SlideShare a Scribd company logo
1 of 38
Download to read offline
Introduction To Mobile Computing
By
Prof. Madhuri Nitin Badgujar
Birla College Of Arts, commerce, and
Science, Kalyan(w)
• Mobile Computing : A technology that allows transmission
of data, via a computer, without having to be connected to
a fixed physical link.
• Mobile voice communication is widely established
throughout the world and has had a very rapid increase in
the number of subscribers to the various cellular networks
over the last few years. An extension of this technology is
the ability to send and receive data across these cellular
networks. This is the principle of mobile computing.
• Mobile data communication has become a very important
and rapidly evolving technology as it allows users to
transmit data from remote locations to other remote or
fixed locations.
EXISTING CELLULAR NETWORK
ARCHITECTURE
• Mobile telephony took off with the introduction
of cellular technology which allowed the efficient
utilization of frequencies enabling the connection
of a large number of users.
• During the 1980's analogue technology was
used.
• In the 1990's the digital cellular technology was
introduced with GSM(Global System Mobile)
• Today many peoples use mobile computing for
different purpose
• Advances in technology
• – More computing power in smaller devices
• – Flat, lightweight displays with low power consumption
• – New user interfaces due to small dimensions
• – More bandwidth (per second? per space?)
• – Multiple wireless techniques
• • Technology in the background
• – Device location awareness: computers adapt to their environment
• – User location awareness: computers recognize the location of the
• user and react appropriately (call forwarding)
• • “Computers” evolve
• – Small, cheap, portable, replaceable
• – Integration or disintegration?
• There are 2 aspects of mobile computing
• – User mobility: users communicate “anytime,
anywhere, with anyone” (example: read/write
email on web browser)
• – Device portability: devices can be
connected anytime, anywhere to the network
• There are two different kinds of mobility:
• user mobility and device portability.
• User mobility refers to a user who has
• access to the same or similar telecommunication services
at different places, i.e.,the user can be mobile, and the
services will follow him or her.
• With device portability, the communication device moves
• Many mechanisms in the network and inside the device
have to make sure
• that communication is still possible while the device is
moving.
• In device mobility wireless term is used which
This only describes the way of accessing a
network
• he wire is replaced by the transmission of
electromagnetic waves through the air
• communication device can exhibit one of the following
characteristics:
• Fixed and wired: The devices use fixed networks. This
configuration describes the typical desktop computer in an
office.
• Mobile and wired:Many of today’s laptops fall into this
category, users carry the laptop from one place to the next,
and reconnecting to the company’s network via the
telephone network and a modem.
• Fixed and wireless:This mode is used for installing
networks, in historical buildings to avoid damage by
installing wires, or at buying or selling of goods and services
shows to ensure fast network setup
• Mobile and wireless: No cable restricts the
user, who can roam between different
wireless networks. Today’s most successful
example for this category is GSM with more
than 800 million users.
Applications
• 1. Vehicles:Today’s cars already comprise some, but tomorrow’s cars will
comprise many wireless communication systems and mobility aware
applications, like transmission of news, road condition, weather, music.
• For personal communication,a universal mobile telecommunications
system (UMTS) phone might be available offering voice and data
connectivity with 384 kbit/s.
• For remote areas,satellite communication can be used,
• For example, the current position of the car is determined via the global
positioning system (GPS).
• At the emergency situations local ad-hoc network use for the fast
exchange of information to help each other. In case of accident, there will
be fast services provided in to the accident place, this technology already
available in the cars.
• In the future, cars will also inform other cars about accidents via the ad-
hoc network to help them slow down in time, even before a driver can
recognize an accident.
• Figure 1.1 shows a typical scenario for mobile communications with many wireless devices.
• Networks with a fixed infrastructure like cellular phones
(GSM, UMTS) will be interconnected with trunked radio
systems (TETRA) and wireless LANs (WLAN).
• Satellite communication links can also be used.
• The networks between cars and inside each car will more
likely work in an ad-hoc fashion
• Wireless networks inside a car can made up of personal digital
assistants (PDA), laptops, or mobile phones, e.g., connected
with each other using the Bluetooth technology.
• So we can say that local ad-hoc network with vehicles close-by
to prevent accidents, guidance system, redundancy
• 2. Emergencies:
• early transmission of patient data to the hospital, current
status, first diagnosis
• replacement of a fixed infrastructure in case of
earthquakes, hurricanes, fire etc.
• Wireless networks are the only means of communication in
the case of natural disasters such as earthquakes.
• 3. Business:
• A travelling salesman today needs instant access to the
company’s database: to ensure that files on his or her
laptop reflect the current situation, to enable the company
to keep track of all activities of their travelling employees,
to keep databases consistent etc.
• Figure shows what may happen when employees try to communicate off
base.
• At home, the laptop connects via a WLAN or
LAN and DSL to the Internet.
• Leaving home requires a handover to another
technology,
• mobile communications should always offer as
good connectivity as possible to the internet,
the company’s intranet, or the telephone
network.
• 4. Replacement of wired networks
• wireless networks can also be used to replace wired networks,
• it is often impossible to wire remote sensors for weather forecasts,earthquake
detection, or to provide environmental information.
• Wireless connections, e.g., via satellite, can help in this situation.
• Wired network is infrequent and inflexible
• Many computer fairs use WLANs as a replacement for cabling.
• wireless networks are computers, sensors, or information displays
• in historical buildings, where excess cabling may destroy valuable walls or floors.
• 5. Infotainment and more
• wireless networks can provide up-to-date information at any appropriate location.
• Another growing field of wireless network applications lies in entertainment and
games to enable, e.g., ad-hoc gaming networks as soon as people meet to play
together.
• 6. Location dependent services
• Many research efforts in mobile computing and wireless networks try to hide
• the fact that the network access has been changed
• it is important for an application to ‘know’ something about the location or the
user might need location information for further activities. Several services that
might depend on the actual location can be distinguished:
• Follow-on services
– automatic call-forwarding, transmission of the actual workspace to the current location
• Information services
– „push“: e.g., current special offers in the supermarket
– „pull“: e.g., where is the Black Forrest Cherry Cake?
• Support services
– caches, intermediate results, state information etc. „follow“ the mobile device through the
fixed network
• Privacy
– who should gain knowledge about the location
• Mobile and wireless devices
• Even though many mobile and wireless devices
are available, there will be many more in the
future.
• There is no precise classification of such devices,
by size,shape, weight, or computing power.
• The following list gives some examples of mobile
and wireless devices graded by increasing
performance
Sensor:
• A very simple wireless device is represented by a
sensor transmitting state information.
Embedded controllers:
• Many appliances already contain a simple or
sometimes more complex controller
Pager:
• pager can only display short text messages,
• has a tiny display, and cannot send any messages.
Pagers can even be integrated into watches.
 Mobile phones:
• The traditional mobile phone only had a simple black
and white text display and could send/receive voice or
short messages.
• Today, mobile phones migrate more and more toward
PDAs. Mobile phones with full color graphic display,
touch screen, and Internet browser are easily available.
 Personal digital assistant:
• PDAs typically accompany a user and offer simple
versions of office software
• The typical input device is a pen, with built-in character
recognition translating handwriting into characters.
Pocket computer:
• pocket computers offering tiny keyboards, color
displays, and simple versions of programs found
on desktop computers
Notebook/laptop:
• Finally, laptops offer more or less the same
performance
• as standard desktop computers; they use the
same software – the only technical difference
being size, weight, and the ability to run on a
battery. If operated mainly via a sensitive display
History Of Wireless Communication
• The mobile and wireless devices of the future will be more
powerful, less heavy, and comprise new interfaces to the user and
to new networks. However, one big problem, which has not yet
been solved, is the energy supply.
• The more features that are built into a device, the more power it
needs.
• The higher the performance of the device, the faster it drains the
batteries
• Although the area of mobile computing and mobile communication
is developing rapidly, the devices typically used today still exhibit
some major drawbacks compared to desktop systems in addition to
the energy problem
• Mobile communication is greatly influenced by the merging of
telecommunication and computer networks.
• The use of light for wireless communications reaches back to ancient times.
• In former times, the light was either ‘modulated’ using mirrors to create a certain light on/light off
pattern
• Wired communication started with the first commercial telegraph line
• between Washington and Baltimore in 1843 and Alexander Graham Bell’s
• All optical transmission systems suffer from the high frequency of the carrier light.
• Today, DECT has been renamed digital enhanced cordless telecommunications for marketing
reasons and to reflect the capabilities of DECT to transport multimedia data streams.
• GSM was standardized in a document of more than 5,000
• pages in 1991. This first version of GSM, now called global system for mobile communication and
uses 124 full-duplex channels.
• GSM offers full international roaming, automatic location services, authentication, encryption on
the wireless link, efficient interoperation with ISDN systems, and a relatively high audio quality.
• It was soon discovered that the analog AMPS in the US and the digital GSM at 900 MHz in Europe
are not sufficient for the high user densities in cities.
• While in the US, no new spectrum was allocated for a new system, in Europe a new frequency band
at 1800 MHz was chosen
• In the US, different companies developed
different new, more bandwidth-efficient
technologies to operate side-by-side with
AMPS in the same frequency band.
• This resulted in three incompatible systems,
the analog narrowband AMPS (IS-88,(TIA,
1993a)), and the two digital systems TDMA
(IS-136, (TIA, 1996)) and CDMA (IS-95, (TIA,
1993b)).
• The invention of the electronic vacuum tube in 1906
by Lee DeForest (1873–1961) and Robert von Lieben
(1878–1913) helped to reduce the size of sender and
receiver.
• Nineteen twenty-eight was the year of many field
trials for television broadcasting
• The ‘Groupe Spéciale Mobile’ (GSM) was founded for
this new development.
• In 1983 the US system advanced mobile phone system
(AMPS) started
• Nineteen ninety-eight marked the beginning of mobile
communication using satellites with the Iridium system
• Iridium marked the beginning of small and
• truly portable mobile satellite telephones
including data service.
• Iridium consists of 66 satellites in low earth
orbit and uses the 1.6 GHz band for
communication with the mobile phone
Market For Mobile Communications
• Although the growth in wireless and mobile
communication systems has slowed down, these
technologies have still a huge market potential.
• More and more people use mobile phones,
wireless technology is built into many cars,
wireless data services are available in many
regions, and wireless local area networks are
used in many places.
• Figure shows the increasing number of
subscribers to mobile phone services worldwide
Introduction To Mobile Computing
Some open research topics
 Interference: Radio transmission cannot be protected against interference using
shielding as this is done in coaxial cable or shielded twisted pair. For higher loss
rates for transmitted data or higher bit error rates respectively.
 Regulations and spectrum: Frequencies have to be coordinated, and
unfortunately, only a very limited amount of frequencies are available (due to
technical and political reasons). One research topic involves determining how to
use available frequencies more efficiently.
• Further improvements are new air interfaces, power aware ad-hoc networks,
smart antennas, and software defined radios (SDR). The latter allow for software
definable air interfaces but require high computing power.
 Low bandwidth: Although they are continuously increasing, transmission rates are
still very low for wireless devices compared to desktop systems.
• Local wireless systems reach some Mbit/s while wide area systems only offer some
10 kbit/s. One task would involve adapting applications used with high-bandwidth
connections to this new environment so that the user can continue using the same
application when moving from the desktop outside the building.
• Researchers look for more efficient communication protocols with low overhead.
• High delays, large delay variation: A serious problem for communication protocols
used in today’s Internet (TCP/IP) is the big variation in link characteristics.
• In wireless systems, delays of several seconds can occur, and links can be very
asymmetrical. Applications must be tolerant and use robust protocols.
 Lower security, simpler to attack: Not only can portable devices be stolen more
easily, but the radio interface is also prone to the dangers of eavesdropping.
Wireless access must always include encryption, authentication, and other security
mechanisms that must be efficient and simple to use.
 Shared medium: Radio access is always realized via a shared medium. As it is
impossible to have a separate wire between a sender and each receiver, different
competitors have to ‘fight’ for the medium. Although different medium access
schemes have been developed, many questions are still unanswered, for example
how to provide quality of service efficiently with different combinations of access,
coding, and multiplexing schemes.
 Ad-hoc networking: Wireless and mobile computing allows for spontaneous
networking with prior set-up of an infrastructure. However, this raises many new
questions for research: routing on the networking and application layer, service
discovery, network scalability, reliability, and stability etc.
A simplified reference model
• Basic reference model used to structure communication systems
• Any readers who are unfamiliar with the basics of communication
networks should look up the relevant sections in the recommended
literature
• Figure shows a personal digital assistant (PDA) which provides an
example for a wireless and portable device.
• This PDA communicates with a base station in the middle of the
picture.
• The base station consists of a radio transceiver (sender and
receiver) and an interworking unit connecting the wireless link with
the fixed link.
• The communication partner of the PDA, a conventional computer, is
shown on the right-hand side.
Protocol
Stack
• Below each network element (such as PDA,
interworking unit, computer),the figure shows the
protocol stack implemented in the system according to
the reference model.
• End-systems, such as the PDA and computer in the
example, need a full protocol stack comprising the
application layer, transport layer, network layer, data
link layer, and physical layer.
• the PDA and computer in the example, need a full
protocol stack comprising the application layer,
transport layer, network layer, data link layer, and
physical layer.
• Applications on the end-systems communicate
with each other using the lower layer services.
• Intermediate systems such as the networking
unit, do not necessarily need all of the layers
• Figure shows only shows the network, data link,
and physical layers. As (according to the basic
reference model) only entities at the same level
communicate with each other
• the end-system applications do not notice the
intermediate system directly in this scenario.
• Physical layer: This is the lowest layer in a communication system
and is responsible for the conversion of a stream of bits into signals
that can be transmitted on the sender side.
• The physical layer of the receiver then transforms the signals back
into a bit stream.
• For wireless communication, the physical layer is responsible for
frequency selection, generation of the carrier frequency, signal
detection, modulation of data onto a carrier frequency and
encryption.
• Data link layer: The main tasks of this layer include accessing the
medium, multiplexing of different data streams, correction of
transmission errors,and synchronization.
• the data link layer is responsible for a reliable point-to point
connection between two devices or a point-to-multipoint
connection between one sender and several receivers.
• Network layer: This third layer is responsible for routing packets through a
network or establishing a connection between two entities over many other
intermediate systems. Important topics are addressing, routing, device
location,and handover between different networks
• Transport layer: This layer is used in the reference model to establish an end-to-
end connection. Topics like quality of service, flow and congestion control are
relevant, especially if the transport protocols known from the Internet, TCP and
UDP, are to be used over a wireless link.
• Application layer: Finally, the applications (complemented by additional
• layers that can support applications) are situated on top of all transmission
oriented layers.
• Topics of interest in this context are service location, support for multimedia
applications, adaptive applications that can handle the large variations in
transmission characteristics, and wireless access to the world wide web using a
portable device.
• Very demanding applications are video (high data rate) and interactive gaming
(low jitter, low latency).
Introduction To Mobile Computing

More Related Content

What's hot

Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
Wireless network
Wireless networkWireless network
Wireless networkmattglover0
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile ComputingKABILESH RAMAR
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPTSeminar Links
 

What's hot (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
WAP 2.0
WAP 2.0WAP 2.0
WAP 2.0
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Wireless network
Wireless networkWireless network
Wireless network
 
Wireless network
Wireless networkWireless network
Wireless network
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
CS8601 mobile computing Two marks Questions and Answer
CS8601 mobile computing Two marks Questions and AnswerCS8601 mobile computing Two marks Questions and Answer
CS8601 mobile computing Two marks Questions and Answer
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Cordless Technology
Cordless TechnologyCordless Technology
Cordless Technology
 

Viewers also liked

Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
Challenges in Business and IT Alignment
Challenges in Business and IT AlignmentChallenges in Business and IT Alignment
Challenges in Business and IT AlignmentVidur Pandit
 
Management information System and its types
Management information System and its typesManagement information System and its types
Management information System and its typesAbdul Rehman
 
Corporate information strategy & management
Corporate information strategy & managementCorporate information strategy & management
Corporate information strategy & managementschool teaching
 
Strategic Business IT alignment
Strategic Business IT alignmentStrategic Business IT alignment
Strategic Business IT alignmentJulen Mohanty
 
Types, purposes and applications of information systems
Types, purposes and applications of information systemsTypes, purposes and applications of information systems
Types, purposes and applications of information systemsMary May Porto
 
Strategic planning facilitation SME Strategy facilitator services
Strategic planning facilitation SME Strategy facilitator servicesStrategic planning facilitation SME Strategy facilitator services
Strategic planning facilitation SME Strategy facilitator servicesAnthony C Taylor
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systemsProf. Othman Alsalloum
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategyNorazila Mat
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information SystemsManuel Ardales
 
strategic information system
strategic information systemstrategic information system
strategic information systemPrateek Singh
 

Viewers also liked (16)

Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Challenges in Business and IT Alignment
Challenges in Business and IT AlignmentChallenges in Business and IT Alignment
Challenges in Business and IT Alignment
 
Management information System and its types
Management information System and its typesManagement information System and its types
Management information System and its types
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Corporate information strategy & management
Corporate information strategy & managementCorporate information strategy & management
Corporate information strategy & management
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Strategic Business IT alignment
Strategic Business IT alignmentStrategic Business IT alignment
Strategic Business IT alignment
 
Types, purposes and applications of information systems
Types, purposes and applications of information systemsTypes, purposes and applications of information systems
Types, purposes and applications of information systems
 
Strategic planning facilitation SME Strategy facilitator services
Strategic planning facilitation SME Strategy facilitator servicesStrategic planning facilitation SME Strategy facilitator services
Strategic planning facilitation SME Strategy facilitator services
 
Achieving competitive advantage with information systems
Achieving competitive advantage with information systemsAchieving competitive advantage with information systems
Achieving competitive advantage with information systems
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategy
 
Information System Plan
Information System PlanInformation System Plan
Information System Plan
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information Systems
 
strategic information system
strategic information systemstrategic information system
strategic information system
 

Similar to Introduction To Mobile Computing

Similar to Introduction To Mobile Computing (20)

MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
 
MIS
MISMIS
MIS
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATION
 
1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
M.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxM.Sc Mobile computing.pptx
M.Sc Mobile computing.pptx
 
Mobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxMobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptx
 
Mobile Communication final 4-2- Copy.pptx
Mobile Communication  final 4-2- Copy.pptxMobile Communication  final 4-2- Copy.pptx
Mobile Communication final 4-2- Copy.pptx
 
CS8601 Unit-1.pptx
CS8601 Unit-1.pptxCS8601 Unit-1.pptx
CS8601 Unit-1.pptx
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Mobile communication &computing
Mobile communication &computingMobile communication &computing
Mobile communication &computing
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdf
 
MOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptxMOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer Communications
Computer CommunicationsComputer Communications
Computer Communications
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Mob ppt
Mob pptMob ppt
Mob ppt
 

Introduction To Mobile Computing

  • 1. Introduction To Mobile Computing By Prof. Madhuri Nitin Badgujar Birla College Of Arts, commerce, and Science, Kalyan(w)
  • 2. • Mobile Computing : A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. • Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. • Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations.
  • 3. EXISTING CELLULAR NETWORK ARCHITECTURE • Mobile telephony took off with the introduction of cellular technology which allowed the efficient utilization of frequencies enabling the connection of a large number of users. • During the 1980's analogue technology was used. • In the 1990's the digital cellular technology was introduced with GSM(Global System Mobile)
  • 4. • Today many peoples use mobile computing for different purpose
  • 5. • Advances in technology • – More computing power in smaller devices • – Flat, lightweight displays with low power consumption • – New user interfaces due to small dimensions • – More bandwidth (per second? per space?) • – Multiple wireless techniques • • Technology in the background • – Device location awareness: computers adapt to their environment • – User location awareness: computers recognize the location of the • user and react appropriately (call forwarding) • • “Computers” evolve • – Small, cheap, portable, replaceable • – Integration or disintegration?
  • 6. • There are 2 aspects of mobile computing • – User mobility: users communicate “anytime, anywhere, with anyone” (example: read/write email on web browser) • – Device portability: devices can be connected anytime, anywhere to the network
  • 7. • There are two different kinds of mobility: • user mobility and device portability. • User mobility refers to a user who has • access to the same or similar telecommunication services at different places, i.e.,the user can be mobile, and the services will follow him or her. • With device portability, the communication device moves • Many mechanisms in the network and inside the device have to make sure • that communication is still possible while the device is moving.
  • 8. • In device mobility wireless term is used which This only describes the way of accessing a network • he wire is replaced by the transmission of electromagnetic waves through the air
  • 9. • communication device can exhibit one of the following characteristics: • Fixed and wired: The devices use fixed networks. This configuration describes the typical desktop computer in an office. • Mobile and wired:Many of today’s laptops fall into this category, users carry the laptop from one place to the next, and reconnecting to the company’s network via the telephone network and a modem. • Fixed and wireless:This mode is used for installing networks, in historical buildings to avoid damage by installing wires, or at buying or selling of goods and services shows to ensure fast network setup
  • 10. • Mobile and wireless: No cable restricts the user, who can roam between different wireless networks. Today’s most successful example for this category is GSM with more than 800 million users.
  • 11. Applications • 1. Vehicles:Today’s cars already comprise some, but tomorrow’s cars will comprise many wireless communication systems and mobility aware applications, like transmission of news, road condition, weather, music. • For personal communication,a universal mobile telecommunications system (UMTS) phone might be available offering voice and data connectivity with 384 kbit/s. • For remote areas,satellite communication can be used, • For example, the current position of the car is determined via the global positioning system (GPS). • At the emergency situations local ad-hoc network use for the fast exchange of information to help each other. In case of accident, there will be fast services provided in to the accident place, this technology already available in the cars. • In the future, cars will also inform other cars about accidents via the ad- hoc network to help them slow down in time, even before a driver can recognize an accident.
  • 12. • Figure 1.1 shows a typical scenario for mobile communications with many wireless devices.
  • 13. • Networks with a fixed infrastructure like cellular phones (GSM, UMTS) will be interconnected with trunked radio systems (TETRA) and wireless LANs (WLAN). • Satellite communication links can also be used. • The networks between cars and inside each car will more likely work in an ad-hoc fashion • Wireless networks inside a car can made up of personal digital assistants (PDA), laptops, or mobile phones, e.g., connected with each other using the Bluetooth technology. • So we can say that local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy
  • 14. • 2. Emergencies: • early transmission of patient data to the hospital, current status, first diagnosis • replacement of a fixed infrastructure in case of earthquakes, hurricanes, fire etc. • Wireless networks are the only means of communication in the case of natural disasters such as earthquakes. • 3. Business: • A travelling salesman today needs instant access to the company’s database: to ensure that files on his or her laptop reflect the current situation, to enable the company to keep track of all activities of their travelling employees, to keep databases consistent etc.
  • 15. • Figure shows what may happen when employees try to communicate off base.
  • 16. • At home, the laptop connects via a WLAN or LAN and DSL to the Internet. • Leaving home requires a handover to another technology, • mobile communications should always offer as good connectivity as possible to the internet, the company’s intranet, or the telephone network.
  • 17. • 4. Replacement of wired networks • wireless networks can also be used to replace wired networks, • it is often impossible to wire remote sensors for weather forecasts,earthquake detection, or to provide environmental information. • Wireless connections, e.g., via satellite, can help in this situation. • Wired network is infrequent and inflexible • Many computer fairs use WLANs as a replacement for cabling. • wireless networks are computers, sensors, or information displays • in historical buildings, where excess cabling may destroy valuable walls or floors. • 5. Infotainment and more • wireless networks can provide up-to-date information at any appropriate location. • Another growing field of wireless network applications lies in entertainment and games to enable, e.g., ad-hoc gaming networks as soon as people meet to play together.
  • 18. • 6. Location dependent services • Many research efforts in mobile computing and wireless networks try to hide • the fact that the network access has been changed • it is important for an application to ‘know’ something about the location or the user might need location information for further activities. Several services that might depend on the actual location can be distinguished: • Follow-on services – automatic call-forwarding, transmission of the actual workspace to the current location • Information services – „push“: e.g., current special offers in the supermarket – „pull“: e.g., where is the Black Forrest Cherry Cake? • Support services – caches, intermediate results, state information etc. „follow“ the mobile device through the fixed network • Privacy – who should gain knowledge about the location
  • 19. • Mobile and wireless devices • Even though many mobile and wireless devices are available, there will be many more in the future. • There is no precise classification of such devices, by size,shape, weight, or computing power. • The following list gives some examples of mobile and wireless devices graded by increasing performance
  • 20. Sensor: • A very simple wireless device is represented by a sensor transmitting state information. Embedded controllers: • Many appliances already contain a simple or sometimes more complex controller Pager: • pager can only display short text messages, • has a tiny display, and cannot send any messages. Pagers can even be integrated into watches.
  • 21.  Mobile phones: • The traditional mobile phone only had a simple black and white text display and could send/receive voice or short messages. • Today, mobile phones migrate more and more toward PDAs. Mobile phones with full color graphic display, touch screen, and Internet browser are easily available.  Personal digital assistant: • PDAs typically accompany a user and offer simple versions of office software • The typical input device is a pen, with built-in character recognition translating handwriting into characters.
  • 22. Pocket computer: • pocket computers offering tiny keyboards, color displays, and simple versions of programs found on desktop computers Notebook/laptop: • Finally, laptops offer more or less the same performance • as standard desktop computers; they use the same software – the only technical difference being size, weight, and the ability to run on a battery. If operated mainly via a sensitive display
  • 23. History Of Wireless Communication • The mobile and wireless devices of the future will be more powerful, less heavy, and comprise new interfaces to the user and to new networks. However, one big problem, which has not yet been solved, is the energy supply. • The more features that are built into a device, the more power it needs. • The higher the performance of the device, the faster it drains the batteries • Although the area of mobile computing and mobile communication is developing rapidly, the devices typically used today still exhibit some major drawbacks compared to desktop systems in addition to the energy problem • Mobile communication is greatly influenced by the merging of telecommunication and computer networks.
  • 24. • The use of light for wireless communications reaches back to ancient times. • In former times, the light was either ‘modulated’ using mirrors to create a certain light on/light off pattern • Wired communication started with the first commercial telegraph line • between Washington and Baltimore in 1843 and Alexander Graham Bell’s • All optical transmission systems suffer from the high frequency of the carrier light. • Today, DECT has been renamed digital enhanced cordless telecommunications for marketing reasons and to reflect the capabilities of DECT to transport multimedia data streams. • GSM was standardized in a document of more than 5,000 • pages in 1991. This first version of GSM, now called global system for mobile communication and uses 124 full-duplex channels. • GSM offers full international roaming, automatic location services, authentication, encryption on the wireless link, efficient interoperation with ISDN systems, and a relatively high audio quality. • It was soon discovered that the analog AMPS in the US and the digital GSM at 900 MHz in Europe are not sufficient for the high user densities in cities. • While in the US, no new spectrum was allocated for a new system, in Europe a new frequency band at 1800 MHz was chosen
  • 25. • In the US, different companies developed different new, more bandwidth-efficient technologies to operate side-by-side with AMPS in the same frequency band. • This resulted in three incompatible systems, the analog narrowband AMPS (IS-88,(TIA, 1993a)), and the two digital systems TDMA (IS-136, (TIA, 1996)) and CDMA (IS-95, (TIA, 1993b)).
  • 26. • The invention of the electronic vacuum tube in 1906 by Lee DeForest (1873–1961) and Robert von Lieben (1878–1913) helped to reduce the size of sender and receiver. • Nineteen twenty-eight was the year of many field trials for television broadcasting • The ‘Groupe Spéciale Mobile’ (GSM) was founded for this new development. • In 1983 the US system advanced mobile phone system (AMPS) started • Nineteen ninety-eight marked the beginning of mobile communication using satellites with the Iridium system
  • 27. • Iridium marked the beginning of small and • truly portable mobile satellite telephones including data service. • Iridium consists of 66 satellites in low earth orbit and uses the 1.6 GHz band for communication with the mobile phone
  • 28. Market For Mobile Communications • Although the growth in wireless and mobile communication systems has slowed down, these technologies have still a huge market potential. • More and more people use mobile phones, wireless technology is built into many cars, wireless data services are available in many regions, and wireless local area networks are used in many places. • Figure shows the increasing number of subscribers to mobile phone services worldwide
  • 30. Some open research topics  Interference: Radio transmission cannot be protected against interference using shielding as this is done in coaxial cable or shielded twisted pair. For higher loss rates for transmitted data or higher bit error rates respectively.  Regulations and spectrum: Frequencies have to be coordinated, and unfortunately, only a very limited amount of frequencies are available (due to technical and political reasons). One research topic involves determining how to use available frequencies more efficiently. • Further improvements are new air interfaces, power aware ad-hoc networks, smart antennas, and software defined radios (SDR). The latter allow for software definable air interfaces but require high computing power.  Low bandwidth: Although they are continuously increasing, transmission rates are still very low for wireless devices compared to desktop systems. • Local wireless systems reach some Mbit/s while wide area systems only offer some 10 kbit/s. One task would involve adapting applications used with high-bandwidth connections to this new environment so that the user can continue using the same application when moving from the desktop outside the building. • Researchers look for more efficient communication protocols with low overhead.
  • 31. • High delays, large delay variation: A serious problem for communication protocols used in today’s Internet (TCP/IP) is the big variation in link characteristics. • In wireless systems, delays of several seconds can occur, and links can be very asymmetrical. Applications must be tolerant and use robust protocols.  Lower security, simpler to attack: Not only can portable devices be stolen more easily, but the radio interface is also prone to the dangers of eavesdropping. Wireless access must always include encryption, authentication, and other security mechanisms that must be efficient and simple to use.  Shared medium: Radio access is always realized via a shared medium. As it is impossible to have a separate wire between a sender and each receiver, different competitors have to ‘fight’ for the medium. Although different medium access schemes have been developed, many questions are still unanswered, for example how to provide quality of service efficiently with different combinations of access, coding, and multiplexing schemes.  Ad-hoc networking: Wireless and mobile computing allows for spontaneous networking with prior set-up of an infrastructure. However, this raises many new questions for research: routing on the networking and application layer, service discovery, network scalability, reliability, and stability etc.
  • 32. A simplified reference model • Basic reference model used to structure communication systems • Any readers who are unfamiliar with the basics of communication networks should look up the relevant sections in the recommended literature • Figure shows a personal digital assistant (PDA) which provides an example for a wireless and portable device. • This PDA communicates with a base station in the middle of the picture. • The base station consists of a radio transceiver (sender and receiver) and an interworking unit connecting the wireless link with the fixed link. • The communication partner of the PDA, a conventional computer, is shown on the right-hand side.
  • 34. • Below each network element (such as PDA, interworking unit, computer),the figure shows the protocol stack implemented in the system according to the reference model. • End-systems, such as the PDA and computer in the example, need a full protocol stack comprising the application layer, transport layer, network layer, data link layer, and physical layer. • the PDA and computer in the example, need a full protocol stack comprising the application layer, transport layer, network layer, data link layer, and physical layer.
  • 35. • Applications on the end-systems communicate with each other using the lower layer services. • Intermediate systems such as the networking unit, do not necessarily need all of the layers • Figure shows only shows the network, data link, and physical layers. As (according to the basic reference model) only entities at the same level communicate with each other • the end-system applications do not notice the intermediate system directly in this scenario.
  • 36. • Physical layer: This is the lowest layer in a communication system and is responsible for the conversion of a stream of bits into signals that can be transmitted on the sender side. • The physical layer of the receiver then transforms the signals back into a bit stream. • For wireless communication, the physical layer is responsible for frequency selection, generation of the carrier frequency, signal detection, modulation of data onto a carrier frequency and encryption. • Data link layer: The main tasks of this layer include accessing the medium, multiplexing of different data streams, correction of transmission errors,and synchronization. • the data link layer is responsible for a reliable point-to point connection between two devices or a point-to-multipoint connection between one sender and several receivers.
  • 37. • Network layer: This third layer is responsible for routing packets through a network or establishing a connection between two entities over many other intermediate systems. Important topics are addressing, routing, device location,and handover between different networks • Transport layer: This layer is used in the reference model to establish an end-to- end connection. Topics like quality of service, flow and congestion control are relevant, especially if the transport protocols known from the Internet, TCP and UDP, are to be used over a wireless link. • Application layer: Finally, the applications (complemented by additional • layers that can support applications) are situated on top of all transmission oriented layers. • Topics of interest in this context are service location, support for multimedia applications, adaptive applications that can handle the large variations in transmission characteristics, and wireless access to the world wide web using a portable device. • Very demanding applications are video (high data rate) and interactive gaming (low jitter, low latency).