Mobile Computing 1-2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Introduction to Mobile Computing Location Management: HLR-VLR Wireless Networking

Mobile computing refers to the use of portable In GSM (Global System for Mobile Communications) and Wireless networking refers to the technology and
computing devices, such as smartphones, tablets, other cellular networks, Location Management is the infrastructure that enables communication between
laptops, and wearable technology, to access and process of tracking the current location of mobile devices without the need for physical wired
transmit data wirelessly. subscribers as they move within the network's coverage connections.
This technology has transformed the way people area. It has become an integral part of modern
communicate, work, and interact with information, 1. Home Location Register (HLR): communication systems, facilitating connectivity
enabling unprecedented levels of connectivity and The HLR is a central database that stores permanent between devices such as smartphones, laptops,
flexibility. subscriber information for each registered mobile tablets, IoT (Internet of Things) devices, and more.
Issues in Mobile Computing device within the network's coverage area. Applications of Wireless Networking:
1. Security Concerns: Mobile devices are susceptible to It serves as the main repository for subscriber profiles, Internet Access: Wireless networks provide ubiquitous
various security threats, including malware, phishing including subscriber identity, service subscription internet access, allowing users to connect to the
attacks, and data breaches. details, and current location information. internet from various locations such as homes, offices,
2. Privacy Risks: The extensive collection of personal 2. Visitor Location Register (VLR): coffee shops, and public spaces.
data by mobile apps and services raises concerns The VLR is a temporary database associated with each Mobile Communication: Cellular networks enable
about user privacy. Mobile Switching Center (MSC) or Base Station mobile communication services such as voice calls,
3. Device Fragmentation: Developers must ensure Controller (BSC) in the cellular network. text messaging, and mobile internet access for
compatibility across multiple platforms, which can be It stores information about mobile subscribers smartphones and other mobile devices.
time-consuming and resource-intensive. currently located within the coverage area of the IoT Connectivity: Wireless networking is essential for
4. Battery Life: Battery life remains a significant corresponding MSC or BSC. connecting and controlling IoT devices, such as smart
constraint for mobile devices, limiting their usability thermostats, security cameras, wearable devices, and
and functionality. Channel Allocation in Cellular Systems: CDMA and GPRS industrial sensors.
5. Network Connectivity: Mobile users rely on wireless Channel allocation in cellular systems is the process of Wireless LANs (WLANs): Wireless LANs provide local
networks, such as Wi-Fi, cellular, and Bluetooth, for assigning communication channels to users within the area network connectivity without the need for wired
internet access and data transmission. network to facilitate voice calls, data transmission, and connections, enabling flexible and mobile access to
6. Limited Resources: Compared to traditional desktop other communication services. network resources within homes, offices, and public
computers, mobile devices have limited processing Two prominent cellular technologies, CDMA (Code Wi-Fi hotspots.
power, memory, and storage capacity. Division Multiple Access) and GPRS (General Packet Emerging Technologies: Wireless networking continues
7. User Experience: Designing intuitive and responsive Radio Service), employ different methods of channel to evolve with emerging technologies such as 5G, Wi-Fi
user interfaces for mobile applications is crucial for allocation. 6 (802.11ax), and LPWANs (Low-Power Wide-Area
ensuring a positive user experience. 1. CDMA (Code Division Multiple Access): Networks), which promise faster speeds, lower latency,
CDMA is a digital cellular technology that allows multiple and increased connectivity for future applications.
GSM (Global System for Mobile Communications) users to share the same frequency band simultaneously by
GSM, or Global System for Mobile Communications, is using unique spreading codes to differentiate between Wireless LAN Overview: MAC Issues
a widely used digital cellular technology for mobile users. Wireless Local Area Networks (WLANs) utilize various
phones that operates on the 900 MHz and 1800 MHz Soft Handoff: CDMA supports soft handoff, where a technologies and protocols to enable wireless
frequency bands in most parts of the world. mobile device is simultaneously connected to multiple communication between devices within a limited
Its air interface and channel structure define how base stations (cells) during handover. geographical area, such as a home, office, or campus.
Dynamic Channel Assignment: CDMA networks The Medium Access Control (MAC) layer of the IEEE
information is transmitted between mobile devices
dynamically allocate channels based on demand and 802.11 standard governs access to the shared wireless
and base stations in the GSM network.
network conditions. medium, addressing several key issues in wireless
Power Control: CDMA employs power control LANs:
1. Air Interface:
mechanisms to regulate the transmit power of mobile 1. Collision Avoidance:
Frequency Division Multiple Access (FDMA): GSM uses
devices. In wireless LANs, multiple devices contend for access to
FDMA as the basic multiple access technique. The
2. GPRS (General Packet Radio Service): the shared wireless medium. To avoid collisions and
available frequency band is divided into multiple
GPRS is a packet-switched technology that enables ensure efficient data transmission, WLANs employ various
channels, each with a bandwidth of 200 kHz.
mobile data communication over GSM networks. mechanisms:
Time Division Multiple Access (TDMA): Within each
GPRS introduces packet-switching capabilities to GSM, 2. Hidden Node Problem:
FDMA channel, TDMA is employed to divide the
allowing users to transmit data in small, discrete The hidden node problem occurs when two or more
channel into time slots. GSM uses an 8-slot TDMA
packets rather than dedicated circuit-switched devices cannot detect each other's transmissions due to
frame structure, with each frame lasting for 4.615
connections. obstructions or distance. This can lead to collisions when
milliseconds..
1. Packet-Switched Architecture: GPRS networks allocate multiple devices transmit simultaneously. Techniques to
Digital Modulation: GSM employs Gaussian Minimum
radio channels dynamically on a per-packet basis. mitigate the hidden node problem include:
Shift Keying (GMSK) modulation for transmitting digital
Instead of reserving a dedicated channel for each user, 3. Quality of Service (QoS) Management:
data over the air interface.
GPRS utilizes available channels as needed to transmit Ensuring QoS in wireless LANs is essential for applications
2. Channel Structure:
data packets. This dynamic allocation enables efficient requiring timely and reliable data transmission. The MAC
Traffic Channels (TCH): These channels are used for
use of network resources and supports bursty data layer addresses QoS issues through mechanisms such as:
carrying user voice or data traffic. There are two types
traffic. 4. Power Management:
of traffic channels:
2. Logical Channels: GPRS introduces several logical Wireless devices often implement power-saving
Full-rate TCH (TCH/F): Each full-rate TCH supports
channels for data transmission, including the Packet mechanisms to conserve battery life when idle.
a single voice connection with a data rate of 13
Data Channel (PDCH) for carrying user data packets
kbps.
and the Packet Control Channel (PCCH) for signaling IEEE 802.11 (Wi-Fi)
Half-rate TCH (TCH/H): Half-rate TCHs are used to
and control messages. IEEE 802.11, commonly known as Wi-Fi, is a set of
accommodate two voice connections within the
3. Dynamic Allocation of Timeslots: GPRS employs standards for wireless local area networking (WLAN)
same channel, each operating at a data rate of 6.5 dynamic allocation of timeslots within the TDMA (Time technology.
kbps. Division Multiple Access) frame structure used in GSM. It defines protocols and specifications for
Control Channels: 4. Quality of Service (QoS) Control: GPRS supports implementing wireless communication between
Broadcast Control Channel (BCCH): This channel different QoS levels to accommodate various types of devices within a local area network.
carries system information broadcasted by the applications and servicessuch as data throughput, 802.11a/b/g/n/ac/ax: These are different variants of the
base station, including cell identity, location area delay, and reliability, can be negotiated between the IEEE 802.11 standard, each offering varying data rates,
identity, and neighboring cell information. network and the mobile device to ensure satisfactory frequency bands, and features.
Common Control Channel (CCCH): CCCH includes performance for different types of data traffic. 2.4 GHz and 5 GHz Bands: Wi-Fi operates in both the 2.4
channels for paging, access grant, and random GHz and 5 GHz frequency bands, providing flexibility
access procedures. Overview of Wireless Telephony: Cellular Concept and compatibility with different devices and
Dedicated Control Channel (DCCH): DCCH is used The cellular concept is a fundamental principle in environments.
for signaling between the mobile device and the wireless telephony that revolutionized communication Applications:
network during call setup, handover, and other by enabling widespread mobile connectivity. Internet Access: Wi-Fi is widely used for providing
control functions. It involves dividing a geographical area into smaller wireless internet access in homes, offices, public
Associated Control Channel (ACCH): ACCH is used regions called cells, each served by a low-power spaces, and other locations.
for exchanging control information related to transceiver station known as a cell site or base station. Wireless LANs (WLANs): Wi-Fi enables the creation of
ongoing voice or data connections, such as power Cellular Concepts: wireless local area networks, allowing devices to
control and handover commands. Cell: A geographic area covered by a cellular network, communicate with each other and access network
Synchronization Channels: served by a base station. resources without wired connections.
Synchronization Channel (SCH): SCH is used for Base Station (Cell Site): A fixed radio transceiver that Mobile Connectivity: Wi-Fi connectivity is integrated
initial synchronization of mobile devices with the provides wireless connectivity to mobile devices within into smartphones, tablets, laptops, and other mobile
network. its coverage area. devices, enabling seamless connectivity to Wi-Fi
Frequency Correction Channel (FCCH): FCCH is Mobile Switching Center (MSC): A central component networks for internet access and data transmission.
transmitted periodically to assist mobile devices in in the cellular network that connects calls, manages
frequency synchronization. handoffs, and controls signaling. Bluetooth
Random Access Channel (RACH): RACH allows mobile Bluetooth is a wireless communication technology
devices to request access to the network for initiating used for short-range data transmission between
calls or sending short data messages. devices.
It is commonly used for connecting peripherals such
as headphones, speakers, keyboards, and
smartwatches to smartphones, tablets, and computers.
1.Pairing and Security:
Pairing: Devices establish a secure connection by
pairing with each other using a PIN or passkey. Once
paired, devices exchange encryption keys to secure
data transmissions.
Security Features: Bluetooth specifications include
security features such as authentication, encryption,
and frequency hopping to protect against
eavesdropping and unauthorized access.
2.Applications:
Wireless Audio Streaming: Bluetooth is commonly used
for streaming audio from smartphones, tablets, and
computers to headphones, speakers, and car stereos.
Peripheral Connectivity: Bluetooth enables wireless
connections between smartphones and peripherals
such as keyboards, mice, game controllers, and
printers.
IoT Connectivity: Bluetooth Low Energy (BLE) is a
variant of Bluetooth designed for low-power IoT
devices, allowing them to communicate with
smartphones and other BLE-enabled devices for data
exchange and control.
Wireless Multiple Access Protocols Wireless Applications
Wireless multiple access protocols are used to manage Wireless technology has facilitated the development of
access to the shared wireless medium in wireless various applications across numerous domains, enabling
communication networks, allowing multiple users to mobility, connectivity, and convenience.
transmit and receive data simultaneously. Voice over Wireless: Providing voice communication
1. Frequency Division Multiple Access (FDMA): over wireless networks, often through technologies like
In FDMA, the available frequency spectrum is VoIP (Voice over Internet Protocol).
divided into multiple non-overlapping frequency Video Streaming: Transmitting video content
bands. wirelessly, commonly used in applications like video
FDMA is used in analog cellular systems and some conferencing and online streaming.
satellite communication systems. Location-Based Services: Utilizing wireless
2. Time Division Multiple Access (TDMA): technologies for applications like GPS navigation and
TDMA divides the available time slots within a location-based advertising.
predefined time frame into multiple time slots. Mobile Communication: Wireless networks provide
TDMA is used in GSM (2G) and some digital trunking voice calling, text messaging, and multimedia
systems. messaging services to mobile devices.
3. Code Division Multiple Access (CDMA): Internet Access: Wireless technology enables wireless
CDMA allows multiple users to share the same internet access via Wi-Fi hotspots, cellular networks
frequency band simultaneously by assigning unique (e.g., 4G LTE, 5G), and satellite internet services,
spreading codes to each user. providing connectivity to users .
CDMA is used in 3G (CDMA2000) and 4G (LTE) Mobile Apps:
cellular networks. Mobile Payments:
Emergency Services: allowing individuals to call for
TCP over Wireless help, report emergencies, and receive alerts via mobile
Transmission Control Protocol (TCP) is a reliable, devices.
connection-oriented protocol used for transmitting
data over IP networks. Wireless Application Protocol (WAP)
When TCP is used over wireless networks, several WAP is an open international standard for delivering
challenges arise due to the characteristics of wireless internet content and services to mobile devices.
communication, such as packet loss, variable link 1. Architecture:
quality, and high bit error rates. WAP Gateway: It translates WAP content requests into
1. Packet Loss and Retransmission: standard internet protocols (e.g., HTTP) and vice versa,
Wireless networks are prone to packet loss due to allowing mobile devices to access web content.
factors like signal attenuation, interference, and Wireless Application Environment (WAE): WAE defines
fading. the programming model and runtime environment for
2. Link Layer Retransmissions: developing WAP applications.
Some wireless technologies, such as Wi-Fi, employ Wireless Session Protocol (WSP): WSP is a lightweight
automatic retransmission mechanisms at the link protocol used for communication between the mobile
layer (e.g., ARQ in IEEE 802.11). device and the WAP gateway.
3. Window Size Adaptation: Wireless Transaction Protocol (WTP): WTP provides
TCP's congestion control algorithm relies on reliable data transport over unreliable wireless
feedback from packet acknowledgments (ACKs) to networks by managing packet sequencing,
adjust the sender's window size dynamically. retransmissions, and error detection.
4. Buffer Management: Wireless Transport Layer Security (WTLS): WTLS is a
Wireless networks may have smaller buffer sizes security protocol that provides data encryption,
and lower capacity compared to wired networks, authentication, and integrity protection for WAP
leading to increased queuing delays and potential communications.
buffer overflows.
5. Cross-Layer Optimization: Protocol Stack:
Cross-layer optimization techniques that leverage The WAP protocol stack comprises multiple layers, each
information from lower layers (e.g., link quality responsible for specific functions:
indicators) to inform TCP's congestion control Application Layer: This layer includes the Wireless
decisions can improve performance over wireless Application Environment (WAE), which provides APIs
networks. and tools for developing WAP applications.
Session Layer: The Session layer handles session
Data Broadcasting management and coordination between the mobile
Data broadcasting refers to the transmission of data to device and the WAP gateway.
multiple recipients simultaneously over a broadcast Transaction Layer: The Transaction layer, consisting of
network. the Wireless Transaction Protocol (WTP), manages
In the context of wireless communication, data reliable data transport over the wireless network,
broadcasting is used to deliver information, content, or ensuring packet sequencing, retransmissions, and error
updates to a large number of mobile devices detection.
efficiently. Security Layer: The Security layer, implemented by the
1. Broadcast Protocols: Various protocols and standards Wireless Transport Layer Security (WTLS) protocol,
are used for data broadcasting over wireless networks, provides data encryption, authentication, and integrity
including DVB (Digital Video Broadcasting), ATSC protection for WAP communications.
(Advanced Television Systems Committee), DAB
(Digital Audio Broadcasting), and LTE Multimedia Application Environment:
Broadcast Multicast Service (MBMS). The WAP application environment provides a platform for
2. Content Delivery: Data broadcasting can deliver developing and deploying interactive and dynamic mobile
various types of content, including audio, video, text, applications.
software updates, live events, news, weather forecasts, Programming Model: WAE defines a programming
and advertisements. model for building WAP applications using markup
3. Hybrid Broadcasting: Hybrid broadcasting solutions languages (e.g., WML), scripting languages (e.g.,
combine traditional broadcast networks with internet- WMLScript), and server-side technologies (e.g.,
based delivery mechanisms, enabling seamless WMLScript libraries).
integration of broadcast content with interactive Development Tools: WAP developers use specialized
services, on-demand content, and personalized tools, such as WAP development kits and emulators, to
recommendations. create, test, and debug WAP applications across
4. Content Protection: Data broadcasting systems different mobile devices and platforms.
incorporate content protection mechanisms, such as Content Delivery: WAP applications deliver content in
encryption and digital rights management (DRM), to a format optimized for mobile devices, enabling users
secure transmitted content and prevent unauthorized to access web-based services, information, and
access, piracy, or content manipulation. multimedia content on their phones and tablets.

Mobile IP Applications:
Mobile IP (Internet Protocol) is a protocol suite that WAP applications span various domains and use cases,
enables mobile devices to maintain continuous network including:
connectivity and transparently roam between different Mobile Web Browsing: WAP-enabled mobile browsers
networks while preserving their IP addresses. allow users to browse the internet, access websites,
1. IP Address Mobility: Mobile IP allows mobile devices to and search for information using their mobile devices.
retain their IP addresses even when moving between Mobile Commerce: WAP supports mobile commerce
different networks or changing their point of applications, such as mobile banking, mobile payments,
attachment to the internet. and mobile shopping, enabling users to conduct
2. Home Agent and Foreign Agent: Mobile IP employs a financial transactions and purchase goods and services
Home Agent (HA) and Foreign Agent (FA) to manage on their phones.
mobility and routing functions. Messaging Services: WAP-based messaging
3. Registration Process: When a mobile device moves to a applications, including SMS (Short Message Service)
new network, it initiates a registration process with the and MMS (Multimedia Messaging Service), allow users
Home Agent through the Foreign Agent. to send and receive text messages, images, and
4. Route Optimization: Mobile IP supports route multimedia content on their mobile devices.
optimization techniques, such as triangular routing and Mobile Entertainment: WAP enables mobile
bi-directional tunneling, to minimize latency and entertainment applications, such as mobile games,
optimize data routing between the mobile device and streaming media, and music downloads, offering users
its correspondent nodes, bypassing unnecessary access to on-the-go entertainment options on their
detours through the Home Agent. phones and tablets.
5. Security Considerations: Mobile IP implementations
incorporate security mechanisms, such as IPsec (IP
Security) and Authentication, Authorization, and
Accounting (AAA) protocols, to protect against attacks,
eavesdropping, and unauthorized access to mobile
communications.

You might also like