Professional Documents
Culture Documents
In other words, you can say that mobile computing allows transmission of data, voice
and video via a computer or any other wireless-enabled device without being connected
to a fixed physical link. In this technology, data transmission is done wirelessly with the
help of wireless devices such as mobiles, laptops etc.
This is only because of Mobile Computing technology that you can access and transmit
data from any remote locations without being present there physically. Mobile
computing technology provides a vast coverage diameter for communication. It is one
of the fastest and most reliable sectors of the computing technology field.
o Mobile Communication
o Mobile Hardware
o Mobile Software
Mobile Communication
Mobile Communication specifies a framework that is responsible for the working of
mobile computing technology. In this case, mobile communication refers to an
infrastructure that ensures seamless and reliable communication among wireless
devices. This framework ensures the consistency and reliability of communication
between wireless devices. The mobile communication framework consists of
communication devices such as protocols, services, bandwidth, and portals necessary to
facilitate and support the stated services. These devices are responsible for delivering a
smooth communication process.
Fixed and Wired: In Fixed and Wired configuration, the devices are fixed at a position,
and they are connected through a physical link to communicate with other devices.
Mobile and Wired: In Mobile and Wired configuration, some devices are wired, and
some are mobile. They altogether make communication with other devices.
Mobile and Wireless: In Mobile and Wireless configuration, the devices can
communicate with each other irrespective of their position. They can also connect to any
network without the use of any wired device.
Mobile Hardware
It has Mobile Device and Device Component enabled to receive and access
the Communication Service.
Mobile hardware means those devices or mobile devices that can receive or
access the service of mobility. It includes laptops, smartphones, tablet PCs,
smart watch and other personal digital assistants (PDA).
It includes mobile device and device components which receive and receive
communication service. These devices include portable laptop, smartphone,
tablet, Personal Digital Assistance (PAD). All these devices are configured in
(full- duplex), in which they are able to send and receive signals at the same
time. To send a signal to a device in full- duplex, one does not have to wait
until the other device finishes sending the signal. It goes on continuously.
Mobile Software
Mobile software is a program that runs on mobile hardware and it can work
according to the features and requirements of Mobile Application. We can
also call this the Mobile Device Engine.
It is responsible for all functions inside the device. It is also called the engine
of the device.
It looks at all the features and needs of mobile applications. It offers camera,
music player, cellular connectivity, WI-FI, Bluetooth, voice recorder, speech
recognition, and video player etc.
The guided media is categorized further into three categories that are twisted-
pair cable, coaxial cable and fiber-optic cable. The twisted pair cable has two
conductors wires wounded around each other and each surrounded by an
insulating material. The twisted pair cable is flexible and easy to install. But it
has low bandwidth and provide less protection from interference. Twisted pair
cable are also of two types shielded and unshielded twisted pair cable.
The unguided media is also called unbounded media as it does not have any
border limitation. The unguided media allows the user to connect all the time,
as the communication is wireless the user can connect himself from anywhere
to the network.
Infrared waves are used for short range communication. Like, the remote
control for televisions, VCRs, etc. uses infrared waves. It can not penetrate
through obstacles. The government licence is not required, to operate an
infrared system as it is more secure against eavesdropping.
Mobile Computing Applications
Traffic:-
During traveling in traffic if we require to know road situation, latest
news and when if feel more stress in driving then can play music and
other important broadcast data are received through digital audio
broadcasting(DAB). If we forget the road then we can know our exact
location with the help of global positioning system (GPS).In case if
got accident then can to inform police and ambulance via an
emergency call to the service provider, which help to improve
organization and save time & money.
Emergencies Situation:-
To play a vital role in the medical sector can hire an ambulance with
great quality wireless connection and help of this can carry significant
information about injured persons. The useful step can prepare for a
particular accident and doctor can be consulted for diagnosis.
Only Wireless networks work of communication in nature disaster 2
such as earthquakes, tsunami, flood, and fire. In worst conditions only
decentralized, wireless ad-hoc networks survive. Means that can
handle Emergencies situation by mobile computing easily.
Use in Business:-
As per business point of view CEO help of this computing system can
represent the presentation at the front of their clients while can access
hot news of the market. Help of video conference could be discuss at
the topic without hindrance any time. Another side if traveling
salesman wants to access the company database as per requirement
then can be retrieved data on his wireless device and maintain the
consistency company’s database. Cause of these every employee are
updated up to date.
Infotainment:-
If we use someone else's wi-fi then he can easily hack our phone.
The battery capacity in mobile devices is very low and these batteries
last for a short time. If you get stuck in a place where there is no
electricity and your battery is exhausted. (Because their battery lasts
only for 1 or 2 days and they have to charge again.)
You must have seen that sometimes 4G networks are coming full in
your phone, but the speed of internet is very low. So this is a drawback
of this. 2g speed is also not available in 4g network.
If we take the phones with us, then there is a risk of theft due to which
someone can misuse your phone
Each tier is distributed to a different place or places in a network. These tiers do not
necessarily correspond to physical locations on various computers on a network, but rather
to logical layers of the application.
Smart Phone
Smartphone connect a mobile phone and a computer in one hand to
the same device. Smartphone allows users to access and store
information (such as e-mails) and installs the program (apps) while
being able to use a mobile phone in one device.
Tablet PC
Notebook computers are not running and a stylus is also used to write
in it, handwriting is digitized and can be converted into standard text
through handwriting recognition or it is written in text form is. The
stylus can also be used to type on a pen-based key layout, where letter
keys are arranged differently than a standard QWERTY keyboard.
These computers also have a keyboard and a mouse for input.
iPad
I Pad tablet is a tablet PC designed by Apple Inc. The iPad has a 9.7
inch touch screen that users can talk directly through the finger
stroke. This portable device can be used to browse the web, listen to
music, watch movies, read eBooks and play games in addition to other
things.
Atari Lynx: It is 8/16 bit portable game device that was developed by
Atari Lynx, in 1989.
2. WLAN network:-
Wireless LAN stands for Wireless Local Area Network. It is also called LAWN (Local
Area Wireless Network). WLAN is one in which a mobile user can connect to a Local
Area Network (LAN) through a wireless connection.
The IEEE 802.11 group of standards defines the technologies for wireless LANs. For path
sharing, 802.11 standard uses the Ethernet protocol and CSMA/CA (carrier sense
multiple access with collision avoidance). It also uses an encryption method i.e. wired
equivalent privacy algorithm.
Wireless LANs provide high speed data communication in small areas such as building
or an office. WLANs allow users to move around in a confined area while they are still
connected to the network.
In some instance wireless LAN technology is used to save costs and avoid laying cable,
while in other cases, it is the only option for providing high-speed internet access to the
public. Whatever the reason, wireless solutions are popping up everywhere.
Examples of WLANs that are available today are NCR's waveLAN and Motorola's ALTAIR.
WLAN architecture
.
Advantages of WLANs
Disadvantages of WLANs
o Quality of Services: Quality of wireless LAN is typically lower than wired networks. The
main reason for this is the lower bandwidth due to limitations is radio transmission,
higher error rates due to interference and higher delay/delay variation due to extensive
error correction and detection mechanisms.
o Proprietary Solutions: Due to slow standardization procedures, many companies have
come up with proprietary solutions offering standardization functionality plus many
enhanced features. Most components today adhere to the basic standards IEEE 802.11a
or 802.11b.
o Restrictions: Several govt. and non-govt. institutions world-wide regulate the operation
and restrict frequencies to minimize interference.
o Global operation: Wireless LAN products are sold in all countries so, national and
international frequency regulations have to be considered.
o Low Power: Devices communicating via a wireless LAN are typically power consuming,
also wireless devices running on battery power. Whereas the LAN design should take this
into account and implement special power saving modes and power management
functions.
o License free operation: LAN operators don't want to apply for a special license to be
able to use the product. The equipment must operate in a license free band, such as the
2.4 GHz ISM band.
o Robust transmission technology: If wireless LAN uses radio transmission, many other
electrical devices can interfere with them (such as vacuum cleaner, train engines, hair
dryers, etc.).Wireless LAN transceivers cannot be adjusted for perfect transmission is a
standard office or production environment.
Characteristics of MANET –
Dynamic Topologies:
Network topology which is typically multihop, may change randomly and
rapidly with time, it can form unidirectional or bi-directional links.
Bandwidth constrained, variable capacity links:
Wireless links usually have lower reliability, efficiency, stability, and capacity
as compared to a wired network
Autonomous Behavior:
Each node can act as a host and router, which shows its autonomous
behavior.
Energy Constrained Operation:
As some or all the nodes rely on batteries or other exhaustible means for
their energy. Mobile nodes are characterized by less memory, power, and
lightweight features.
Limited Security:
Wireless networks are more prone to security threats. A centralized firewall
is absent due to its distributed nature of the operation for security, routing,
and host configuration.
Less Human Intervention:
They require minimum human intervention to configure the network,
therefore they are dynamically autonomous in nature.
Pros and Cons of MANET –
Pros:
1. Separation from central network administration.
2. Each node can play both the roles ie. of router and host showing
autonomous nature.
3. Self-configuring and self-healing nodes do not require human
intervention.
Cons:
1. Resources are limited due to various constraints like noise, interference
conditions, etc.
2. Lack of authorization facilities.
3. More prone to attacks due to limited physical security.
GSM Services
GSM is the most successful digital mobile telecommunication system in the world today. It
is used in more than 190 countries. GSM permits the integration of different voice and data
services and the inter working with existing networks. Services make a network interesting
for customers. GSM has defined three different categories of services:
3. Supplementary Services
Supplementary services are provided on top of TeleServices or bearer services, and include
features such as caller identification, call forwarding, call waiting, multi-party conversation. A
brief description of supplementary services is given here:
GSM – Architecture
Introduction:
GSM is the short form of Global System for Mobile Communications. It is called
2G or Second Generation technology. There are various GSM standards such as
GSM900, EGSM900, GSM1800 and GSM 1900 which uses different frequency
bands for their operation. GSM uses TDMA/FDMA access technique. GSM 900
uses uplink frequency band from 890 to 915 MHz and downlink frequency band
from 935 to 960 MHz. It uses bandwidth of 200 KHz.
A GSM network comprises of many functional units. These functions and interfaces are
explained in this chapter. The GSM network can be broadly divided into −
The Mobile Station (MS)
The Base Station Subsystem (BSS)
The Network Switching Subsystem (NSS)
The Operation Support Subsystem (OSS)
The OSS is the functional entity from which the network operator monitors and controls
the system. The purpose of OSS is to offer the customer cost-effective support for
centralized, regional, and local operational and maintenance activities that are required
for a GSM network. An important function of OSS is to provide a network overview and
support the maintenance activities of different operation and maintenance
organizations.
Introduction:
GSM has an additional feature of worldwide localization of user’s .GSM System always
know where a user currently is, and the same phone number is valid worldwide.
Localization:
GSM performs periodic location updates even if a user does not use the mobile
station.
The HLR always contains information about the current location
The VLR currently responsible for the MS informs the HLR about location
changes.
As soon as an MS moves into the range of a new location area (new VLR) the
HLR sends all user data needed to the new VLR.
Changing VLRs with uninterrupted availability of all services is also called
roaming.
Following are some numbers which are needed to locate an MS and to address:
GSM Calling:-
GSM Handover
Types of GSM handover
Within the GSM system there are four types of handover that can be performed for GSM only systems:
Intra-BTS handover: This form of GSM handover occurs if it is required to change the frequency or
slot being used by a mobile because of interference, or other reasons. In this form of GSM handover, the
mobile remains attached to the same base station transceiver, but changes the channel or slot.
Inter-BTS Intra BSC handover: This for of GSM handover or GSM handoff occurs when the mobile
moves out of the coverage area of one BTS but into another controlled by the same BSC. In this instance
the BSC is able to perform the handover and it assigns a new channel and slot to the mobile, before
releasing the old BTS from communicating with the mobile.
Inter-BSC handover: When the mobile moves out of the range of cells controlled by one BSC, a
more involved form of handover has to be performed, handing over not only from one BTS to another but
one BSC to another. For this the handover is controlled by the MSC.
Inter-MSC handover: This form of handover occurs when changing between networks. The two
MSCs involved negotiate to control the handover.
Security in GSM
Introduction:
Different security services are provided by GSM for security issues. Confidential
information is stored in AuC and in the individual SIM. SIM Contains personal, secret
data and is protected with a PIN against unauthorized use.
Access control and authentication: To access the SIM user needs a secret PIN
(Personal Identification number). By this authentication of the user is done.
Confidentiality: After authentication, BTS and MS apply encryption to voice, data, and
signaling. This confidentiality exists only between MS and BTS, but it does not exist end-to-
end or within the whole fixed GSM/telephone network.
Anonymity: To provide user anonymity, all data is encrypted before transmission, and
user identifiers are not used over the air. Instead, GSM transmits a temporary identifier
(TMSI), which is newly assigned by the VLR after each location update. Additionally, the VLR
can change the TMSI at any time.
Three algorithms have been specified to provide security services in GSM.
Algorithm A3 is used for authentication, A5 for encryption, and A8 for the generation of
a cipher key.
Authentication:
Encryption:
After authentication, MS and BSS can start using encryption by applying the cipher key
Kc.
Kc is generated using the individual key Ki and a random value by applying the
algorithm A8.
The key Kc itself is not transmitted over the air interface. MS and BTS can now encrypt
and decrypt data using the algorithm A5 and the cipher key Kc. Figure 8.11 shows, Kc should
be a 64 bit key – which is not very strong, but is at least a good protection against simple
eavesdropping.
What is CDMA?
Synchronous CDMA
Asynchronous CDMA
Synchronous CDMA
Synchronous CDMA is defined as exploiting the mathematical properties
orthogonally between vectors representing the data strings. This digital
modulation method is analogous to the one used in simple radio transceivers.
Asynchronous CDMA
If mobile-to-base links are not exactly matched, particularly due to handsets
mobility, a different approach is required. This type of CDMA is not
mathematically possible to create signature sequences which are orthogonal
for arbitrarily random starting points, and thus make use of the code space.
Pseudo-random or pseudo-noise sequences are used in asynchronous CDMA
systems.
Level of Security: In order to receive the data, the receiver synchronizes the
code to recover the data. The use of an independent data and synchronous
reception allows multiple users to access the same frequency band at same
time.
Working of CDMA
Code Division Multiple Access is entirely a different approach from the Time
Division Multiple Access. CDMA, after digitizing the data, spreads out the date
over the entire available bandwidth. Multiple calls are overlapped to each
other on a channel which is assigned with a unique sequence code. CDMA is
a form of spread-spectrum technique, which means data can be sent in small
pieces over a number of frequencies available to use at any time in the
specified range.
CDMA Working
All the users’ data can be transmitted in a similar way to that of wide band
chunk of spectrum. Users Signals are spread over the entire bandwidth by a
unique spreading code. At the receiver end, the same code is used to recover
the signal. CDMA system requires accurate time stamp on each piece of a
signal. Eight and ten separate calls are carried out in the same channel space
as one analog call.
Frequency Hopping
Direct Sequence
Frequency Hopping
Direct Sequence
Direct sequence is the most famous spread spectrum technique in which the
data signal is multiplied by a Pseudo-random noise code. A PN code is a
sequence of chips which is given values as -1 and 1 (non polar) or 0 and 1
(polar). The number of chips within one code is known as the period of this
code. The digital data is directly coded at higher frequency, and the code is
generated pseudo randomly. A receiver knows how to generate the same
code and correlates the received signal with that code to extract the data.
The above figure shows that one channel is operated in one direction and the
signal transmission consists of the following steps:
Advantages
Increased user capacity is an advantage of the CDMA as it supports a lot
more users in comparison to TDMA or FDMA.
CDMA is more secure as the information transmitted is below the noise
floor making the intrusion of the spectrum difficult.
CDMA systems have comparatively fewer dropouts than GSM. Thus, it
can also be used in rural areas.
The cost of the calls in CDMA is lower in comparison to the cost in GSM.
CDMA provides a high quality of voice with almost no noise during the
calls.
Using CDMA problems like multipath and fading do not occur.
CDMA has a very low power requirement.
Disadvantages
CDMA lacks the facility of international roaming which is provided by
GSM.
Since there is no limit to the number of users the system performance
degrades with an increase in the number of users.
Self-jamming problem occurs in CDMA systems because of loss of
orthogonality.
The problem of channel pollution occurs in CDMA systems which thus
degrades the quality of audio.
Since most of the mobile companies use GSM thus there is a lack of
handsets for CDMA technology.
GPRS stands for General Packet Radio Service. It is a packet oriented wireless data
communication service for mobile communications on 2G and 3G cellular
communication systems. It is non-voice, high speed packet switching technology
intended for GSM networks.
It is based on a modulation technique called Gaussian minimum-shift keying (GMSK). To
enable GPRS on a GSM or TDMA network, we are required to add two core modules: the
Gateway GPRS Service Node (GGSN) and the Serving GPRS Service Node (SGSN).
Benefits of GPRS
o It provides higher data transfer speed than fixed telecommunication networks. Its
optimum speed is 171.2 kbps, almost three times quicker than fixed-telecommunication
speed.
o It provides instant connection and immediate data transfer.
o It is very cost-effective.
o It has innovative and superior applications. It provides internet applications over mobile
and also facilitates Web browsing, IM messages, E- commerce etc.
GPRS Architecture
The architecture that works as a network to allow the passage of data is called
GPRS Architecture. It has settings for packet data at a faster rate of 171 kbps.
Multiple users can enter the network and use the resources judiciously.
Involved from GPS, General Packet Radio Service provides packet service in 2G
or 3G mobile data services. Short packets are accessed in a short duration with
proper infrastructure, which provides the connection to GSM infrastructure.
When 2G is provided with data, additional entities are needed for the same.
They are GGSN and SGSN. Additional provisions are given to the architecture
to improve itself.
database called GPRS register which is located with HLR. It stores routing
informations and maps the IMSI to a PDN address. Thus, GPRS Reference
Mobility Support:
In a manner similar to GSM and CDPD, there are mechanism in
GPRS to support mobility. There are two types of Mobility Support in
GPRS Network-
Attachment Procedure
Location and Handoff Management
Short Messaging Services in GSM:
For the proliferation of GSM enable the introduction of SMS, which is
similar to peer-to-peer instant messaging on the Internet. Users of
SMS can exchange alphanumeric message of up to 160 char. with in
seconds of submission of the message.
1. Data access time is concise in the architecture so that the data under
any network or under any system can be accessed and used faster. This
makes the network manage the data well under the system with proper
2. All the resources are utilized to the maximum in the network, so that
stay always connected in the system. With the high transfer rate and
6. Availability and accessibility of the GPRS network over all the systems