SlideShare a Scribd company logo
Introduction of Mobile Computing
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 1
What is Mobile Computing?
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 2
 Mobile Computing is a technology that allows
transmission of data, voice and video via a
computer or any other wireless enabled device
without having to be connected to a fixed
physical link.
 Mobile Computing is an umbrella term used to
describe technologies that enable people to
access network services anyplace, anytime, and
anywhere.
Mobility
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 3
A device that moves
 Between different geographical locations
 Between different networks
 Between different applications
 Such as Palm-top, laptop,
 Cell phones
mobile communicationA device due to which
is possible
 Modems.
Types of mobility
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 4
• user mobility: users communicate
anytime, anywhere, with anyone
• device portability: devices can be
connected anytime, anywhere to the
network
Wireless Communication
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 5
Wireless refers to the method of transferring
information between a computing device, such
as a personal data assistant (PDA), and a data
source, such as an agency database server,
without a physical connection. Not all wireless
communications technologies are mobile.
For example, lasers are used in wireless data
transfer between buildings, but cannot be used
in mobile communications at this time.
• The wire is replaced by electro magnetic spectrum
wave
• Data transmission through the air
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 6
Why Mobile Computing?
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 7
•Enable anywhere/anytime connectivity
•Bring computer communications to areas without pre
existing infrastructure
•Enable mobility
•Enable new applications
•An exciting new research area
Wired Vs. Wireless Networks
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 8
Wired Networks
- high bandwidth
- can listen on wire
- high power machines
- need physical
access(security)
- low delay
Mobile Networks
- low bandwidth
- hidden terminal problem
- low power machines
- high resource machines - low resource machines
- need proximity
- higher delay
Advantages of Wireless Networks
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 9
Flexible: Radio waves can penetrate the obstacles. Sender and
receiver can be placed any where.
Mobility: Data can be access from any location.
Robustness : Can survive in disaster (Earthquake, military
operations)
Scalable: Can be configured in variety of topologies.
Easy Installation
Less Cost
Usage of ISM band: ISM (Industrial, Scientific and Medical) band
(2.40GHz to 2.484 GHz, 5.725 GHz to 5.850 GHz) is available for
use by anyone.
No Planning: Only Wireless Ad hoc not required any planning.
Disadvantages of Wireless Networks
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 10
Quality of Service:
Lower Bandwidth
Lower Data Transmission Rate
High Error Rates
Interference
Higher Delay
Restrictions: License-free frequency bands are not same worldwide.
Safety and Security: Interference from other devices
Types of Wireless Devices
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 11
Laptops
Palmtops
PDAs
Cell phones
Pagers
Sensors
Sensor:
• A very simple wireless device is represented
by a sensor transmitting state information.
Embedded controllers:
• Many appliances already contain a simple
or sometimes more complex controller
Pager:
• pager can only display short text messages,
• has a tiny display, and cannot send any
messages. Pagers can even be integrated
into watches.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 12
 Mobile phones:
• The traditional mobile phone only had a simple
black and white text display and could
send/receive voice or short messages.
• Today, mobile phones migrate more and more
toward PDAs. Mobile phones with full color
graphic display, touch screen, and Internet
browser are easily available.
 Personal digital assistant:
• PDAs typically accompany a user and offer
simple versions of office software
• The typical input device is a pen, with built-in
character recognition translating handwriting into
characters.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 13
Pocket computer:
• pocket computers offering tiny keyboards,
color displays, and simple versions of
programs found on desktop computers
Notebook/laptop:
• Finally, laptops offer more or less the
same performance
• as standard desktop computers; they use
the same software – the only technical
difference being size, weight, and the ability
to run on a battery. If operated mainly via a
sensitive display
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 14
Applications
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 15
 Vehicles
 transmission of news, road conditions,
weather
 personal communication using cellular
phones
 position identification via GPS
 inter vehicle communications for accident
prevention
 vehicle and road inter communications for
traffic control, signaling, data gathering
 ambulances, police, etc.: early
transmission of patient data to the hospital,
 Mobile workers
 access to customer files and company documents
stored in a central location
 collaborative work environments
 access to email and voice messages
 Replacement of fixed networks
 remote sensors, e.g., weather, environment, road
conditions
 flexible work spaces
 LANs in legacy buildings
 Entertainment, education, ...
 outdoor Internet access
 intelligent travel guide with up-to-date
 location dependent information
 ad-hoc networks for multi user games
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 16
•For Estate Agents:
Estate agents can work either at home or out in the field. With
mobile computers they can be more productive.
They can obtain current real estate information by accessing
multiple listing services, which they can do from home, office
or car when out with clients.
•Emergency Services: Ability to receive information on
the move is vital where the emergency services are involved.
Information regarding the address, type and other details of
an incident can be dispatched quickly,
•Credit Card Verification: At Point of Sale (POS)
terminals in shops and supermarkets, when customers use credit
cards for transactions, the intercommunication is required
between the bank central computer and the POS terminal, in
order to effect verification of the card usage, can take place
quickly and securely over cellular
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 17
Limitations of Mobile Computing
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 18
1. Insufficient Bandwidth: Mobile Internet access is generally
slower than direct cable connections, using technologies
such as GPRS and EDGE, and more recently 3G networks.
These networks are usually available within range of
commercial cell phone towers. Higher speed wireless LANs
are inexpensive but have very limited range.
2. Security Standards: When working mobile, one is dependent
on public networks, requiring careful use of Virtual Private
Network (VPN). Security is a major concern while concerning
the mobile computing standards on the fleet. One can easily
attack the VPN through a huge number of networks
interconnected through the line.
3. Power consumption: When a power outlet or portable
generator is not available, mobile computers must rely
4. Transmission interferences: Weather, terrain, and
the range from the nearest signal point can all interfere
with signal reception. Reception in tunnels, some
buildings, and rural areas is often poor.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 19
5.Potential health hazards: People who use mobile
devices while driving are often distracted from driving are
thus assumed more likely to be involved in traffic
accidents. Cell phones may interfere with sensitive
medical devices. There are allegations that cell phone
signals may cause health problems.
6. Human interface with device: Screens and
keyboards tend to be small, which may make them hard
to use. Alternate input methods such as speech or
handwriting recognition require training.
Introduction
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 20
 GSM stands for Global System for Mobiles.
 GSM is a cellular network, which means that cell phones connect to
it by searching for cells in the immediate vicinity.
 This is a world-wide standard for digital cellular telephony
 GSM was created by the Europeans, and originally meant "Groupe
Special Mobile“
 to describe the protocols for second-generation digital cellular
networks used by mobile devices such as tablets,
 first deployed in Finland in December 1991
 As of 2014, it has become the global standard for mobile
communications – with over 90% market share, operating in over
219 countries and territories
 2G networks developed as a replacement for first generation
analog cellular networks, and the GSM standard originally
described as a digital, circuit-switched network optimized for full
duplex voice telephony.
Global System for Mobile communication
(GSM)
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 21
In 2001 the first commercial launch of 3G was done in
Japan. With 3G following services are available :
Video Conferencing
online games
net surfing..10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 22
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 23
• Communication
mobile, wireless communication, support for voice and data
services
• Total mobility
international access, chip-card enables use of access points of
different providers.
• Worldwide connectivity
one number, the network handles every location.
• High capacity
better frequency efficiency, smaller cells, more customers per
cell.
• High transmission quality
high audio quality and reliability for wireless, uninterrupted
phone calls at higher speeds (e.g., from cars, trains).
Advantages
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 24
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 25
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 26
Supplementary services
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 27
Bearer services
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 28
Data rate for Bearer services
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 29
GSMArchitecture
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 30
GSM Architecture
 Radio Subsystem
 Network Subsystem
 Operation Subsystem
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 31
Radio subsystem
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 32
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 33
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 34
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 35
Functions of BTS
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 36
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 37
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 38
Network subsystem
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 39
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 40
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 41
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 42
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 43
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 44
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 45
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 46
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 47
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 48
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 49
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 50
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 51
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 52
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 53
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 54
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 55
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 56
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 57
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 58
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 59
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 60
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 61
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 62
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 63
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 64
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 65
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 66
GMSC Identified
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 67
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 68
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 69
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 70
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 71
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 72
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 73
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 74
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 75
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 76
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 77
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 78
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 79
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 80
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 81
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 82
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 83
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 84
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 85
Mobile originating call
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 86
Call connection process
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 87
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 88
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 89
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 90
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 91
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 92
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 93
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 94
Radio interface
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 95
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 96
List of interfaces in GSM
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 97
Interfac
e
Description
Um MS↔ BTS
ABis BTS↔ BSC
A BSC ↔ (G)MSC
B (G)MSC↔ VLR
C (G)MSC↔ HLR
D VLR↔HLR
E (G)MSC↔ (G)MSC
F (G)MSC↔ EIR
G VLR↔ VLR
H HLR ↔AUC
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 98
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 99
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 100
Handover
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 101
Purpose:
1. To keep continuous communication with
moving MS
2.To improve network performance
3.To reduce the call drop rate
4.To reduce the congestion rate
Types of GSM handover
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 102
1.Intra-BTS handover:
Because of interference, or other reasons
2. Inter-BTS Intra BSC handover:
The mobile moves out of the coverage area of one BTS
3. Inter-BSC handover:
When the mobile moves out of the range of cells controlled by
one BSC
4. Inter-MSC handover:
when changing between networks
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 103
Security in GSM
 Security services
 access control/authentication
 user  SIM (Subscriber Identity Module): secret PIN
(personal identification number)
 SIM  network: challenge response method
 confidentiality
 voice and signaling encrypted on the wireless link (after
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 104
successful authentication)
 anonymity
 temporary identity TMSI
(Temporary Mobile Subscriber Identity)
 newly assigned at each new location update (LUP)
 encrypted transmission
 3 algorithms specified in GSM
 A3 for authentication (“secret”, open interface)
 A5 for encryption (standardized)
 A8 for key generation (“secret”, open interface)
security concerns can be defined in two side:
operator side and customer side.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 105
Operators:
 Should bill the right person
 Should provide systems to avoid fraud
Should protect their services against attacks
Customers
 Should have privacy, nobody should be able to detect
their identification or their location
 Communication on the air should be encrypted to
avoid eavesdropping
 Should be able to change mobile equipment
independently
Security mechanisms
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 106
 Shouldn’t add much load to the voice calls or
data communication
 Shouldn’t need to increase the channel
bandwidth
 Shouldn’t increase the bit error rate
 Shouldn’t bring expensive complexity to the
system
 Should be useful and cost efficient
 Should be able to detect suspicious mobile
equipment
GSM security can be written in 4 principles
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 107
 Authentication of a user it provides the ability for mobile
equipment to prove that it has access to a particular
account with the operator.
 Ciphering of the data and signaling it requires that all
signaling and user data (such as text messages and
speech) are protected against interception by means of
ciphering
 Confidentiality of a user identity it provides IMSI’s security.
GSM communication uses IMSI rarely, it uses TMSI
(Temporary Mobile Subscriber Identity) to provide more
secure communication and to avoid disclosing of user’s
identity
 Using SIM as security module Incase SIM card was taken
by opponent, there is still PIN code measurement.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 108
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 109
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 110
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 111
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 112
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 113
GSM Protocol stack
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 114
•GSM Data services are the processes that can transfer digital
information between wireless devices and the GSM system.
•GSM data services use
o a continuous connection - circuit switched data
oA bursty data transmission - packet switched data.
•Circuit Switched Data - GSM circuit switched data is the
reserving of a continuous path of transmission resources from
a sender to a receiver.
•GSM data may dedicate a variable number of transmission
time slots per frame for circuit switched data connection.
•For circuit switched connections, the data transmission path is
always available even if there is no data to send.
GSM Data services
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 115
•Packet Switched Data - GSM packet switched data is the
sending of data which is divided into small packets which can
take different paths through a packet data network.
•The GSM radio channel was modified in the GPRS system to
allow the dynamic assignment of time slots to enable packet
data to be sent on the GSM radio channel.
•Fax Services - Fax service is the transmission of facsimile
(image) information between users.
•Facsimile signals are normally sent using audio frequencies
which cannot be sent through the GSM voice coder.
•To send fax signals through the GSM system, the GSM
system must decode the fax signal and send it in digital form.
•When the fax data reaches its GSM exit point, the GSM
system must reconvert the digital fax back into it original analog
form
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 116
•It is a packet-based wireless communication service that
promises data rates from 56 up to 114 Kbps and continuous
connection to the Internet for mobile phone and computer
users.
•The higher data rates allow users to take part in video
conferences and interact with multimedia Web sites and
similar applications using mobile handheld devices as well
as notebook computers.
•GPRS is based on Global System for Mobile (GSM)
communication and complements existing services
such circuit-switched cellular phone connections and the
Short Message Service (SMS).
General Packet Radio Services (GPRS)
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 117
•GPRS packet-based services cost users less than circuit-
switched services since communication channels are being
used on a shared-use, as-packets-are-needed basis rather
than dedicated to only one user at a time.
•It is also easier to make applications available to mobile users
because the faster data rate
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 118
Enabling GPRS on a GSM network requires the addition of
two core modules,
- the Gateway GPRS Service Node (GGSN)
-GGSN acts as a gateway between the GPRS network and
Public Data Networks such as IP and X.25.
-GGSNs also connect to other GPRS networks to facilitate
GPRS roaming.
- the Serving GPRS Service Node (SGSN).
-provides packet routing to and from the SGSN
service area for all users in that service area.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 119
GPRS network elements
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 120
GSN (GPRS Support Nodes): GGSN and SGSN
 GGSN (Gateway GSN)
interworking unit between GPRS and PDN
(Packet Data Network)
SGSN (Serving GSN)
supports the MS (location, billing, security)
 GR (GPRS Register)
GPRSAdvantages
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 121
IMMEDIACY
INTERNETAWARE
SPEED
No Dial Up

More Related Content

What's hot (20)

4G
4G4G
4G
 
Presentation1
Presentation1Presentation1
Presentation1
 
4G - The mobile race to evolution
4G - The mobile race to evolution4G - The mobile race to evolution
4G - The mobile race to evolution
 
3g technologies
3g technologies3g technologies
3g technologies
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
4G technology
4G technology4G technology
4G technology
 
3g 4g ppt
3g 4g ppt3g 4g ppt
3g 4g ppt
 
3G Technology
3G Technology 3G Technology
3G Technology
 
4G vs 3G
4G vs 3G4G vs 3G
4G vs 3G
 
4G Technology
4G Technology4G Technology
4G Technology
 
120
120120
120
 
4G
4G4G
4G
 
3g & 4g technology
3g & 4g technology3g & 4g technology
3g & 4g technology
 
D010221620
D010221620D010221620
D010221620
 
3g and 4g
3g and 4g3g and 4g
3g and 4g
 
From 0G to 5G network
From 0G to 5G networkFrom 0G to 5G network
From 0G to 5G network
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
 
IRJET- Study on VLSI Technology for Processor Architecture of Cellphones : A ...
IRJET- Study on VLSI Technology for Processor Architecture of Cellphones : A ...IRJET- Study on VLSI Technology for Processor Architecture of Cellphones : A ...
IRJET- Study on VLSI Technology for Processor Architecture of Cellphones : A ...
 
4g technology
4g technology4g technology
4g technology
 
Pxc3871282
Pxc3871282Pxc3871282
Pxc3871282
 

Similar to Unit 1 part 1

Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMPallepati Vasavi
 
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsWireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
 
NEW TRENDS IN MOBILE NETWORKING
NEW TRENDS IN MOBILE NETWORKINGNEW TRENDS IN MOBILE NETWORKING
NEW TRENDS IN MOBILE NETWORKINGkrishna kalpana
 
The Survey on Mobile Computing and its Applications
The Survey on Mobile Computing and its ApplicationsThe Survey on Mobile Computing and its Applications
The Survey on Mobile Computing and its ApplicationsIRJET Journal
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfdeepapriya28
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid Software
 
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographicsPodsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographicsMa. Theresa Nina Pineda
 
A Fresh Approach to Remote IoT Connectivity
A Fresh Approach to Remote IoT ConnectivityA Fresh Approach to Remote IoT Connectivity
A Fresh Approach to Remote IoT ConnectivityPodsystem M2M
 
Kuliah umum-tif
Kuliah umum-tifKuliah umum-tif
Kuliah umum-tifPak Zuhdi
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGYoishimustafi1
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computingBhupesh Rawat
 
INTRODUCTION TO MOBILE COMPUTING.pptx
INTRODUCTION TO MOBILE COMPUTING.pptxINTRODUCTION TO MOBILE COMPUTING.pptx
INTRODUCTION TO MOBILE COMPUTING.pptxBhuvanaR13
 
5 g mobile wireless technology
5 g mobile wireless technology5 g mobile wireless technology
5 g mobile wireless technologyIJARIIT
 

Similar to Unit 1 part 1 (20)

Chapter 09 pertemuan 13- donpas - mobile computing
Chapter 09  pertemuan 13- donpas - mobile computingChapter 09  pertemuan 13- donpas - mobile computing
Chapter 09 pertemuan 13- donpas - mobile computing
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsWireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
 
NEW TRENDS IN MOBILE NETWORKING
NEW TRENDS IN MOBILE NETWORKINGNEW TRENDS IN MOBILE NETWORKING
NEW TRENDS IN MOBILE NETWORKING
 
The Survey on Mobile Computing and its Applications
The Survey on Mobile Computing and its ApplicationsThe Survey on Mobile Computing and its Applications
The Survey on Mobile Computing and its Applications
 
Presentation1
Presentation1Presentation1
Presentation1
 
ETRASCT-2014
ETRASCT-2014ETRASCT-2014
ETRASCT-2014
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdf
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Unit 1
Unit 1Unit 1
Unit 1
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20
 
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographicsPodsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
 
A Fresh Approach to Remote IoT Connectivity
A Fresh Approach to Remote IoT ConnectivityA Fresh Approach to Remote IoT Connectivity
A Fresh Approach to Remote IoT Connectivity
 
Kuliah umum-tif
Kuliah umum-tifKuliah umum-tif
Kuliah umum-tif
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
INTRODUCTION TO MOBILE COMPUTING.pptx
INTRODUCTION TO MOBILE COMPUTING.pptxINTRODUCTION TO MOBILE COMPUTING.pptx
INTRODUCTION TO MOBILE COMPUTING.pptx
 
5 g mobile wireless technology
5 g mobile wireless technology5 g mobile wireless technology
5 g mobile wireless technology
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 

More from Vikram Nandini

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarVikram Nandini
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and CommandsVikram Nandini
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsVikram Nandini
 
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II PartVikram Nandini
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online ComponentsVikram Nandini
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural NetworksVikram Nandini
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected DevicesVikram Nandini
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoTVikram Nandini
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityVikram Nandini
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfVikram Nandini
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web TechnologiesVikram Nandini
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style SheetsVikram Nandini
 

More from Vikram Nandini (20)

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold Bar
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and Commands
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic Commands
 
INTRODUCTION to OOAD
INTRODUCTION to OOADINTRODUCTION to OOAD
INTRODUCTION to OOAD
 
Ethics
EthicsEthics
Ethics
 
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II Part
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
Business Models
Business ModelsBusiness Models
Business Models
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online Components
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
 
IoT-Prototyping
IoT-PrototypingIoT-Prototyping
IoT-Prototyping
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected Devices
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Embedded decices
Embedded decicesEmbedded decices
Embedded decices
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoT
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdf
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web Technologies
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style Sheets
 

Recently uploaded

fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionjeevanprasad8
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationRobbie Edward Sayers
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdfKamal Acharya
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxwendy cai
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234AafreenAbuthahir2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfPipe Restoration Solutions
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf884710SadaqatAli
 
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisIT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisDr. Radhey Shyam
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdfKamal Acharya
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsAtif Razi
 

Recently uploaded (20)

fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisIT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 

Unit 1 part 1

  • 1. Introduction of Mobile Computing 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 1
  • 2. What is Mobile Computing? 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 2  Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.  Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere.
  • 3. Mobility 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 3 A device that moves  Between different geographical locations  Between different networks  Between different applications  Such as Palm-top, laptop,  Cell phones mobile communicationA device due to which is possible  Modems.
  • 4. Types of mobility 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 4 • user mobility: users communicate anytime, anywhere, with anyone • device portability: devices can be connected anytime, anywhere to the network
  • 5. Wireless Communication 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 5 Wireless refers to the method of transferring information between a computing device, such as a personal data assistant (PDA), and a data source, such as an agency database server, without a physical connection. Not all wireless communications technologies are mobile. For example, lasers are used in wireless data transfer between buildings, but cannot be used in mobile communications at this time.
  • 6. • The wire is replaced by electro magnetic spectrum wave • Data transmission through the air 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 6
  • 7. Why Mobile Computing? 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 7 •Enable anywhere/anytime connectivity •Bring computer communications to areas without pre existing infrastructure •Enable mobility •Enable new applications •An exciting new research area
  • 8. Wired Vs. Wireless Networks 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 8 Wired Networks - high bandwidth - can listen on wire - high power machines - need physical access(security) - low delay Mobile Networks - low bandwidth - hidden terminal problem - low power machines - high resource machines - low resource machines - need proximity - higher delay
  • 9. Advantages of Wireless Networks 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 9 Flexible: Radio waves can penetrate the obstacles. Sender and receiver can be placed any where. Mobility: Data can be access from any location. Robustness : Can survive in disaster (Earthquake, military operations) Scalable: Can be configured in variety of topologies. Easy Installation Less Cost Usage of ISM band: ISM (Industrial, Scientific and Medical) band (2.40GHz to 2.484 GHz, 5.725 GHz to 5.850 GHz) is available for use by anyone. No Planning: Only Wireless Ad hoc not required any planning.
  • 10. Disadvantages of Wireless Networks 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 10 Quality of Service: Lower Bandwidth Lower Data Transmission Rate High Error Rates Interference Higher Delay Restrictions: License-free frequency bands are not same worldwide. Safety and Security: Interference from other devices
  • 11. Types of Wireless Devices 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 11 Laptops Palmtops PDAs Cell phones Pagers Sensors
  • 12. Sensor: • A very simple wireless device is represented by a sensor transmitting state information. Embedded controllers: • Many appliances already contain a simple or sometimes more complex controller Pager: • pager can only display short text messages, • has a tiny display, and cannot send any messages. Pagers can even be integrated into watches. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 12
  • 13.  Mobile phones: • The traditional mobile phone only had a simple black and white text display and could send/receive voice or short messages. • Today, mobile phones migrate more and more toward PDAs. Mobile phones with full color graphic display, touch screen, and Internet browser are easily available.  Personal digital assistant: • PDAs typically accompany a user and offer simple versions of office software • The typical input device is a pen, with built-in character recognition translating handwriting into characters. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 13
  • 14. Pocket computer: • pocket computers offering tiny keyboards, color displays, and simple versions of programs found on desktop computers Notebook/laptop: • Finally, laptops offer more or less the same performance • as standard desktop computers; they use the same software – the only technical difference being size, weight, and the ability to run on a battery. If operated mainly via a sensitive display 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 14
  • 15. Applications 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 15  Vehicles  transmission of news, road conditions, weather  personal communication using cellular phones  position identification via GPS  inter vehicle communications for accident prevention  vehicle and road inter communications for traffic control, signaling, data gathering  ambulances, police, etc.: early transmission of patient data to the hospital,
  • 16.  Mobile workers  access to customer files and company documents stored in a central location  collaborative work environments  access to email and voice messages  Replacement of fixed networks  remote sensors, e.g., weather, environment, road conditions  flexible work spaces  LANs in legacy buildings  Entertainment, education, ...  outdoor Internet access  intelligent travel guide with up-to-date  location dependent information  ad-hoc networks for multi user games 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 16
  • 17. •For Estate Agents: Estate agents can work either at home or out in the field. With mobile computers they can be more productive. They can obtain current real estate information by accessing multiple listing services, which they can do from home, office or car when out with clients. •Emergency Services: Ability to receive information on the move is vital where the emergency services are involved. Information regarding the address, type and other details of an incident can be dispatched quickly, •Credit Card Verification: At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for transactions, the intercommunication is required between the bank central computer and the POS terminal, in order to effect verification of the card usage, can take place quickly and securely over cellular 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 17
  • 18. Limitations of Mobile Computing 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 18 1. Insufficient Bandwidth: Mobile Internet access is generally slower than direct cable connections, using technologies such as GPRS and EDGE, and more recently 3G networks. These networks are usually available within range of commercial cell phone towers. Higher speed wireless LANs are inexpensive but have very limited range. 2. Security Standards: When working mobile, one is dependent on public networks, requiring careful use of Virtual Private Network (VPN). Security is a major concern while concerning the mobile computing standards on the fleet. One can easily attack the VPN through a huge number of networks interconnected through the line. 3. Power consumption: When a power outlet or portable generator is not available, mobile computers must rely
  • 19. 4. Transmission interferences: Weather, terrain, and the range from the nearest signal point can all interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 19 5.Potential health hazards: People who use mobile devices while driving are often distracted from driving are thus assumed more likely to be involved in traffic accidents. Cell phones may interfere with sensitive medical devices. There are allegations that cell phone signals may cause health problems. 6. Human interface with device: Screens and keyboards tend to be small, which may make them hard to use. Alternate input methods such as speech or handwriting recognition require training.
  • 20. Introduction 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 20  GSM stands for Global System for Mobiles.  GSM is a cellular network, which means that cell phones connect to it by searching for cells in the immediate vicinity.  This is a world-wide standard for digital cellular telephony  GSM was created by the Europeans, and originally meant "Groupe Special Mobile“  to describe the protocols for second-generation digital cellular networks used by mobile devices such as tablets,  first deployed in Finland in December 1991  As of 2014, it has become the global standard for mobile communications – with over 90% market share, operating in over 219 countries and territories  2G networks developed as a replacement for first generation analog cellular networks, and the GSM standard originally described as a digital, circuit-switched network optimized for full duplex voice telephony.
  • 21. Global System for Mobile communication (GSM) 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 21
  • 22. In 2001 the first commercial launch of 3G was done in Japan. With 3G following services are available : Video Conferencing online games net surfing..10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 22
  • 23. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 23
  • 24. • Communication mobile, wireless communication, support for voice and data services • Total mobility international access, chip-card enables use of access points of different providers. • Worldwide connectivity one number, the network handles every location. • High capacity better frequency efficiency, smaller cells, more customers per cell. • High transmission quality high audio quality and reliability for wireless, uninterrupted phone calls at higher speeds (e.g., from cars, trains). Advantages 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 24
  • 25. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 25
  • 26. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 26
  • 27. Supplementary services 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 27
  • 28. Bearer services 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 28
  • 29. Data rate for Bearer services 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 29
  • 30. GSMArchitecture 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 30
  • 31. GSM Architecture  Radio Subsystem  Network Subsystem  Operation Subsystem 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 31
  • 32. Radio subsystem 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 32
  • 33. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 33
  • 34. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 34
  • 35. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 35
  • 36. Functions of BTS 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 36
  • 37. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 37
  • 38. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 38
  • 39. Network subsystem 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 39
  • 40. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 40
  • 41. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 41
  • 42. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 42
  • 43. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 43
  • 44. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 44
  • 45. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 45
  • 46. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 46
  • 47. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 47
  • 48. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 48
  • 49. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 49
  • 50. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 50
  • 51. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 51
  • 52. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 52
  • 53. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 53
  • 54. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 54
  • 55. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 55
  • 56. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 56
  • 57. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 57
  • 58. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 58
  • 59. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 59
  • 60. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 60
  • 61. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 61
  • 62. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 62
  • 63. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 63
  • 64. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 64
  • 65. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 65
  • 66. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 66
  • 67. GMSC Identified 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 67
  • 68. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 68
  • 69. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 69
  • 70. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 70
  • 71. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 71
  • 72. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 72
  • 73. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 73
  • 74. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 74
  • 75. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 75
  • 76. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 76
  • 77. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 77
  • 78. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 78
  • 79. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 79
  • 80. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 80
  • 81. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 81
  • 82. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 82
  • 83. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 83
  • 84. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 84
  • 85. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 85
  • 86. Mobile originating call 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 86
  • 87. Call connection process 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 87
  • 88. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 88
  • 89. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 89
  • 90. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 90
  • 91. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 91
  • 92. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 92
  • 93. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 93
  • 94. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 94
  • 95. Radio interface 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 95
  • 96. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 96
  • 97. List of interfaces in GSM 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 97 Interfac e Description Um MS↔ BTS ABis BTS↔ BSC A BSC ↔ (G)MSC B (G)MSC↔ VLR C (G)MSC↔ HLR D VLR↔HLR E (G)MSC↔ (G)MSC F (G)MSC↔ EIR G VLR↔ VLR H HLR ↔AUC
  • 98. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 98
  • 99. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 99
  • 100. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 100
  • 101. Handover 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 101 Purpose: 1. To keep continuous communication with moving MS 2.To improve network performance 3.To reduce the call drop rate 4.To reduce the congestion rate
  • 102. Types of GSM handover 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 102 1.Intra-BTS handover: Because of interference, or other reasons 2. Inter-BTS Intra BSC handover: The mobile moves out of the coverage area of one BTS 3. Inter-BSC handover: When the mobile moves out of the range of cells controlled by one BSC 4. Inter-MSC handover: when changing between networks
  • 103. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 103
  • 104. Security in GSM  Security services  access control/authentication  user  SIM (Subscriber Identity Module): secret PIN (personal identification number)  SIM  network: challenge response method  confidentiality  voice and signaling encrypted on the wireless link (after 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 104 successful authentication)  anonymity  temporary identity TMSI (Temporary Mobile Subscriber Identity)  newly assigned at each new location update (LUP)  encrypted transmission  3 algorithms specified in GSM  A3 for authentication (“secret”, open interface)  A5 for encryption (standardized)  A8 for key generation (“secret”, open interface)
  • 105. security concerns can be defined in two side: operator side and customer side. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 105 Operators:  Should bill the right person  Should provide systems to avoid fraud Should protect their services against attacks Customers  Should have privacy, nobody should be able to detect their identification or their location  Communication on the air should be encrypted to avoid eavesdropping  Should be able to change mobile equipment independently
  • 106. Security mechanisms 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 106  Shouldn’t add much load to the voice calls or data communication  Shouldn’t need to increase the channel bandwidth  Shouldn’t increase the bit error rate  Shouldn’t bring expensive complexity to the system  Should be useful and cost efficient  Should be able to detect suspicious mobile equipment
  • 107. GSM security can be written in 4 principles 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 107  Authentication of a user it provides the ability for mobile equipment to prove that it has access to a particular account with the operator.  Ciphering of the data and signaling it requires that all signaling and user data (such as text messages and speech) are protected against interception by means of ciphering  Confidentiality of a user identity it provides IMSI’s security. GSM communication uses IMSI rarely, it uses TMSI (Temporary Mobile Subscriber Identity) to provide more secure communication and to avoid disclosing of user’s identity  Using SIM as security module Incase SIM card was taken by opponent, there is still PIN code measurement.
  • 108. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 108
  • 109. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 109
  • 110. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 110
  • 111. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 111
  • 112. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 112
  • 113. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 113
  • 114. GSM Protocol stack 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 114
  • 115. •GSM Data services are the processes that can transfer digital information between wireless devices and the GSM system. •GSM data services use o a continuous connection - circuit switched data oA bursty data transmission - packet switched data. •Circuit Switched Data - GSM circuit switched data is the reserving of a continuous path of transmission resources from a sender to a receiver. •GSM data may dedicate a variable number of transmission time slots per frame for circuit switched data connection. •For circuit switched connections, the data transmission path is always available even if there is no data to send. GSM Data services 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 115
  • 116. •Packet Switched Data - GSM packet switched data is the sending of data which is divided into small packets which can take different paths through a packet data network. •The GSM radio channel was modified in the GPRS system to allow the dynamic assignment of time slots to enable packet data to be sent on the GSM radio channel. •Fax Services - Fax service is the transmission of facsimile (image) information between users. •Facsimile signals are normally sent using audio frequencies which cannot be sent through the GSM voice coder. •To send fax signals through the GSM system, the GSM system must decode the fax signal and send it in digital form. •When the fax data reaches its GSM exit point, the GSM system must reconvert the digital fax back into it original analog form 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 116
  • 117. •It is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. •The higher data rates allow users to take part in video conferences and interact with multimedia Web sites and similar applications using mobile handheld devices as well as notebook computers. •GPRS is based on Global System for Mobile (GSM) communication and complements existing services such circuit-switched cellular phone connections and the Short Message Service (SMS). General Packet Radio Services (GPRS) 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 117
  • 118. •GPRS packet-based services cost users less than circuit- switched services since communication channels are being used on a shared-use, as-packets-are-needed basis rather than dedicated to only one user at a time. •It is also easier to make applications available to mobile users because the faster data rate 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 118
  • 119. Enabling GPRS on a GSM network requires the addition of two core modules, - the Gateway GPRS Service Node (GGSN) -GGSN acts as a gateway between the GPRS network and Public Data Networks such as IP and X.25. -GGSNs also connect to other GPRS networks to facilitate GPRS roaming. - the Serving GPRS Service Node (SGSN). -provides packet routing to and from the SGSN service area for all users in that service area. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 119
  • 120. GPRS network elements 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 120 GSN (GPRS Support Nodes): GGSN and SGSN  GGSN (Gateway GSN) interworking unit between GPRS and PDN (Packet Data Network) SGSN (Serving GSN) supports the MS (location, billing, security)  GR (GPRS Register)
  • 121. GPRSAdvantages 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 121 IMMEDIACY INTERNETAWARE SPEED No Dial Up