SlideShare a Scribd company logo
1 of 26
Download to read offline
Mobile Technologies
Unit 2
DESIGN MOBILE COMPUTING
ARCHITECTURE
Ms. Swapnali Pawar
Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Index
• Mobile Communication
• Characteristics of Mobile Communication
Device
• Features of Mobile Communication
• Applications of Mobile Communication
• Advantages of Mobile Communication
• A simplified reference model
Mobile Communication
Mobile Communication is the use of technology that
allows us to communicate with others in different
locations without the use of any physical connection
(wires or cables). Mobile communication makes our
life easier, and it saves time and effort.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Characteristics of Mobile Communication
Device
● Fixed and wired:
This configuration describes the typical desktop computer in an office. Neither weight
nor power consumption of the devices allow for mobile usage. The devices use fixed
networks for performance reasons.
● Mobile and wired:
Many of today’s laptops fall into this category; users carry the laptop from one hotel
to the next, reconnecting to the company’s network via the telephone network and a
modem.
● Fixed and wireless:
This mode is used for installing networks, e.g., in historical buildings to avoid damage
by installing wires, or at trade shows to ensure fast network setup. Another example is
bridging the last mile to a customer by a new operator that has no wired
infrastructure and does not want to lease lines from a competitor.
● Mobile and wireless:
This is the most interesting case. No cable restricts the user, who can roam between
different wireless networks. Today’s most successful example for this category is GSM
with more than 800 million users.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
1. High capacity load balancing:
Each wired or wireless infrastructure must incorporate high
capacity load balancing.High capacity load balancing means,
when one access point is overloaded, the system will actively
shift users from one access point to another depending on the
capacity which is available.
Features of Mobile Communication
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
2.Scalability
The growth in popularity of new wireless devices continuously increasing
day by day. The wireless networks have the ability to start small if
necessary, but expand in terms of coverage and capacity as needed -
without having to overhaul or build an entirely new network.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
3. Network management system:
Now a day, wireless networks are much more complex and
may consist of hundreds or even thousands of access
points, firewalls, switches, managed power and various
other components.The wireless networks have a smarter
way of managing the entire network from a centralized
point.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
4. Role based access control
Role based access control (RBAC) allows you to assign roles based on what, who,
where, when and how a user or device is trying to access your network.
Once the end user or role of the devices is defined, access control policies or rules
can be enforced.
•Indoor as well as outdoor coverage options:
It is important that your wireless system has the capability of adding indoor
coverage as well as outdoor coverage.
•Network access control:
Network access control can also be called as mobile device registration. It is
essential to have a secure registration.
Network access control (NAC) controls the role of the user and enforces policies.
NAC can allow your users to register themselves to the network. It is a helpful
feature that enhances the user experience.
•Mobile device management:
Suppose, many mobile devices are accessing your wireless network; now think
about the thousands of applications are running on those mobile devices.
How do you plan on managing all of these devices and their applications,
especially as devices come and go from your business?
Mobile device management can provide control of how you will manage access
to programs and applications. Even you can remotely wipe the device if it is lost
or stolen.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
• Roaming: You don't need to worry about dropped
connections, slower speeds or any disruption in service as
you move throughout your office or even from building to
building wireless needs to be mobile first.
Roaming allows your end-users to successfully move from
one access point to another without ever noticing a dip in a
performance.
For example: allowing a student to check their mail as they
walk from one class to the next.
• Redundancy: The level or amount of redundancy your
wireless system requires depends on your specific
environment and needs.
For example: A hospital environment will need a higher
level of redundancy than a coffee shop. However, at the
end of the day, they both need to have a backup plan in
place.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
5.Proper Security means using the right firewall
The backbone of the system is your network firewall. With
the right firewall in place you will be able to:
• See and control both your applications and end users.
• Create the right balance between security and
performance.
• Reduce the complexity with:
Antivirus protection.
Deep Packet Inspection (DPI)
Application filtering
• Protect your network and end users against known and
unknown threads including:
Zero- day.
Encrypted malware.
Ransomware.
Malicious botnets.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
6.Switching:
Basically, a network switch is the traffic cop of your wireless
network which making sure that everyone and every device
gets to where they need to go.
Switching is an essential part of every fast, secure wireless
network for several reasons:
• It helps the traffic on your network flow more efficiently.
• It minimizes unnecessary traffic.
• It creates a better user experience by ensuring your
traffic is going to the right places.
Applications of Mobile Communication
1. Vehicles
2. Emergencies
3. Business
4. Replacement of wired networks
5. Infotainment and more
6. Location dependent services
7. Mobile and wireless devices
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
1. Vehicles
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Business
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Advantages of Mobile Communication
 Flexibility:
 Wireless communication enables the people to communicate with each other regardless of
location. There is no need to be in an office or some telephone booth in order to pass and
receive messages.
 Cost effectiveness:
 In wireless communication, there is no need of any physical infrastructure (Wires or cables)
or maintenance practice. Hence, the cost is reduced.
 Speed:
 Improvements can also be seen in speed. The network connectivity or the accessibility was
much improved in accuracy and speed.
 Accessibility:
 With the help of wireless technology easy accessibility to the remote areas is possible. For
example, in rural areas, online education is now possible. Educators or students no longer
need to travel to far-flung areas to teach their lessons.
 Constant connectivity:
 Constant connectivity ensures that people can respond to emergencies relatively quickly.
For example, a wireless device like mobile can ensure you a constant connectivity though
you move from place to place or while you travel, whereas a wired landline can't.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
A simplified reference model
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
● Physical layer:
This is the lowest layer in a communication system and is responsible for the
conversion of a stream of bits into signals that can be transmitted on the sender
side. The physical layer of the receiver then transforms the signals back into a bit
stream. For wireless communication, the physical layer is responsible for
frequency selection, generation of the carrier frequency, signal detection
(although heavy interference may disturb the signal), modulation of data onto a
carrier frequency and (depending on the transmission scheme) encryption. These
features of the physical layer are mainly discussed in chapter 2, but will also be
mentioned for each system separately in the appropriate chapters.
● Data link layer:
The main tasks of this layer include accessing the medium, multiplexing of
different data streams, correction of transmission errors, and synchronization
(i.e., detection of a data frame). Chapter 3 discusses different medium access
schemes. A small section about the specific data link layer used in the presented
systems is combined in each respective chapter. Altogether, the data link layer is
responsible for a reliable point-topoint connection between two devices or a point-
to-multipoint connection between one sender and several receivers.
A simplified reference model
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
● Network layer:
This third layer is responsible for routing packets through a network or
establishing a connection between two entities over many other intermediate
systems. Important topics are addressing, routing, device location, and handover
between different networks. Chapter 8 presents several solutions for the network
layer protocol of the internet (the Internet Protocol IP). The other chapters also
contain sections about the network layer, as routing is necessary in most cases.
● Transport layer:
This layer is used in the reference model to establish an end-to-end connection.
Topics like quality of service, flow and congestion control are relevant, especially
if the transport protocols known from the Internet, TCP and UDP, are to be used
over a wireless link.
● Application layer:
Finally, the applications (complemented by additional layers that can support
applications) are situated on top of all transmissionoriented layers. Topics of
interest in this context are service location, support for multimedia applications,
adaptive applications that can handle the large variations in transmission
characteristics, and wireless access to the world wide web using a portable
device. Very demanding applications are video (high data rate) and interactive
gaming (low jitter, low latency).
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar

More Related Content

What's hot

Future of mobile technology
Future of mobile technologyFuture of mobile technology
Future of mobile technologymktgmobile
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareEd Dodds
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMPallepati Vasavi
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile ComputingMadhuri Badgujar
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computingcegonsoft1999
 
Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)cegonsoft1999
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile ComputingNitin Ujgare
 
Mobile computing
Mobile computingMobile computing
Mobile computinglalit arora
 
Mobile technology for learning
Mobile technology for learningMobile technology for learning
Mobile technology for learningSuganthi Nadar
 

What's hot (20)

Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Future of mobile technology
Future of mobile technologyFuture of mobile technology
Future of mobile technology
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Manika
ManikaManika
Manika
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
 
Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
 
WAP
WAPWAP
WAP
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile technology for learning
Mobile technology for learningMobile technology for learning
Mobile technology for learning
 

Similar to MT Unit 2 Mobile Computing Architecture

Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computingVENNILAV6
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission systemDurgarao Gundu
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Understanding Network Switches- .pdf
Understanding Network Switches- .pdfUnderstanding Network Switches- .pdf
Understanding Network Switches- .pdfInfoRIPRASAITSolutio
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...IRJET Journal
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityeSAT Publishing House
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks ShohanaakterKakon
 
Handoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesHandoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesITM Universe - Vadodara
 

Similar to MT Unit 2 Mobile Computing Architecture (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Understanding Network Switches- .pdf
Understanding Network Switches- .pdfUnderstanding Network Switches- .pdf
Understanding Network Switches- .pdf
 
smart grid
smart gridsmart grid
smart grid
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobility
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 
Handoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesHandoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet services
 
H010524049
H010524049H010524049
H010524049
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 

More from Swapnali Pawar

Unit 3 introduction to android
Unit 3 introduction to android Unit 3 introduction to android
Unit 3 introduction to android Swapnali Pawar
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingSwapnali Pawar
 
Fresher interview tips demo
Fresher interview tips demoFresher interview tips demo
Fresher interview tips demoSwapnali Pawar
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to androidSwapnali Pawar
 
Web Programming& Scripting Lab
Web Programming& Scripting LabWeb Programming& Scripting Lab
Web Programming& Scripting LabSwapnali Pawar
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1Swapnali Pawar
 
web programming & scripting 2
web programming & scripting 2web programming & scripting 2
web programming & scripting 2Swapnali Pawar
 
web programming & scripting
web programming & scriptingweb programming & scripting
web programming & scriptingSwapnali Pawar
 

More from Swapnali Pawar (14)

Unit 3 introduction to android
Unit 3 introduction to android Unit 3 introduction to android
Unit 3 introduction to android
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile Computing
 
Introduction to ios
Introduction to iosIntroduction to ios
Introduction to ios
 
Fresher interview tips demo
Fresher interview tips demoFresher interview tips demo
Fresher interview tips demo
 
View & index in SQL
View & index in SQLView & index in SQL
View & index in SQL
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
 
Android Introduction
Android IntroductionAndroid Introduction
Android Introduction
 
SQL JOINS
SQL JOINSSQL JOINS
SQL JOINS
 
Exception Handling
Exception Handling Exception Handling
Exception Handling
 
Mobile Technology 3
Mobile Technology 3Mobile Technology 3
Mobile Technology 3
 
Web Programming& Scripting Lab
Web Programming& Scripting LabWeb Programming& Scripting Lab
Web Programming& Scripting Lab
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1
 
web programming & scripting 2
web programming & scripting 2web programming & scripting 2
web programming & scripting 2
 
web programming & scripting
web programming & scriptingweb programming & scripting
web programming & scripting
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

MT Unit 2 Mobile Computing Architecture

  • 1. Mobile Technologies Unit 2 DESIGN MOBILE COMPUTING ARCHITECTURE Ms. Swapnali Pawar Swapnali Pawar
  • 2. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Index • Mobile Communication • Characteristics of Mobile Communication Device • Features of Mobile Communication • Applications of Mobile Communication • Advantages of Mobile Communication • A simplified reference model
  • 3. Mobile Communication Mobile Communication is the use of technology that allows us to communicate with others in different locations without the use of any physical connection (wires or cables). Mobile communication makes our life easier, and it saves time and effort. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 4. Characteristics of Mobile Communication Device ● Fixed and wired: This configuration describes the typical desktop computer in an office. Neither weight nor power consumption of the devices allow for mobile usage. The devices use fixed networks for performance reasons. ● Mobile and wired: Many of today’s laptops fall into this category; users carry the laptop from one hotel to the next, reconnecting to the company’s network via the telephone network and a modem. ● Fixed and wireless: This mode is used for installing networks, e.g., in historical buildings to avoid damage by installing wires, or at trade shows to ensure fast network setup. Another example is bridging the last mile to a customer by a new operator that has no wired infrastructure and does not want to lease lines from a competitor. ● Mobile and wireless: This is the most interesting case. No cable restricts the user, who can roam between different wireless networks. Today’s most successful example for this category is GSM with more than 800 million users. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 5. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 1. High capacity load balancing: Each wired or wireless infrastructure must incorporate high capacity load balancing.High capacity load balancing means, when one access point is overloaded, the system will actively shift users from one access point to another depending on the capacity which is available. Features of Mobile Communication
  • 6. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 2.Scalability The growth in popularity of new wireless devices continuously increasing day by day. The wireless networks have the ability to start small if necessary, but expand in terms of coverage and capacity as needed - without having to overhaul or build an entirely new network.
  • 7. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 3. Network management system: Now a day, wireless networks are much more complex and may consist of hundreds or even thousands of access points, firewalls, switches, managed power and various other components.The wireless networks have a smarter way of managing the entire network from a centralized point.
  • 8. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 4. Role based access control Role based access control (RBAC) allows you to assign roles based on what, who, where, when and how a user or device is trying to access your network. Once the end user or role of the devices is defined, access control policies or rules can be enforced. •Indoor as well as outdoor coverage options: It is important that your wireless system has the capability of adding indoor coverage as well as outdoor coverage. •Network access control: Network access control can also be called as mobile device registration. It is essential to have a secure registration. Network access control (NAC) controls the role of the user and enforces policies. NAC can allow your users to register themselves to the network. It is a helpful feature that enhances the user experience. •Mobile device management: Suppose, many mobile devices are accessing your wireless network; now think about the thousands of applications are running on those mobile devices. How do you plan on managing all of these devices and their applications, especially as devices come and go from your business? Mobile device management can provide control of how you will manage access to programs and applications. Even you can remotely wipe the device if it is lost or stolen.
  • 9. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar • Roaming: You don't need to worry about dropped connections, slower speeds or any disruption in service as you move throughout your office or even from building to building wireless needs to be mobile first. Roaming allows your end-users to successfully move from one access point to another without ever noticing a dip in a performance. For example: allowing a student to check their mail as they walk from one class to the next. • Redundancy: The level or amount of redundancy your wireless system requires depends on your specific environment and needs. For example: A hospital environment will need a higher level of redundancy than a coffee shop. However, at the end of the day, they both need to have a backup plan in place.
  • 10. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 5.Proper Security means using the right firewall The backbone of the system is your network firewall. With the right firewall in place you will be able to: • See and control both your applications and end users. • Create the right balance between security and performance. • Reduce the complexity with: Antivirus protection. Deep Packet Inspection (DPI) Application filtering • Protect your network and end users against known and unknown threads including: Zero- day. Encrypted malware. Ransomware. Malicious botnets.
  • 11. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 6.Switching: Basically, a network switch is the traffic cop of your wireless network which making sure that everyone and every device gets to where they need to go. Switching is an essential part of every fast, secure wireless network for several reasons: • It helps the traffic on your network flow more efficiently. • It minimizes unnecessary traffic. • It creates a better user experience by ensuring your traffic is going to the right places.
  • 12. Applications of Mobile Communication 1. Vehicles 2. Emergencies 3. Business 4. Replacement of wired networks 5. Infotainment and more 6. Location dependent services 7. Mobile and wireless devices MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 13. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 14. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 15. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 16. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 17. 1. Vehicles MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 18. Business MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 19. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 20. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 21. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 22. Advantages of Mobile Communication  Flexibility:  Wireless communication enables the people to communicate with each other regardless of location. There is no need to be in an office or some telephone booth in order to pass and receive messages.  Cost effectiveness:  In wireless communication, there is no need of any physical infrastructure (Wires or cables) or maintenance practice. Hence, the cost is reduced.  Speed:  Improvements can also be seen in speed. The network connectivity or the accessibility was much improved in accuracy and speed.  Accessibility:  With the help of wireless technology easy accessibility to the remote areas is possible. For example, in rural areas, online education is now possible. Educators or students no longer need to travel to far-flung areas to teach their lessons.  Constant connectivity:  Constant connectivity ensures that people can respond to emergencies relatively quickly. For example, a wireless device like mobile can ensure you a constant connectivity though you move from place to place or while you travel, whereas a wired landline can't. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 23. A simplified reference model MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 24. ● Physical layer: This is the lowest layer in a communication system and is responsible for the conversion of a stream of bits into signals that can be transmitted on the sender side. The physical layer of the receiver then transforms the signals back into a bit stream. For wireless communication, the physical layer is responsible for frequency selection, generation of the carrier frequency, signal detection (although heavy interference may disturb the signal), modulation of data onto a carrier frequency and (depending on the transmission scheme) encryption. These features of the physical layer are mainly discussed in chapter 2, but will also be mentioned for each system separately in the appropriate chapters. ● Data link layer: The main tasks of this layer include accessing the medium, multiplexing of different data streams, correction of transmission errors, and synchronization (i.e., detection of a data frame). Chapter 3 discusses different medium access schemes. A small section about the specific data link layer used in the presented systems is combined in each respective chapter. Altogether, the data link layer is responsible for a reliable point-topoint connection between two devices or a point- to-multipoint connection between one sender and several receivers. A simplified reference model MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 25. ● Network layer: This third layer is responsible for routing packets through a network or establishing a connection between two entities over many other intermediate systems. Important topics are addressing, routing, device location, and handover between different networks. Chapter 8 presents several solutions for the network layer protocol of the internet (the Internet Protocol IP). The other chapters also contain sections about the network layer, as routing is necessary in most cases. ● Transport layer: This layer is used in the reference model to establish an end-to-end connection. Topics like quality of service, flow and congestion control are relevant, especially if the transport protocols known from the Internet, TCP and UDP, are to be used over a wireless link. ● Application layer: Finally, the applications (complemented by additional layers that can support applications) are situated on top of all transmissionoriented layers. Topics of interest in this context are service location, support for multimedia applications, adaptive applications that can handle the large variations in transmission characteristics, and wireless access to the world wide web using a portable device. Very demanding applications are video (high data rate) and interactive gaming (low jitter, low latency). MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 26. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar