You are on page 1of 58

Next Generation Tele

communication Network
BTCS- 703

Mr. Shyam Gehlot

1
Next Generation Network

A Next-Generation Network (NGN) is a packet


based telecommunication network that handles
multiple types of traffic (such as voice, data,  and
multimedia).

2
Objectives of subject

Understand the importance of next generation wireless

networks.

Define the term “Next Generation Network” and it’s main


characteristics.

Describe the main architectural elements of a Next


Generation Network and explain the logic behind it.

Understand the principles of mobile networks and they


relate to NGN.
3
Unit -1

Mobile Computing

Basic history of Mobile Computing Architecture for mobile


computing, Three tier architecture, design considerations for
mobile computing, mobile computing through internet, Wireless
network architecture, Applications, Security, Concerns and
Standards, Benefits, Future. Evolution of mobile computing.

4
What Is Mobile Computing?
(Cont.)

Mobile Computing : A technology that allows transmission


of data, via a computer, without having to be connected to
a fixed physical link.

Mobile data communication has become a very


important and rapidly evolving technology as it allows
users to transmit data from remote locations to other
remote or fixed locations

6
What Is Mobile Computing? (Cont.)

. Mobile Computing is an umbrella term used to


describe technologies that enable people to access
network services anyplace, anytime, and anywhere.

A technology that is capable of providing an


environment which enables users to transmit data
from one device to other device without the use of any
physical link/cables is known as Mobile Computing. . It
means, data transmission is done wirelessly with the
help of wireless devices such as mobiles, laptops etc.

7
Why Go Mobile?
Enable anywhere/anytime connectivity
Bring computer communications to areas
without pre-existing infrastructure
Enable mobility
Enable new applications
An exciting new research area

8
Advantages
Today many peoples use mobile computing for different purposes
1 Advances in technology
• More computing power in smaller devices ,Flat, lightweight displays
with low power consumption
• New user interfaces due to small dimensions
• More bandwidth (per second? per space?)
• Multiple wireless techniques
2. Technology in the background
• Device location awareness: computers adapt to their environment
• User location awareness: computers recognize the location of the
• user and react appropriately (call forwarding)
3. Computers” evolve Small, cheap, portable, replaceable Integration
or disintegration

9
Advantages of Mobile Computing

Location Flexibility: This has enabled users to work from anywhere


as long as there is a connection established. A user can work without
being in a fixed position. Their mobility ensures that they are able to
carry out numerous tasks at the same time and perform their stated
jobs.

Saves Time: The time consumed or wasted while travelling from


different locations or to the office and back, has been slashed. One can
now access all the important documents and files over a secure
channel or portal and work as if they were on their computer. It has
enhanced telecommuting in many companies. It has also reduced
unnecessary incurred expenses.
10
Conti….
Enhanced Productivity: Users can work efficiently and effectively from
whichever location they find comfortable. This in turn enhances their
productivity level.

Ease of Research: Research has been made easier, since users earlier
were required to go to the field and search for facts and feed them back
into the system. It has also made it easier for field officers and
researchers to collect and feed data from wherever they are without
making unnecessary trips to and from the office to the field.
Entertainment
Video and audio recordings can now be streamed on-the-go using mobile
computing. It's easy to access a wide variety of movies, educational and
informative material

11
Conti……

With the improvement and availability of high speed data connections at

considerable cost, one is able to get all the entertainment they want as
they browse the internet for streamed data. One is able to watch news,
movies, and documentaries among other entertainment offers over the
internet. This was not possible before mobile computing dawned on the
computing world.
Streamlining of Business Processes: Business processes are now
easily available through secured connections. Looking into security
issues, adequate measures have been put in place to ensure
authentication and authorization of the user accessing the services.
Some business functions can be run over secure links and sharing of
information between business partners can also take place. Meetings,
seminars and other informative services can be conducted using video
and voice conferencing. Travel time and expenditure is also
considerably reduced.
12
• There are 2 aspects of mobile computing

– User mobility: users communicate “anytime,


anywhere, with anyone” (example: read/write email
on web browser)

– Device portability: devices can be connected


anytime, anywhere to the network

13
Mobile Computing Functions

We can define a computing environment as mobile if it


supports one or more of the following characteristics:

User mobility

Network mobility

Device Mobility

Bearer Mobility

Session Mobility

14
User Mobility
User should be able to move from one physical location
to another location and use the same service.

The service could be in the home network or a remote


network.

For example a user moves from India to New York and


uses Internet to access the corporate application the
same way the user uses in the home office.

15
Network Mobility

User should be able to move from one network to


another network and use the same service.

For example a user moves from Hong Kong to New


Delhi and uses the same GSM phone to access the
corporate application through WAP (Wireless
Application Protocol). In home network he uses this
service over GPRS (General Packet Radio Service)
whereas in Delhi he accesses it over the GSM
network.

16
Device Mobility

User should be able to move from one device to another


and use the same service.

For example a sales representatives using their


desktop computer in home office. During the day while
they are on the street they would like to use their

Palmtop to access the application.

17
Bearer Mobility

User should be able to move from one bearer to another


and use the same service.

For example a user was using a service through WAP


bearer in his home network in Bangalore. He moves to
Coimbatore, where WAP is not supported, he switch
over to voice or SMS(Short Message Service) bearer
to access the same application.

18
Session Mobility

A user session should be able to move from one user-


agent environment to another.

For example a user was using his service through a


CDMA (Code Division Multiple Access) IX network.
The user entered into the basement to park the car
and got disconnected from his CDMA network. User
goes to home office and starts using the desktop. The
unfinished session in the CDMA device moves from
the mobile device to the desktop computer.
19
What is mobile computing? How does
it work?

Mobile Computing is a human-computer interaction that


allows transmission of data, voice and video via a computer or
any other wireless device without connecting to a fixed
physical link. It also allows people to access data and
information from wherever they are. The main concept
involves −

Mobile communication

Mobile hardware

Mobile software
20
Mobile communication
The mobile communication refers to the use of technology
that allows us to communicate with others in different
locations. The wireless networks carry the data where it
needs to go. Traditionally, data was routed through cell
towers in a particular provider’s physical network to
another user’s phone. With modern mobile computing,
data is also often delivered onto the Internet via the
provider’s telecom network. where users can access
individual Internet sites over their smart phones.

21
Since the media is unguided/ unbounded, the overlaying
infrastructure is basically radio wave-oriented. That means
the signals which help in sending and receiving similar kind
of signals are carried by air to those devices.

22
Mobile communication can be of one of the
following form as mentioned below.
 

23
Mobile and Wired : In this configuration, Some of the devices are
wired and some are mobile in nature. For Example : Laptops.

Fixed and Wired : In this configuration, The devices are fixed at a


position and are connected through a physical link for
communication. For Example : Office/Desktop Computer.

Mobile and Wireless : In this configuration, devices can


communicate(data transmission) with each other irrespective of
their position and can connect to any network without the use of
any wired device. For Example : WiFi  and GSM

24
Mobile Hardware
Mobile hardware includes mobile devices or device components capable
of operating, executing and providing services that receive or access the
service of mobility. They would range from portable laptops, smart
phones, tablet Pc's, Personal Digital Assistants. Above mentioned devices
use an existing and established network to operate on. In most cases, it
would be a wireless network.

25
Mobile software
Mobile software is an operating system that allows smart phones, tablet
PCs, and other devices to run applications and programs. It is the
actual program that runs on the mobile hardware. It deals with the
characteristics and requirements of mobile applications. This is the
engine of the mobile device. It is considered as the heart of the device
that operates the mobile device.

26
Applications of Mobile Computing

Vehicles. The current position of the car is


determined via the global positioning system (GPS).
Cars driving in the same area build a local ad-hoc
network for the fast exchange of information in
emergency situations or to help each other keep a safe
distance. In case of an accident, not only will the airbag
be triggered, but the police and ambulance service will
be informed via an emergency call to a service provider

27
Figure shows a typical scenario for mobile
communications with many wireless devices.

28
Networks with a fixed infrastructure like cellular phones (GSM,
UMTS) will be interconnected with trunked radio systems
(TETRA) and wireless LANs (WLAN).

Satellite communication links can also be used.

The networks between cars and inside each car will more likely
work in an ad-hoc fashion

Wireless networks inside a car can made up of personal digital


assistants (PDA), laptops, or mobile phones, e.g., connected with
each other using the Bluetooth technology.

So we can say that local ad-hoc network with vehicles close-by


to prevent accidents, guidance system redundancy

29
Emergencies

An ambulance with a high-quality wireless connection to a


hospital can carry vital information about injured persons to
the hospital from the scene of the accident. All the necessary
steps for this particular type of accident can be prepared and
specialists can be consulted for an early diagnosis. Wireless
networks are the only means of communication in the case of
natural disasters such as hurricanes or earthquakes. In the
worst cases, only decentralized, wireless ad-hoc networks
survive.

30
Business

A travelling salesman today needs instant access to


the company’s database: to ensure that files on his or
her laptop reflect the current situation, to enable the
company to keep track of all activities of their
travelling employees, to keep databases consistent

etc.

31
Figure shows what may happen when
employees try to communicate off
base.

32
At home, the laptop connects via a WLAN or LAN
and DSL to the Internet.

Leaving home requires a handover to another


technology,

mobile communications should always offer as good


connectivity as possible to the internet, the
company’s intranet, or the telephone network.

33
Credit Card Verification

At Point of Sale (POS) terminals in shops and supermarkets,


when customers use credit cards for transactions, the
intercommunication required between the bank central
computer and the POS terminal, in order to effect verification of
the card usage, can take place quickly and securely over
cellular channels using a mobile computer unit. This can speed
up the transaction process and relieve congestion at the POS
terminals.

34
Replacement of Wired Networks

wireless networks can also be used to replace wired networks,


e.g., remote sensors, for tradeshows, or in historic buildings.
Due to economic reasons, it is often impossible to wire remote
sensors for weather forecasts, earthquake detection, or to
provide environmental information. Wireless connections, e.g.,
via satellite, can help in this situation. Other examples for
wireless networks are computers, sensors, or information
displays in historical buildings, where excess cabling may
destroy valuable walls or floors.

35
Infotainment

. wireless networks can provide up-to-date information at any


appropriate location. The travel guide might tell you something
history of a building (knowing via GPS, contact to a local base
station, or triangulation where you are) downloading information
about a concert in the building at the same evening via a local
wireless network. Another growing field of wireless network
applications lies in entertainment and games to enable, e.g., ad-
hoc gaming networks as soon as people meet to play together

36
Challenges
Disconnection
Low bandwidth
Low power and resources
Security risks
Wide variety terminals and devices with
different capabilities
Device attributes
Fit more functionality into single, smaller
device

37
Limitations and disadvantages of MC
Resource constraints: Battery needs and recharge requirements
are the biggest constraints of mobile computing.

Interference: Radio transmission cannot be protected against


interference using shielding and result in higher loss rates for
transmitted data or higher bit error rates respectively

Bandwidth: Although they are continuously increasing,


transmission rates are still very low for wireless devices
compared to desktop systems. Researchers look for more

efficient communication protocols with low overhead.


Dynamic changes in communication environment: variations in
signal power within a region, thus link delays and connection
losses.

38
Continue
Network Issues Due to the ad hoc networks some issues
relating discovery of connection, service to destination, and
connection stability.

Interoperability issues: the varying protocol standards

Security constraints: Not only can portable devices be stolen


more easily, but the radio interface is also prone to the dangers of
eaves dropping. Wireless access must always include encryption,
authentication, and other security mechanisms that must be
efficient and simple to use.

39
Disadvantages of MC
One of the disadvantages is that the mobile devices will need either
WiFi connectivity or mobile network connectivity such as GPRS, 3G
and in some countries even 4G connectivity that is why this is a
disadvantage because if you are not near any of these connections
your access to the internet is very limited.
Security Concerns
 Mobile VPNs are unsafe to connect to, and also syncing devices
might also lead to security concerns. Accessing a WiFi network can
also be risky because WPA and WEP security can be bypassed easily.
 Power Consumption
  Due to the use of batteries in these devices, these do not tend to last
long, if in a situation where there is no source of power for charging
then that will certainly be a letdown.  40
EVOLUTION OF MOBILE COMPUTING

Mobile computing first came into the lights in the year 1990. The
devices which were first implemented on mobile computing technology
were two-way radios. These two-way radios were used to communicate
with the computers which were three inches long with the help of large
antennas. These three-inch-long computers were able to perform all
those tasks a normal person.

The introduction of computers and laptops brought a drastic change in


the computing industry. In earlier times, machines of very big size were
used for doing small tasks. But, at present, a small microprocessor can
do big tasks within minutes.nal computer can do.

41
The advent of portable computers and laptops, Personal Digital
Assistants (PDA), PC tablets and smart phones, has made mobile
computing very convenient. Mobile devices have now become the
personal command centers for all other wearable and connected
devices.

The portability of these devices ensure and help the users to access all
the services as if they were working in the internal network of their
company. For example consider the use of Tablet PC and iPads. This
new technology helps the users to update documents, surf the internet,
send and receive e-mail, stream live video files, take photographs and
also support video and voice conferencing where it is easy for the
people to access. 42
Evaluation of devices

43
Future of Mobile Computing

Use of Artificial Intelligence


Integrated Circuitry -> Compact Size
Increases in Computer Processor
speeds

44
Architecture for mobile computing

Mobile computation architecture refer to define various layers


b/w user application interfaces ,devices and network hard ware.

A well define architecture is required for systematic computation


and access data and software objects.

The network-centric mobile computing architecture uses


three-tier architecture.
1) Présentation Tiers

2) Application Tiers

3) Data Tiers

45
46
3 Tiers Architecture

47
48
In three tier architecture, the first layer is User Interface or
Presentation Tier.
 This layer deal with user facing device handling and rendering.
this tier includes a user system interface where user service

reside.

The second tier is the Process Management or Application Tier



This layer is capable of accommodating hundreds of users.
 The middle process management tier controls transaction and
asynchronous queuing to ensure reliable completion of

transaction
The third final tier is the Database Management or Data Tier.

This Layer is for database access and management. The three-tier

 architecture is better suited for an effective networked client/server


design. It provide increased performance , flexibility ,
 maintainability , reusability and scalability , while hiding the

complexity of distributed processing from user.

All these characteristic have made three-tier architecture a popular


choice for Inter application and net-centric information
 system

3 Tier
Architecture

This is user facing System in the first tier. This is the


layer of agent application and system.
These applications run on the client device and offer
 all the user interface.

 This tier is responsible for presenting the information to the end


user.
Presentation Tier include web browsers (like Mozilla, Internet
Explorer etc…)WAP browsers and customized client programs.
 It performs the business logic of processing user input , obtaining
data, and making decision

 In certain case, this layer will do the transconding of data for


appropriate rendering in the presentation Tier.

In mobile computing environment in addition to the business logic


there are quite a few additional management function that need

to be performed
These function relate to decision on renderinal ,
network management , security, data store access,
etc.

Most of these function are implemented using different


middleware software.


Middleware frame work is defined as a layer of software , which
sits in middle between the operating system and the user facing

software.
1) Message –oriented Middle war
2) Transaction processing Middleware.
3) Database Middleware
4) Communication Middleware
5) Distributed Object and Components.
6) Transcoding Middleware.
 The Data Tier is used to store data needed by the
application and acts as a repository for both
temporary and permanent data.

 These can range from sophisticate relational


database, legacy hierarchical database , to even
simple text files.
Database middle ware allows the business
logic to be independent and transparent of the

database technology and the database vendor.

Database middle ware runs between the


application program and the database.

Example of such middle ware will be ODBC,JDBC,



etc.
Using this middle ware , the application will be able to
access data from any source.

Data source ca be text files, spreadsheets or a network,


relational , indexed, hierarchical, XML database, object
database, etc.., fro vendors like Oracle, SQL , Sybase ,
etc.

You might also like