You are on page 1of 31
Introduction _5 the cost of installing. LAN cabling and ease the task of relocation or otherwise modifying the network’s structure, When Wireless LAN (WLAN) was first introduced in the market, the cost per node was higher than the cost of its counterpartim the wired domain, However, as time progressed, the cost per node started dropping, making wireless LAN quite-attfactive. Slowly WLAN started becoming popular and many compar offering products. The question of interoperability between different wireless LAN products became critical. IEEE Standards committee took the responsibility to form the standard for WLAN, As a result the IEEE 802.11 series of standards emerged. N uses the unlicensed Industrial, Scientific, and Medical (ISM) band that different products catetise as long as they comply with certain regulatory gulgs. THESE TMes cover characteristics such as radiated power and the manner in which modulation occurs. The ISM bands specified by the ITU-R are: 6.795 MHz, 13.553-13,567 MHz, 2 MHz, 40.66-40.70 MHz, 433.05-434.79 MHz, 902-928 MHz, 2.400-2.500 GHz, 875 GHz, 24.00-24.25 GHz, 61.00-61.5 GHz, 122-123 GHz, 244-246 GHz. WLAN uses 2.4 GHz and 5.8 GHz ISM bands. WLAN works both in infrastructure mode and ad hoc mode. WLAN is also known as Wireless Fidelity or WiFiin short. There are many products which use these unlicensed bands along with WLAN; examples could be cordless telephone, microwave oven, etc. Evolution of Wireless PAN ireless technology offers convenience and flexibility. Some people will call-this freedom from being entangled with the wire. The success of Wireless technology in cellular telephonés or Wireless MAN (Metropolitan Area Network) made péople think of using the technique in Wireless LAN and_Wireless Personal Area Network (WPAN). Techniques for WPANs are (tnfraretand d radio. waves. Most of the laptop computers support communication through infrare: ¢ Siren Fave'been formulated by IrDA (Infrared Data Association—www.irda.org). Through WPAN, a PC can communicate with another IrDA device like another PC or a Personal, Digital Assistant (PDA) or a Cellular phone. siete al The other best known PAN technology standard is Bluetooth. Bluetooth uses radio instead of infrared. It offers a peak over the air speed of about 2.1 Mbps over a short range of about 100 ineters (power dependent). The advantage of radio wat is-thatunlike infrared it does not need a line of sight. WPAN works in ad hoc mode only. <3 MosiLE COMPUTING Mobile computing can be defined as d1@6i pu will be able to mobile computing environment rom any device in any networ! = Ad here using a computing device Mphysicallmabiliqyeyhe user of a cess data, inform: other logical BBjects while op the mave; A mobile computing system allows a user to ithe public (the Web), corporate (business pea Fe 7 | f ‘este PSS tes) Lynx B Javascript , Lotus Domino = Soe: : mail and oe documents WAP 2 SP | [Rover Pike Browser pare Cade reo Gongs 8 ss - BEEP tee Equipments JeME : HS cate, Legacy sand ~ | Applications Internet Active MS Exchande] | gear ane] Qe i, Information | | Server : ‘Appliances oa Server Pages __ | [MS Commerce Server] [com ule Tan = Figure 2.2 The Mobile Computing Architecture | clovie lhandl tn 4 eet This is th er. This is the layer ol ations and systems, These ay nd Offer his tier is responsible ‘or Bresenting| the’ "Thejendins SS generally" use-visual and audio means to = ubiquitous = oe eves heed or aceyel| Y ‘ 7 sranoloring - Ayonmplabion (/ 34 Mobile Computing 7 audio Lvideo device’ fa z ile'nh oy Oy duerd Lyn CO. , tions like vibrator in mobile p| jones). Huma e receive information from machines Mia some excep! Ebr Pep Ato@ REE Se ie my ae ee Sra ahaa min the ease af the visual, the Presentation g my le to feed the data to the system. wo ti ) informa e Te eee ascreen. T) e. the visual presentation will relate to rendering 7 | a screen ‘Presentation Tie? icnlecy ai) like Mozilla, Ly % Jnternet Explore and c Netscape'Navigator), WAP browsers and €ustomizéd client programs) }A mobile computing agen, needs to be context-aware and device independent jin Lisghe bee a eee in general, the age it software in the client device is an Interne I Se the agent software is an applet running on a browser or a virtual niachine (Java Veal Machine, for example). The functions performed by these agent systems can range from relatively simple tas like accessing some other application through HTTP API, to sophisticated applications like real time sales and inventory management across multiple vendors. Some of these agents work as weh scrapers. In a web scraper, the agent embeds functionality of the HTTP browser and functions lie an automated web browser. The scraper picks up part of, the data from the web page and filters of the remaining data according to some predefined template. These applications can be in Business ‘to Business (BZB) space, Business to Consumer (B2C) space or Business to Employee (B2E) space, of machine to machine (M2M) space. Applications can range from e-commerce, workflow, supply chain management to legacy applications. There are agent software in the Internet that access the remote service through telnet interface, There are different flavors of telnet agents in use. These are standard telnet for UNIX servers, TN3270 for IBM OS/390; TN5250 for IBM AS/400 or VT3K for HP3000, For some applications, we may need an agent with embedded telnet Protocol. This will work like an automated telnet agent (virtual terminal) similar to a web scraper. These types of user agents or programs work as -M2M interface or software robots. ‘These kinds of agents are use applications mobile, Also, such sys servers within the OSS ( ed quite frequently to make legacy ems are used in the telecommunication world as mediation por (Operation and Support Subsystem), 2.8.2 Application (Tier-2) Bunun logic of a ubiquitous application, It performs the Deprocessing user input, Obtainmg data and'making decisions. Incertain cases, Berw 5 ir ae ao For appropriate 1 data for appropriate rendering in the Presentation Tier The pplication Tier may include tec mology like CGls Java, J “Services, PHPlor ColdFusion, Gael in products likeYApache, WebS Pentre here, WebLogic! iPlanet, Pramsu. 1 TEND. <> The application tier isfpresent ion)and{ dab - gic} iPlanet, Pramati, JBOSS or ina mobile comput reps ting eiivironment, it-addition to the busine: additional dj SS, bee there are quite a fev ditional pm aa functions that Peed to be performed. Thesd functions relaté to decision’ on eerie He BEET REGUL datastore access, etc. Most of these fuvotions implemented using fferentmid . Aimiddleware framework ig defing "softifaile, which sits'in the middle between IN geSVTEAT a Seen timulated by the growth of netw between a -based applications and systing, . rk-ba stems, are gaining increasing importan sentiic Com 2 middleware framework sits betwe: inl a vers a Wide range vets AWE cts and components, Thessage-oriented nor gmehaees 7 Mobile Computing Architecture 35 communication, database connectors, mobile application support, transaction drivers, etc. ‘Middleware can also be considered as a software gateway connecting two independent open objects. Itis very difficult to define how many types of middleware are there. A very good description of * middleware is available in Carnegie Mellon University Software Engineering Institute (http:// wwwsei.cmu.edu/str/descriptions/middleware.html), which readers can refer to. @into the following major categories, Ao (58% We can group 1. Message-oriented Middleware 2. Transaction Processinig Middleware. 8 3. Database Middleware. Ne 4. Communication Middleware. 5. Distributed Object and Components. at Per mone ranscoding Middleware. +1905 — Application of Mobile Computing a mahendragohil.gohil@gmail.com 2 years ago The importance of Mobile Communication has been highlighted in many fields. Some of which a few are described below: 1. Business: o Managers can use mobile computers say, critical presentations to major customers. They can access the latest market share information. To enable the company to keep track of all activities of their travelling employees, to keep databases consistent etc. With wireless access, the laptop can be turned into a true mobile office, but efficient and powerful synchronization mechanisms are needed to ensure data consistency. 2. Infotainment: o Now a days there is a huge market of Entertainment for humans while they are on move. Watching movies, listening music and playing a game is become a part of life for entertainment. In this case mobile computing performs a major role to provide uninterrupted internet connection to digital devices. 3. Replacement of Wired Networks: o wireless networks can also be used to replace wired networks. e.g., remote sensors, for tradeshows, or in historic buildings. Due to economic reasons, it is often impossible to wire remote sensors for weather forecasts, earthquake detection, or to provide environmental information. 4. Credit Card Verification e At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for transactions, the intercommunication required between the bank central computer and the POS terminal, in order to effect verification of the card usage, can take place quickly and securely over cellular channels using a mobile computer unit. This can speed up the transaction process and relieve congestion at the POS terminals. 5. Emergencies: o An ambulance with a high-quality wireless connection to a hospital can carry Vital information about injured persons to the hospital from the scene of the accident. All the necessary steps for this particular type of accident can be prepared and specialists can be consulted for an early diagnosis. 6. Tourism: ° Tourism is the largest industry for all the countries. Mostly tourism places are at remote location from the developed cities. In this case wireless communication performs a vital role in connectivity for people who are enjoying their tour. They are continuously in contact with the family and friends and searching for travel services, hotel services food services etc. 7, E-Governance: o Governments are using many communication services to update their rural areas. To provide health, education, safety , farming , weather forecast and many other related information to governance, governments are connecting rural areas with head quarter offices for monitoring. 8. Education: o 2020 COVID Pandemic teach us a great lesson to provide distance education to all who can not reach to the college or schools. Wireless communication and digital devices are the backbone for such distance learning concept. Now all private and public industries are moving towards the online education with help of good wireless connectivity. 9. Manage Personal Records : o Some mobile applications allows user to manage their personal records such as day to day activities, some useful notes, etc... 10. Social Media and Group Message : ° Some mobile applications allows user to keep in touch with their friends and relatives by sending messages, images, audio and video clips. 11. Transaction : © Some mobile applications allow the facility of transaction such as recharge mobile, pay bills etc... In today’s techno-crazy world almost all the peoples required mobile computing services in one or another way. There are lots of applications, and services available in the world of mobile computing. Following are the application of Mobile Computing: These are the just few examples of wireless communication. So many new areas are growing towards the internet facility to break the wall and put them to the space of world. Communication Technologies - Mobile Ad closed by Google © Previous Page Next Page © Since the introduction of first commercial mobile phone in 1983 by Motorola, mobile technology has come a long way. Be it technology, protocols, services offered or speed, the changes in mobile telephony have been recorded as generation of mobile communication. Here we will discuss the basic features of these generations that differentiate it from the previous generations. 1G Technology 1G refers to the first generation of wireless mobile communication where analog signals were used to transmit data. It was introduced in the US in early 1980s and designed exclusively for voice communication. Some characteristics of 1G communication are - = Speeds up to 2.4 kbps 4 Poor voice quality 1 Large phones with limited battery life = No data security 2G Technology 2G refers to the second generation of mobile telephony which used digital signals for the first time. It was launched in Finland in 1991 and used GSM technology. Some prominent characteristics of 2G communication are - ) Data speeds up to 64 kbps = Text and multimedia messaging possible 2 Better quality than 1G When GPRS technology was introduced, it enabled web browsing, e-mail services and _ fast upload/download speeds. 2G with GPRS is also referred as 2.5G, a step short of next mobile generation. 3G Technology Third generation (3G) of mobile telephony began with the start of the new millennium and offered major advancement over previous generations. Some of the characteristics of this generation are - = Data speeds of 144 kbps to 2 Mbps » High speed web browsing = Running web based applications like video conferencing, multimedia e-mails, etc. 4 Fast and easy transfer of audio and video files * 3D gaming Every coin has two sides. Here are some downsides of 3G technology - » Expensive mobile phones = High infrastructure costs like licensing fees and mobile towers = Trained personnel required for infrastructure set up The intermediate generation, 3.5G grouped together dissimilar mobile telephony and data technologies and paved way for the next generation of mobile communication. AG Technology Keeping up the trend of a new mobile generation every decade, fourth generation (4G) of mobile communication was introduced in 2011. Its major characteristics are - = Speeds of 100 Mbps to 1 Gbps = Mobile web access 3 High definition mobile TV 1 Cloud computing 3 IP telephony compunvanes sey we seypes wis crvcuyime opreduspeLU uit! 9yStEH Uae HauuteR : nications for the US during the Cuban Missile Crisis in 1962. It was in the early ‘asthat the term, “spread-spectrum " began to be used. Today it refers to digital communications ide frequency spreading factor (much wider than typical voice telephone sat use @ Wi sssmunications), and are not dependent on a particular type of tonality (such as a human voice) je wansmitting waveform. inthe mid-1980s, the US military declassified Spread-Spectrum technology. Immediately, the camercal sector began to develop it for consumer electronics. Qualcomm was the first to use this echnology for commercial deployment of CDMA. 3G has been in gestation since 1992, when the emational Telecommunications Union (ITU) began work on a standard called IMT-2000. IMT ez for International Mobile Telecommunications; the number 2000 initially had three meanings: sever that services should become available (year 2000), the frequency range in MHz that would teused (2000 MHz or 2 GHz), and the data rate in Kbits/sec (2000 Kbps or 2 Mbps). digital ce COUT Ja SpREAD-SPECTRUM TECHNOLOGY and then ‘caconventional transmission system, théinformation ismodulatediwith a "asnitted through a medium.{When transinitied, allithe pow e signal is transmitted centered ‘ound a particular frequency. This frequency represents a specific channel and generally has a ‘ey narow band. In spread-spectrum we spread the transmission power over the complete band a iPMigure 9.1. -—— - " ‘pread-spectrum the’ mn sign (IS mUCH higher than the information Feb, There Sways to cause a carrier d: however, all spread-spectrum se data to be transmitted is 4 im, ac ; : METScan be viewed as two steps modulation processe¢ First, the da ae the spreading code, cau ‘ Sema —_ ° h eae Sandwidth. Different spreading techniqu : * DirerSeq, ~ trum is typically used to ins ee pom de ats ee ie digital information stream with & ke Common mo in DS systems is — 220 Mobile Computing Noise Level Power Spectral Density (PSD) | Frequency | Figure 9.1 Narrow Band and Spread Spectrum | + Frequency Hopping (FH): Frequency hopping is a form of spreading in which the cent frequency of a conventional carrier is altered many times within a Fixed time period (like one sécond) in accordance with a pseudo-random list of channels. = * Chirp: The third spreading method employs a carrier that is swept over a range of frequen This method is called chirp spread spectrum and finds its primary application in rangins radar systems, signal, + Time Hopping: The last spreading method is called time hopping, In a timehopped “" the carrier is on-off duty eyed by the pseudo-noise (PN) sequence resulting in a very I" cycle. The speed of keying determines thé'amount of signal spreading. adspeouu™ + Hybrid System: A hybrid system combines the best points of two or more spread Fi 3 systems. The performance of a hybrid system is usually better than can be obi single spread-spectrum technique for the same cost. The most common hybri both frequency-hopping and direct-sequence techniques. ding te Amateurs and business community are currently authorized to use only {WO SPF 0G sp These are frequency hopping and direct sequence techniques. Rest of the SP! Samson are classified and used by military and space sciences. in chi’ ctr Classification of MAC protocols MAC protocol is the first protocol layer above the Physical Layer in ad hoc .The primary task of any MAC protocol is to control the access of the nodes to shared medium. Classification of MAC protocols : These are as following below. 1. Contention-based protocols without reservation/scheduling — o Bandwidth are not reserved. o No guarantees. nN . Contention-based protocols with reservation mechanisms — e Bandwidth is reserved for transmission. o Guarantees can be given. wo . Contention-based protocols with scheduling mechanisms — © Distributed scheduling is done between nodes. o Guarantees can be given. 4. Other protocols — e Combine multiple features of other protocols. e It can also use a completely new approach. ‘Connection Based | Reservation ‘Scheduling Other ! sender initiated receiver initiated] l l synchronous asynchronous cna tenn rnuliple channel 1. Contention-based protocols without reservation/scheduling — ¢ Sender-initiated protocols: The transmission of packets are initiated by the sender node. o Single-channel sender initiated. For example, MACAW, FAMA. o Multiple-channel sender initiated protocols. For example, BTMA, DBTMA, ICSMA. ¢ Receiver-initiated protocols: The connection is initiated by the receiver node. For example, RI-BTMA, MACA-BI, MARCH. 2. Contention-based protocols with reservation mechanisms — ¢ Synchronous protocols: All node are kept synchronized. For example, D-PRMA, CATA, HRMA, SRMA/PA, FPRP. Asynchronous protocols: Relative time information is used to achieve effecting reservations. For example, MACA/PR, RTMAC.. Contention -based protocols with scheduling mechanisms — All the nodes are treated equally and no node is get deprived of bandwidth. For example, Eg. DPS, DWOP, DLPS. Other protocols — These MAC protocols do not strictly fall into any above category. For example, MMAC, MCSMA, PCM, RBAR. Frequency Division Multiple Access (FDMA) FDMA is the basic technology for advanced mobile phone services. The features of FDMA are as follows. o oO o FDMA allots a different sub-band of frequency to each different user to access the network. If FDMA is not in use, the channel is left idle instead of allotting to the other users. FDMA is implemented in Narrowband systems and it is less complex than TDMA. Tight filtering is done here to reduce adjacent channel interference. The base station BS and mobile station MS, transmit and receive simultaneously and continuously in FDMA. Time Division Multiple Access (TDMA) In the cases where continuous transmission is not required, there TDMA is used instead of FDMA. The features of TDMA include the following. 2 TDMA shares a single carrier frequency with several users where each users makes use of non-overlapping time slots. | Data transmission in TDMA is not continuous, but occurs in bursts. Hence handsoff process is simpler. TDMA uses different time slots for transmission and reception thus duplexers are not required. TDMA has an advantage that is possible to allocate different numbers of time slots per frame to different users. Bandwidth can be supplied on demand to different users by concatenating or reassigning time slot based on priority. o Code Division Multiple Access (CDMA) Code division multiple access technique is an example of multiple access where several transmitters use a single channel to send information simultaneously. Its features are as follows. In CDMA every user uses the full available spectrum instead of getting allotted by separate frequency. CDMA is much recommended for voice and data communications. While multiple codes occupy the same channel in CDMA, the users having same code can communicate with each other. CDMA offers more air-space capacity than TDMA. The hands-off between base stations is very well handled by CDMA. Space Division Multiple Access (SDMA) Space division multiple access or spatial division multiple access is a technique which is MIMO (multiple-input multiple-output) architecture and used mostly in wireless and __ satellite communication. It has the following features. All users can communicate at the same time using the same channel. SDMA is completely free from interference. o A single satellite can communicate with more satellites receivers of the same frequency. The directional spot-beam antennas are used and hence the base station in SDMA, can track a moving user. ! Controls the radiated energy for each user in space. 238 Mobile Computing frame. A large packet may sp, hi relationship between PPP packet and the raf ~qaffic channel frames. A single traffic channe™ 1 uit mes may be trans] as traf — 9.5.1 Short Message Service : i i i ize of a SMS in 18-95 ; in IS-95 is similar to SMS in GSM. Unlike GSM, the maximum size o 118-955 pp features as in GSM. Like in GSM, the SMS in 1 the signaling channel for data tang, SMS administration features include storage, } n of receipt and aus eng capabilities. is Mo THIRD GENERATION NeTWworRKS ( 2 Gi) The telecommunications world is changing due to trends in media convergence and industy consolidation. The perception of mobile phone has changed significantly over thé last few years. ~ More changes predicted for the future are: : * The mobile devices will be used as an_integral part of our lives. * Data (“non-voice”) usage of 3G will become important and: different from the traditional Voice business. Rs * A great deal of conver; technology. ae * The look of the phone will be as important as its usage. . Mobile communications will be similar in its social positioning. People will have only amobile evice, Lio address these challenges and opportunities, Y Span mut me may contain multiple PPP pace ad data burst message, Rip ill take place between information and communication % the mobile telecommunication technology needs to adapt new techniques, facilities and services, The 3G system will offer a plethora of telecommunication’services including voi, ge il ig Voice, multimedia, vi i th 3G mobile Internet technology significant c ges will be cans ia, video and high speed data. Wit i ‘e le. , Ymemet technol ight about in the day-to-day life of the peop | dima2d00 ag ot, *PPFoach for the third generation networks and systems. In ae ; ¢dma2000 standards are being driven by TH ). It uses the CDMA air interface, which is base ard uses (Wideband Code Division Multiple Act® standard is bein Japan 3G stand: version. This s WCDMA (DoCoMo) and many parts of the a driven by ARIB, In Europe, Asia, Aust” ee Id 3G has b 6 y in Pe Ais being driven by ETSI. and ig wena Pee accepted as UMTS ond WCDMA. UMTS/WOD! The main 3 ers {yand is the normal evel i MTS (Uc lution from GSM/GPR: any (Universal Mobile lecommunications System) is to offer 8™0 Universal Roaming: Any OL Vices to the Weis ee + Higher Bit Rate: Nove anal Will be able to move across the world and access the net" would open the path toward multimedia applications: wok ‘ : * Mobile-Pixed Convergence: There is a need to offer users cross-domain servic ples the tracking of a user’s location in the mobile, fixed and Internet domain and sata aly adapting the content of his incoming messages to SMS; voice message, fax or ema (Virtual Home Environment) is the enabler to this service portability across networks and terminals in different domains. es. An example is * Fesibe Serice Architecture: By standardizing not the services themselves ut the bung blocks that make up servi s from GSM and UMTS shortens the time for marketing servic enhances creativity flexibility when inventing new services. L9cF peruicanions On 3G Dee : a nae can works in multiple ways. They can run in a tunneli node, In tunneling mode the device works more as pass through d ing mode or in an application levice or.amodem. In this ~ 244 Mobile Computing mode, the mobile phone is connected to another device like a laptop and functions as media interface. The intelligence of the phone is not used, only the Communication interae ge phone is used. e ication mode, applications run on the phone itself. A 3G mobile eM, WAE on ae EXE classmark 3). A MEXE classmark 3 mobile device wil have execution environment that will allow application development for the client device, This applicat platform canbe Java (Uhrough JavaPhone, Personaljava or JZME, Java virtual machine coe (through Symbian, Brew or PalmOS) or Visual Basic (through Windows CE). MExE classmark 3 devices will offer API to access device resource. These dev be SMS, messaging, diary, address book, etc. In future, network related inform: available to the MExE environment through API (Application Programming I (Wireless Telephony Application Interface) can also be used in a WAP environ: phone will gy ice resources wil ation will also be Interfaces). Wray Ment to access the telephone resource. :— In 8G, there will be different types of client applications:These are: 1. Local SS 2. Occasionally connected ? 3. Online 4. Real-time.

You might also like