Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Subject : Mobile Computing and Application Development 3360704

UNIT:1 Concept of Mobile Communication


Concept of mobile communication:
 In the first half of 20th century successful wireless application was radio broadcast. In such
system one transmitter know as radio station. This type of transmission system is known as
Simplex means in one direction.

Base Station Radio Device

Simplex Transmission

 Later concept of Duplex found. In this information take place in two directions. Ex:
Walky-talky, in which user was not allowed to transmit as well as receive. So known as
Semi Duplex.

User 1 User 2

Duplex Transmission
 Then concept of Full duplex was introduced in which users are allowed to transmit as well
as receive signals.
 This type of full duplex system is known as Single Cell System, here data transmission
take place between Base Station and Mobile Phone.
 Downlink: Process of transmitting user data from Base station and Mobile Phone.

User 1 Base Station User 2

Full Duplex (Single Cell System)

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 1
Subject : Mobile Computing and Application Development 3360704

Q-1 Define Mobile Communication and Mobile Phone:


Mobile Communication :Wireless form of communication in which data and voice information
is transmitted and received via microwaves is called mobile communication.
 This type of communication take place while moving from place to place.
 Example: cellular and digital cordless telephones, pagers, satellite-based communication.
Mobile Phone or Cell Phone: It is a long-range, portable electronic device used for mobile
communication. It connects to a wireless carrier network using radio waves.
Q-2 Different generation of wireless technology:
 Network which is connected by radio waves or microwaves to maintain communication
and no any physical connection between sender and receiver is called wireless technology
 This technology uses NICs, IPs and routers in place of wires for connectivity.
 Various generation of wireless technologies are:

1. First Generation (1G)


 Developed in 1980’s
 Based on Analog System
 Speed: 2.4kbps
 It uses FDMA (frequency division multiple access)
 Allows user to make voice calls in only 1 country
 Disadvantages: poor voice Quality, battery life, no security, large phone size

2. Second Generation (2G)


 Developed in 1990’s
 Based on Digital System
 Speed: 64kbps
 Offers services like digital voice, SMS, email
 It uses TDMA (time division multiple access)
 There are 2 forms of 2G:
i. 2.5G (GPRS) : Used for WAP, MMS, email and WWW access.
ii. 2.75G (EDGE) : Extended version of GSM, and allows clear and fast
transmission.
 Disadvantages: Requires strong digital signal , Unable to handle complex data
and information.
[ NOTE: GPRS:General Packet Radio Service, EDGE: Enhanced Data Rates for GSM Evolution ]

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 2
Subject : Mobile Computing and Application Development 3360704

3. Third Generation (3G)


 Developed in 2000’s
 Based on Broadband with CDMA and IP technology
 Speed: 2mbps
 Uses WCDMA (Wireless Code Division Multiple Access)
 It is based on ITU family
 It has HSPA(High Speed Packet Access) data transmission
 More flexible, Supports enhanced audio and video streaming, higher data speed,
video conferencing, web and wap higher speed.
 There are 2 forms of 2G:
i. 3.5G (HSDPA) : High Speed Downlink Packet Access
ii. 3.75G (HSUPA) : High Speed Uplink Packet Access
 Disadvantages: expensive fees for license service, require higher bandwidth

4. Fourth Generation (4G)


 It is extension of 3G with more bandwidth and services
 High quality audio/video streaming over end to end protocol
 Used mobile WiMax standard and Long Term Evolution (LTE) standard
 Faster and more reliable
 Provides hign performance
 Offers both cellular and broadband multimedia services everywhere.
 Diadvantages: Consume more battery power, complex to implement

5. Fifth Generation (5G)


 This technology has changed the way to use cell phoens.
 Includes all type of advanced features like MP3 recording, video player, large
phone memory, dialing speed etc.
 User can hook their 5G cell phone with their laptop.
 Speed upto 1Gbps
 Supposed to be faster and reliable the 4G

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 3
Subject : Mobile Computing and Application Development 3360704

COMPARISION OF VARIOUS WIRELESS TECHNOLOGY:

Technology 1G 2G 2.5G 3G 4G

Design Begin 1970 1980 1985 1990 2000

Implementatio 1984 1991 1999 2002 2010 ?


n
Service Analog Digital voice, Higher Higher Higher
voice SMS capacity, capacity, capacity,
Packet data, Broadband Complete IP,
MMS data multimedia

Standards AMPS, TDMA,CDMA, GPRS, WCDMA, Single


TACS, GSM,PDC EDGE CDMA2000 standard
NMT
Bandwidth 1.9kb 14.4kbps 384kbps 2Mbps 100+Mbps
ps
Multiplexing FDMA TDMA, TDMA, CDMA CDMA ?
CDMA CDMA

Core Network PSTN PSTN PSTN, Packet IP network


Packet network (Internet)
network

Q-3 Explain BASIC CELL, CLUSTER AND FREQUENCY REUSE


 CELL: It is geographical area covered by radio frequency signals or a smallest unit of
frequency.
 Its types and size depend on the location, height, directivity of antenna, the power of
transmitter, obstacles etc..

 In reality a cell can be of any shape but generally it is represented in the form of hexagon.
 The base station is placed at the center of cell.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 4
Subject : Mobile Computing and Application Development 3360704

CLUSTER: No of cell can be grouped together is known as cluster.

 Often this cluster contain 7 cell but other configuration are also possible.7 is a convention
number.
 When choosing the no. of cell in a cluster two points we have to check.
1) Limiting interference level
2) No. of channel that can be allowed to each cell site.

Spectrum and Frequency Reuse:-


 The design process of selecting and allocating channel for all cellular base station within a
system is called frequency reuse of frequency planning.
 To increase capacity of system, frequencies must be reused in the cellular layout.
 In frequency reused concept the clusters are arranged such that no neighboring cells having
same frequency channel to avoid the frequency interference.
 Consider a cellular system that has total of S duplex radio channels, then
S=kN

S=duplex radio channel


K=group of channel
N=no. of cells
 If a cluster is replicated M times within the system then, total no of duplex channels or
Capacity is
C=MkN =MS

What is Base Station(BS)?

 BS is placed at the center of cell.


 It is a transmitter and receiver that relays signal (control and information) from the mobile unit
to the MSC and vice versa

What is MSC (Mobile Switching Center)?


 It controls a cluster of cell.
 Base stations are connected to the MSC via wire link.
 It directly connected to the PSTN.
 It is responsible for all calls related to mobiles located within its domain.
Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 5
Subject : Mobile Computing and Application Development 3360704

 MSC also responsible for errors, delays, blocking.


 It is also responsible for hands off(a mobile user moves to a different cell while conversation is
in process, MSC transfer the call to a new base) process.

Q-4 Explain Cell Size and Types:-


 As the cells are smaller it increases the possibility of overall capacity of cellular system where
there are more users small, low power base stations are installed.
 Different types of cell are given different names according to their size and function.

1) MICRO Cells: They are normally found in populated areas which may have diameter of
around 1km.
2) MACRO Cells: They are large cells that are used for remote areas like 10km or more.
3) PICO Cells: They are used for covering very small areas. Example: area of building or
tunnel. For the small cell, the power level used by base stations is much more.
4) Selective Cells: They are used where full 360 degree coverage is not required they may be
used to fill in a hole in the coverage in the cellular system.
5) Umbrella Cells: It is used in instances where heavily used road crosses an area where there
are micro cells. Under normal situation these would result in a large number of handovers as
people driving along the road and quickly cross the microcells. An umbrella cell would take in
the coverage of microcells.

Q-5 Explain Noise and its Effects on Mobile:-


 Definition: Noise is any undesired signal in a communication circuit.
 Noise is unwanted disturbance of signals.
 Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals
and data.
Types and Sources of Noise:-
There are many variety of noise in which four are most important noise for telecommunication or
data communication are:
1. Thermal Noise:
 It occurs in all transmission media and communication equipment. It arises from random
electron motion and it is characterized by a uniform distribution of energy.
 Whenever molecules heat above absolute zero thermal noise will be present.
2. Intermodulation Noise:
 It is the result of presence of InterModulation products.
 If two signals of frequencies f1 and f2 are passed through a non-linear device it creates
Intermodulation (IM) noise.
 IM products may be produced from harmonics of desired signals.
3. Cross-Talk:
 It refers to unwanted coupling between signal paths.
 There are three reasons of Crosstalk :

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 6
Subject : Mobile Computing and Application Development 3360704

-Electrical Coupling between transmission media.


-Poor control of frequency response.
-Nonlinear performance in analog multiplex system.
4. Impulse Noise:
 It is a discontinuous series of an irregular pulses or noise spikes of short duration.
 These spikes are called heats.

Q-6 Explain GSM.

What is GSM?

 GSM:- GSM stands for global system for mobile communication.


 It is open digital cellular technology used for transmitting mobile voice and data services.
 It is invented from the idea of cell based Mobile Radio System and at bell laboratories in
1970.
 It is a circuit switched system that divides each 200khz channel into eight 25khz time slots.
 GSM operates in the 900MHz and 1.8 GHz bands in Europe and the 1.9GHz and 850 MHz
bands in the US.
 GSM makes use of narrow band time division multiple access (TDMA) for transmitting
signals.
 Presently GSM supports more than one billion mobile subscriber's in more than one 210
countries.
 GSM digitizes and compress data, then sends it down through a channel.
Why GSM is popular?(Advantages)

 Clear voice quality.


 International roaming.
 Data support including SMS and web browsing.
 Compatibility with Integrated Service Digital Network (ISDN) and other telephone
company services.
 Subscriber Identity Module (SIM) cards it allows customer to buy a new or additional
phone.
 Research and development.

Q-7 What is CDMA?

 Code Division Multiple Access (CDMA) is a wireless technology that uses spread-spectrum
techniques.
 It assign a specific frequency to each user and user has access to the whole bandwidth for
the entire duration.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 7
Subject : Mobile Computing and Application Development 3360704

 The technology is commonly used in ultra-high-frequency (UHF) cellular telephone


systems, bands ranging between the 800-MHz and 1.9-GHz.
 Working: A code called spreading code is used to perform this action. Using a group of
codes, which are orthogonal to each other, it is possible to select a signal with a given code
in the presence of many other signals with different orthogonal codes.

Advantages:
o Transmission Burst − reduces interference.
o CDMA has a soft capacity
o Flexible transfer may be used.
Disadvantages:
o Lack of international roaming capabilities.
o Limited variety of handset.
o Time synchronization is required.
o A large code length may cause interference.

Q-8 Explain GSM Architecture:


 A GSM network comprises of many functional units.
 The GSM network can be broadly divided into:
 The Mobile Station (MS)
 The Base Station Subsystem (BSS)
 The Network Switching Subsystem (NSS)
 The Operation Support Subsystem (OSS)

GSM architecture

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 8
Subject : Mobile Computing and Application Development 3360704

Mobile Station (MS): It is a technical name which is used to represents the Mobile Phones or
Cell Phones with Subscriber Identity Module (SIM)

Base Station System (BSS): All radio-related functions are performed in the BSS, which
consists of base station controllers (BSCs) and the base transceiver stations (BTSs). It connects
Mobile Station with Network and Switching System. It includes following two parts

1. Base Station Controller (BSC): BSC provides all the control functions and physical links
between the MSC and BTS. It is a high-capacity switch that provides functions such as
handover, cell configuration data etc. A number of BSCs are served by an MSC (2)
2. Base Station Transceiver (BST): BTS handles the radio interface to the mobile station.
The BST is the radio equipment needed to service each cell in the network. A group of
BSTs are controlled by a BSC.

Network and Switching System (NSS): NSS is responsible for performing call processing and
subscriber-related functions. Functional units are:

(1) Mobile Services Switching Center (MSC): The MSC performs the telephony switching
functions of the system. It controls calls to and from other telephone and data systems.

(2) Home Location Register (HLR): The HLR is a database used for storage and management
of subscriptions. The HLR is considered the most important database as it stores permanent data
like location, subscriber identity etc.

(3) Visitor Location Register (VI.R): The VLR is a database that contains temporary
information about subscribers that is needed by the MSC. The VLR is always integrated with the
MSC. When a mobile station roams into a new MSC area, the VLR connected to that MSC.

(4) Authentication Center(AuC): A unit called the AUC provides authentication and encryption to
identity and ensure of each call. It protects network operators from fraud.

(5) Equipment Identity Register(EIR): It is database that contains information about identity of
mobile from stolen, defective mobile station etc.

Operation Support Subsystem: The OMC (operations and maintenance center)is connected to
switching system and BSC. It is called the OSS, which is functional entity from which network
operator monitors and controls system.
Additional functional elements are message center, mobile service node, GMSC and GIWU.
The following diagram shows the GSM network along with the added elements:

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 9
Subject : Mobile Computing and Application Development 3360704

Q-9 Explain GSM Services.


 SMS
 Short Message Service (SMS) is a mechanism of delivery of short messages over
the mobile networks.
 It is a store and forward way of transmitting messages to and from mobiles.
 Each short message can be no longer than 160 characters. These characters can be
text or binary Non-Text Short messages.
 SMS supports national and international roaming.
 MMS
 Multimedia Messaging Service (MMS) is a standard way to send messages that
include multimedia content to and from mobile phones.
 It extends the core SMS (Short Message Service) capability that allowed exchange
of text messages only up to 160 characters in length.
 The most popular use is to send photographs from camera-equipped handsets.
 Unlike text only SMS, commercial MMS can deliver a variety of media including up
to forty seconds of video, one image, multiple images via slideshow or audio plus
unlimited characters.
 LBS
 A Location-Based Service (LBS) is a software application for a mobile device that
requires knowledge about where the mobile device is located.
 LBS is a software application for an IP-capable mobile device that requires
knowledge about where the mobile device is located.
Ex.: nearest ATM, Hotel, Petrol pump, etc.
 It requires five basic components.
 By law, location-based services must be permission-based.
Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 10
Subject : Mobile Computing and Application Development 3360704

 VAS
 A Value-Added Service (VAS) is a popular telecommunication term used for non-
core services.
 It refers to all the services beyond standard voice calls and fax transmissions.
 It can be used in any industry to promote their primary business at little or no cost.
 Mobile VAS services can be mainly categorized into 3 categories:-
1. Consumer VAS
2. Network VAS
3. Enterprise VAS
 VASPs typically connect to the operator using protocols like Short Message Peer-to-
Peer Protocol (SMPP) and Short Message Service Centre (SMSC).
 Following are some of the major value-added services:
a. Mobile TV
b. Play and Download Music, Movies
c. Sports Services
d. Online Gaming
 Supplementary Services
 Multiparty Service / Conferencing: It allows to setup a conference call.
 Call Waiting: It allows to notified of an incoming call during conversation.
 Call Hold: It allows to put on hold and then resume call during conversation.
 Call Forwarding: It is used to divert calls from original recipient to another number.
 Call Barring: Concept of barring is something will happen unless something else
happen, It is useful to stop calls being routed to while subscriber will pay the charges
for roaming.

Q-10 Write Difference between CDMA and GSM.

No CDMA GSM
1 Code Division Multiple Access Global System for Mobile Communication
2 Storage type: internal memory SIM card
3 Dominant standard in the U.S. Dominant standard worldwide except the U.S.
4 Less Accessible in international roaming More accessible in international roaming
5 Frequency band : single Frequency band : Multiple
6 Network service: Handset specific Network service: SIM specific
7 It has built-in encryption No built-in encryption
More security is provided in CDMA Less security compared to CDMA technology.
8
technology.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 11
Subject : Mobile Computing and Application Development 3360704

Q-11 Different modes used for Mobile Communication


1.Infrared(IR) Wireless Communication
2.Broadcast Radio
3.Microwave Radio
4.Communicaion Satellites
5. Bluetooth
6. WI-FI

1. Infrared(IR) Wireless Communication

 It communicates Data or Information in devices or system


 It is Electro-magnetic Energy at a Wave-length. That is Longer than Red light.
 IR Wireless is used for short and medium range communication and security control.
 This system mostly operate in Line-of-Sight mode.
 A Photo LED Transmitter and a Photo Diode Receptor are Required for Successful IR
Communication.
 The Source and destination can be Laptop, Mobile Phones, Televisions Security System
and any other device get support wireless communication.
 In the Electro Magnetic Spectrum infrared radiation lies Between Microwaves & Visible
Light so it can be used as source of communication.
2. Broadcast Radio

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 12
Subject : Mobile Computing and Application Development 3360704

 Radio Broadcast Sound Throw the Air as Radio-Waves.


 It Uses a Transmeter To Transmit Radio-Waves to a Reciving Antenna.
 The Broadcast accurs either in Syndication or Simyncast or Both.
 It Can Also be Done Using Cable, FM, Internet & Satelites.
 Radio-Waves have Different Frequency Segment and you Can Select Your Audio Sgnal by
Tunning into Specific frequency Segment.
 When you Wish to Listen to 91.1 FM Alll You Have to Tune the Radio to Accept That
Particular Frequency.

3. Microwave radio:

Microware radio node


 Microwave transmission transfers voice and data throw atmosphere as super high frequency
radio waves called microwaves.
 It is mainly used to transmit messages between ground based station and satellite
communication system.
 Working:
o Microwave belongs to radio spectrum ranges of approx 1.0 GHz to 30GHz antenna
used are of convenient sizes and shapes.
o It is also depends on line of side in order to work properly.
o For two way communication two frequencies are used with only one antenna. The
ideal distance between each antenna is approx 25 miles.
 Disadvantages: They can be affected by bad weather specially rain.
4. Communication Satellite:

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 13
Subject : Mobile Computing and Application Development 3360704

 It is an artificial satellite used specifically as communication transmitter/receiver inorbit ,


it behaves like a radio relay station to receiver amplify and redirect analog specific radio
frequency.
 Working: Data is passed through using transfer most satellite have between 24 to 72
transponder with a single transponder capable of transmitting and receiving 155 million bits
of information per second.
5. Bluetooth
 It is an open wireless technology standard for accessing data over short distances.
 Bluetooth uses short wavelength radio transmission to create PANs.
 Range of data transfer is power dependent i.e.100m.
Uses:
 Wireless networking between PCs in a confined space.
 Transfer of files, contact details etc.
Advantages:
 It has a high level of compatibility among devices.
 It will connect to devices that are not of the same model.
Disadvantages:
 Infrared has data rates of up to 4 Mbps while Bluetooth only offers 1 Mbps.

6. Wi-Fi
 Wi-Fi is a wireless technology that uses radio waves to provide wireless high speed
internet and network connections.
 The cornerstone of any wireless network is an access point (AP).
Advantages:
 Wi-Fi allows the deployment of LANs without wires for client devices.
 Deployment of WLANs, It reduces the costs of network deployment and expansion.
 Wi-Fi is becoming widespread and easily accessible in the corporate infrastructures.
Disadvantages:
 Mobile use of Wi-Fi over wider is limited
 Congestion

Q-13 Explain 3 tier architecture of mobile computing with diagram.

First Tier/Layer: User Interface/Presentation Layer


 It is responsible for presenting information to the end-user.
 It includes a user interfacing components like Textbox, Labels, Checkboxes, etc.
 User receives information through: screens, speakers, vibrations.
 User sends information through: keyboards, pens, touch screens.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 14
Subject : Mobile Computing and Application Development 3360704

OR

Second Tier/Layer: Process Management/application Layer


 It deals with Business logic & Rules.
 It is capable of accommodating hundreds users.
 It optimizes the use of resources.

Third Tier/Layer: Database Management/Data Tier


 It deals with DB management & access.
 Act as a repository of both temporary and permanent data.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 15
Subject : Mobile Computing and Application Development 3360704

Q-14 Write design consideration for mobile computing.


 On mobile platform everything is limited so developer has to maintain balance between
design principles and resources at hand.
 Types of Application:
 Application may be native or mobile web.
 Decide type of application.
 If application requires local processing, access to local resources than design native
application.
 A native application is hard to maintain, requires upgrade infrastructure.
 A mobile Web application is compatible with all devices with internet connection
and browser.
 Target Device: Consider target device’s screen size, resolution, memory, CPU
performance characteristics.
 User Experience: User interface should be rich, intuitive and responsive.
 Resource Constraint: Consider limited CPU, memory and battery life. Reading and
writing to memory, wireless connections, specialized hardware and processor speed.
 Multiple Platforms: Portability must be there So if you are developing for more than one
device, design first for the subset of functionality then customize for device specific.
 Security: Ensure that device communication is secured.
 Network Communication: It is slow and costly. To reduce network traffic combine
several commands in one request. Ex: commit add, update and deleted records in one
request.

Q-15 Write characteristics of Mobile Communication.


 User Mobility: It allows user to move from one physical location to another and use the
same services. Ex: Access the application through internet from Bombay and also
traveling from Bombay to Puna.
 Device Mobility: It allows user to switch from one device to another device and use the
same services. Ex: Access application through internet from Mobile phone or Tablet.
 Network Mobility: It allows user to move from one network to another network and use
the same services. (Example: WiFi or 4G network)
 Session Mobility: It allows user to move their active session from one environment to
another.
 Security Function: Access control, authentication via Chip card and PIN

Q-16 Write Application of Mobile Communication.


1. Manage Personal Records: Allows users to manage their personal records like day to day
activities,some useful notes, etc…
2. Social media and group messages: Allows users to keep in touch with their friends and
relatives by sending messages,images,audio and video clip.
3. Transaction: Allows to facility of transaction like recharge, pay bills etc.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 16
Subject : Mobile Computing and Application Development 3360704

4. Mobile Shopping and Banking: Allows user to shop online various products and customer
can manage their accounts online for transaction.
5. Entertainment: Lots of entertainment application available for downloading songs, videos
games etc.
6. News and media: Allows exploring news around you, latest news, current affairs.
7. Weather Forecast: Provides facility of weather forecast details of specific location using
GPS.
8. GPS based Services: Allows facilities of location based services such as finding nearest
hotels, airport, petrol pumps etc…
9. Alert and Notification: Several mobile apps allow the facilities of alert messages.

Q-17 Explain security issues related to Mobile Computing.


 Security issues related with mobile computing can be classified into two main categories.
1. Traditional Security Issue
2. Mobile Computing Security Issue
1. Traditional Security Issue:
 Confidentiality: Information stored on a system or transmitted over communication
links, is only disclosed to authorize user.
 Integrity: Information exchange between different parties is accurate, complete and
not altered during transmission.
 Authentication: It enforces verification and validation of the identities and
credentials exchange between mobile device and service provider.
 Authorization: It ensures that the service requester has right to access the
information on different network or mobile resources.
 Availability: It ensures that the mobile computing environment or the services of
the information systems are all the time available to users.

2. Mobile Computing Security Issue: Security issues introduced in mobile computing are
classified into following two categories.
a) Wireless Network Security Issues
b) Mobile Device Security Issues

a) Wireless Network Security Issues


 Denial of Service: It is explicit attempt by attackers to prevent legitimate users
of a service from using that service.
 Traffic Analysis: The attacker can monitor the transmission of data, measure the
load on channel, capture packets and read source-destination fields.
 Eavesdropping: If the network is not secure enough and the transmitted
information is not encrypted then an attacker can log on to the network and get
access to sensitive data.
 Spoofing: The attacker may hijack a session and impersonate as an authorize
user to gain access to unauthorized information and services.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 17
Subject : Mobile Computing and Application Development 3360704

 Session Interception and Message Modification: The attacker can intercept a


session and alter the transmitted messages of the session.

b) Mobile Device Security Issues


 Pull Attacks: The attacker controls the device as a source of propriety data and
control information.
 Push Attacks: The attacker use the mobile device to plant a malicious code and
spread it to infect other elements of the network.
 Forced De-authentication: The attacker transmits packets intended to convince
a mobile end point to drop its network connection, reacquire a new signal, and
then inserts a crook device between a mobile device and the network.
 Roaming: To allow roaming, certain parameters and user profiles should be
replicated at different locations so that when a user roams across different zones,
he/she should not be experience any degradation in the access and latency time.
 Disconnection: The transition from one level of disconnection to another may
present an opportunity for an attacker to masquerade either mobile unit or mobile
support station.

Q-18 What is middleware? Write Use of Middleware and Explain types of


middleware.

 Middleware is Software that provides a link between separate software applications.


 It is a layer that lies between the operating system and applications.
 Use of middleware:-
 Provide interaction with another service or application.
 Filter data to make them friendly usable.
 Make an application independent from network services.
 Make an application reliable and always available.
 Types of Middleware:
1. Communication Middleware: It is used to connect one application with another
application.
o Ex.: Telnet
2. Message Oriented Middleware:
o It supports the receiving and sending of messages over distributed applications.
o It makes network protocols less complicated.
o It is one of the most widely used types of middleware.
3. Object Oriented Middleware:
o It is also known as an object request broker.
o It provides the facility to send objects and request services.
4. Remote Procedure Cell Middleware:

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 18
Subject : Mobile Computing and Application Development 3360704

o It provides the facility to calls procedures on remote systems and is used to perform
synchronous or asynchronous interaction between app or systems.
o It is utilized within a software application.
5. Database Middleware:
o It provides direct access and interaction to databases with databases.
o This is the most general and commonly known type of middleware.
o This includes SQL database software.
6. Transaction Middleware:
o It includes application like transaction proccessing monitor and web application
server.
7. Embedded Middleware:
o It act as a interface between embedded application and real time operating system.
8. Contact-Centric Middleware:
o It allows abstract specific content and similar to publish/subscribe middleware.

Q-19 Define Gateway.

It is used when networks between device and middleware having different set of protocols.

Ex: IVR Gateway is used to interface voice with a computer and WAP gateway is used to access
internet on mobile phones.

Q-20 How to make an existing application to mobile enable?


 Create a new application: You can develop new application that supports mobile computing.
 Enhance or Upgrade existing system: Enhance existing system by providing mobile computing
features on it.
 Buy an application from version: You can buy mobile enable applications from market.
 Take an application or rent: You can take mobile enabled application on rent from providers.
 Use middleware: Use middleware technology which make your application enable.

Q-21 Explain Mobile IP in detail or What is mobile IP Explain working of it ?


OR Explain Agent Discovery and registration in mobile IP.
Mobile IP :

 Mobile IP (Internet Protocol) enables the transfer of information to and from mobile
computers, such as laptops and wireless communications.
 Any device or media that supports IP can supports Mobile IP.
 Mobile IP allows user to keep same IP address while roaming from home network to
foreign network without terminating active session of ongoing application.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 19
Subject : Mobile Computing and Application Development 3360704

 Component of Mobile IP:


1. Mobile Node: It is a device such as mobile phone, smart phone, tablet or laptop
Having network roaming capabilities .
2. Home Agent: It is router on the home network .It works as an anchor point
from communication with the Mobile Node.
3. Foreign Agent: It is a router on the foreign network. It works as point of
Attachment for the mobile node when it roams to a foreign network.

 Working of mobile IP involves three basic functions.


A. Agent discovery
B. Registration
C. Tunneling
A. Agent discovery:
 A mobile node discovers that it is foreign and home agent.
 Home agent and foreign agent advertise their services on the network by using ICMP
Router Discovery Protocol(IRDP).
 The mobile node listens to this advertisement and detects that it has moved from home
network to foreign network and it starts registration.
B. Registration:
 A mobile node register its current location with the foreign agent and home agent
during his face.
 Once a mobile node get the address it’s sends the same registration request to home
agent.
 When home agent receives this request it updates its routing table and send replay back
to mobile node
c. Tunneling :
 During these phase a tunnel is setup by the home agent of mobile node.
 Then foreign network route the packets to mobile node while roaming.

Q-22 Explain basic concept of Satellite Communication.

 Satellites enable communication over large distance.


 It can be used for variety of applications like telephone calls, providing communication to
remote areas of the earth, ships, aircraft and other mobile vehicles.
 In satellite communication signal transfer sender and receiver.
 The transmitter station on the earth send signals in the sp[ace towards satellite. This
process is known as uplink.
 Upon receiving signals from the transmitter station, the satellite amplifies the signal, sends
back to the receiver station on earth, this process is known as downlink.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 20
Subject : Mobile Computing and Application Development 3360704

Satellite

Transmitter Receiver Station


Station

 Types of Satellite Communication System:-


 Depending upon the orbit position of satellite there are three types:
i. LEO (Low Earth Orbit) Satellite
ii. MEO (Medium Earth Orbit) Satellite
iii. GEO (Geo Stationery Earth Orbit) Satellite
1. LEO (Low Earth Orbit) – In this, orbit is in the range of 500 to 1500 km.
 Orbit period is about 10-40 min.
 Due to orbit position we required 40-80 satellites to provide continuous coverage.
 It is used in telecommunication system like video conferencing, e-mail, etc.
Advantage of LEO:
 As the orbit position is not far away from the surface of the earth it does not require
high power rocket to launch them.
 Less expensive.
2. MEO (Medium Earth Orbit) –
 Here orbit is in the range of 5000 to 12000 km.
 It is known as Intermediate Circular Orbit (ICO) because its orbits higher then LEO
and lower than GEO.
 Orbit period is about 2-8 hrs.
 Approx 8-20 such satellite required to provide continuous coverage.
 It is used for navigation which cover the north and south pole.
3. GEO (Geo Stationary Satellite):
 Here the orbit is in the range of 36000 km above the surface of the earth.
 The orbital period is about 24hrs.
 It is used to handle communication up to large distance.
 Its revolutionary direction must be same as that of earth.
 The time period of satellite’s revolution must be same to the time period of the earth.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 21
Subject : Mobile Computing and Application Development 3360704

Comparison of LEO, MEO and GEO:-

LEO MEO GEO


Orbital Height 500-1500 km 5000-12000 km 36000 km
Orbital Period 10-40 minutes 2-8 hrs 24 hrs
No of Satellite 40 to 80 8 to 20 3
Satellite Life Short Long Longer
No of Handoff High Low Least
Propagation Delay Low High Highest

Satellite phones:
 A satellite phone is a phone that uses satellites for communication.
 It receives and sends signals.
 These phones enable communication anywhere around the world irrespective of location.
 Due to cost and other reasons such as government regulations on use, satellite phones
are utilized primarily where there is no access.
 The major applications of satellite phones can be found in the following areas:-
 Marine Engineering(Ships)
 Aviation(Aero-planes)
 Military
 Emergency Conditions

Satellite Phone Vs Cell Phone:


Satellite Phone Cell Phone
 Satellite phones use low Earth  A cellular phone functions on the
Orbiting(LEO)/MEO(Medium Earth basis of cells and hence are called
Orbit)/Geostationary satellites. cell phones.
 They do not have any intermediate  The whole network area is divided
towers. into small areas and an antenna is
installed in each area.
 They do not use cell towers.  They have cell towers.
 The communication link rarely gets  Each cell is a radio link from the cell
broken. phone to the PSTN.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 22
Subject : Mobile Computing and Application Development 3360704

Features Of Satellite Phones:


 Satellite phones provide a solution for communication when all other forms of
communication are disrupted or limited in cases like earthquakes, floods etc.
 The coverage area of a satellite greatly exceeds that of a terrestrial system.
 Transmission cost of a satellite is independent of the distance.
 Satellite to satellite communication is very precise.
 Higher bandwidths are available for use.

Components of a Satellite Phone Network:


1. Satellite network
2. The ground stations
3. Subscriber products(The satellite phones and data units)

 Satellite network consists of one or more satellites for transmitting the signals for source
to destination.
 For example , Iridium satellite
 Each satellite travelling at 16,832 miles per hour.
 These satellites act as cellular towers in the sky.
 The ground network consists of earth stations that are used for command and control.
 The earth stations also work as Hubs.
 For example , Iridium gateways interconnect with PSTN.

Functioning of a Satellite Phone Network:

 A satellite phone is a radio transceiver.


 It sends signals directly to a satellite.
 When the satellite phone is turned on, the signal goes up to any number of satellites.
 Those signals are then sent back to earth to a station.
 The Gateway processes and takes care of the switching of the calls.
 This station then directs the call to the PSTN.
 The frequency specification of a satellite phone is a 626.5 to 1660.5 MHz for transmitter
and 1525.0 to 1559.0 MHz for receiver.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 23
Subject : Mobile Computing and Application Development 3360704

Manufacturers of Satellite Phone Systems:


Some of the major manufacturers of satellite phone systems include:-

 inmarsat
 IRIDIUM
 THURAYA
 Globalstar

Advantages of Satellite Phones:


 Wide network coverage
 Uniform performance irrespective of location
 Uniformity in phone number
 No installation/setup required
 Highly useful in disaster response

Disadvantages of Satellite Phones:


 High cost of the phone as well as call cost
 Large antenna size
 Delay in voice communications conversations, particularly when using networks based on
geosynchronous orbits.
 Low data bandwidths for internet access etc.
 Local government regulations may also prevent one from using satellite phones without
prior permission.

Prepared By: Preeti Gajjar and Ami Patel (VPMP POLYTECHNIC, Lecturer in CE Dept ) 24

You might also like