Professional Documents
Culture Documents
Module 1
Mobile Computing and App Developement
Dayananda Sagar University
Dayananda Sagar University
Cellular Architecture
Dayananda Sagar University
Cellular Configuration
• In all cellular systems, land area is divided into a number of cells each
with its radio service.
• In AMPS(Advanced Mobile Phone Services) the area is large which in
digital services, the area is much smaller.
• Conventionally cells are hexagonal in shape.
• Each cell uses a frequency range that is not used by its adjacent cells.
• However frequencies may be reused in non-adjacent cells.
• At the center of each cell is a base station through which mobile
phones and other mobile devices transmit data and voice.
Dayananda Sagar University
Cellular Configuration
Dayananda Sagar University
Shape of Cells
• Hexagon
• A hexagon cell shape is highly recommended for its easy coverage and
calculations. It offers the following advantages −
• Provides equidistant antennas
• Distance from center to vertex equals length of side
Dayananda Sagar University
Frequency Reuse
• Frequency reusing is the concept of using the same radio frequencies within a given area,
that are separated by considerable distance, with minimal interference, to establish
communication.
• Frequency reuse offers the following benefits −
• Frequency reuse improve the spectral efficiency and signal Quality (QoS).
• Frequency reuse classical scheme proposed for GSM systems offers a protection
against interference.
• The number of times a frequency can be reused is depend on the tolerance capacity
of the radio channel from the nearby transmitter that is using the same frequencies.
• In Frequency Reuse scheme, total bandwidth is divided into different sub-bands that
are used by cells.
• Frequency reuse scheme allow WiMax system operators to reuse the same
frequencies at different cell sites.
Dayananda Sagar University
Frequency Reuse
• For example, when N cells are using the same number of frequencies
and K be the total number of frequencies used in systems. Then
each cell frequency is calculated by using the formulae K/N.
• In Advanced Mobile Phone Services (AMPS) when K = 395 and N =
7, then frequencies per cell on an average will be 395/7 = 56.
Here, cell frequency is 56.
Dayananda Sagar University
•As nodes move, the connectivity may change based on relative locations of other nodes. The resulting
change in the network topology known at the local level must be passed on to other nodes so that old
topology information can be updated.
•For example, as MS2 in the figure changes its point of attachment from MS3 to MS4, other nodes that are
part of the network should use this new route to forward packets to MS2. In the figure, we assume that it is
not possible to have all nodes within each other's radio range. In case all nodes are closed by within each
other's radio range, there are no routing issues to be addressed.
Dayananda Sagar University
MANET
• In figures raise another issue, that of symmetric and asymmetric
(bidirectional) and asymmetric (unidirectional) links.
• Consider symmetric links with associative radio range; for example, if
MS1 is within radio range of MS3, then MS3 is also within radio
range of MS1. Then the communication links are symmetric.
• Routing in asymmetric networks is relatively hard task.
• In certain cases, it is possible to find routes that exclude asymmetric
links, since it is cumbersome to find the return path. The issue of
efficient is one of the several challenges encountered in a MANET.
Dayananda Sagar University
Applications of MANET
• Defense applications: Many defense applications require on the fly communications set-up, and ad hoc/sensor
networks are excellent candidates for use in battlefield management.
• Crisis management applications: These arise, for example, as a result of natural disasters in which the entire
communication infrastructure is in disarray. Restoring communications quickly is essential.
• Telemedicine: The paramedic assisting the victim of a traffic accident in a remote location must access medical
records (e.g. X-rays) and may need video conference assistance from a surgeon for an emergency intervention.
In fact, the paramedic may need to instantaneously relay back to the hospital the victim's X-rays and other
diagnostic tests from the site of the accident.
• Tele-geoprocessing application: The combination of GPS, GIS (Geographical Information Systems), and
high-capacity wireless mobile systems enables a new type of application referred to as tele- geo processing.
• Virtual Navigation: A remote database contains the graphical representation of building, streets, and physical
characteristics of a large metropolis. They may also "virtually" see the internal layout of buildings, including an
emergency rescue plan, or find possible points of interest.
• Education via the internet: Educational opportunities available on the internet or remote areas because of the
economic infeasibility of providing expensive last-mile wire line internet access in these areas to all subscribers.
• Vehicular area network: This a growing and very useful application of adhoc network in providing emergency
services and other information. This is equally effective in both urban and rural setup. The basic and exchange
necessary data that is beneficial in a given situation.
Mobile Network Architecture-
Sensor Network Architecture
Dayananda Sagar University
Sensor Network Architecture
Data Fusion: Inside each cluster, each node communicate with the cluster head to gather the
information. All the clusters which are formed share their gathered information to the base station.
Dayananda Sagar University
Differences between Mobile Adhoc
Network and Wireless Sensor Network
1. The data rate of MANETs is more than WSN
2. The number of nodes in the WSN is more than MANETs
3. Mobility is very high in MANETs(since nodes are less) than WSN
4. Sensor nodes of WSN are generally static and cooperate together to transfer the sensed data
5. Sensor nodes usually consume less energy than MANET’s nodes
6. MANETs are usually close to civilization.
7. Public-key cryptography is used in MANETs whereas symmetric key cryptography used in
WSNs for security purposes
8. Compared to MANETs, WSNs are smaller, more powerful, and more memory-constrained
9. Mostly, MANETs are used for distributed computing whereas WSNs are used for information
gathering from the environment
10.WSNs are more prone to failures than MANETs
Dayananda Sagar University
Features Includes:
• Global system for mobile communications (GSM) forms the basis of
2G mobile communication. GSM provides roaming and short
message service (SMS) facility
• It enables services such as text messages, picture messages and MMS
(multi media message).
• It provides better quality and capacity.
Dayananda Sagar University
1. Mobile station: This represents the mobile device and consists of the
subscriber identity module (SIM).
• The international mobile equipment identity (IMEI) uniquely identifies
the mobile device.
• The SIM holds a secret key that helps in authentication and security
measures.
• Through its RF antenna, it connects to the Base Transceiver Station
(BTS).
Dayananda Sagar University
Features Includes:
• Phone Calls
• Send/Receive E-mail Messages
• Web Browsing
• Speed : 64-144 kbps
• Camera Phones
• Take a time of 6-9 mins. to download a 3 mins. Mp3 song
Dayananda Sagar University
• EDGE - Enhanced Data rates for GSM Evolution (EDGE), also known
as 2.75G
• Evolution of GPRS and provides faster data rates of up to 384kbps.
• Speed increase are achieved via new modulation and protocol
enhancements to the existing GSM/GPRS networks.
• No changes are needed to the existing core network infrastructure
to support EDGE, and only an "add-on" to the BSS is required to
enable EDGE services.
Dayananda Sagar University
• Launched in 2001
• Standardized by the 3GPP as the Universal Mobile Telecommunications
System (UMTS)
• Data Transmission speed increased from 144kbps- 2Mbps.
• 3G mobile communication systems support data rates of over 153.6 kbps
• They provide better quality of experience for the users and support
multimedia data transfers such as transfer of audio, video, text, and pictures
• Typically called Smart Phones and features increased its bandwidth and
data transfer rates to accommodate web-based applications and audio and
video files.
Dayananda Sagar University
FEATURES OF 3G TECHNOLOGY
• Providing Faster Communication
• Send/Receive Large Email Messages
• High Speed Web / More Security Video Conferencing / 3D Gaming
• TV Streaming/ Mobile TV/ Phone Calls
• Large Capacities and Broadband Capabilities
• 11 sec – 1.5 min. time to download a 3 min Mp3 song
Dayananda Sagar University
DRAWBACKS OF 3G TECHNOLOGY
MAGIC:
❑Mobile Multimedia
❑ Anytime Anywhere
❑Global Mobility Support
BENEFITS OF 5G TECHNOLOGY
• High Speed, High Capacity
• 5G technology providing large broadcasting of data in Gbps .
• Multi - Media Newspapers, watch T.V programs with the clarity as
to that of an HD Quality.
• Faster data transmission that of the previous generations.
• Large Phone Memory, Dialing Speed, clarity in Audio/Video.
• Support interactive multimedia , voice, streaming video, Internet
and other
• 5G is More Effective and More Attractive
Dayananda Sagar University
Symbian OS
Harmony OS
• It is a latest OS
• Huawei is its developer.
• It is specifically designed for use in IoT devices.
Dayananda Sagar University
Palm OS
• Easy to use
• The graphics should be attractive.
• The buttons and features should be easy to use.
• The functionalities should not be very complicated.
• Features should be powerful and useful.
• Good app store
• An app is one of the basic part of an OS.
• Good and useful apps forms an important part of an OS.
• The apps should be simple and interactive.
Dayananda Sagar University
Mobile Communication-
challenges
Dayananda Sagar University
Mobile Communication-challenges
• Mobile Computing is defined as a computing environment which is
mobile and moves along with the user.
• There are various number of challenges that affected mobile
computing and it has to overcome them.
• Some of the major technical challenges faced by mobile computing
are:
Dayananda Sagar University
1. Mobility:
• It is the most important aspect of mobile computing, but it has to face the certain
challenges which are :
• Auto configuration of the system, as the environment of the system is developing
continuously. Hence for every change, it has to configure itself to the new situation.
• Location management is also a big objection in mobility. To manage the location,
following tasks are to be performed regularly over a fixed period of time.
• Track user’s call.
• Update user’s position and data.
• To maintain the heterogeneity is also a big task as the system is keep moving in a
large variation of situations
• Range of spectrum.
• Verification of security.
Dayananda Sagar University
2. Wireless Medium:
• The transmission medium in mobile computing is wireless,
therefore the following points are considered:
• Various interferences occurs in the mobile computing by the
different elements in the environment.
• Accuracy and quantity of bandwidth should be sufficient.
• Network cost is feasible.
Dayananda Sagar University
3. Portability:
• This means that the communication device moves, for eg.
mobile phones. The following mobile constraints are to be
considered as the devices are also mobile:
• Minimum number of resources are used.
• Security is very less, as security risks include the processing of
fake transactions, unauthorized access of data and program
files, and the physical theft or damage of the device.
• Restrictions of the battery.
Dayananda Sagar University
Reliance on battery power
• Depending on where you may be, you may experience poor connectivity
with your mobile computing device.
• You may find yourself in a place (such as a rural location, or some
buildings) where bandwidth is low, and there are gaps in coverage. Signal
ranges can fluctuate.
• Reliability may suffer in the form of dropped calls or other types of
disconnects.
• The more reliance on a network (as opposed to your device as a
standalone computer), typically the more considerable the risk of
disconnecting.
• App designers can potentially aid this situation by coding their apps to be
more robust against the loss of network connections.
Dayananda Sagar University
Security and privacy