels differ in terms of their
coding schemas and error correction
capabilities.
• Control Channels (CCH): Many CCHs are
used in GSM to control medium access,
allocation of traffic channels or mobility
management. Each of channels in this
group is again categories into several sub
channels.
1 Broadcast control channel (BCCH): A BTS
uses this channel to signal information to
all MSs within a cell. Information
transmitted in this channel is, the cell
identifier, options available within the cell
and frequencies available inside the cell
and neighboring cells. The following are
a) Frequency correction channel (FCCH): A
BTS sends frequency correction
information through this channel.
b) Synchronization channel (SCH): The BTS
sends the time synchronization
information through this channel.
2.Communication control channel (CCH):
The CCH is used to exchange all the
information regarding connection setup
between MS and BTS. The following are the
sub channels of CCH.
•
a) Paging channel (PCH): For the calls
towards an MS, the BTS uses the paging
channel for paging the appropriate MS.
b) Random Access Channel (RACH): If MS
wants to (establish) setup a call, it uses
random access channel to send data to the
BTS.
c) Access Grant Channel (AGCH): The BTS
uses access grant channel to signal an MS
that it can use a TCH or SDCCH for further
connection setup.
3.  Dedicated  Control  Channel  (DCCH):  All the
above channels are unidirectional, but
dedicated control channels are
bidirectional. The following are sub
channels of DCCH.
a) Stand alone Dedicated Control Channel
(SDCCH): As long as MS has not
established a TCH with BTS, it uses
SDCCH with low data rate for signaling. It
consists of authentication, registration or
other data needed to setup a TCH.
b) Slow Associated Dedicated Control
Channel (SACCH): Each TCH associated
with Slow Associated Dedicated Control
Channel (SACCH), to exchange the system
information, channel quality, signal power
level etc…
c)  Fast Associated Dedicated Control
Channel (FACCH): When TCH is already
exists, more signaling information is
required and then GSM uses FACCH. It
uses the time slots which are otherwise
used by TCH.
• The FACCH is necessary in case of
handovers where BTS and MS have to
exchange larger amounts of data in less
time.
Frames Hierarchy:
• The GSM specifies a complex multiplexing
scheme that integrates several hierarchies
of frames. Suppose we use TCH/F for user
data transmission each TCH/F has
associated with SACCH for slow signaling
and FACCH for fast signaling. A typical
usage of physical channel for data
transmission is shown bellow.
•
TTTTTTTTTTTTSTTTTTTTTTTTTX
TTTTTTTTTTTTSTTTTTTTTTTTTX
 
• In the above data transmission T-indicates
the user data, S-indicates signaling slot and
x-is unused slot
• Twelve slots of user data followed by
signaling slot again twelve slots of user data,
then an unused slot, these 26 slots are
repeated over and over again. But actually
24 out of 26 slots (2 unused) are used by
TCH/F for data transmission.
• We know that 114 bits of user data
transmitted in a normal burst, which is
repeated for every 4.165 ms. this results
the data transmission rate is 24.7 Kbits/s.
the TCH/F actually use 24/26 of slots, so
the final data rate is 22.8 Kbit/s. (for
TCH/F)
• The periodic patterns of 26 slots occur in
all TDMA frame with TCH. The logical
combination of these frames which carry
user traffic is called traffic multi frame.
• Suppose it contains signaling data then it
called control frame. The combination of
26 frames have to a multi frame takes 120
ms duration. The control frame consists of
51 TDMA frames have duration 235.4 ms.
• The logical frame hierarchy, combining 26
data frames with 51 control frames or 51
control frames with 26 data frames. The
2048 multi frames form a hyper frame with
duration 3.5 hours.
• The large logical structure is needed for
encryption. The GSM counts each TDMA
frame with frame number forming input
for the encryption algorithm. The frame
number and slot number uniquely identify
each time slot in GSM.
PROTOCOLS OF GSM
• The following diagram shows the protocol
structure of GSM, which consists of
signaling protocols, interfaces and some
entities
• In the above the Um interface is play an
important role, between the objects in a
fixed network
LAYER-1:  the physical later at MS handles
all radio specific functions, such as,
a) Multiplexing of bursts into TDMA frames.
b) Synchronization of MS with the BTS.
c) Detection of idle channels.
d) Measurement of channel quality on the
downlink.
•The physical layer at Um interface uses
Gaussian Minimum Shift Keying (GMSK)
technique for digital modulation and
performs encryption and decryption of the
data.
• But in GSM the encryption in not
performed end-to-end, it is between Ms
and BTS with in air.
• The synchronization used for the
correction of individual path delays
between MS and BTS. All MSs with in a
cell can use the same BTS and must be
synchronized with this BTS
• The BTS generate time structure of slots or
frame for the synchronization.
• A major problem in synchronization is
different round trip times (RTT).
• An MS very close to BTS has a very short
RTT other wise the RTT will increase
• The main task of the physical layer in GSM
protocol architecture is channel coding
and error detection/ correction
• The channel coding use the different
Forward Error Correction schemes (FEC).
FEC adds redundancy to user data for
detection and correction of selected errors
• Different logical channels of GSM use
different coding schemes with different
correction capabilities
• LAYER-2: The protocol existed with in
second layer of GSM protocol architecture
is Link Access Procedure for D-Channel
(LAPDm), which is used to signaling
between the other GSM network entities
• The LAPD which is generally used in ISDN
systems and it is a version of High Level
Data Link Control (HDLC)
• The LAPDm offers reliable data transfer
over connections, resequencing of data
frames, and flow control
• The LAPDm is a light weight protocol
because it does not require
synchronization of flags or checksums for
error detection and correction
• There is no buffer space between layer-1
and layer-2 so LAPDm accepts frame
structure, recurrence patterns etc defined
at Um interface
LAYER-3: The third layer in GSM protocol
architecture may also called network layer.
This layer contains many sub layers
• The lowest sub layer is Radio Resource
Management (RR). The some part of the RR
is implemented at BTS and remaining part
is implemented at BSC
• The function of RR is supported by BSC
by using BTS management
• The main task of RR is to setup, maintain
and release of radio channels. The RR can
directly access the physical layer for radio
information and offers a reliable
connection to next higher layers
LAYER-4:  The fourth layer is Mobility
Management (MM) contain functions for
registration, authentication, location
updating and also provide Temporary
Mobile Subscriber Identity (TMSI) which is
used to replace the International Mobile
Subscriber Identity (IMSI).
• The TMSI hides the real identity of an MS
user over the air interface. The MM offers a
reliable connection to the next higher
layers 
LAYER-5: The final layer is Call Management
(CM) layer which contain three entities.
  a) Call Control (CC).
b) Short Message Service (SMS).
c) Supplementary Service (SS).
• Call Control (CC): This provides a point-to-
point connection between two terminals and
is used by higher layers for call
establishment, call clearing, and change of
call parameters
•This entity also provides functions to send
in-band tones, called Dual Tone Multiple
Frequency (DTMF)
• Short Message Service (SMS): It allows for
message transfer using control channels
SDCCH and SACCH
• Supplementary Services (SS):  These
services are enhancement of standard
telephony services and these may vary
from provider to provider
• The supplementary services may be user
identification, call redirection, forwarding,
closed user groups and multiparty
communication
GSM Localization
• One fundamental feature of GSM is
automatic world wide localization of users.
The GSM system always knows the users
current location and the same phone
number is valid world wide
• To provide localization of uses the GSM
performs periodic location updates even if
the user does not use mobile station
• The HLR always have the information
about current location and the VLR is
responsible for the MS where it is and
informs to the HLR about location changes
• When MS moves from one VLR to another
VLR the HLR sends all user data needed to
the new VLR
• Changing VLR with uninterrupted
availability of all services is also called
roaming. To locate the MS and to address
the MS several numbers are needed
• Mobile Station International ISDN Number
(MSISDN): The only important number for
user of GSM is pone number. The phone
number is associated with SIM, which is
personalized for a user
• The MSISDN follows ITU-T standard for
addresses and it also used in fixed ISDN
networks
• This number consists of Country Code
(CC), example for India +91, the National
Destination Code (NDC), which addresses
the network provider for example 984 for
idea network and Subscriber Number (SN)
• International Mobile Subscriber Identity
(IMSI): The GSM uses the IMSI for internal
unique identification of subscriber.
• The IMSI consists of Mobile Country Code
(MCC), the Mobile Network Code (MNC)
and Mobile Subscriber Identification
Number (MSIN)
• Temporary Mobile Subscriber Identity
(TMSI): The GSM uses the 4 byte TMSI for
local subscribe identification to hide the
IMSI. The TMSI is selected by current VLR
and is only valid with in the location area
of VLR, additionally the VLR may change
the TMSI periodically
• Mobile Station Roaming Number (MSRN):
The MSRN is a temporary address that
hides the identity and location of
subscriber. This address is generated by
the VLR on the request of MSC
• This address contains current Visitor
Country Code (VCC), Visitor National
Destination Code (VNDC). The MSRN helps
to find a subscriber for an incoming call
• The following is the call organization
procedure in GSM network. In GSM
network there are two types of calls,
 
a) Mobile Terminated Call (MTC).
b) Mobile Originated Call (MOC).
• Mobile Terminated Call (MTC): In this
situation an outside network subscriber
calling a mobile station in GSM network.
The following is the diagram
• In MTC, A user dials the phone number of
GSM subscriber. The Public Switching
Telephone Network (PSTN) notices that the
number belongs to the user in GSM
network and forward the call to GMSC
• Now the GMSC forward this information to
the HLR for subscriber identification and
signals
• Here the HLR checks whether the number
exists and whether the user has
subscribed requested services and also
requests the MSRN from current VLR
• After receiving MSRN from VLR the HLR
forward this information to GMSC. Now
the GMSC forward the call setup request
to MSC
• On this point the MSC request the current
status of MS from VLR. If MS is available,
the MSC initiates paging signal to the
BTSs of all BSSs
• . At this point the paging signal is transmit
to the MS. Of the MS response, the VLR
signals to MSC to setup a connection to
the MS
• Mobile Originated Call: The Mobile
Originated Call is a simple procedure then
the Mobile Terminated Call. The following
is the diagram
• In MOC the MS transmit a request for new
connection to the BSS and then it is
forwards this request to the MSC
• Now the MSC checks if this user is allowed
to setup a call with the requested service
and checks the availability of resources
through the GSM network and into the
PSTN
• If all resources are available, the MSC
setup a connection between the MS and
fixed network.
• The following is the flow of messages
during MOC.
1. The MS request the BTS to grant a
channel for communication and BTS
immediately responds by assigning
channel to MS.
2. MS sends a request to BTS for service and
BTS replies with authentication to MS.
3. BTS sends a command for ciphering at
MS, cipher number generated by AuC and
cipher key is available at BTS for accessing
MS.
4. Now MS runs an algorithm on cipher
number sent by BTS and the key is stored
in SIM.
5. Now call is setup by call Management
protocol (CM) by the MS and BTSM
protocol by BTS.
6. Call setup is conformed by BTS to MS.
7. Assignment command is sent by BTS to
MS and assignment complete is sent by
MS to BTS.
8. An alert message is sent from BTS to MS
before connection.
9. Connection established message is sent
from BTS to MS and connection
acknowledgement is sent by MS to BTS.
10. Voice or data interchange starts.
• The following is the flow of messages
during MTC.
1. The BTS sends a request for paging to MS
and MS request to BTS for channel
allocation.
2. Channel is immediately assigned by BTS
to MS and MS responds to paging signal to
BTS.
3. A request for authentication is sent by the
BTS and response is sent by the MS.
4. BTS sends the ciphering command and
MS responds with cipher complete
message.
5. Call is setup by running CM protocol at
MS and BTSM protocol at BTS.
6. Now assignment command is sent by BTS
and MS responds with assignment
complete.
7. Before connection establishment alert
message sent by BTS to MS.
8. Connection established message is sent
by BTS to MS and acknowledgement
message is sent by MS to BTS.
9. Voice or data transmission begins.
END OF UNIT - III

More Related Content

What's hot

Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile ComputingKABILESH RAMAR
 
1. introduction to wireless communication
1. introduction to wireless communication1. introduction to wireless communication
1. introduction to wireless communicationJAIGANESH SEKAR
 
Routing and routing algorithms
Routing and routing algorithmsRouting and routing algorithms
Routing and routing algorithmsBhatt Aadil
 

What's hot (20)

Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Power control in 3 g
Power control in 3 gPower control in 3 g
Power control in 3 g
 
6lowpan
6lowpan6lowpan
6lowpan
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
Mobile Radio Propagations
Mobile Radio PropagationsMobile Radio Propagations
Mobile Radio Propagations
 
Fading & Doppler Effect
Fading & Doppler EffectFading & Doppler Effect
Fading & Doppler Effect
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Dsl
DslDsl
Dsl
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
1. introduction to wireless communication
1. introduction to wireless communication1. introduction to wireless communication
1. introduction to wireless communication
 
Computer network
Computer networkComputer network
Computer network
 
Routing and routing algorithms
Routing and routing algorithmsRouting and routing algorithms
Routing and routing algorithms
 

Viewers also liked

Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computingMadhuri Badgujar
 
Logical design vs physical design
Logical design vs physical designLogical design vs physical design
Logical design vs physical designMd. Mahedi Mahfuj
 
Graphical User Interface (Gui)
Graphical User Interface (Gui)Graphical User Interface (Gui)
Graphical User Interface (Gui)Bilal Amjad
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system pptSantosh Kumar
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentationKrishna Kumari
 
Introduction to Animation
Introduction to AnimationIntroduction to Animation
Introduction to Animationmrnasim
 
Presentation on Android operating system
Presentation on Android operating systemPresentation on Android operating system
Presentation on Android operating systemSalma Begum
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Viewers also liked (16)

Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Designing the Internet of Things
Designing the Internet of ThingsDesigning the Internet of Things
Designing the Internet of Things
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
 
Sad
SadSad
Sad
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Logical design vs physical design
Logical design vs physical designLogical design vs physical design
Logical design vs physical design
 
Graphical User Interface (Gui)
Graphical User Interface (Gui)Graphical User Interface (Gui)
Graphical User Interface (Gui)
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Introduction to Animation
Introduction to AnimationIntroduction to Animation
Introduction to Animation
 
Animation
AnimationAnimation
Animation
 
Presentation on Android operating system
Presentation on Android operating systemPresentation on Android operating system
Presentation on Android operating system
 
ANIMATION PPT
ANIMATION PPTANIMATION PPT
ANIMATION PPT
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Mobile Computing

Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIRamesh Babu
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationMukesh Chinta
 
Mobile computing 98q76r876778787767.pptx
Mobile computing 98q76r876778787767.pptxMobile computing 98q76r876778787767.pptx
Mobile computing 98q76r876778787767.pptxJuliesSr
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationMukesh Chinta
 
474-Ch7-TransmissionMedia.pptx
474-Ch7-TransmissionMedia.pptx474-Ch7-TransmissionMedia.pptx
474-Ch7-TransmissionMedia.pptxShrutiLande2
 
Transmission media
Transmission mediaTransmission media
Transmission mediaMVPS,KBTCOE
 
Lecture handouts-Data Communication.pdf
Lecture handouts-Data Communication.pdfLecture handouts-Data Communication.pdf
Lecture handouts-Data Communication.pdfSnehanshuShekhar5
 
Group 1 communication system.pptx
Group 1 communication system.pptxGroup 1 communication system.pptx
Group 1 communication system.pptxAdwitiyaGoswami
 
Jaimin chp-2 - 2011 batch
Jaimin   chp-2  - 2011 batchJaimin   chp-2  - 2011 batch
Jaimin chp-2 - 2011 batchJaimin Jani
 
Optical Fiber communication
Optical Fiber communicationOptical Fiber communication
Optical Fiber communicationEklavya Singh
 
Networking: A Beginner's Guide
Networking: A Beginner's GuideNetworking: A Beginner's Guide
Networking: A Beginner's Guideashishkrsinha4u
 
Sept 2017 communication system and protocols
Sept 2017  communication system and protocolsSept 2017  communication system and protocols
Sept 2017 communication system and protocolsshahin raj
 
Transmission mediums in computer networks
Transmission mediums in computer networksTransmission mediums in computer networks
Transmission mediums in computer networksGourav Kumar Saini
 
lecture2.ppt
lecture2.pptlecture2.ppt
lecture2.pptn00ne2
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless TransmissionJoe Christensen
 

Similar to Mobile Computing (20)

Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Mobile computing 98q76r876778787767.pptx
Mobile computing 98q76r876778787767.pptxMobile computing 98q76r876778787767.pptx
Mobile computing 98q76r876778787767.pptx
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Mobile computing unit 1
Mobile computing unit 1Mobile computing unit 1
Mobile computing unit 1
 
474-Ch7-TransmissionMedia.pptx
474-Ch7-TransmissionMedia.pptx474-Ch7-TransmissionMedia.pptx
474-Ch7-TransmissionMedia.pptx
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Data Communication.ppt
Data Communication.pptData Communication.ppt
Data Communication.ppt
 
Data Communication.ppt
Data Communication.pptData Communication.ppt
Data Communication.ppt
 
Lecture handouts-Data Communication.pdf
Lecture handouts-Data Communication.pdfLecture handouts-Data Communication.pdf
Lecture handouts-Data Communication.pdf
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Group 1 communication system.pptx
Group 1 communication system.pptxGroup 1 communication system.pptx
Group 1 communication system.pptx
 
Jaimin chp-2 - 2011 batch
Jaimin   chp-2  - 2011 batchJaimin   chp-2  - 2011 batch
Jaimin chp-2 - 2011 batch
 
Optical Fiber communication
Optical Fiber communicationOptical Fiber communication
Optical Fiber communication
 
Networking: A Beginner's Guide
Networking: A Beginner's GuideNetworking: A Beginner's Guide
Networking: A Beginner's Guide
 
Sept 2017 communication system and protocols
Sept 2017  communication system and protocolsSept 2017  communication system and protocols
Sept 2017 communication system and protocols
 
Transmission mediums in computer networks
Transmission mediums in computer networksTransmission mediums in computer networks
Transmission mediums in computer networks
 
lecture2.ppt
lecture2.pptlecture2.ppt
lecture2.ppt
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
 

More from Ramesh Babu

Software Project Management
Software Project ManagementSoftware Project Management
Software Project ManagementRamesh Babu
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8Ramesh Babu
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6Ramesh Babu
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5Ramesh Babu
 
Role of computers in Engineering Education
Role of computers in Engineering EducationRole of computers in Engineering Education
Role of computers in Engineering EducationRamesh Babu
 

More from Ramesh Babu (6)

Software Project Management
Software Project ManagementSoftware Project Management
Software Project Management
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
Role of computers in Engineering Education
Role of computers in Engineering EducationRole of computers in Engineering Education
Role of computers in Engineering Education
 

Recently uploaded

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Mobile Computing

  • 1. MOBILE COMPUTING (IV –I B.Tech R10 Regulation) AMRITA SAI INSTITUTE OF SCIENCE & TECHNOLOGY RAMESH BABU PALEPU Associate Professor
  • 2.
  • 3. UNIT-I • An overview of mobile communication • Guided Transmission • Unguided Transmission • Signal propagation frequencies • Antennae • Modulation • Modulation methods & standards for voice oriented data communication standards • Modulation methods & standards for data and voice oriented data communication standards
  • 4. • Mobile computing –Novel applications & limitations • Mobile computing architecture • Mobile system networks ------------------------------------------------------ - What is a network? Let me allow different kinds of networks before we start our actual discussion. It is possible to classify the net works on various parameters, such as i) Geographical area ii) According to the topology iii) According to the protocols
  • 5. iv) According to the data transmission v) According to the routing vi) According to the physical media etc.. Now we discuss about mobility- Today the most of the computing devices are portable that is we can easily carry the devices from one place to another place. The characteristic of device portability leads to the mobility. It means ability to move. The mobile computing means ‘the computing systems that may easily moved while they are being perform some task’(computation)
  • 6.
  • 7. There are two kinds of mobility’s. a)User mobility - In user mobility a user can access the same or similar services at different places. That is the user can be mobile, and services will follow him. b)Device mobility - the communication device moves with or without help of a user. Several techniques in communication network guarantees that communication is even possible while device is being moved.
  • 8. • The following are the four different characteristics exhibit by the communication devices. A) Fixed and wired: This category describes the fixed desktop computers in the office, which are      connected through the wired network. The weight and power consumption of these devices      does not permit for mobility, these devices use fixed network for information accessing
  • 9. B) Mobile and wired: The most of the portable computing devices fall within this category. We      can easily carry these devices (eg: laptops) from one place to another place and      reconnecting to the organization’s network via the telephone lines or a modem. C) Fixed and wireless: This kind of technique is especially used for installing networks in      historical places such as buildings to avoid damages by fixing cables and other equipment.      This method can also be used for fastest network setup.
  • 10. D) Mobile and wireless: This is the most recent technique, in which no cable restricts, the       user, who can roam between different wireless networks. Eg:GSM –Global system for       mobile communications. Limitations of MC: 1.Power consumption 2.Tiny Keypads 3.Small Displays
  • 11. Applications of MC 1.Vehicles 2.Emergencies 3.Business 4.Replacement of Wired networks 5.Infotainment. 6.Location dependent services. a) Follow on services b) Location aware services c) Privacy d) Information services
  • 12. MOBILE COMMUNICATION • Communication is a two transmission and reception of data, voice, or multimedia content through a fiber, wire, or wireless medium. • The transmission takes place by generating the signals according to defined regulations, standards and protocols. • Here the signal can be defined as variation of voltage ‘v’ or current ‘i’ between two points in a circuit. The values of v or i change as function of time t.
  • 13. • The signal frequency is defined as signal voltage v or current i oscillates 109 times between maximum and minimum values then the electrical signal frequency f=109 Hz (1 GHz). • The simplest representation of the signal (s) in the form of sinusoidal function of time, here the changes in the amplitudes of signal are represented by s(t) which varies sin of an angle between 0 to 360. • S(t) = S0 sin [(2π x f x t) + θt0
  • 14. Guided Transmission • Metal wires and optical fibers are used in guided or wired transmission of data. The guided transmission takes place using four types of cables. i) Optical fibers for signals of wavelength 1.35 – 1.5 µm. ii) coaxial cable for electrical signals of frequency up to 500 MHz to a range of 40 m. iii) Twisted pairs for electrical signals of up to 100 MHz to a range of 2 Km
  • 15. iv) Power lines are used for long transmission of frequencies between 10KHz to 522 KHz. Advantages: • Transmission is along a directed path from one point to another. • Practically there is no interference of external sources. • A large number of sources can simultaneously transmitted along optical fiber, coaxial, or twisted pair by using multiplexing and coding techniques.
  • 16. Disadvantages: • In guided transmission transmitting and receiving points are fixed. • The total number of interconnections between transmitters and receivers are limited. UNGUIDED TRANSMISSION • Unguided transmission or wireless transmission is carried out through radiated electromagnetic energy. Here the electromagnetic energy flows in free space in the form of MHz or GHz spectrum rage.
  • 17. • Here the spectrum means the set of frequencies. Signal Propagation Frequencies: • Generally electrical signals are converted into electromagnetic radiation and then transmitted through antennae. • There are various frequency bands in electromagnetic spectrum and each of one have different transmission requirements. • The electromagnetic signal frequency in vacuum or air is defined as; f = c/λ = (300/ λ)MHz [λ in meter]
  • 18. • Here f in MHz and wavelength λ in meters and c is the velocity of signal propagation, it is 3 x106 m/s. • The following table illustrate some wireless transmission frequencies and their properties;
  • 19.
  • 20. The following are some of the signal propagation frequencies and their wavelengths; 1.Long wavelength radio, very low frequency (LW):30KHz to 1 MHz wavelength in 10,000 to 300 meters. 2.Medium wavelength radio, Medium frequency (MW):0.5 to 2 MHz and wavelength in 600 to 150 meters. 3.Short wavelength radio, high frequency (SW): 6 to 30MHz and wavelength in 50to 10 meters.
  • 21. 4. FM radio: 87.5 to 108 MHz and 3.4 to 2.8 meters wavelength then operated in 50km range. 5. VHF: 50 to 250 MHz and wavelength in 6 to 1.2 meters. 6. UHF: 200 to 2000 MHz and wavelength in 1.5 to0.15 meters 7. Super High Microwave Frequency: 2 to 40 GHz and wavelength in 15 to 0.75 cm. 8.Extreme High Frequency(EHF): operated above 40 GHz and wavelength in 0.75cm to 3μm.
  • 22. 9. Far infrared: (1.5 to 3)x 1014 Hz and wavelength between 1.0 μm to 2.0 μm. 10. Infrared: 0.70 to 0.40 μm wavelength and operated (3.3 to 3.5)x 1014 Hz. ANTENNAE • Antennae are devices that transmit and receive electromagnetic radiations most function efficiently for relatively narrow frequency ranges. • If not properly tuned to the frequency band in which the transmitting system connected to it operates, the transmitted or received signals may be impaired.
  • 23. • The forms of antennae are chiefly determined by the frequency ranges they operate in and can vary from a single piece of wire to a parabolic dish. • The following diagram shows λ/2 Dipole Antenna for wireless transmission of waves of wavelength λ.
  • 24. • It is called dipole antenna because at any given instant at both the ends the signals are1800 out of phase. • The following diagram shows another antenna of length λ/4 mounted on a long conducting surface.
  • 25. • One of the important characteristic of antenna is radiation pattern which defines a path on which each point will have identical signal strength at any given instant t. • The radiation pattern is two types i) Circular pattern ii) Directed pattern. • The following diagram shows radiation pattern of λ/2 dipole antenna in z-y and x- z planes. It indicates signal amplitude at an instant is identical along the circles and antenna axis is perpendicular to the plane of circles and tangent to both circles.
  • 26. • The following diagram shows radiation patterns of λ/4 dipole antenna in y-z and x-z planes. • In circular radiation pattern the radiated energy and signal strength is equally distributed in all directions in the plane. • A pattern in which the signal strength is directed along a specific direction is called
  • 27. Antenna For Multiple Input Multiple Output (MIMO): • To explain MIMO let us consider two sources which are physically separated by a distance and assume one emitting red light and other emitting green light, but both incident on the same point (reach same destination). • We know that the color appears at the incident point will be different from the color of any one of the source, because the beams are travel on different paths and phase angle also different, which depends
  • 28. On time and distance travelled by the beams. • The end resultant color determined by the distance between the sources and phase difference the source signals. • Generally the resultant color has maximum intensity than the two source signals. • The MIMO technology use more then one antenna which was physically separated and multiple antenna outputs are used for transmission. So the resultant output is different from each antenna output.
  • 29. • So it is possible in MIMO two or more sources’ signals can travel on different paths, and their frequencies and phase angles are carefully selected at receiver ends. • In MIMO one antenna radiating (sending) signal in receiver direction is placed in the vicinity of another antenna radiating in the same direction. • Appropriate separation between antennas cause constructive interference between radiations from them.
  • 30. • Now the receiver got the superimposed signal which causes increase wireless link range. This phenomena is used to code the signals and increase the transmitted spectral efficiency. • In MIMO multiple antennae can be used for wireless communication. Assume ‘n’ antennae has separated at transmitter side, here the distance between antennae is significantly large. • Now multiple wavelengths can generated at transmitted station which causes multiple outputs.
  • 31. • These multiple outputs can thus received at receiving station using multiple antennae as a inputs to receiver. • Here the receiver may have 1 or ‘m’ separated antennae. The space between the receiver antennae is small. • Now each receiver able to receive ‘n’ signals transmitted through ‘n’ paths. So the signal propagates through a matrix of ‘n x m’ paths this is called MIMO.
  • 32. Propagation of signals • The wireless communication requires reliable transmission, but it is difficult wireless transmission rather than fixed wired communication because the wireless transmission may face many complications. • we know that now a days the antennae size and height is very small so the obstacles in the vicinity of antennae certainly influence the propagation of signals.
  • 33. • We know that the propagation properties may depend on the time, place and weather and soon. • To minimize the impairing effects, the signal propagation routes are designed and calculated by considering the various propagation losses. • The following things should consider during the propagation of the signal; a) Line of sight: It is the transmission of the signal without refraction, diffraction and scattering, even though transmission losses may occur.
  • 34. • We know that the strength of the signal decreases as the square of the distance from the transmitter. This is due to radiated power is distributed over a large spherical surface. b) The signal strength may also decreases due to attenuation. Suppose the obstacles in the path of signal is greater in size than the wavelength of the signal then attenuation of signal happens. • For example: FM band signal transmitter 90 MHz (λ =3.3 m) faces─ attenuation of in objects of size 10 m and above
  • 35. GSM 900 MHz (λ > = 33 cm) signal then it will face attenuation in objects of size > 1 m (>> λ ~ 33 cm) c) The signal scatters when it encounters an obstacle of size equal or less than the wavelength of the signal. For example GSM signal, about 33 cm in wavelength, scattered by an object of 30 cm or less. d) The signal bends as the result of diffraction from the edges of an obstacle of size equal to or less than the wavelength. For example GSM signal of wavelength 33 cm will diffract from an object of 33 cm or less.
  • 36. • The diffracted signal may or may not reach the destination. It depends upon geometry of the obstacle and separation between the transmitter and receiver. The following diagram shows diffraction of signal. e) Signal reflected from the surface of an obstacle, whose size is greater than the wavelength of the signal.
  • 37. • For example GSM 900 MHz (λ = 33 cm) signal the transmitter signal reflects from an object of size 10 m and above (much greater than λ). The following diagram shows the reflection of signal. • The reflected signal may undergoes the transmission delay, the delay is the common phenomena in multi hop path.
  • 38. • The delayed signals have distorted wave forms and cause misrepresentation of information encoded in the signal. • We use digital signaling processing to avoid distortion caused by delays. The delay in reflected signal with respect to the original direct signal is given as, tindirect - tdirect = additional path travel in meters 3 x 108 ms-1
  • 39. Modulation Methods & Standards for Voice Oriented Data • First generation wireless devices communicated only voice signals the symbol 1G refers voice only. • Second generation (2G) devices communicate voice as well as data, it is introduced in 1988, the 2G signals have transmit the data rates of up to 14.4 kbps. • The 2.5G and 2.5G+ are enhancements of the second generation and sport data rates up to 100 kbps.
  • 40. • The 3G supports Higher data rates than 2G and support voice, data, and multimedia streams. • The 3G supports data rates of 2 Mbps or Higher for short distances and 384 kbps for long distance transmissions. • High data rates in 3G Enable transfer of video clips and faster multimedia communication. • 4G supports the higher data rates than 3G it facilitates streaming data for video and enables multimedia news paper, high resolution mobile TV, IP telephony and data rates up to 100 Mbps.
  • 41. • GSM Standard: To day the most successful digital mobile telecommunication system is G.S.M. its original name is “Groupe speciale mobile” was founded in 1982. • Its name soon changed as “Global system for mobile communications”, with specification of procedures designed by European Telecommunications standards Institute (ETSI) after that the universal mobile Telecommunication systems (UMTS) add new standards to G.S.M. • The GSM standard for mobile telecommunication through a cellular network at data rates of up to 14.4kbps and uses time-slices of 577 μs.
  • 42. • GSM 900 standard was founded in 1988 by GSM which uses GMSK (Gaussian Minimum Shift Keying) modulation for transmitting 1s and 0s. • The primary goal of G.S.M was to provide a mobile phone system that allows users to roam seamlessly and provide voice services compatible to ISDN and PSTN systems. • There are several versions in GSM depending on various standards and different uplink and downlink frequencies.
  • 43. • GSM 900-it is initial version of GSM developed in Europe using 890-915 MHz uplink and 935-960mhz down link frequency. • DCS 1800-digital cellular system is a version of GSM using 1710-1785 MHz up link and 1805-1880 MHz down link frequencies. • PCS 1900- personal communication service is a version of GSM using 1850-1910 MHz uplink and 1930-1990 MHz down link frequencies.
  • 44. • GSM-R (Rail)-this version of GSM offers many additional services which are un-available with public GSM. It offers 19 channels for voice and data traffic .other services are, emergency calls with acknowledgement, voice group call service, voice broadcast service etc. • EGSM: Extended GSM provides an additional spectrum of 10 MHz on both uplink and down link channels. So the operating frequency of EGSM is 880-915 MHz uplink and 925-960 MHz downlink. The additional 10 MHz on each side provides an additional 50 channels of 200 KHz each.
  • 45. • EGSM communication frequency spectrum lies in three bands 900/1800/1900 MHz. this is therefore known as tri-band. GPRS [GSM Phase 2+ (2.5G)]: General Packet Radio Service is a packet oriented service for data communication of mobile devices and utilizes the unused channels in TDMA mode in GSM network.
  • 46. EDGE (Enhanced Data rates for GSM Evolution): It is a enhancement of GSM phase 2. it uses PSK modulation for communication for higher rates up to 48kbps per 200 kHz channel. EGPRS (Enhanced GPRS): It is an extension of GPRS using PSK modulation. It enhances the data communication rates based on EDGE and uses High Speed Circuit Switched Data (HSCSD).
  • 47. Modulation Methods & Standards for Data and Voice Communication • Here we describe CDMA based modulation methods and standards for mobile communication network used for long distance communication. • In addition to GSM, CDMA is the most popular mobile communication standard the initial version of CDMA was 2.5G and most famous CDMA standard is CDMA One (IS-95).
  • 48. • Cdmaone founded in 1991 by QUALCOM, USA. It operates at 824-849 MHz and transmit analog signal from multiple sources.The following are some of the 3G standards based on CDMA; 3G Partnership Project (3GPP/WCDMA): It is also known as Wide CDMA. It supports asynchronous operations and has a 10ms frame length with 15 slices. • Each frame both uplink and downlink modulated by QPSK technique and uses Direct sequence of CDMA.
  • 49. 3GPP2: It is a 3G partnership project 2 started in 2001. it is compatible with CDMA 2000 and CDMA 2000 1x chipping rates. • it is mainly used for voice communication, it can transmit circuit switched as well as packet switched techniques. • It supports high data rates and synchronous operations.
  • 50. Universal Mobile Telecommunication System (UMTS): –It supports both 3GPP and 3GPP2 and transmit the data at the rate 100kbps to2 Mbps. –It combines several technologies for transmission, security and management functions.
  • 51. MOBILE COMPUTING • Mobile computing is the process of computation on a mobile device. In mobile computing, a set of distributed computing systems or service provider servers participate, connect, and synchronize through mobile communication protocols. • Mobile computing Provides decentralized (distributed) computations on diversified devices, systems, and networks, which are mobile, synchronized, and interconnected via mobile communication standards and protocols.
  • 52. • Mobile device does not restrict itself to just one application, such as, voice communication. • Ubiquitous computing refers to the blending of computing devices with environmental objects. • A term that describes integration of computers into practically all objects in our everyday environment, endowing them with computing abilities. • Ubiquitous computing is based on pervasive computing.
  • 53. • Pervasive means ‘existing in all parts of a place or thing’. • Pervasive computing is the next generation of computing which takes into account the environment in which information and communication technology is used everywhere, by everyone, and at all times. • Pervasive computing Assumes information and communication technology to be an integrated part of all facets of our environment, such as toys, computers, cars, homes, factories, and work-areas.
  • 54. • Mobile computing Also called pervasive computing when a set of computing devices, systems, or networks have the characteristics of transparency, application-aware adaptation, and have an environment sensing ability. Limitations of mobile computing:1. 1. Resource constraints – Battery needs and recharge requirements are the biggest constraints of mobile computing. 2.Interference – there may be interference in wireless signals affecting the quality of service.
  • 55. 3. Bandwidth – there may be bandwidth constraints due to limited spectrum availability at given instant causing connection latency. 4. Dynamic changes in communication environment - We know that there may be variations in signal power within a region it causes link delays and connection losses. 5. Network issues – Due to the ad hoc networks some issues relating discovery of connection, service to destination, and connection stability.
  • 56. 6. Interoperability – The varying protocol standards available between different regions may lead to interoperability issues. 7. Security constraints – Protocols conserving privacy of communication may be violated. Some times physical damage or loss of mobile device is probable than static computing system.
  • 57. MOBILE COMPUTING ARCHITECTURE • Here we discuss the architecture requirements for programming mobile device. This will provide an overview of programming language used for mobile software.
  • 58. • We also discuss mobile OS required to run software components on the hardware and OS functions. • We represent the middleware components used in the mobile devices and layered structure of mobile computing components. Programming languages: A variety of programming languages are used for mobile application development in mobile computing.
  • 59. • One popular programming language is Java, because of platform independent, the code developed in java independent of CPU and OS of the system. • J2SE-Java 2 standard Edition and its two versions of J2ME-Java 2 Micro Edition and Java card and J2EE- Java 2 Enterprise Edition used for developing mobile applications.
  • 60. Functions of OS: We know that an OS enables user to run applications without knowing hardware specifications and functionalities. • The mobile OS provides functions for scheduling multiple tasks, memory management tasks, synchronization and priority allocation. • The mobile OS also provides interfaces for communication between application layers, middle ware layers and hardware.
  • 61. • The mobile OS provides configurable libraries for GUI in the device and phone API, it also provides new application development environment. Functions of middleware: Middleware are the software components that link application components with network distributed components, mobile OS provides middleware components.
  • 62. • The following are some middleware applications; 1. Discover the nearby Bluetooth device. 2. Discover nearby hotspot. 3. Achieve device synchronization with server or an enterprise server. 4. Retrieve data from network database. 1.Adaptation of application to the platform and service availability. Mobile computing architectural layers: Mobile computing architecture refers to define various layers between user applications interfaces, devices and network hardware.
  • 63. • A well defined architecture is required for systematic computations and access data and software objects. • The following diagram shows mobile computing architecture for mobile device.
  • 64. • Here two adjacent layers interact with each other and other with the help of input-output interface. • All mobile APIs are appear at application layer and components in middleware layer discover the service, link the client and network service, update database, manage the devices using remote server software, perform client server synchronzation and soon. Protocols: Generally to perform interchanges between two diversified and distributed components need protocols and standards.
  • 65. • Mobile computing use number of protocols such as GSM 900/1800/1900, CDMA, WCDMA, HSPA, UMTS, i-Mode, LTE and WiMax. • Layers There are different layers in network transmission and reception or interchange of information. The following are some layers in Mobile computing as per OSI model.1.Physical layer – Sending and receiving signals • Data link layer – multiplexing • Network layer – Linking to destination
  • 66. 5.Wireless transport layer - for establish end-to-end connectivity. 6. Wireless transport protocol 7. Wireless session protocol 8. Wireless application environment MOBILE SYSTEM NETWORKS • Mobile network means network for mobile devices, it consists of mobile devices, servers, and distributed computing systems.
  • 67. • There are three types of mobile networks; a) Cellular networks b) Wireless LAN networks c) Ad hoc networks Cellular networks: A cell is the coverage area of a base station, connected to other stations via wire or fiber or wirelessly through switching centers. • The coverage area defines a cell and its boundaries.
  • 68. • Each cell base station functions as an access point for the mobile service. • Each mobile device connects to the base station of the cell which covers the current location of the device. • All the mobile devices within the range of a given base station communicate with each other through that base station only.
  • 69. • The following diagram shows the cellular network;
  • 70. WLAN network & Mobile IP: Mobile devices like pocket computers and laptops connects to an access point. The access point, in turn, connects to a host LAN which links up to the Internet through a router. • This connectivity is established between internet, two LANs, mobile devices, and computers. • The following diagram shows communication between WLAN
  • 71. • Mobile IP is an open standard defined by Internet Engineering Task Force (IETF). • It is based on Internet Protocol (IP), all the communication system support IP also support mobile IP.
  • 72. Ad hoc networks: In ad hoc networks the base stations function as gateways and The nodes, mobile nodes, and sensor nodes communicate among themselves using a base station. •The ad hoc networks deployed for routing, target detection, service discovery, and other needs in a mobile environment. END OF UNIT-I
  • 73. UNIT-II MOBILE DEVICES & SYSTEMS Cellular Networks & Frequency Reuse: • We know that mobile communication is mostly cellular based. • A cell is defined as a coverage of base station, i.e. each cell as a base station and each base station works as a access point for the mobile devices. • A mobile device within the cell wirelessly communicates with base station and other mobile devices within the cell.
  • 74. • The base stations are interconnected either wired or wirelessly form the cellular networks. • In cellular network neighbouring cell uses different frequency bands in GSM communication technology. The frequencies are reused in nest to nest cells.
  • 75. Cellular Networks & Mobile Smart phones: • In the above diagram a mobile service region is divided into cells, the size of the cell is depend on the technology and frequency used within the cell. For example CDMA 950 MHz cell radius is 24 km. • Generally all the cells in the hexagonal shape whose base stations are at the middle and these base stations are compatible with ISDN or PSTN.
  • 76. • A multi cellular network lead to when a mobile unit moves from one place to another place the communication (connection) also switched from cell to cell, using handover technique. • There are so many handover techniques, due to the handover mobile unit transition completed without disrupting ongoing communication. •
  • 77. Frequency reuse in networks: • We know that each cell in the network is surrounded by cells in all directions. So same frequency may used at all base stations may cause the interference, then adjacent cell may use different frequencies. • The FDMA technique species that there may be at least one cell gap between the cells which reuse the same frequency. • For example If cell A0 is using frequency f0, then the cells A1, A2, A3 , A4, A5 and A6 must use different frequencies.
  • 78. • Assume that cell A0 is using frequency f0 then cell A1 uses f1, cell A2 uses f2 and cell A3 can reuse f1. • This is because A1 and A3 are not adjacent and there is a gap of one cell between them. Cell A4 reuses f2, cell A5 reuses f1 and cell A6 can reuse f2. • Three separate frequencies f0, f1 and f2 are required in case frequencies are reused. Frequency reuse factor is 1/3.
  • 79. • The frequency reuse factor(u) can be 1/3, 1/4, 1/7, 1/9 and 1/12. the cell size can also be reduced when more frequencies are available. • The formula for frequency reuse distance d = r√(3xn where r is distance between cell centre and cell boundary and n is number of surrounding cells. • We observe that each cell is divided into sectors with each sector lying in different direction from the base station.
  • 80. • Assume base station use m antennas may form m sectors. Each antennae in different direction and use the same frequency. Here space division multiplexing technique is used, and here frequency reusing factor is m/u. • For example GSM uses a reuse pattern 3/4 and consider total bandwidth to GSM service is ‘b’ then the number of frequency channels that can be used =b/u. • Each sector in GSM using SDMA can use the bandwidth bs= b/m x u.
  • 81. Capacity enhancement in networks: Capacity enhancement takes place due to the followings: 1.Frequency reuse: Capacity enhancement due to frequency reuse = k × m× u. Here k is the enhancement due to multiplexing, m is number of sectors formed in a cell and u is number of adjacent cells. 2.Multiplexing is also enhances the capacity. Different channels, users, or sources can share a common space, time, frequency, or code for transmitting data
  • 82. 3. A sector antenna can be divided into micro-sectors and each sector is along a specific beam transmitted by the antenna. Window Switched beam Smart antennae use can further enhance the capacity. An antenna can radiate p beams in different directions. Capacity enhancement due to frequency reuse = p × k × m× u.
  • 83. MOBILE SMART PHONES, SMART MOBILES & SYSTEMS • Mobile phones are now smart phones which Communicate with other phones using a cellular service-provider network • Packed with smart functions and are available in smaller sizes • Applications of mobile phones no longer confined to telephonic communication. • Now a days mobile can synchronize and upload and download data to and from PCs. • mobile smart phones provides e-mail and Internet connectivity.
  • 84. • it can send files, click pictures and prepare albums. •Includes a personal information manager (PIM), a handheld computer, and an entertainment device. Smart phone Features: 1. A GSM, CDMA, or tri-band wireless radio interface to a cellular network provided by a mobile service provider. 2. Small area LCD display. 3. A smart T9 keypad─ A smart keypad is one that remembers previously keyed entries.
  • 85. 4. T9 stands for ‘text on 9 keys’. 5. A text input system that offers an alternative to multi-tapping for entering textual characters on a numeric keypad. 6. Smart T9 keypads useful for creating SMS messages and entering contact information. 7. Functions as a phone as well as a PIM ─ phone diary, address book, task-list, calculator, alarm, and calendar. 8. Ability to send and receive SMS messages of up to 160 characters.
  • 86. 9. Ability to send and receive MMS (multi media messaging service) messages for transmission of digital images, video clips, and animations. 10.Provisions for games, e-commerce, and e-ticketing. 11.Bluetooth communication with PCs and neighboring devices. 12.Integration of location information, GPS and maps.
  • 87. Multimedia features in smart phones: • A smart phone also offers multimedia functionalities. play MP3 format audio and MP4 format video files • Some phones may also support other formats such as WMA, AAC, etc. • many smart phones with multimedia features include cameras for still pictures and video recording. • Some phones are with multimedia features include cameras for still pictures and video recording. Some phones also offer picture editing software.
  • 88. •It is also Possible to watch TV on a mobile phone using EDGE/EGPRS (3G) connectivity. Many mobile service providers link up with various TV channels enable users to enjoy mobile TV on the LCD screens of their cell phones. • Another popular applications of multimedia phones is gaming. Some phones are designed with special hardware and software components in order to supports better gaming experience for the user with enhanced graphics and faster interactions among the players.
  • 89. Digital music players: • Mobile computing encompass wide range of applications include entertainment. • Digital music players have revolutionized the way people listen music. These players include software that encode music format such as MP3, WMA, Real media etc. • Digital music players includes media playing hardware that play an variety of digital media file formats. • The capacity of music player may vary from 128 MB to 80 GB
  • 90. • Some flash memory stick based players can store 15,000 songs or more. Most flash based players can serve as a storage devices. • Now a days media players enable video as well audio playback. Bluetooth and Wi-Fi: • Bluetooth was invented by the Ericsson in 1994. it provide communication as a serial COM port emulator and is an alternative to RS-232 data cables.
  • 91. • Bluetooth network is a self configuring network, it creates Personal Area Networks (PANs). It transfers the data with high level of security it able to has eight networked devices in one picocell. ( A picocell has 10m distance). • Bluetooth is accepted as open wireless technology by IEEE for exchanging the data over short distances. It uses short wavelength radio transmissions in fixed as well as in mobile devices.
  • 92. • Wi-Fi 802.11b and 802.11n supports data transfer of 54 Mbps, 2.4 GHz and 600 MHz respectively. • 802.11b uses DSSS (Direct Sequence Spread Spectrum)/ FHSS (Frequency Hoping Spread Spectrum) and OFDM (Orthogonal Frequency Division Multiple access). Global Positioning System(GPS): • Today mobile phones have GPS receiver which provides the current location of user through its service provider.
  • 93. • GPS receiver receives signals transmitted by various GPS satellites orbiting the earth. Timing circuits of all satellites are synchronized. • At least three GPS satellites are in the line of sight of any location on the globe. Assume satellites i, j, and K are in line of sight at a location, these satellites provide current geographical position of a mobile device. • The latitude and longitude values are used to identify name of the location in the mobile vicinity.
  • 94. • The geographical location is continuously changed on the map on the display when the mobile device moves. Gyroscope & Accelerometer: • Gyroscope is a sensor which measures the change in velocity as well as change in direction. This measurement are used in mobile gaming . • Accelerometer is a sensor which detects linear acceleration along three axis x, y and z. Therefore it detects up/down, right/left and front/back accelerations by the user.
  • 95. Digital compass & Magnetometer: • A digital compass in a mobile phone shows the directions north, south, east and west. It also shows the direction in which the phone’s display is inclined. It shows how many degrees the device is inclined from actual location. • Magnetometer provides 3-dimensional interactions without touch. Software monitors the changes in magnetic fields around the phone ad identifies user gestures.
  • 96. Camera: Today mobile phones have up to 12 Megapixel cameras by the Carl Zeiss optics. • These cameras have auto focus, LED flash for pictures and videos. The pictures are generally bmp, gif, or png formats. 2D and 3D Graph & HDMI: • Smart phones support 2D and 3D graphics and High Definition Multimedia Interface (HDMI), these are used to transfer the digital data without compression, in this technique bandwidth is 340 MHz and data transfer rate is 10.2 Gbps.
  • 97. • It connects to computers, set-top boxes, DVD players, and digital television. Handheld pocket Computers: • Handheld computing devices may available in many forms, one of the example is smart phones. • However pocket computers different from smart phones and multimedia phones in that they can be programmed for customized applications . • pocket computers offer a variety of applications and programming tools not included in new generation mobile phones.
  • 98. •Unlike smart phones, which usually use the text-on-nine-keys format, handheld computers have full text keypad or a touch screen keypad. • Stylus generally used to enter data into handheld devices such as PDAs and palmtops. • Some allow the user to write on the screen using a stylus and incorporate special software for handwriting recognition.
  • 99. • The handheld computers include word processors and spread sheet software as well as PIM software it also have QWERTY keyboards or touch screens with stylus for data inputs. • Pocket PCs do not CD drives and hard disk use flash memory or micro SD card and allow the insertion of a memory stick as a secondary storage. • Clock speeds of pocket computer processors are limited up to 200 MHz due to considerations about battery life.
  • 100. •Unlike laptops and notebooks, which use regular microcomputer operating systems, pocket computers have specially designed operating systems. • OS scaled to the requirements of the software, hardware, and peripherals used in handheld computers. HANDHELD DEVICES (mobile OS) • Not only the mobile hardware and software the mobile operating systems also revolution ally changed from past 20 years. • The mobile OS provide interfaces, process allocation and management and act as a platform for sophisticated mobile soft wares.
  • 101. • The following are features of some mobile operating systems; Windows CE: • Windows CE is an operating system from Microsoft. It is a real-time operating system meant for handheld computers and embedded systems. • The Windows CE kernel is different from the kernel of desktop versions of Windows. It is meant for computing devices with low storage and can be run in about 1 MB of memory.
  • 102. • There are various versions of Windows CE to support different CPUs such as NEC MIPS, Intel Strong-ARM, AMD X86, etc. The following are Some of the features in Windows CE devices: • High resolution color/ display, touch screen and stylus keypad. • Complex APIs in Windows CE. It gives the user a PC like feel and Windows like GUIs. • PIM, MS office, Internet Explorer features on handheld mobile system. • The Compact Flash card slots to extend memory and extension card slots.
  • 103. •OS memory requirement is large but scales to the requirement of the device peripherals. • Built-in microphone for voice recording. • USB port. A cradle connects to PC (A cradle is an attachment on which the handheld device can rest near a PC and connects to the PC via a USB or serial port, Bluetooth, or infrared). • Infrared port to communicate with mobile phones and external modems. • Digital camera card. • Games.
  • 104. •Microsoft Windows Media player and other media players. •ActiveSync for synchronizing mobile data with PC. Mac OS: •Mac OS is used in Apple iPhones. It has four abstract layers. •The first layer is for basic operations, second for core services, third one is media layer and fourth is the touch layer. •The Mac require 500 MB but actual requirements are depending on OS version.
  • 105. • Mac provide faster response to user interfaces, this API enables manipulation of multi touch gestures. Symbian OS: • Symbain most widely used operating system for smart phones, it runs exclusively on ARM processors and its structure much like that of some desktop operating systems. • Symbian offers pre-emptive multitasking, multithreading and Memory protection. It initially designed for handheld devices with limited resources, strongly emphasizes on
  • 106. • Symbian OS embodies event-based programming and when applications are not directly concerned with events, the CPU is switched off, such techniques are very useful in conserving battery life. The following are some features of symbian devices: • Low boot time. • Support for WLAN. • One click connect to Internet. • Improves performance of smart phones. • Intelligent network management. • Support for You Tube. • High end security enhancement features.
  • 107. Linux OS: Generally any mobile OS designed for specific hardware and offer a platform for selection of software applications. But Linux changed these situations. • It is an Operating System which support different kinds of hardware and software applications. • It is an open source OS, it enables the user to customize their device to suit their specific needs. • Linux to be more secure than most other operating systems.
  • 108. •Linux support is easily available from the many forums and associations that promote this OS. • Many international mobile phone manufacturers turning to Linux for their OS requirements. Android OS: • Android allows developers to write the managed code in Java. It allows controlling of the mobile device via Google-developed Java libraries. • Android is a mobile operating system that has a modified version of the Linux. It is free and open source software.
  • 109. The following are features of Android device: • Multi-touch feature and supports devices with various screen sizes and resolutions. • Virtual keyboard layout for faster and more accurate typing. • Communicate instantly by tapping on the contact. • Sync feature which enables synchronization of the files, images between the PC and mobile. • Choosing from all available communication options (Face book, Twitter, Yahoo! Mail, Gmail, etc).
  • 110. • Multiple email account synchronization, that combines all account into a single email inbox with option of exchange support . •Bluetooth API allows the device to connect to other nearby devices. This capabilities includes the integration of features of social- interaction and P2P communication. • Improved camera controls with digital zoom, a scene mode, white balance controls, macro focus and color effects.
  • 111. E-Book Reader: Adobe offers in e-book readers in multiple languages for pocket PC and Symbian OS based mobile devices. • e-book reader is a software running on computers to read e-books news papers and magazines. SMART SYSTEMS • Here we discuss smart systems that have embedded computational devices. • Smart systems provide comfort, efficiency, and remote access to devices and applications, the following are some smart systems.
  • 112. Smart Cards: Smart card is small, pocket- sized card. It has electronic processing circuits embedded in them. It can also function as the memory cards, meant for storing data. • Smart card may also have embedded microprocessor circuit. The size, shape, electrical characteristics, communications protocols, command formats, and functions are defined by the ISO/IEC 7816 and ISO/IEC 7810 standards. • Smart cards are two types contact smart cards and contact less smart cards
  • 113. • Contact smart cards have small gold coated pins on the chip that provide contact with the electrical circuit of the card reader when card is inserted in it. • The chip size of smart cards are few millimetres and it lies in between inner layers of the card. • Smart card chip includes processing unit, memory and transceiver and the cards have secured hardware. • The following are some applications of smart cards
  • 114. • A card is used for financial transactions as a credit card or ATM/debit card. • A card can store personal ID (even photo) and personal information. • A card can store the medical records of the holder. (This may provide doctors a faster way of accessing patient-records by reading this card through a PC). • An employee in an enterprise uses a card to open the security locks at work and log in. • A student uses a card to get books issued from the college library.
  • 115. • Smart cards do not have batteries, the energy is provided by the card reader. • A smart card has a fabrication key, personalization key, and utilization lock embedded in it. • Fabrication key identifies a card uniquely, the host machine, remote server uses personalization key, to activate the transactions for which card is intended for, utilization lock is used to lock or unlock the use of card. •
  • 116. •The card can communicate with the host after appropriate interchanges for authentication. ASK 13.56 Mbps is used for contact-less communication at data rates of 1 Mbps. • A metallic squared foil at the side of the card surface acts as the antenna for transmitting signals to a host. •The host is a device which reads the card and performs requested transactions. The host connects to a PC or remote server through a phone line, Internet leased line, fiber line.
  • 117. Smart Labels: Generally labels serve the purpose of identifying the contents of the package. • A label differs from card in terms of thickness and visibility, and it using wireless transmission for product identification. • A smart label has a processor, memory, transceiver, and antenna. • Labels are powered by the received signals due to wireless communication the label need not visible when implemented in product or package.
  • 118. • The smart labels networked together using a central reading and computational devices. • We use collision sense and avoidance protocols that multiple labels are not allocated the same ID tag and then central server can uniquely identify each one. • A label may use secured hardware and server authentication software. RFID: It is a automatic identification method for remote storage and retrieval of data on RFID tags.
  • 119. • RFID tags are objects that are attached onto people, products, or animals to enable their identification using radio waves from near by source. • RFID usually contains integrated circuit and antenna supports up to 115 Kbps data transfer. • RFID computations are limited to transmission of tag’s content. • Each RFID tag is monitored by hotspot which is in the area of tag and has a line of sight access to it.
  • 120. • The hotspot has a computer and wireless transceivers to transmit and receive signals from RFID tag. • The distance between RFID and hotspot is less than 20cm then a device use NFC protocol. Smart Tokens: Tokens are used for authentication purpose, such as granting entry into a restricted area, etc. • A smart token is an encapsulated circuit consists of embedded processor and memory.
  • 121. • The size of the smart token is small and use wire based protocol and communicate 16-128 kbps for connection less communication. • The following are some examples of smart tokens; 1.For granting permission to employees to enter work place. 2.Token is used to remotely open doors. 3.Defence applications.
  • 122. Sensors: Sensors are electronic devices that sense the physical environment, For example, sensors for temperature, pressure, light, metal, smoke, and proximity to an object. • Sensor sends the signals to a computer or controller facilitate interaction of the mobile device with the surroundings. • The following are some examples of sensors; 1. A CCD (charge-coupled device) camera to identify various objects or a microphone to recognize voices.
  • 123. • Sensor for background noise is used to control voice amplification during a call. • Sensor for surrounding light used to control the brightness of the LCD screen. • The SPS (Speech Processing System) authenticates the mobile owner then, the SPS can also be used to dial a spoken number and interpret and execute spoken commands. • A sensor for measuring the strength of the signal received controls the amplifications of received signals.
  • 124. Actuator: Actuator receives the signals from a controller or central computer and accordingly activates a physical device, appliance, or system. • sensor actuator pair are used in control systems, for example, a temperature sensor and current actuator pair controls the oven temperature. • A light sensor and bulb current actuator pair controls the light levels • A pressure sensor and valve actuator pair controls the pressure
  • 125. Smart appliances: With the present automation technology, it is possible to control home appliance and security systems using cell phones. • It is possible to networked home appliances which use the power lines are able to carry data frequencies up to 525 KHz. • We know that smart home devices are we enabled services, so we are able to allot web address (IP address) and these devices are generally connected to the internet through residential gateway.
  • 126. • The gateway allow the user to access home appliance from outside using WLAN, internet, or access point of mobile service provider. Setup Boxes: • A set-top box is a sophisticated computer- based device. It has data, media, and network processing capabilities. • It interconnects the home TV and the broadcasting service network. Java is the most commonly used programming language in a setup box.
  • 127. • Setup boxes run decoding and encoding software. There is a software component, called a device agent, which administers the device on behalf of the service provider. • Setup box sends its output signal to telephone lines, cable lines, and wireless antennae, it also provide feedback channels for interactive TV, web browsing. • The setup box gets signal from wireless antennae, cable lines, telephone lines, and dish antennae.
  • 128. LIMITATIONS OF MOBILE DEVICES • Mobile devices are limited in various ways such as hardware limitations, quality of mobile service, security during communication and transmission, connectivity troubles, etc. • Quality and Security of Service: Technical restrictions and practical considerations, it is difficult for service providers and device manufactures to ensure that the mobile device operations run uninterrupted.
  • 129. • Accessibility: Each mobile device is limited by accessibility constraints. For example RFID has limited ranges and line of sight hot spot. • Range: Signal strength is inversely proportional to the square of the distance from the transmission source. In addition to this there is degradation of signal quality due to reflection, scattering, and diffraction.
  • 130. • Connectivity: There may be connectivity loss or intermittent connectivity in certain situations. The atmospheric conditions and changes in environment affect signal strength. • Security: A mobile device has security constraints. Unsolicited advertisements and unwanted messages may delivered to a device. Virus attacks on mobile devices can cause a software crash or even corrupt the hardware.
  • 131. • Hackers may hack into a device and render it functionless or threaten integrity and security of the data stored on the device. • Mobility: Non-availability of an access point or base station and other infrastructural issues restrict the mobility of a device. • Energy Constraints: All mobile devices have limited energy stored in their battery. Also, battery size and power are limited due to considerations such as size, weight, and bulk of mobile devices. The devices therefore need to be recharged after short periods of time.
  • 132. • Hardware Limitations: Besides energy limitations due to battery size, all mobile devices face various other hardware constraints too. • Memory There are constraints on memory availability. Most mobile devices do not support hard-disk drives and CD drives due to size limitations. • Bandwidth: Limited bandwidth may become an obstacle to seamless connectivity and quality of signals, when a large number of mobile devices simultaneously demand network connectivity.
  • 133. UNIT –III GSM & Other 2G Architectures Introduction to GSM: To day the most successful digital mobile telecommunication system is G.S.M. its original name is “Groupe speciale mobile” was founded in 1982. Its name soon changed as “Global system for mobile communications”, with specification of procedures designed by European Telecommunications standards Institute (ETSI) after that the universal mobile Telecommunication systems (UMTS) add new standards to G.S.M.
  • 134. • The primary goal of G.S.M was to provide a mobile phone system that allows users to roam seamlessly and provide voice services compatible to ISDN and PSTN systems. • There are several versions in GSM depending on various standards and different uplink and downlink frequencies. 1. GSM 900-it is initial version of GSM developed in Europe using 890-915 MHz uplink and 935-960mhz down link frequency. 2. DCS 1800-digital cellular system is a version of GSM using 1710-1785 MHz up link and 1805-1880 MHz down link frequencies.
  • 135. 3. PCS 1900- personal communication service is a version of GSM using 1850-1910 MHz uplink and 1930-1990 MHz down link frequencies. 4. GSM-R (Rail)-this version of GSM offers many additional services which are un- available with public GSM. It offers 19 channels for voice and data traffic .other services are, emergency calls with acknowledgement, voice group call service, voice broadcast service etc.
  • 136. GSM (Mobile) services • GSM permits the integration of different voice and data services that compatible with existing networks. The GSM has defined three different categories of services these are, 1. Bearer services. 2. Tele services. 3. Supplementary services. The following is the GSM service reference model.
  • 137. • In the service model A mobile station ’MS’ is connected to GSM-Public Land Mobile Network (PLMN) via Um interface. This is further connected to transit network, such as Integrated Services Digital Network (ISDN) or Public Switched Telephone Network (PSTN). • There may be additional source/destination network before another terminal ‘TE’. within the MT there is a mobile station MS. • The mobile termination ’MT’ performs all network specific tasks and also offers an interface for data transmission to ’MS’ which is the network independent.
  • 138. Barrier Services: In classical GSM model, bearer services are connection oriented and circuit or packet switched. These services only need the three lower layers of OSI reference model. The bearer services may be transparent and non transparent, synchronous or asynchronous, data transmission. • Barrier services are again classified into; 1. Transparent Barrier Services. 2. Non Transparent Barrier Services. 3. Synchronous Services. 4. Asynchronous Services.
  • 139. Transparent Barrier Services: which use the functions of physical layer to transmit data. Here data transmission has constant delay and throughput if no transmission errors occurs. To improve the quality of transmission, this method use Forward Error Correction (FEC)-which reconstructs the original data incase of transmission errors. Non Transparent Barrier Services: which use the second and third layer protocols to implement errors correction and flow control. Here we use transparent services
  • 140. • This protocol contains High level Data Link Control (HDLC) and selective-reject technique to retransmission of erroneous data. In Non transparent bearer service the error rate is less than 107, but the throughput and delay vary depending on transmission quality. Synchronous Data Transmission: It indicates that the data transmitted from transceiver at a fixed rate as the result constant phase difference maintained between successive data bits or frames.
  • 141. • The receiver must synchronize clock rate according the incoming data bits. The receivers also synchronize data bits coming in from multiple paths or stations and compensate for the varied delays in receiving signals. • Handshaking is not used in synchronous transmission of data and synchronous data transmission is faster because there is no waiting period during the data transfer.
  • 142. Asynchronous Data Transmission: Here the data is transmitted by the transceiver at variable rates as a result of constant time intervals are not continuously maintained between consecutive data frames. Usually handshaking or acknowledgement of data in asynchronous data transfer. • Even if there is no acknowledgement when the data flow is maintained by using FEC and buffers. Buffers can use variable delay in reception.
  • 143. Tele Services: GSM tele services are end-to- end that is from one terminal TE to another, these are application specific and need all seven layers of OSI model. The following different tele services offered by G.S.M. 1) telephony- The main focus of GSM is to provide voice oriented tele services. Here special codes are used for voice transmission, other codes used for analog data communication with traditional computer modems.
  • 144. 2) Emergency Number- In this service, the same number can be used throughout specific area. It is a mandatory (compulsory) service offered by service providers at free of cost. This service has the highest priority and will be set up with the closest emergency center. 3) Short Message Service (SMS) – it is a useful service to transfer short messages upto160 characters. This service do not use standard data channel of GSM, but using unused capacity in the signaling channels.
  • 145. •Sending and receiving of SMS is possible during voice or data transmission. 4) Enhanced message service (EMS)- which support large message size, formatted text, animated pictures, small images and ring tones in a standardized away. EMS never create hurdles to MMS multimedia message service, which offers transmission of large pictures, short video clips etc.   5) Group 3 FAX- this is another Non voice Tele service is available world wide.
  • 146. • In this service FAX data is transmitted is digital data over the analog telephone network according to the ITU-T standards. Supplementary services: Supplementary services are enhancements for standard telephony services, and may vary from provider to provider. These services are user identification, call redirection, call forwarding, closed user group and multiparty communication calls.
  • 147. GSM Architecture The GSM has hierarchical, complex, system architecture containing many entities, interfaces, and acronyms. A GSM system contains three subsystems,   1. Radio Sub System (RSS) 2. Network and switching Sub System (NSS). 3. Operating Sub System (DSS).   The following is the functional architecture of GSM.
  • 148.
  • 149. • In the above figure the RSS and NSS are connected through ‘A’ Interface and connection to OSS through ‘O’ interface. The ‘A’ interface is circuit-switched based and ‘O’ interface is signaling system based. Radio Sub System: The top level radio sub system contains all radio specific entities, such as base station sub system (BSS), mobile stations (MS), and Base transceiver station (BTS), base station controller (BSS) .etc...
  • 150. A) Base station sub system (BSS): A GSM network contains many BSS. Each controlled by a Base Station Controller (BSC). The BSS performs all activities to maintain radio connection to MS, such as coding/decoding of voice, rate adoption, etc. the BSS contains many BTSs. B) Base transceiver station (BTS): A BTS contains all radio equipment, such as antennas, signal processing, and amplifiers required for radio transmission, the BTS can form a radio cell by using sectorized antennas and it contains several MSs. The connection between BTS and MS through ‘Um’ interface and BSC through ‘Abis’ interface.
  • 151. • An ‘Um’ interface contains all techniques for wireless transmission and ‘Abis’ interface contains 64Kbit/s connections. C) Base station controller (BSC): It is basically manages the BTSs. It reserves radio frequencies, handles hand over from one BTS to another BTS with in BSS and performs paging of MS. The BSC also multiplex paging of radio channels into the fixed network connections.  
  • 152. D) Mobile Station (MS): It is independent user equipment, contains hardware and software of Subscriber Identity Module (SIM), which stores all user specific data that is relevant to GSM. • The user can personalize MS by his /her SIM without SIM only emergency calls are possible. • Any MS is identified through International Mobile Equipment Identity (IMEI). The device specific techniques such as theft protection are supported by IMEI.
  • 153. • The SIM have many user subscribed identifiers, labels and services such as a Personal Identity Number (PIN), A PIN UN block Key (PUK), an authentication key ‘Ki’ and International Mobile Subscriber Identity (IMSI) and Location Area Identification (LAI). • The MS also offers other interfaces to users with display, loudspeaker, microphone and programmable soft keys.
  • 154. Network and Switching Sub System: The network and switching sub system is the heart of the GSM network, which connects wireless networks. •The NSS carries out handovers between different BSSs and contain techniques for world wide localization of users and also supports charging, accounting, and roaming of users between different service providers in different countries. • The NSS contain following switches and databases.
  • 155. A) Mobile Service switching Center (MSC): It is a high performance digital ISDN switch, which setup connections to other MSCs and to the BSCs. through the ‘A’ interface. • It is a fixed back bone network of GSM system, which manages several BSCs in a geographical region. • An MSC handles all signaling needed for connection setup, connection release and handover of connections between MSCs, by using the standard signaling system No 7 (SS7).
  • 156. • The MSC can also perform all supplementary services such as call forwarding, multiparty calls etc... B) Home Location Register (HLR): It is the most important database in GSM system and stores all user relevant information. • The HLR consists of static information such as the mobile subscriber ISDN number (MSISDN) and International Mobile Subscriber Identity (IMSI).
  • 157. •The HLR may also contain dynamic information, such as, current location area (LA) of MS, Mobile Subscriber Roaming Number (MSRN). As soon as MS leaves its current LA, the information in HLR is updated.  C) Visitor Location Register (VLR): It is a dynamic database associated with each MSC, which stores all important information required for users currently in the LA. •If new MS comes into LA the VLR is responsible for it, copies all relevant information of this user from HLR.
  • 158. • This hierarchy of VLR and HLR avoids frequent HLR updates and long distance signaling of user information. 3) Operation Sub System: The operation sub system contains the necessary functions for network operation and maintenance. The OSS processes network entities of its own and access other entities through SS7 signaling. The following are some entities in OSS.
  • 159. A) Operation and Maintenance center (OMC): The OMC monitors and controls all other network entities Via ‘O’ interface. •The functions are, traffic monitoring, status reports, subscriber and security management, accounting and billing. •To carry out above functions the OMC use the concept of Telecommunication Management Network standard (TMN) by ITU-T (International Telecommunication Union-Telecommunication Sector). B) Authentication Center (AUC): An authentication center is defined to protect
  • 160. •The AUC contains algorithms for authentication, encryption keys, and generate values for user authentication in HLR. Actually the AUC exists in the special protection part of HLR.  C) Equipment Identity Register (EIR): The EIR is the database which stores all device identifications (IMEI) registered for the network. •The EIR also contains a list of valid IMEIs and a list of malfunctioning devices.
  • 161. RADIO INTERFACES OF GSM • The radio interface illustrates the connection or communication between Base Transceiver Station (BTS) and Mobile Station (MS). It also determines the process of channel allocation for data transmission. • In GSM system, the Um radio interface is the most significant one. It contains many mechanisms for multiplexing and media (channel) access.
  • 162. • Generally the GSM uses space division multiple access (SDMA) with in a BTS to establish communication between MS and BTS. Further, the GSM uses frequency division duplex (FDD) to separate uplink and down link. So the GSM media access combines both TDMA and FDMS. • The GSM 900 uses 248 channels for uplink and downlink, each has 200 KHz wide. Due to the technical reasons channel 1 and 124 is not used, 32 channels are reserved for organizational data and remaining 90 used for customers
  • 163. •That is; Uplink channels: 124 Down link channels: 124 Total channels : 248 Organizational Data: 32 User Data: 90 Unused: 02 Total channels: 124 • The following diagram illustrates the frame hierarchy of GSM
  • 164.
  • 165. • As shown in the figure, each 248 channels are separated by GSM-TDMA frame that is every 200 KHz carrier (Channel) is divided into smaller frames. The time duration the frame is 4.155ms. • A GSM frame is again subdivided into eight (8) GSM time slots. The transmission time of the GS M time slot is 577µs. • The data is transmitted in small portions called bursts. The above figure shows the GSM normal burst; which indicates data transmission within a time slot.
  • 166. •The each time slot is able to transmit 148 bits which can take 546 µs the remaining time 31 µs are used as guard space to avoid overlapping with other bursts. The GSM time slot is divided into;   Trail bits: 06 Flag bits(S) 02 Training bits 26 User data bits 114 Total bits in the GSM time slot is 148 bits. •
  • 167. • Suppose if you fill the whole slot with data for transmission 156.25 bits with 577 µs. so the each physical TDM channel has a raw data rate 33.8 Kbits/s, so each radio carrier approximately transmits 270 Kbits/s over Um interface. • The first and last bits of time slot that is trail bits are set to 0 (zero) can be used to enhance the performance of receiver. • The training bits are used to adopt the parameters of receiver to the current path propagation characteristics.
  • 168. • The flag bits ‘S’ indicates whether data field contains user or network data. • In addition to the normal burst, the GSM defines four more bursts. 1. Frequency correction burst. 2. Synchronization burst. 3. Access burst. 4. Dummy burst. • Frequency Correction Burst: This burst can allow the MS to correct the frequency of local oscillator to avoid interference with neighboring channels.
  • 169. • Synchronization Burst: this is the extension of training sequence to synchronize the MS with the BTS in time. • Access Burst: This is used for initial connection setup between MS and BTS. • Dummy Burst: It is used if no data is available for a slot. Logical Channel Allocation: The GSM specifies two basic groups of logical channels; 1. Traffic channels. 2. Control channels.
  • 170. • Traffic Channels (TCH): The GSM uses TCH to transmit user data such as voice and fax. There are two categories of TCH one is TCH full rate (TCH/F) and another one is TCH half rate (TCH/H) • The TCH/F can transmit the data with rate 22.8 kbits/s and TCH/H transmit the data with rate 11.4 Kbits/s. But we know that the GSM uses 13 Kbits/s standard rates to transmit the voice data with quality.
  • 171. • Suppose we can use TCH/H for the voice data transmission, it doubles the capacity of the GSM system, but the quality of the speech decreases. • Suppose we use TCH/F for the data transmission the remaining capacity, that is 22.8 – 13 Kbits/s = 9.8 Kbits/s was used for error correction. • The GSM uses standard codes for transmission of voice, such as full rate (13 Kbits/s) Half rate (5.6 Kbits/s) and Enhanced Full Rate ((EFR) for better quality and low transmission errors.
  • 172. • For higher quality of data transmission, GSM uses Tandem Free Operation (TFO). In this mode the two MSS are directly exchange the voice data. • Not only voice transmission, the data transmission is also possible in GSM at different data rates, example TCH/F 4.8 for 4.8 Kbits/s, TCH/F 9.6 for 9.6 kbits/s and TCH/F 14.4 for 14.4 Kbits/s. • The logical channels differ in terms of their coding schemas and error correction capabilities.
  • 173. • Control Channels (CCH): Many CCHs are used in GSM to control medium access, allocation of traffic channels or mobility management. Each of channels in this group is again categories into several sub channels. 1 Broadcast control channel (BCCH): A BTS uses this channel to signal information to all MSs within a cell. Information transmitted in this channel is, the cell identifier, options available within the cell and frequencies available inside the cell and neighboring cells. The following are
  • 174. a) Frequency correction channel (FCCH): A BTS sends frequency correction information through this channel. b) Synchronization channel (SCH): The BTS sends the time synchronization information through this channel. 2.Communication control channel (CCH): The CCH is used to exchange all the information regarding connection setup between MS and BTS. The following are the sub channels of CCH. •
  • 175. a) Paging channel (PCH): For the calls towards an MS, the BTS uses the paging channel for paging the appropriate MS. b) Random Access Channel (RACH): If MS wants to (establish) setup a call, it uses random access channel to send data to the BTS. c) Access Grant Channel (AGCH): The BTS uses access grant channel to signal an MS that it can use a TCH or SDCCH for further connection setup.
  • 176. 3.  Dedicated  Control  Channel  (DCCH):  All the above channels are unidirectional, but dedicated control channels are bidirectional. The following are sub channels of DCCH. a) Stand alone Dedicated Control Channel (SDCCH): As long as MS has not established a TCH with BTS, it uses SDCCH with low data rate for signaling. It consists of authentication, registration or other data needed to setup a TCH.
  • 177. b) Slow Associated Dedicated Control Channel (SACCH): Each TCH associated with Slow Associated Dedicated Control Channel (SACCH), to exchange the system information, channel quality, signal power level etc… c)  Fast Associated Dedicated Control Channel (FACCH): When TCH is already exists, more signaling information is required and then GSM uses FACCH. It uses the time slots which are otherwise used by TCH.
  • 178. • The FACCH is necessary in case of handovers where BTS and MS have to exchange larger amounts of data in less time. Frames Hierarchy: • The GSM specifies a complex multiplexing scheme that integrates several hierarchies of frames. Suppose we use TCH/F for user data transmission each TCH/F has associated with SACCH for slow signaling and FACCH for fast signaling. A typical usage of physical channel for data transmission is shown bellow.
  • 179.
  • 180. TTTTTTTTTTTTSTTTTTTTTTTTTX TTTTTTTTTTTTSTTTTTTTTTTTTX   • In the above data transmission T-indicates the user data, S-indicates signaling slot and x-is unused slot • Twelve slots of user data followed by signaling slot again twelve slots of user data, then an unused slot, these 26 slots are repeated over and over again. But actually 24 out of 26 slots (2 unused) are used by TCH/F for data transmission.
  • 181. • We know that 114 bits of user data transmitted in a normal burst, which is repeated for every 4.165 ms. this results the data transmission rate is 24.7 Kbits/s. the TCH/F actually use 24/26 of slots, so the final data rate is 22.8 Kbit/s. (for TCH/F) • The periodic patterns of 26 slots occur in all TDMA frame with TCH. The logical combination of these frames which carry user traffic is called traffic multi frame.
  • 182. • Suppose it contains signaling data then it called control frame. The combination of 26 frames have to a multi frame takes 120 ms duration. The control frame consists of 51 TDMA frames have duration 235.4 ms. • The logical frame hierarchy, combining 26 data frames with 51 control frames or 51 control frames with 26 data frames. The 2048 multi frames form a hyper frame with duration 3.5 hours.
  • 183. • The large logical structure is needed for encryption. The GSM counts each TDMA frame with frame number forming input for the encryption algorithm. The frame number and slot number uniquely identify each time slot in GSM. PROTOCOLS OF GSM • The following diagram shows the protocol structure of GSM, which consists of signaling protocols, interfaces and some entities
  • 184. • In the above the Um interface is play an important role, between the objects in a fixed network
  • 185. LAYER-1:  the physical later at MS handles all radio specific functions, such as, a) Multiplexing of bursts into TDMA frames. b) Synchronization of MS with the BTS. c) Detection of idle channels. d) Measurement of channel quality on the downlink. •The physical layer at Um interface uses Gaussian Minimum Shift Keying (GMSK) technique for digital modulation and performs encryption and decryption of the data.
  • 186. • But in GSM the encryption in not performed end-to-end, it is between Ms and BTS with in air. • The synchronization used for the correction of individual path delays between MS and BTS. All MSs with in a cell can use the same BTS and must be synchronized with this BTS • The BTS generate time structure of slots or frame for the synchronization. • A major problem in synchronization is different round trip times (RTT).
  • 187. • An MS very close to BTS has a very short RTT other wise the RTT will increase • The main task of the physical layer in GSM protocol architecture is channel coding and error detection/ correction • The channel coding use the different Forward Error Correction schemes (FEC). FEC adds redundancy to user data for detection and correction of selected errors • Different logical channels of GSM use different coding schemes with different correction capabilities
  • 188. • LAYER-2: The protocol existed with in second layer of GSM protocol architecture is Link Access Procedure for D-Channel (LAPDm), which is used to signaling between the other GSM network entities • The LAPD which is generally used in ISDN systems and it is a version of High Level Data Link Control (HDLC) • The LAPDm offers reliable data transfer over connections, resequencing of data frames, and flow control
  • 189. • The LAPDm is a light weight protocol because it does not require synchronization of flags or checksums for error detection and correction • There is no buffer space between layer-1 and layer-2 so LAPDm accepts frame structure, recurrence patterns etc defined at Um interface LAYER-3: The third layer in GSM protocol architecture may also called network layer. This layer contains many sub layers
  • 190. • The lowest sub layer is Radio Resource Management (RR). The some part of the RR is implemented at BTS and remaining part is implemented at BSC • The function of RR is supported by BSC by using BTS management • The main task of RR is to setup, maintain and release of radio channels. The RR can directly access the physical layer for radio information and offers a reliable connection to next higher layers
  • 191. LAYER-4:  The fourth layer is Mobility Management (MM) contain functions for registration, authentication, location updating and also provide Temporary Mobile Subscriber Identity (TMSI) which is used to replace the International Mobile Subscriber Identity (IMSI). • The TMSI hides the real identity of an MS user over the air interface. The MM offers a reliable connection to the next higher layers 
  • 192. LAYER-5: The final layer is Call Management (CM) layer which contain three entities.   a) Call Control (CC). b) Short Message Service (SMS). c) Supplementary Service (SS). • Call Control (CC): This provides a point-to- point connection between two terminals and is used by higher layers for call establishment, call clearing, and change of call parameters •This entity also provides functions to send in-band tones, called Dual Tone Multiple Frequency (DTMF)
  • 193. • Short Message Service (SMS): It allows for message transfer using control channels SDCCH and SACCH • Supplementary Services (SS):  These services are enhancement of standard telephony services and these may vary from provider to provider • The supplementary services may be user identification, call redirection, forwarding, closed user groups and multiparty communication
  • 194. GSM Localization • One fundamental feature of GSM is automatic world wide localization of users. The GSM system always knows the users current location and the same phone number is valid world wide • To provide localization of uses the GSM performs periodic location updates even if the user does not use mobile station • The HLR always have the information about current location and the VLR is responsible for the MS where it is and informs to the HLR about location changes
  • 195. • When MS moves from one VLR to another VLR the HLR sends all user data needed to the new VLR • Changing VLR with uninterrupted availability of all services is also called roaming. To locate the MS and to address the MS several numbers are needed • Mobile Station International ISDN Number (MSISDN): The only important number for user of GSM is pone number. The phone number is associated with SIM, which is personalized for a user
  • 196. • The MSISDN follows ITU-T standard for addresses and it also used in fixed ISDN networks • This number consists of Country Code (CC), example for India +91, the National Destination Code (NDC), which addresses the network provider for example 984 for idea network and Subscriber Number (SN) • International Mobile Subscriber Identity (IMSI): The GSM uses the IMSI for internal unique identification of subscriber.
  • 197. • The IMSI consists of Mobile Country Code (MCC), the Mobile Network Code (MNC) and Mobile Subscriber Identification Number (MSIN) • Temporary Mobile Subscriber Identity (TMSI): The GSM uses the 4 byte TMSI for local subscribe identification to hide the IMSI. The TMSI is selected by current VLR and is only valid with in the location area of VLR, additionally the VLR may change the TMSI periodically
  • 198. • Mobile Station Roaming Number (MSRN): The MSRN is a temporary address that hides the identity and location of subscriber. This address is generated by the VLR on the request of MSC • This address contains current Visitor Country Code (VCC), Visitor National Destination Code (VNDC). The MSRN helps to find a subscriber for an incoming call • The following is the call organization procedure in GSM network. In GSM network there are two types of calls,  
  • 199. a) Mobile Terminated Call (MTC). b) Mobile Originated Call (MOC). • Mobile Terminated Call (MTC): In this situation an outside network subscriber calling a mobile station in GSM network. The following is the diagram
  • 200. • In MTC, A user dials the phone number of GSM subscriber. The Public Switching Telephone Network (PSTN) notices that the number belongs to the user in GSM network and forward the call to GMSC • Now the GMSC forward this information to the HLR for subscriber identification and signals • Here the HLR checks whether the number exists and whether the user has subscribed requested services and also requests the MSRN from current VLR
  • 201. • After receiving MSRN from VLR the HLR forward this information to GMSC. Now the GMSC forward the call setup request to MSC • On this point the MSC request the current status of MS from VLR. If MS is available, the MSC initiates paging signal to the BTSs of all BSSs • . At this point the paging signal is transmit to the MS. Of the MS response, the VLR signals to MSC to setup a connection to the MS
  • 202. • Mobile Originated Call: The Mobile Originated Call is a simple procedure then the Mobile Terminated Call. The following is the diagram
  • 203. • In MOC the MS transmit a request for new connection to the BSS and then it is forwards this request to the MSC • Now the MSC checks if this user is allowed to setup a call with the requested service and checks the availability of resources through the GSM network and into the PSTN • If all resources are available, the MSC setup a connection between the MS and fixed network.
  • 204. • The following is the flow of messages during MOC. 1. The MS request the BTS to grant a channel for communication and BTS immediately responds by assigning channel to MS. 2. MS sends a request to BTS for service and BTS replies with authentication to MS. 3. BTS sends a command for ciphering at MS, cipher number generated by AuC and cipher key is available at BTS for accessing MS.
  • 205. 4. Now MS runs an algorithm on cipher number sent by BTS and the key is stored in SIM. 5. Now call is setup by call Management protocol (CM) by the MS and BTSM protocol by BTS. 6. Call setup is conformed by BTS to MS. 7. Assignment command is sent by BTS to MS and assignment complete is sent by MS to BTS. 8. An alert message is sent from BTS to MS before connection.
  • 206. 9. Connection established message is sent from BTS to MS and connection acknowledgement is sent by MS to BTS. 10. Voice or data interchange starts. • The following is the flow of messages during MTC. 1. The BTS sends a request for paging to MS and MS request to BTS for channel allocation. 2. Channel is immediately assigned by BTS to MS and MS responds to paging signal to BTS.
  • 207. 3. A request for authentication is sent by the BTS and response is sent by the MS. 4. BTS sends the ciphering command and MS responds with cipher complete message. 5. Call is setup by running CM protocol at MS and BTSM protocol at BTS. 6. Now assignment command is sent by BTS and MS responds with assignment complete. 7. Before connection establishment alert message sent by BTS to MS.
  • 208. 8. Connection established message is sent by BTS to MS and acknowledgement message is sent by MS to BTS. 9. Voice or data transmission begins. END OF UNIT - III