You are on page 1of 18

mobile computing

UNIT—1

2. Introduction to Mobile Computing.

Mobile Computing is a technology that allows us to transmit data, audio, and video via

devices that are not connected with any physical link. The key features of mobile

computing are that the computing devices are portable and connected over a network.

In other words, you can say that mobile computing allows transmission of data,
voice and video via a computer or any other wireless-enabled device without being
connected to a fixed physical link. In this technology, data transmission is done wirelessly
with the help of wireless devices such as mobiles, laptops etc.
This is only because of Mobile Computing technology that you can access and transmit data
from any remote locations without being present there physically. It is one of the fastest and
most reliable sectors of the computing technology field.
The concept of Mobile Computing can be divided into three parts:

Mobile Hardware
Mobile hardware consists of mobile devices or device components that can be
used to receive or access the service of mobility. Examples of mobile hardware
can be smartphones, laptops, portable PCs, tablet PCs, Personal Digital Assistants,
etc.
These devices are inbuilt with a receptor medium that can send and receive
signals. These devices are capable of operating in full-duplex. It means they can
send and receive signals at the same time. They don't have to wait until one
device has finished communicating for the other device to initiate
communications.
Mobile Software
Mobile software is a program that runs on mobile hardware. This is designed to deal capably
with the characteristics and requirements of mobile applications. This is the operating
system for the appliance of mobile devices. In other words, you can say it the heart of the
mobile systems. This is an essential component that operates the mobile device.

Applications of Mobile Computing.


Mobile computing is the use of portable devices that can access data and services over
wireless networks. Some applications of mobile computing are:

Web or Internet access: This allows users to browse the web, check e-mails, stream
videos, and download files from anywhere with a wireless connection.

Global Position System (GPS): This enables users to locate their position, navigate
routes, and find nearby places of interest using satellite signals and maps.

Emergency services: This allows users to contact emergency responders, such as


police, fire, and ambulance, and provide them with their location and situation using voice
or text messages.

Entertainment services: This enables users to enjoy various forms of entertainment,


such as games, music, movies, and podcasts, on their mobile devices.
Educational services: This allows users to access online courses, lectures, quizzes, and
other learning materials on their mobile devices.

3. Compare the SDMA, TDMA, FDMA, and CDMA exposed.

Difference Between SDMA , TDMA , FDMA and CDMA in Tabular form.


SDMA : Space-division multiple access
TDMA : Time-division multiple access
FDMA : Frequency-division multiple access
CDMA : Code-division multiple access

Approach SDMA TDMA FDMA CDMA

Idea Segment Segments Segment the Spread the


spaced into sending time frequency band spectrum using
cells or sectors. into disjoint into disjoint orthogonal
time slots subbands codes.
demand driven
or fixed
patterns.

Terminals Only one All terminals Every terminal All terminals


terminal can be are active for has its own can be active at
active in one short periods of frequency the same place
cell or one time on same uninterrupted at the same
sector. frequency. moment
uninterrupted.

Signal Cell structure, Synchronizatio Filtering in the Code plus


separation directed n in time frequency special
antennas domain domain. receivers.

Transmission Continuous Discontinuous Continuous Continuous


scheme

Cell capacity Depends on cell Limited Limited No absolute


area limit on
channel
capacity but it
is an
interference
limited system

Advantages Very simple, Established Simple, Flexible, less


increases fully digital, established, frequency
capacity per flexible robust planning
needed, soft
handover

Disadvantages Inflexible, Guard space Inflexible, Complex


antennas needed frequencies are receivers,
typically fixed (multipath scarce resource needs more
propagation), complicated
synchronization power control
difficult for senders

Comment Only in Standards in Typically Still faces some


combination fixed networks, combined with problems,
with TDMA, together with TDMA and higher
FDMA or CDMA FDMA or SDMA SDMA complexity,
useful used in many lowered
mobile expectations,
networks will be
integrated with
TDMA or FDMA

UNIT -- 2
1. Which type of services does GSM offer.
GSM supports a wide range of features, including call forwarding, call waiting, voicemail,
conference calling, and more.
• Conferencing − It allows a mobile subscriber to establish a multiparty conversation, i.e.,
a simultaneous conversation between three or more subscribers to setup a conference call.
This service is only applicable to normal telephony.
• Call Waiting − This service notifies a mobile subscriber of an incoming call during a
conversation. The subscriber can answer, reject, or ignore the incoming call.
• Call Hold − This service allows a subscriber to put an incoming call on hold and resume
after a while. The call hold service is applicable to normal telephony.
• Call Forwarding − Call Forwarding is used to divert calls from the original recipient to
another number. It is normally set up by the subscriber himself. It can be used by the
subscriber to divert calls from the Mobile Station when the subscriber is not available, and
so to ensure that calls are not lost.
• Call Barring − Call Barring is useful to restrict certain types of outgoing calls such as
ISD or stop incoming calls from undesired numbers. Call barring is a flexible service that
enables the subscriber to conditionally bar calls.
• Number Identification -- There are following supplementary services related to number
identification −
➢ Calling Line Identification Presentation
➢ Calling Line Identification Restriction

• Closed User Groups (CUGs) − This service is meant for groups of subscribers who wish
to call only each other and no one else.
• Unstructured supplementary services data (USSD) − This allows operator-defined
individual services.

4. Describe UMTS with its system architecture.


UMTS or Universal Mobile Telecommunications Framework, is the 3G successor to the
GSM family of measures counting GPRS and EDGE. 3G UMTS employements a completely
diverse radio interface based around the utilize of Coordinate Grouping Spread Range as CDMA
or Code Division Multiple Access. Although 3G UMTS employements a completely distinctive
radio get to standard, the center arrange is the same as that utilized for GPRS and EDGE to carry
partitioned circuit exchanged voice and bundle data.
UMTS employements a wideband adaptation of CDMA possessing a 5 MHz wide channel.
Being more extensive than its competition CDMA2000 which as it was utilized a 1.25MHz
channel, the tweak conspire was known as wideband CDMA or WCDMA/W-CDMA.

UMTS Applications
• Streaming / Download (Video, Audio)
• Videoconferences.
• Fast Internet / Intranet.
• Mobile E-Commerce (M-Commerce)
• Remote Login
• Background Class applications
• Multimedia-Messaging, E-Mail
• FTP Access
• Mobile Entertainment (Games)
Features of UMTS
• UMTS could be a component of IMT-2000 standard of the Universal
Broadcast communications Union (ITU), created by 3GPP.
• It employments wideband code division multiple access (W-CDMA) discuss
interface.
• It gives transmission of content, digitized voice, video and multimedia.
• It gives tall transmission capacity to portable operators.
• It gives a tall information rate of 2Mbps.
• For High-Speed Downlink Parcel Get to (HSDPA) handsets, the data-rate is
as tall as 7.2 Mbps within the downlink connection.
• It is additionally known as Flexibility of Mobile Multimedia Access (FOMA).

Advantages of UMTS
• UMTS could be a successor to 2G based GSM advances counting GPRS and
EDGE . Gaining a 3rd title 3GSM since it could be a 3G relocation for GSM
• Support 2Mbit/s information rates.
• Higher Information rates at lower incremental costs.

Disadvantages of UMTS
• It is more expensive than GSM.
• Universal Mobile Telecommunication System has poor video experience.
• Universal Mobile Telecommunication System still not broadband.

1. Generations of Mobile Communication Technologies.

Each generation of network brought with it a significant milestone in the development of


mobile communications.

Here is an outline of the 5 generations of mobile networks:

First Generation (1G)


First generation mobile networks were reliant upon analogue radio systems, which meant that
users could only make phone calls, they could not send or receive text messages. The 1G
network was first introduced in Japan in 1979 before it was rolled out in other countries such as
the USA in 1980. In order to make it work, cell towers were built around the country, which
meant that signal coverage could be obtained from greater distances. However, the network
was unreliable and had some security issues. For instance, cell coverage would often drop, it
would experience interference by other radio signals and due to a lack of encryption, it could
easily be hacked. This means that with a few tools, conversations could be heard and recorded.

Second Generation (2G)


The 1G network was not perfect, but it remained until remained until 1991 when it was
replaced with 2G. This new mobile network ran on digital signal, not analogue, which vastly
improved its security but also its capacity. On 2G, users could send SMS and MMS messages
(although slowly and often without success) and when GPRS was introduced in 1997, users
could receive and send emails on the move.

Third Generation (3G)


Third generation mobile networks are still in use today, but normally when the superior 4G
signal fails. 3G revolutionized mobile connectivity and the capabilities of cell phones. In
comparison to 2G, 3G was much faster and could transmit greater amounts of data. This means
that users could video call, share files, surf the internet, watch TV online and play online games
on their mobiles for the first time. Under 3G, cell phones where no longer just about calling and
texting, they were the hub of social connectivity.

Fourth Generation (4G)


The introduction of 4G went one-step further than the revolutionary 3G. It is five times faster
than the 3G network – and can in theory provide speeds of up to 100Mbps. All mobile models
released from 2013 onwards should support this network, which can offer connectivity for
tablets and laptops as well as smartphones. Under 4G, users can experience better latency (less
buffering), higher voice quality, easy access to instant messaging services and social media,
quality streaming and make faster downloads.

Fifth Generation (5G)


The network has arrived and has been largely welcomed by the mobile industry. The network
has changed more than just our mobile use, and affects how we connect our devices to the
internet. The improved speed and the massive network capacity has developed new IoT trends,
such as smart cities, ehealthcare, IoT in the home or office and connected cars.

5G can theoretically have download speed 20x faster than 4G, as well as boasting a very low
latency in comparison to its predecessor. This means that time-delay for online gaming, video
calls, and critical mission applications will be significantly lower.
With almost a decade of 5G development left, the technology’s full potential is yet to come.
The 5G network will revolutionize the way people live and work across the world, so expect to
see exciting changes in the coming years.

4. Write introduction to mobile computing and discuss about applications of mobile


computing in brief.

1. Introduction to Mobile Computing.


Mobile Computing is a technology that allows us to transmit data, audio, and video via
devices that are not connected with any physical link. The key features of mobile
computing are that the computing devices are portable and connected over a network.

In other words, you can say that mobile computing allows transmission of data,
voice and video via a computer or any other wireless-enabled device without being
connected to a fixed physical link. In this technology, data transmission is done wirelessly
with the help of wireless devices such as mobiles, laptops etc.
This is only because of Mobile Computing technology that you can access and transmit data
from any remote locations without being present there physically. It is one of the fastest and
most reliable sectors of the computing technology field.
The concept of Mobile Computing can be divided into three parts:

Mobile Hardware
Mobile hardware consists of mobile devices or device components that can be
used to receive or access the service of mobility. Examples of mobile hardware
can be smartphones, laptops, portable PCs, tablet PCs, Personal Digital Assistants,
etc.
These devices are inbuilt with a receptor medium that can send and receive
signals. These devices are capable of operating in full-duplex. It means they can
send and receive signals at the same time. They don't have to wait until one
device has finished communicating for the other device to initiate
communications.
Mobile Software
Mobile software is a program that runs on mobile hardware. This is designed to deal capably
with the characteristics and requirements of mobile applications. This is the operating
system for the appliance of mobile devices. In other words, you can say it the heart of the
mobile systems. This is an essential component that operates the mobile device.

2. Applications of Mobile Computing.


Mobile computing is the use of portable devices that can access data and services over
wireless networks. Some applications of mobile computing are:

Web or Internet access: This allows users to browse the web, check e-mails, stream
videos, and download files from anywhere with a wireless connection.

Global Position System (GPS): This enables users to locate their position, navigate
routes, and find nearby places of interest using satellite signals and maps.

Emergency services: This allows users to contact emergency responders, such as


police, fire, and ambulance, and provide them with their location and situation using voice
or text messages.

Entertainment services: This enables users to enjoy various forms of entertainment,


such as games, music, movies, and podcasts, on their mobile devices.
Educational services: This allows users to access online courses, lectures, quizzes, and
other learning materials on their mobile devices.

UNIT - 4

2. What is Mobile IP? write name the requirement for a mobile IP.
Mobile IP is a communication protocol (created by extending Internet Protocol, IP)
that allows the users to move from one network to another with the same IP
address. It ensures that the communication will continue without the user’s
sessions or connections being dropped.

Component:
1. Mobile Node (MN): The mobile node is an end system or device such as a cell
phone, PDA (Personal Digital assistant), or laptop whose software enables
network roaming capabilities.
2. Home Network is a network to which the mobile node originally belongs as
per its assigned IP address (home address).
3. Home Agent (HA) is a router in-home network to which the mobile node was
originally connected
4. Home Address is the permanent IP address assigned to the mobile node
(within its home network).
5. Foreign Network is the current network to which the mobile node is visiting
(away from its home network).
6. Foreign Agent (FA) is a router in a foreign network to which the mobile node
is currently connected. The packets from the home agent are sent to the
foreign agent which delivers them to the mobile node.
7. Correspondent Node (CN) is a device on the internet communicating to the
mobile node.
8. Care-of Address (COA) is the temporary address used by a mobile node
while it is moving away from its home network.
9. Foreign agent COA, the COA could be located at the FA, i.e., the COA is an
IP address of the FA. The FA is the tunnel end-point and forwards packets to
the MN. Many MN using the FA can share this COA as a common COA.
10. Co-located COA, the COA is co-located if the MN temporarily acquired an
additional IP address which acts as COA. This address is now topologically
correct, and the tunnel endpoint is at the MN. Co-located addresses can be
acquired using services such as DHCP.

requirements of mobile IP:


The key requirements for Mobile IP include:
• Unique Identifier (ID): Each mobile device must have a unique identifier, often
referred to as a home address, which remains constant regardless of the device's
current location.
• Home Agent: This is a router on the home network that is responsible for
intercepting and redirecting packets to the mobile device when it is away from
home. It helps in forwarding data to the mobile device's current location.
• Foreign Agent: A router on the foreign network that assists in the delivery of data
to the mobile device when it is away from its home network. It communicates with
the home agent to manage the mobile device's movements.
• Registration: When a mobile device moves to a new network, it needs to register its
current location with the home agent. This involves updating the home agent with
the current care-of address (temporary address) assigned to the mobile device by
the foreign network.
• Tunneling: The encapsulation of data in a tunneling protocol (such as IP in IP or
GRE) to ensure that packets sent to the home address are properly delivered to the
current location of the mobile device.
4. Explain the basic purpose of DHCP and its configuration.

DHCP stands for Dynamic Host Configuration Protocol. It is the critical feature on which the users of an
enterprise network communicate. DHCP helps enterprises to smoothly manage the allocation of IP addresses
to the end-user clients’ devices such as desktops, laptops, cellphones, etc. is an application layer protocol that
is used to provide:
Subnet Mask (Option 1 - e.g., 255.255.255.0)
Router Address (Option 3 - e.g., 192.168.1.1)
DNS Address (Option 6 - e.g., 8.8.8.8)
Vendor Class Identifier (Option 43 - e.g.,
'unifi' = 192.168.1.9 ##where unifi = controller)

How DHCP works(configuration):


DHCP runs at the application layer of the TCP/IP protocol stack to dynamically assign IP addresses to DHCP
clients/nodes and to allocate TCP/IP configuration information to the DHCP clients. Information includes
subnet mask information, default gateway, IP addresses and domain name system addresses.
DHCP is based on client-server protocol in which servers manage a pool of unique IP addresses, as well as
information about client configuration parameters, and assign addresses out of those address pools.
The DHCP lease process works as follows:
• First of all, a client (network device) must be connected to the internet.
• DHCP clients request an IP address. Typically, client broadcasts a query for this information.
• DHCP server responds to the client request by providing IP server address and other configuration
information. This configuration information also includes time period, called a lease, for which the
allocation is valid.
• When refreshing an assignment, a DHCP clients request the same parameters, but the DHCP server
may assign a new IP address. This is based on the policies set by the administrator.

Components of DHCP
The main components of DHCP include:

• DHCP Server: DHCP Server is basically a server that holds IP Addresses and other information related
to configuration.
• DHCP Client: It is basically a device that receives configuration information from the server. It can
be a mobile, laptop, computer, or any other electronic device that requires a connection.
• DHCP Relay: DHCP relays basically work as a communication channel between DHCP Client and
Server.
• IP Address Pool: It is the pool or container of IP Addresses possessed by the DHCP Server. It has a
range of addresses that can be allocated to devices.
• Subnets: Subnets are smaller portions of the IP network partitioned to keep networks under control.
• Lease: It is simply the time that how long the information received from the server is valid, in case of
expiration of the lease, the tenant must have to re-assign the lease.
• DNS Servers: DHCP servers can also provide DNS (Domain Name System) server information to
DHCP clients, allowing them to resolve domain names to IP addresses.

UNIT -- 5

1. Write about wireless network.

A wireless network refers to a computer network that makes use of Radio


Frequency (RF) connections between nodes in the network. Wireless networks
are a popular solution for homes, businesses, and telecommunications
networks.

Types of Wireless Network Connections

In addition to a LAN, there are a few other types of common wireless


networks: personal-area network (PAN), metropolitan-area network (MAN), and
wide-area network (WAN).
LAN
A local-area network is a computer network that exists at a single site, such
as an office building. It can be used to connect a variety of components,
such as computers, printers, and data storage devices. LANs consist of
components like switches, access points, routers, firewalls, and Ethernet
cables to tie it all together. Wi-Fi is the most commonly known wireless
LAN.

PAN
A personal-area network consists of a network centralized around the devices
of a single person in a single location. A PAN could have computers, phones,
video game consoles, or other peripheral devices. They are common inside
homes and small office buildings. Bluetooth is the most commonly known
wireless PAN.

MAN
A metropolitan-area network is a computer network that spans across a city,
small geographical area, or business or college campus. One feature that
differentiates a MAN from a LAN is its size. A LAN usually consists of a
solitary building or area. A MAN can cover several square miles, depending on
the needs of the organization.

Large companies, for example, may use a MAN if they have a spacious campus
and need to manage key components, such as HVAC and electrical systems.

WAN
A wide-area network covers a very large area, like an entire city, state, or
country. In fact, the internet is a WAN. Like the internet, a WAN can contain
smaller networks, including LANs or MANs. Cellular services are the most
commonly known wireless WANs.

The Components of a Wireless Network


Several components make up a wireless network’s topology:

11. Clients: What we tend to think of as the end user devices are
typically called ‘clients’. For example, if employees have to use
scanners to register packages due to be shipped, a wireless network
provides the flexibility they need to freely move about the warehouse.
12. Access Point (AP): An access point (AP) consists of a Wi-Fi that
is advertising a network name (known as a Service Set Identifier, or
SSID). Users who connect to this network will typically find their
traffic bridged to a local-area network (LAN) wired network (like
Ethernet) for communication to the larger network or even the internet.

3, Discuss in detail about WAP model in mobile computing.

WAP stands for Wireless Application Protocol . The Wireless Application Protocol (WAP) is a set of
communication protocols and an application programming model based on the World Wide Web (WWW). Its
hierarchical structure is quite similar to the TCP/IP protocol stack design.
It is a protocol designed for micro-browsers and it enables access to the internet in mobile devices.

WAP Model
The user opens the mini-browser in a mobile device. He selects a website that he wants to view. The mobile
device sends the URL encoded request via network to a WAP gateway using WAP protocol.
The WAP gateway translates this WAP request into a conventional HTTP URL request and sends it over the
internet. The request reaches to a specified web server and it processes the request just as it would have
processed any other request and sends the response back to the mobile device through WAP gateway in WML
file which can be seen in the micro-browser.
WAP Protocol stack

Application Layer: This layer contains the Wireless Application Environment (WAE). It contains mobile
device specifications and content development programming languages like WML.
Session Layer: This layer contains Wireless Session Protocol (WSP). It provides fast connection suspension
and reconnection.
Transaction Layer: This layer contains Wireless Transaction Protocol (WTP). It runs on top of UDP (User
Datagram Protocol) and is a part of TCP/IP and offers transaction support.
Security Layer: This layer contains Wireless Transport Layer Security (WTLS). It offers data integrity,
privacy and authentication.
Transport Layer: This layer contains Wireless Datagram Protocol. It presents consistent data format to
higher layers of WAP protocol stack.

Advantages of Wireless Application Protocol


• WAP is a rapidly evolving technology.
• Wireless Application Protocol is an open source that is totally free of cost.
• WAP can be used over multiple platforms.
• Neither it nor network standards are affected.

Disadvantages of Wireless Application Protocol


• WAP connection speed is slow and number of connections are less.
• At some places it is very difficult to access the Internet, and also at some places it is totally
impossible.
• Less secure.
• WAP provides a small User interface (UI).

You might also like