Professional Documents
Culture Documents
Chapter 2 DFP6033 Version 2 2018
Chapter 2 DFP6033 Version 2 2018
TABLE OF CONTENTS
CHAPTER 12
2.0 MOBILE COMPUTING SYSTEM ARCHITECTURE
a. Mobile Communication []
b. Mobile Hardware[]
c. Mobile Software[]
The Idea of mobile computing has only been around since the 1990s.
It has evolved from two-way radios that use large antennas to communicate
simple messages to three inch personal computers that can do almost everything
a regular computer does.
People can’t go to their local Starbucks and not see a laptop linked up to a hotspot
Static network.
This actually used to mean radio transmitters that operated on a stable base,
usually with the help of large antennas.
2 way radios used by police officers were also considered mobile technology but
now, it means people can connect wirelessly to the internet or to a private
network almost anywhere.
As long as a person has one of the devices capable of wirelessly accessing the
internet, they are participating in mobile computing.
Chances are, you have done it with a laptop computer or a personal digital
assistant or PDA.
So they decide to come up with an idea of portable devices.
These days, Pocket PCs are another way to conveniently access the internet on the
earth devices that have been developed for mobile computing has taken over the
wireless industry.
This new type of communication is a very powerful tool for both businesses and
personal use.
The portable computer has change computing world confiered to hundred years’
back.
From huge machines that could not do much more than word processing to tiny
hand held device.
It offers the opportunity to bring people together and give everyone access to a
greater wealth of information and knowledge, and to share their knowledge with
others.
b. Communication[]
c. Devices[]
Types of mobile computing have been introduced since the 1990s including
the:
Portable computers
It compact, lightweight units including a full character set keyboard and
primarily intended as hosts for software that may be parameterized, such
as desktops/laptops, smartphones/tablets, etc.
Tablets
It is shaped like a paper notebook.
Smartphones
It are the same devices as tablets
It are much smaller and pocket able.
It has a touchscreen including a combination of a virtual keyboard
It can also link to a physical keyboard via wireless Bluetooth or USB. It
can also have features other computer systems would not be able to
incorporate, such as built-in cameras, because of their portability.
Cellular telephones
It can call from a distance through cellular networking technology.
Wearable computers
It mostly limited to functional keys and primarily intended as
incorporation of software agents, such as bracelets, keyless implants, etc.
A carputer
It is installed in an automobile.
It operates as a wireless computer, sound system, GPS, and DVD player.
It also contains word processing software and is Bluetooth compatible.[4]
Smart cards that can run multiple applications but are typically used for
payment travel and secure area access.
d. Platform []
e. Application []
1. Presentation Tier []
It is occupies the top level and displays information related to services available
on a website. []
It communicates with other tiers by sending results to the browser and other tiers
in the network[]
It is the front end layer in the 3-tier system and consists of the user interface. []
This user interface is often a graphical one accessible through a web browser or
web-based application and which displays content and information useful to an
end user. []
It is deployed to a desktop, laptop, tablet or mobile device either via a web
browser or a web-based application utilizing a web server.
It is often built on web technologies such as HTML5, JavaScript, CSS, or through
other popular web development frameworks, and communicates with others layers
through API calls. []
2. Application Tier []
It also called the middle tier, logic tier, business logic or logic tier. []
It is pulled from the presentation tier. []
It controls application functionality by performing detailed processing. []
It contains the functional business logic which drives an application’s core
capabilities.
It is usually hosted on one or more application servers, also be hosted in the cloud,
or on a dedicated workstation depending on the complexity and processing power
needed by the application.
It’s often written in Java, .NET, C#, Python, C++, etc.
3. Data Tier []
There are many benefits to using a 3-layer architecture including speed of development,
scalability, performance and availability.
Speed []
It can gives development teams the ability to develop and enhance a product with
greater speed than developing a singular code base because a specific layer can be
upgraded with minimal impact on the other layers.
It can also help improve development efficiency by allowing teams to focus on
their core competencies.
Many development teams have separate developers who specialize in front- end,
server back-end, and data back-end development.
By modularizing these parts of an application you no longer have to rely on full
stack developers and can better utilize the specialties of each team.
Scalability []
By separating out the different layers you can scale each independently depending
on the need at any given time.
For example, if you are receiving many web requests but not many requests which
affect your application layer, you can scale your web servers without touching
your application servers.
Similarly, if you are receiving many large application requests from only a
handful of web users, you can scale out your application and data layers to meet
those requests without touch your web servers
Performance []
This allows you to load balance each layer independently, improving overall
performance with minimal resources.
With a full stack system you have to worry about a server going down and greatly
affecting performance throughout your entire system, but with a 3-layer application,
the increased independence created when physically separating different parts of an
application minimizes performance issues when a server goes down.
Availability []
By having disparate layers you can also increase reliability and availability by hosting
different parts of your application on different servers and utilizing cached results.
Additionally, the independence created from modularizing the different tiers gives
you many deployment options.
For example, you may choose to have your web servers hosted in a public or private
cloud while you’re application and data layers may be hosted onsite.
Or you may have your application and data layers hosted in the cloud while your web
servers may be locally hosted, or any combination thereof.
Cellular networks use broadcast protocols; all nodes (cellular phones) are
capable of receiving transmissions on a control channel from a central site.
A wireless control node (called the base station) uses this common channel to
direct a node to lock onto a specific (user) channel for its connection.
During the ongoing connection, the cell phone is simultaneously
communicating with the base station with the control link and the user link.
Cellular networks—The cell phone networks (WAN); Bluetooth (LAN); Wi-
Fi (LAN)
Figure: Wireless Networks Include Computer Devices, Base Stations, and a Wireless
Infrastructure
The network is distributed over land areas called cells, each served by at least one
fixed-location transceiver, but more normally three cell sites or base transceiver
stations.
These base stations provide the cell with the network coverage which can be used
for transmission of voice, data, and other types of content.
A cell typically uses a different set of frequencies from neighbouring cells, to
avoid interference and provide guaranteed service quality within each cell.[10]
When joined together, these cells provide radio coverage over a wide geographic
area.
This enables a large number of portable transceivers (e.g., mobile
phones, tablets and laptops equipped with mobile broadband modems, pagers,
etc.) to communicate with each other and with fixed transceivers and telephones
anywhere in the network, via base stations, even if some of the transceivers are
moving through more than one cell during transmission.
Cellular networks offer a number of desirable features:[10]
o More capacity than a single large transmitter, since the same frequency can be
used for multiple links as long as they are in different cells
o Mobile devices use less power than with a single transmitter or satellite since
the cell towers are closer
o Larger coverage area than a single terrestrial transmitter, since additional cell
towers can be added indefinitely and are not limited by the horizon
Major telecommunications providers have deployed voice and data cellular
networks over most of the inhabited land area of Earth.
This allows mobile phones and mobile computing devices to be connected to
the public switched telephone network and public Internet.
Private cellular networks can be used for research [11] or for large organizations
and fleets, such as dispatch for local public safety agencies or a taxicab company.
[12]
a. 1G
1G system.
1G specifications were released in 1990 to be used in GSM.
1G systems are analogue systems such as AMPS that use FDM to divide
the bandwidth into specific frequencies that are assigned to individual
calls.
b. 2G
Copyright @2018 JUSRORIZAL FADLY JUSOH 11 | P a g e
DFP6033 Secure Mobile Computing Version 1 :2018
2G system.
These second-generation mobile systems are digital and use either TDMA
or CDMA method.
Digital cellular systems use digital modulation and have several
advantages over analogue systems, including better utilisation of
bandwidth, more privacy, and incorporation of error detection and
correction.
2.5G system.
It was introduced mainly to add latest bandwidth technology to the
existing 2G generation.
It supports higher-data-rate transmission for Web browsing and also
supports a new browsing format language called wireless application
protocol (WAP).
The different upgrade paths include high-speed circuit-switched data
(HSCSD), GPRS and EDGE.
HSCSD increases the available application data rate to 14.4 kbps as
compared to 9.6 kbps of GSM.
By using four consecutive time slots, HSCSD is able to provide a raw
transmission rate of up to 57.6 kbps to individual users.
GPRS supports multi-user network sharing of individual radio channels
and time slots.
Thus GPRS supports many more users than HSCSD but in a bursty
manner.
When all the eight time slots of a GSM radio channel are dedicated to
GPRS, an individual can achieve as much as 171.2 kbps.
But this has not brought any new evolution.
EDGE introduces a new digital modulation format called 8-PSK (octal
phase-shift keying).
It allows nine different air interface formats, known as multiple
modulation and coding schemes, with varying degree of error control and
protection.
These formats are automatically and rapidly selectable.
Of course, the covering range is smaller in EDGE than in HSCSD or
GRPS.
c. 3G
3G system.
To overcome the short-comings of 2G and 2.5G, 3G has been developed.
It uses a wideband wireless network that offers increased clarity in
conversations.
Countries throughout the world are currently determining new radio
spectrum bands to accommodate 3G networks.
ITU has established 2500-2690MHz, 1700-1855MHz and 806-960MHz
bands. Here the target data rate is 2 Mbps.
The data is sent through packet switching.
Voice calls are interpreted through circuit switching.
3G W-CDMA (UMTS).
Copyright @2018 JUSRORIZAL FADLY JUSOH 12 | P a g e
DFP6033 Secure Mobile Computing Version 1 :2018
d. 4G
It offers additional features such as IP telephony, ultra broadband Internet
access, gaming services and HDTV streamed multimedia.
Flash-OFDM, the 802.16e mobile version of WiMax (also known as
WiBro in South Korea), can support cellular peak data rates of approx. 100
Mbps for high-mobility communications such as mobile access and up to 1
Gbps for low-mobility communications such as nomadic/local wireless
access, using scalable bandwidths of up to 40 MHz. The infrastructure for
4G is only packet-based (all-IP).
e. 5G
5G systems
Future generation after 4G system
Hope 5G can problems such as call loss and difficulty in
connection leads to distrust in services and inconvenience to
users.
This data can include e-mail messages, files, web pages, video, music, and voice
conversations.
The signals carry the information through the system from one point to another.
The signals are either digital or analog, depending on their location within the
system.
Digital Signals
Which are found inside computers, vary in amplitude steps as time advances. (See
Figure 2 -.)
It is common to refer to the signal as a string of binary digits (bits) or binary data.
Digital circuitry inside the computer easily stores and processes these digital
signals in binary form.
F
igure 2-: Digital Signals Are Ideal for Use in Computers
Conversions are easy from the more familiar decimal numbering system to binary,
and computers can readily store binary numbers.
With some protocols, the binary values within a data frame represent specific
protocol information.
To clean up and regenerate the signal, digital circuitry can detect if a digital pulse
is present at a certain period of time and create a new pulse that is exactly equal to
the one originally sent.
As a result, a digital signal can be sent over vast distances through periodic
repeaters while preserving the integrity of the information. This is not possible
with analog signals.
For security purposes, it is often necessary to encrypt and later decode a signal at
the destination.
Copyright @2018 JUSRORIZAL FADLY JUSOH 15 | P a g e
DFP6033 Secure Mobile Computing Version 1 :2018
This process is simple with digital signals because all that is necessary is to
rearrange the bits using some type of secret keying process. When the destination
receives the data, a device can use the same key and decrypt the data.
Data rate
The data rate corresponds to the speed that a digital signal transfers data across
a wireless network.
As a result, the data rate of a digital signal gives some insight on how long it
will take to send data from one point to another, as well as identify the amount
of bandwidth that the medium must supply to effectively support the signal.
The data rate of a signal is equal to the total number of bits transmitted in
relation to the time it takes to send them.
The common unit of measure for bit rate is bits per second (bps). As an
example, consider a signal that moves 1,000,000 bits in 1 second.
Throughput
The data rate of a wireless LAN, for example, might be 11 Mbps, but the
throughput might be only 5 Mbps. After removing the overhead—frame
headers, error checking fields, acknowledgement frames, and retransmissions
because of errors—the resulting information transfer is considerably lower. As
the number of users increases, contention for the shared medium increases,
which drives throughput even lower because computer devices (wireless NICs,
to be more precise) must wait longer before sending data. This delay, which is
a form of overhead, can significantly lower the throughput.
With wireless networks, it is common to say that the system sends data bits. In
reality, a wireless network converts the binary digital signals into analog
before transmitting the signal through the air medium.
Analog Signals
An analog signal, shown in Figure 2 -, is one where the amplitude of the signal
varies continuously as time progresses.
Much of the natural environment produces signals that are analog in form.
Examples of this are light and the human voice.
There are several different methods for describing the amplitude of wireless
signals. Refer to Chapter 3 for details on wireless analog signals.
Apple updated iOS to iOS 9 in 2015 in conjunction with the company's OS X
El Capitan operating system release.
b. Android technology
Google Android
Google Android is a mobile operating system based on Linux that has quickly become
the biggest competitor to Apple iOS in the mobile device market. Google originally
released Android's source code under open sourcelicenses, and today the company
continues to develop the mobile OS privately prior to major update releases that are
made available to OEMs and the public.Manufacturers of Android-powered
smartphone and tablet devices include Samsung, Sony, Asus, Amazon, HTC and LG,
as well as Google itself.
Windows Phone
Originally called the Windows Mobile platform and then Windows Phone,
Microsoft's mobile OS is available on a variety of devices from a variety of wireless
operators. You will find Windows Phone on Microsoft hardware devices as well as
Nokia, Dell, HP, Motorola, Palm and i-mate products. Microsoft unveiled the latest
release of its mobile operating system, Windows 10 Mobile, in late 2015 as part of
the Windows 10 family of operating systems.
References
2. Mobile communication
http://www.yourdictionary.com/mobile-communication
8. Three-Tier Architecture
https://www.techopedia.com/definition/24649/three-tier-architecture
Copyright @2018 JUSRORIZAL FADLY JUSOH 18 | P a g e
DFP6033 Secure Mobile Computing Version 1 :2018
10. Sams (2009) Sams Teach Yourself Networking in 24 Hours, 4th Edition. ISBN-13: 978-
0-7686-8576-3
11. Guowang Miao; Jens Zander; Ki Won Sung; Ben Slimane (2016). Fundamentals of
Mobile Data Networks. Cambridge University Press. ISBN 1107143217.
12. Tom Simonite (24 January 2013). "Google's Private Cell Phone Network Could Be a
Threat to Cellular Carriers | MIT Technology Review". Technologyreview.com.
Retrieved 23 November 2013.