Professional Documents
Culture Documents
Mobile Computing Assignment 1
Mobile Computing Assignment 1
Mobile Computing is a technology that allows us to transmit data, audio, and video via devices
that are not connected with any physical link. The key features of mobile computing are that the
computing devices are portable and connected over a network.
Low bandwidth
Mobile internet access is slower than the fixed desktop connection while using GSM and other
advanced technologies such as 3G, 4G, and 5G. Local wireless connection offers Mbit/s of
speed and wide wireless connection offers only Kbit/s of speed. There is a requirement of using
more bandwidth while using such advanced mobile technologies so that the user can transfer
data at a higher speed while the user is mobile.
Lower security
When working with mobile people are completely dependent on the public network which can be
easily tracked and hacked by hackers. There is a big problem with the security of data while
transferring from one mobile device to another device. Therefore to protect the data from
eavesdropping there is a need for strongly secured algorithms of authentication and security.
Money transaction is a very sensitive area and it is the target of hackers. Internet frauds related
to money are huge. Therefore more research and development is needed to provide more
secure methods to transfer the information.
Transmission interferences
Radio transmission cannot be protected therefore there is higher transmission interference due
to electric engines, lightning, high buildings, mountains, weather conditions, etc., all this results
in a higher loss of data rate and bit errors.
The different types of cells are given different names according to their size and function:
Macro cells: Macro cells are large cells that are usually used for remote or sparsely populated
areas. These may be 10 km or possibly more in diameter.
Micro cells: Micro cells are those that are normally found in densely populated areas which
may have a diameter of around 1 km.
Pico cells: Picocells are generally used for covering very small areas such as particular areas
of buildings, or possibly tunnels where coverage from a larger cell in the cellular system is not
possible.
Obviously for the small cells, the power levels used by the base stations are much lower and the
antennas are not positioned to cover wide areas. In this way the coverage is minimized and the
interference to adjacent cells is reduced.
Femtocells : Femtocells are small, low-powered cellular base stations that are used
predominantly within homes and small businesses. A femtocell is able to connect to a service
provider's network via broadband to deliver connectivity to mobile devices.
Selective cells: Sometimes cells termed selective cells may be used where full 360 degree
coverage is not required. They may be used to fill in a hole in the coverage in the cellular
system, or to address a problem such as the entrance to a tunnel etc.
Umbrella cells: Another type of cells known as an umbrella cell is sometimes used in instances
such as those where a heavily used road crosses an area where there are microcells.
Under normal circumstances this would result in a large number of handovers as people driving
along the road would quickly cross the microcells.
An umbrella cell would take in the coverage of the microcells (but use different channels to
those allocated to the microcells).
However it would enable those people moving along the road to be handled by the umbrella cell
and experience fewer handovers than if they had to pass from one microcell to the next.
5. What is a cluster? What should be the size of a cluster? What is the hidden
terminal problem?
A cluster is a group of cells in which no frequency is reused within a cluster. Frequencies used
in one cell cluster can be reused in another cluster of cells.
Cluster is used to reduce co-channel interference and adjacent channel interference.
Reducing the cluster size N while keeping the cell size constant, more clusters are required to
cover the given area and hence more capacity. N = i2 + ij+ j2 ▪ N, the cluster size is typically 4, 7
or 12. In GSM normally N =7 is used.
In wireless LANs ( wireless local area networks), the hidden terminal problem is a transmission
problem that arises when two or more stations who are out of range of each other transmit
simultaneously to a common recipient. This is prevalent in decentralized systems where there
aren’t any entities for controlling transmissions. This occurs when a station is visible from a
wireless access point (AP), but is hidden from other stations that communicate with the AP.
Co-channel interference is not actually an interference but more a sort of congestion. It hinders
the performance by increasing the wait time as the same channel is used by different devices.
The CCI forces other devices to defer transmissions and wait in a queue until the first device
finishes using the transmission line and the channel is free.
The 802.11 protocol is designed to address this situation and to utilize the channel in the most
efficient way.
The closest distance between the centers of two cells using the same frequency (in different
clusters) is determined by the choice of the cluster size C and the lay-out of the cell cluster. This
distance is called the frequency 'reuse' distance. It is
ru = SQRT{3 C}
For hexagonal cells, i.e., with 'honeycomb' cell lay-outs commonly used in mobile radio, possible
cluster sizes are C = i2 + ij + j2, with integer i and j (C = 1, 3, 4, 7, 9, ...). Integers i and j
determine the relative location of co-channel cells.
7. Draw and explain the GSM architecture. What are subsystems in a GSM system?
What are the logical channels in GSM? What are the different services provided by
GSM?
What are home location registers and visitor location registers used for?
Home Location Register (HLR) is a database that contains data regarding authorized
subscribers using a global system for mobile communication (GSM) core network. The home
location register stores information ranging from phone numbers to current location of the
subscriber. Some data contained in the home location register include the mobile Station
International Subscriber Directory Number (MSISDN) which is a list of the telephone numbers
used by the subscribe
Mobile Computing is defined as a computing environment which is mobile and moves along with the user.
There are various challenges that affect mobile computing and it has to be overcome. Some of the major
technical challenges faced by mobile computing are:
1. Mobility
2. Wireless Medium
3. Portability
These are explained as following below:
1. Mobility:
It is the most important aspect of mobile computing, but it has to face the certain challenges which are :
● Auto configuration of the system, as the environment of the system is developing continuously.
Hence for every change, it has to configure itself to the new situation.
● Location management is also a big objection in mobility. To manage the location, following tasks
are to be performed regularly over a fixed period of time.
● Track user’s call.
● Update user’s position and data.
● To maintain the heterogeneity is also a big task as the system is keep moving in a large variation
of situations
● Range of spectrum.
● Verification of security.
2. Wireless Medium:
The transmission medium in mobile computing is wireless, therefore the following points are considered:
● Various interferences occur in mobile computing by the different elements in the environment.
● Accuracy and quantity of bandwidth should be sufficient.
● Network cost is feasible.
3. Portability:
This means that the communication device moves, for eg. mobile phones. The following mobile
constraints are to be considered as the devices are also mobile: