0% found this document useful (0 votes)
57 views

Mobile Computing

1. Mobile computing allows for portable access to the internet and applications from mobile devices through wireless networks. It provides features like portability, social interactivity, context sensitivity, and connectivity. 2. Wireless networking uses wireless transmission to provide internet access without cables. It allows both mobile and non-mobile devices to connect to networks but does not inherently provide internet access on its own. 3. The key difference is that mobile computing provides internet access directly through built-in wireless connectivity, while wireless networking provides a connection to a local network that may or may not have internet access.

Uploaded by

Harshal Sonar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Mobile Computing

1. Mobile computing allows for portable access to the internet and applications from mobile devices through wireless networks. It provides features like portability, social interactivity, context sensitivity, and connectivity. 2. Wireless networking uses wireless transmission to provide internet access without cables. It allows both mobile and non-mobile devices to connect to networks but does not inherently provide internet access on its own. 3. The key difference is that mobile computing provides internet access directly through built-in wireless connectivity, while wireless networking provides a connection to a local network that may or may not have internet access.

Uploaded by

Harshal Sonar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Mobile Computing vs.

wireless Networking Entertainment Services means the exclusive services of


The terms "mobile" and "wireless" are often used Artist performed in the music industry now existing or
interchangeably but in reality, they are two very hereafter developed including but not limited to the
different concepts applied to modern computing and areas of Recording, Publishing, Merchandise Rights and
technology.Mobile is a word that is commonly used to Live Performance as set forth in this Agreement.
describe portable devices. A mobile device is one that is Educational Services
made to be taken anywhere. Therefore, it needs an This educational tool aims at exploiting the concept of
internal battery for power, and must be connected to a cloud computing in the context of image and video
modern mobile network that can help it to send and processing, where students can assess several
receive data without attaching to a hardware algorithms in real-time.
infrastructure.Wireless, on the other hand, does not Characteristics of Mobile computing
mean mobile. Traditional computers or other non- 1. Portability - The Ability to move a device within a
mobile devices can access wireless networks. One very learning environment or to different environments with
common example is the use of a localized browser ease.
product in a local area network (LAN), where the router 2. Social Interactivity - The ability to share data and
takes what used to be a cabled interaction and makes it collaboration between users.
wireless. Other kinds of wireless networks called wide 3. Context Sensitivity - The ability to gather and
area networks (WAN) can even use components of 3G respond to real or simulated data unique to a current
or 4G wireless systems made specifically for mobile location, environment, or time.
devices, but that doesn‘t mean that the devices on 4. Connectivity - The ability to be digitally connected
these networks are mobile. They may still be plugged in for the purpose of communication of data in any
or require proximity to a router or network environment.
node.Mobile and wireless systems really accomplish 5. Individual - The ability to use the technology to
two very different things. While a wireless system provide scaffolding on difficult activities and lesson
provides a fixed or portable endpoint with access to a customization for individual learners.
distributed network, a mobile system offers all of the 6. Small Size - Mobile devices are also known as
resources of that distributed network to something that handhelds, palmtops and smart phones due to their
can go anywhere, barring any issues with local roughly phone-like dimensions.
reception or technical area coverage.For another
example of the difference between mobile and
wireless, think of businesses that offer Wi-Fi hotspots. A
Wi-Fi hotspot is typically a resource for someone who
has a relatively fixed device, such as a laptop computer
that doesn‘t have its own internal Internet access built
in. By contrast, mobile devices already have inherent
access to the Internet or other wireless systems
through those cell tower networks that ISPs and
telecom companies built specifically for them. So
mobile devices don‘t need Wi-Fi - they already have
their connections.
Mobile Computing Applications
Web or Internet access.
Internet access is the ability of individuals and
organizations to connect to the Internet using
computer terminals, computers, and other devices; and
to access services such as email and the World Wide
Web.
Global Position System (GPS).
The Global Positioning System (GPS) is a U.S.-owned
utility that provides users with positioning, navigation,
and timing (PNT) services.
Entertainment services.
MAC/ RESERVATION BASED SCHEMES signals are broadcast concurrently on one channel. It
eliminates the concept of time and bandwidth division.
It is a code-based communication technique. CDMA
codes are utilized to differentiate between various
users.
FEATURES OF MOBILE IP
Mobile Internet Protocol (Mobile IP) was created in
order to provide better mobile connectivity without
interrupting computers that are already connected to a
network. When mobile devices were introduced, there
was no network technology in place for these devices
to connect to the Internet. Mobile IP created a new
subset of IP connectivity that worked within the already
established system, keeping network engineers from
having to scrap and reinvent the way Internet
connection works.
Roaming Connectivity
ALOHA: In ALOHA, a station can transmit whenever
Mobile IP allows mobile devices to connect to the
data is available. If another station broadcasts at the
Internet when they are not at their home network. This
same time, collision occurs and the packets are lost.
lets laptops connect to hotspots and it lets phones
ALOHA protocol has two versions: pure ALOHA and
connect through 3G and other Internet network
slotted ALOHA.
sources. An IP address lets a network know where to
CSMA: In Carrier Sense Multiple Access (CSMA)
send and receive information from on a network.
protocol, each node must monitor the carrier for some
Mobile IP uses an address that references its home
time before attempting to deliver data packets. Each
network while finding a location on the new network.
node on the bus gets an equal chance to send the data
This keeps Mobile IP from knocking other computers off
across the network.
of a network, because each computer comes from a
CSMA/CD: Carrier Sense Multiple Access with Collision
unique network and has a unique number.
Detection (CSMA/CD) protocol is used for carrier
Compatibility
transmission via collision detection. It is used in early
Mobile IP is compatible with most networks that offer
ethernet technology for Local Area Networking (LAN).
the Internet. This include the 3G network used for
Reservation: In reservation, a station reserves the
mobile televisions; Internet hotspots found in cafes,
transmission channel before transmitting the data
airports and book stores; and all home network
packets.
devices. Early attempts at Mobile IP would only work
Polling: In polling, one device is marked as the primary
with certain routers or certain types of networks.
station (controller) and the other as the secondary
Mobile IP today has no special requirements because
station. The controller is responsible for all data
the system is universal and fits within the original IP
transfers.
infrastructure.
Token passing: In token passing, stations are logically
Tunnelling and Reverse Tunnelling
connected in the form of a ring. To avoid collisions, this
The method by which mobile IP receives information
media access control technique uses token passing. The
from a network is called tunnelling. A network cannot
only computer allowed to communicate is the one with
directly send information to a mobile IP device. In order
the token.
to get this information the mobile device must create
FDMA: In Frequency Division Multiple Access (FDMA),
an IP address within its new IP address. This allows the
the available bandwidth is split into various frequency
network to send information to the IP address through
bands. To prevent crosstalk and noise, guard bands are
the ―tunnel‖ of the two new IPs. Firewalls and routers
also used to ensure that no two bands coincide.
can sometimes block tunnelling by enabling what is
TDMA: In Time Division Multiple Access (TDMA),
called ingress filtering. Mobile IP also can use the
bandwidth is divided across several stations. Time is
process of reverse tunnelling, which is a similar process
divided into slots and stations broadcast data in their
that reverses the flow of information to achieve the
allotted slots to prevent collisions.
same result as tunnelling.
CDMA: In Code Division Multiple Access (CDMA), all
Cordless
The greatest feature of Mobile IP is that there are no The OSI model describes an idealized network
cords needed to complete the network connection. The communications with a family of protocols. TCP/IP does
standard IP required that networks be connected by a not correspond to this model directly. TCP/IP either
phone line or Ethernet cord. With Mobile IP, the device combines several OSI
finds the network automatically and attempts to layers into a single layer, or does not use certain layers
establish a connection. Some mobile capable devices at all. The following table shows the layers of the Solaris
like laptop computers have the ability to connect using implementation of TCP/IP. The table lists the layers
the Mobile IP or using the standard IP with an Ethernet from the topmost layer (application) to the lowest
or phone cord. (physical network).
Key Mechanism in Mobile Physical Network Layer
The Mobile IP process has three main phases, which are The physical network layer specifies the characteristics
discussed in the following sections. of the hardware to be used for the network. For
i.Agent Discovery - A Mobile Node discovers its Foreign example, physical network layer specifies the physical
and Home Agents during agent discovery. characteristics of the communications media. The
ii.Registration - The Mobile Node registers its current physical layer of TCP/IP describes hardware standards
location with the Foreign Agent and Home Agent during such as IEEE 802.3, the specification for Ethernet
registration. network media, and RS-232, the specification for
iii.Tunnelling - A reciprocal tunnel is set up by the standard pin connectors.
Home Agent to the care-of address (current location of Data-Link Layer
the Mobile Node on the foreign network) to route The data-link layer identifies the network protocol type
packets to the Mobile Node as it roams. of the packet, in this instance TCP/IP. The data-link
i.Agent Discovery layer also provides error control and “framing.”
During the agent discovery phase, the Home Agent and Examples of data-link layer protocols are Ethernet IEEE
Foreign Agent advertise their services on the network 802.2 framing and Point-to-Point Protocol (PPP)
by using the ICMP Router Discovery Protocol (IRDP). framing.
The Mobile Node listens to these advertisements to Internet Layer
determine if it is connected to its home network or This layer, also known as the network layer, accepts and
foreign network. delivers packets for the network. This layer includes the
The IRDP advertisements carry Mobile IP extensions powerful Internet Protocol (IP), the Address Resolution
that specify whether an agent is a Home Agent, Foreign Protocol (ARP), and the Internet Control Message
Agent, or both; its care-of address; the types of services Protocol (ICMP).
it will provide such as reverse tunnelling and generic Application Layer
routing encapsulation (GRE); and the allowed The application layer defines standard Internet services
registration lifetime or roaming period for visiting and network applications that anyone can use. These
Mobile Nodes. Rather than waiting for agent services work with the transport layer to send and
advertisements, a Mobile Node can send out an agent receive data. Many application layer protocols exist.
solicitation. This solicitation forces any agents on the The following list shows examples of application layer
link to immediately send an agent advertisement. protocols:
Standard TCP/IP services such as the ftp, tftp, and
If a Mobile Node determines that it is connected to a telnet commands
foreign network, it acquires a care-of address. Two UNIX “r” commands, such as rlogin and rsh
types of care-of addresses exisCare-of address acquired Name services, such as NIS+ and domain name system
from a Foreign Agent (DNS)
Co-located care-of address File services, such as the NFS service
A Foreign Agent care-of address is an IP address of a Simple Network Management Protocol (SNMP), which
Forei Agent that has an interface on the foreign enables network management
network being visited by a Mobile Node. A Mobile Node RIP and RDISC routing protocols
that acquires this type of care-of address can share the IP Protocol
address with other Mobile Nodes. A co-located care-of The IP protocol and its associated routing protocols are
address is an IP address temporarily assigned to the possibly the most significant of the entire TCP/IP suite.
interface of the Mobile Node itself. IP is responsible for the following:
TCP/IP Protocol Architecture Model IP addressing – The IP addressing conventions are part
of the IP protocol. Chapter 3, Planning Your TCP/IP The Address Resolution Protocol (ARP) conceptually
Network (Task) describes IPv4 addressing in detail and exists between the data-link and Internet layers. ARP
Chapter 14, IPv6 (Overview) describes IPv6 addressing assists IP in directing datagrams to the appropriate
in detail. receiving host by mapping Ethernet addresses (48 bits
Host-to-host communications – IP determines the path long) to known IP addresses (32 bits long).
a packet must take, based on the receiving host's IP
address. ICMP Protocol
Packet formatting – IP assembles packets into units that
are known as IP datagrams. Datagrams are fully Internet Control Message Protocol (ICMP) detects and
described in reports network error conditions. ICMP reports on the
following:

Dropped packets – Packets that arrive too fast to be


processed

Connectivity failure – A destination host that cannot be


reached)

Redirection – Redirecting a sending host to use another


router

The ping Command contains more information on the


operating system commands that use ICMP for error
detection.

Transport Layer
Internet Layer.
Fragmentation – If a packet is too large for transmission The TCP/IP transport layer protocols ensure that
over the network media, IP on the sending host breaks packets arrive in sequence and without error, by
the packet into smaller fragments. IP on the receiving swapping acknowledgments of data reception, and
host then reconstructs the fragments into the original retransmitting lost packets. This type of communication
packet. is known as “end-to-end.” Transport layer protocols at
Previous releases of the Solaris operating environment this level are Transmission Control Protocol (TCP) and
implement version 4 of the Internet Protocol, which is User Datagram Protocol (UDP).
abbreviated as IPv4. However, because of the rapid
growth of the Internet, a new Internet Protocol was TCP Protocol
created. The new protocol increases address space. This
TCP enables applications to communicate with each
new version, known as version 6, is abbreviated as IPv6.
other as though connected by a physical circuit. TCP
The Solaris operating environment supports both
sends data in a form that appears to be transmitted in a
versions, which are described in this book. To avoid
character-by-character fashion, rather than as discrete
confusion when addressing the Internet Protocol, one
packets. This transmission consists of a starting point,
of the following conventions is used:
which opens the connection, the entire transmission in
When the term IP is used in a description, the
byte order, and an ending point, which closes the
description applies to both IPv4 and IPv6.
connection.
When the term IPv4 is used in a description, the
description applies only to IPv4. TCP attaches a header onto the transmitted data. This
When the term IPv6 is used in a description, the header contains a large number of parameters that
description applies only to IPv6. help processes on the sending machine connect to peer
processes on the receiving machine.
ARP Protocol
TCP confirms that a packet has reached its destination describes the services that are provided by the daemon
by establishing an end-to-end connection between in.ftpd.
sending and receiving hosts. TCP is therefore
considered a “reliable, connection-oriented” protocol.

Telnet – The Telnet protocol enables terminals and


terminal-oriented processes to communicate on a
UDP Protocol network that runs TCP/IP. This protocol is implemented
as the program telnet (on local machines) and the
UDP, the other transport layer protocol, provides daemon in.telnetd (on remote machines). Telnet
datagram delivery service. UDP does not verify provides a user interface through which two hosts can
connections between receiving and sending hosts. communicate on a character-by-character or line-by-
Because UDP eliminates the processes of establishing line basis. The application includes a set of commands
and verifying connections, applications that send small that are fully documented in the telnet(1) man page.
amounts of data use UDP rather than TCP.
TFTP – The Trivial File Transfer Protocol (tftp) provides
Standard TCP/IP Services functions that are similar to ftp, but the protocol does
not establish ftp's interactive connection. As a result,
FTP and Anonymous FTP – The File Transfer Protocol
users cannot list the contents of a directory or change
(FTP) transfers files to and from a remote network. The
directories. A user must know the full name of the file
protocol includes the ftp command (local machine) and
to be copied. The telnet(1) man page describes the tftp
the in.ftpd daemon (remote machine). FTP enables a
command set.
user to specify the name of the remote host and file
transfer command options on the local host's command
line. The in.ftpd daemon on the remote host then
handles the requests from the local host. Unlike rcp, ftp
works even when the remote computer does not run a
UNIX-based operating system. A user must log in to the
remote computer to make an ftp connection unless the
remote computer has been configured to allow
anonymous FTP.

You can now obtain an enormous amount of materials


from anonymous FTP servers that are connected to the
Internet. Universities and other institutions set up these
servers to offer software, research papers, and other
information to the public domain. When you log in to
this type of server, you use the login name anonymous,
hence the term “anonymous FTP servers.”

Using anonymous FTP and setting up anonymous FTP


servers is outside the scope of this manual. However,
many books, such as The Whole Internet User's Guide &
Catalog, discuss anonymous FTP in detail. Instructions
for using FTP to reach standard machines are in System
Administration Guide: Resource Management and
Network Services. The ftp(1) man page describes all ftp
command options that are invoked through the
command interpreter. The ftpd(1M) man page
created many issues tied directly to consistency as
digital radio technology advanced. The global system
for mobile communication is designed to address these
issues. GSM accounts for about 70% of the world’s
digital cellular services. GSM automates and encodes
the information before transmitting it via a channel
including three distinct streams of user information
inside each time slot. For the vast majority of the world,
it is also the leading 2G digital cell phone standard. It
governs how cell phones interact with the land-based
tower system.In Europe, GSM operates in the 900MHz
and 1.8GHz bands, while in the United States, it
functions in the 1.9GHz PCS band. GSM describes the
overall mobile network, not just the Time division
multiple access air interface, as it is centered on a
circuit-switched structure that splits every 200 kHz
channel into eight 25 kHz time frames. It is a rapidly
expanding transmission technique, with over 250
GSM : million GSM users by the early 2000s. The one billionth
GSM is a digital cellular communication standard that is GSM consumer was linked by mid-2004
universally accepted. The European
Telecommunications Standards Institute created the Frequency Division Multiple Access (FDMA) and Time
GSM standard to define the procedures for second- Division Multiple Access (TDMA) are the two critical
generation digital mobile networks that are used by approaches used by GSM: FDMA is the technique of
devices such as mobile phones. It is a wide-area subdividing frequency bands into many bands, each of
communications technology program that utilizes which is allocated to specific users. In GSM, FDMA
digital radio channeling to bring forth audio, separates the 25MHz bandwidth into 124 carrier
information, and multimedia communication frequencies by 200 kHz. Every base station has one or
systems.GSM is a mobile network and not a computer more carrier frequencies assigned to it.Time Division
networkOpens a new window – this implies that Multiple Access (TDMA) is the practice of allocating the
devices interact with it by looking for nearby cells. GSM, same frequency to multiple users by separating the
including other technological advances, has influenced bandwidths into various time slots. Every subscriber is
the evolution of mobile wireless telecommunication assigned a timeslot, allowing different stations to split
services. A GSM system manages communication the same transmission area.TDMA is used to divide
between mobile stations, base stations, and switching each subdivided carrier frequency into different time
systems. Every GSM radio channel is 200 kHz wide and slots for GSM. Each Time-division multiple access frame
is additionally divided into frames of 8-time slots. The does have 8-time slots and takes 4.164 milliseconds
global system for mobile communication (GSM) was (ms). This means that every time slot or physical
first known as Groupe Special Mobile, which is the channel in this structure should take 577 microseconds,
reason for the acronym. The GSM system comprises and information is transferred in bursts during that
mobile stations, base stations, and intertwining time. A GSM system has several cell sizes, including
switching systems.The GSM program enables 8 to 16 macro, micro, Pico, and umbrella cells. Each cell differs
audio users to share every radio channel, and every depending on the execution domain.A GSM network
radio transmission location may have multiple radio has five cell sizes: macro, micro, pico, and umbrella.
channels. Because of its simplicity, affordability, and Depending on the option provided, the connectivity of
accessibility, GSM is presently the most commonly used each cell differs. The time division multiple access
network technology in the Internet of Things (TDMA) method works by giving every client a varying
(IoT)Opens a new window applications.However, this is time slot on a similar frequency. This can easily be
likely to change in the coming years. Various programs adapted to sending and receiving data and voice
have been designed without the advantage of communication and it can hold bandwidths ranging
standardized provisions all through the transformation from 64kbps to 120Mbps.
of mobile telecommunication services.This significantly
GPRS even time division multiple access (TDMA) customers.
GPRS also allows network operators to deploy an IP-
based core architecture for integrated audio and data
applications, which can be used and improved for 3G
networks.GPRS used to be the fastest network-
accessible option – this has, however, changed in terms
of speed and dependability, as both 3G and 4G
networks surpass it. However, it is still used in several
areas, particularly rural regions and emerging nations
that have not ventured into other more sophisticated
General packet radio service (GPRS) is essentially a technology. When a GPRS network is available, most
packet-switching technology that allows information to smartphones might use it, albeit those used to better
be transmitted via mobile networks. This is utilized for connections will notice the considerably slower
internet connectivity, multimedia messaging service, bandwidth and long waits.
and other types of data transmission. GPRS is UMTS- Universal Mobile Telecommunication System
supported by GPRS cellphones, as well as laptops and UMTS or Universal Mobile Telecommunications
handheld devices equipped with GPRS modems. Framework, is the 3G successor to the GSM family of
Subscribers have reported downstream bandwidths of measures counting GPRS and EDGE. 3G UMTS
up to 80 Kbps. employments a completely diverse radio interface
GPRS could be employed to facilitate connections based around the utilize of Coordinate Grouping Spread
related to Internet protocols which provide a set of Range as CDMA or Code Division Multiple Access.
functions including commercial and enterprise Although 3G UMTS employments a completely
applications. Before the transmission, the information distinctive radio get to standard, the center arrange is
is split into individual packets and routed through the the same as that utilized for GPRS and EDGE to carry
core network and radio. At the receiver’s end, the data partitioned circuit exchanged voice and bundle data.
is reattached.
The global system for mobile communications (GSM) is UMTS employments a wideband adaptation of CDMA
the primary standard for the second generation (2G) possessing a 5 MHz wide channel. Being more extensive
cellular network, while GPRS is an improved version. than its competition CDMA2000 which as it was utilized
GPRS is not like GSM’s short messaging service (GSM- a 1.25MHz channel, the tweak conspire was known as
SMS), which has a message length limit of 160 bytes. wideband CDMA or WCDMA/W-CDMA. This title was
GPRS has a theoretical maximum speed of 115 kbps, regularly utilized to allude to the total framework. It
although most networks operate at roughly 35 kbps. could be a frame of media transmission utilized for
GPRS is sometimes known as 2.5G unofficially. It’s a remote gathering and transmission. It is an
third-generation route to gain availability on the advancement in speed boost from the more seasoned
internet. 2G standard of transmission speed and can increment
GPRS can operate from either symmetric or asymmetric information transmission times between gadgets and
configuration, whereas frequency for either direction is servers.
determined by which one of the 12 multislot provider UMTS Applications
classes are chosen. The number of time slots for every Streaming / Download (Video, Audio)
path is determined by the multislot service class, for Videoconferences.
every time slot propping up a theoretical connection Fast Internet / Intranet.
speed of 21.4 kbps. One of the most basic is service Mobile E-Commerce (M-Commerce)
class 1, which allows a one-time slot for each path. Remote Login
Service class 12 is by far the most proficient, with four- Background Class applications
time slots in every direction. Multimedia-Messaging, E-Mail
GSM-IP stands for global-system mobile FTP Access
communications internet protocol and is also another Mobile Entertainment (Games)
name for GPRS. It ensures that customers are An ad hoc network
connected, making audio calls and browsing the An ad hoc network is one that is spontaneously formed
internet. This method enables packet radio access to when devices connect and communicate with each
other. The term ad hoc is a Latin word that literally
means "for this," implying improvised or impromptu. Smartphone ad hoc networks (SPANs) ...
Ad hoc networks are mostly wireless local area Wireless mesh networks. ...
networks (LANs). The devices communicate with each Army tactical MANETs. ...
other directly instead of relying on a base station or Air Force UAV Ad hoc networks. ...
access points as in wireless LANs for data transfer co- Navy ad hoc networks. ...
ordination. Each device participates in routing activity, Wireless sensor networks. ...
by determining the route using the routing algorithm Ad hoc network of robots.
and forwarding data to other devices via this route. What is routing?
Network routing is the process of selecting a path
across one or more networks. The principles of routing
can apply to any type of network, from telephone
networks to public transportation. In packet-switching
networks, such as the Internet, routing selects the
paths for Internet Protocol (IP) packets to travel from
their origin to their destination. These Internet routing
decisions are made by specialized pieces of network
hardware called routers.
Consider the image below. For a data packet to get
from Computer A to Computer B, should it pass through
networks 1, 3, and 5 or networks 2 and 4? The packet
will take a shorter path through networks 2 and 4, but
networks 1, 3, and 5 might be faster at forwarding
packets than 2 and 4. These are the kinds of choices
network routers constantly make.

Routing Protocol

Routing is one of the most fundamental areas of


networking that an administrator has to know. Routing
protocols determine how your data gets to its
destination and helps to make that routing process as
smooth as possible. However, there are so many
Application
different types of routing protocol that it can be very
A typical example of an ad-hoc network is connecting
difficult to keep track of them all!
two or more laptops (or other supported devices) to
Distance Vector and Link State ProtocolsLink State
each other directly without any central access point,
Routing Protocols
either wirelessly or using a cable. When to use an ad-
IGP and EGPs
hoc network: If you want to quickly set up a peer-to-
Types of Routing Protocol
peer (P2P) network between two devices.
Classful and Classless Routing Protocols
Vehicular ad hoc networks (VANETs) VANETs are used
Dynamic Routing Protocols
for communication between vehicles and roadside
Routing Protocols and Metrics
equipment. ...
Administrative Distance but now they are light and simple to some extent.
Closing Words The operating systems found on smartphones include
Routing Protocols FAQs Symbian OS, iPhone OS, RIM's BlackBerry, Windows
Intermediate System-to-Intermediate System (IS-IS) Mobile, Palm WebOS, Android, and Maemo. Android,
Before we get to looking at the routing protocols WebOS, and Maemo are all derived from Linux. The
themselves, it is important to focus on the categories of iPhone OS originated from BSD and NeXTSTEP, which
protocols. are related to Unix.
All routing protocols can be classified into the It combines the beauty of computer and hand use
following: devices. It typically contains a cellular built-in modem
|Distance Vector or Link State Protocols and SIM tray for telephony and internet connections. If
Interior Gateway Protocols (IGP) or Exterior Gateway you buy a mobile, the manufacturer company chooses
Protocols (EGP) the OS for that specific device.
Classful or Classless Protocols Popular platforms of the Mobile OS
Difference between MANET and VANET 1. Android OS: The Android operating system is the
1 Production cost of MANET is cheap as compared to most popular operating system today. It is a mobile OS
VANET based on the Linux Kernel and open-source software.
1 Much Expensive The android operating system was developed by
2 Mobility of MANET is low as it make bit difficult for Google. The first Android device was launched in 2008.
network enables the serving networks to locate a 2. Bada (Samsung Electronics): Bada is a Samsung
mobile subscriber’s point. mobile operating system that was launched in 2010.
2 High Mobility, as serving networks to locate a mobile The Samsung wave was the first mobile to use the bada
subscriber’s point is easy. operating system. The bada operating system offers
3 Change in network topology orientation is slow. many mobile features, such as 3-D graphics, application
3Frequent and very fast change of network topology, installation, and multipoint-touch.
4 Sparse node density. 3. BlackBerry OS: The BlackBerry operating system is a
4 Node density is frequent variables. mobile operating system developed by Research In
5 MANET HAVE 100 Kps bandwidth available. 5VANET Motion (RIM). This operating system was designed
bandwidth is 1000 Kps. specifically for BlackBerry handheld devices. This
6 It ranges Upto 100 m. operating system is beneficial for the corporate users
6500 m range available in VANET. because it provides synchronization with Microsoft
7 MANET node lifetime depends on power resources. Exchange, Novell GroupWise email, Lotus Domino, and
7Depend on lifetime vehicle. other business software when used with the BlackBerry
8 MANET have medium reliability. Enterprise Server.
8 High reliability of VANET.
9 Movement of the nodes affects the operation of a
MANET as node movement MANETs need to rely on
robust routing protocols.And this MANET have random 4. iPhone OS / iOS: The iOS was developed by the Apple
node movement. inc for the use on its device. The iOS operating system is
9 Regular, moving pattern of nodes. the most popular operating system today. It is a very
10 Attribute Based addressing scheme. secure operating system. The iOS operating system is
10Location Bases addressing scheme. not available for any other mobiles.
11 Position acquisition is obtained using Ultrasonic. 5. Symbian OS: Symbian operating system is a mobile
11VANET maintain position acquisition by using GPS, operating system that provides a high-level of
RADAR. integration with communication. The Symbian
12 Availability of Multi-hop Routing operating system is based on the java language. It
12Weakly available Multi-hop Routing. combines middleware of wireless communications and
personal information management (PIM) functionality.
Mobile Operating System The Symbian operating system was developed by
A mobile operating system is an operating system that Symbian Ltd in 1998 for the use of mobile phones.
helps to run other application software on mobile Nokia was the first company to release Symbian OS on
devices. It is the same kind of software as the famous its mobile phone at that time.
computer operating systems like Linux and Windows, 6. Windows Mobile OS: The window mobile OS is a
mobile operating system that was developed by smartphones, PDAs, tablet computers and other
Microsoft. It was designed for the pocket PCs and smart handheld devices.
mobiles.
7. Harmony OS: The harmony operating system is the ADAPTATION OF TCP WINDOW
latest mobile operating system that was developed by The first phase of a TCP session is establishment of
Huawei for the use of its devices. It is designed the connection. This requires a three-way
primarily for IoT devices. handshake, ensuring that both sides of the
8. Palm OS: The palm operating system is a mobile connection have an unambiguous understanding of
operating system that was developed by Palm Ltd for the sequence number space of the remote side for
use on personal digital assistants (PADs). It was
this session. The operation of the connection is as
introduced in 1996. Palm OS is also known as the
follows:
Garnet OS.
9. WebOS (Palm/HP): The WebOS is a mobile operating The local system sends the remote end an initial
system that was developed by Palm. It based on the sequence number to the remote port, using a SYN
Linux Kernel. The HP uses this operating system in its packet.
mobile and touchpads. The remote system responds with an ACK of the
SPECIAL CONSTRAINTS AND REQUIREMENTS initial sequence number and the initial sequence
Design and capabilities of a Mobile OS (Operating number of the remote end in a response SYN
System) is very different than a general purpose OS packet.
running on desktop machines
Physically Constrained · The local end responds with an ACK of this remote
Battery-powered device sequence number.
Small screens of varying shapes, sizes, and resolutions · The performance implication of this protocol
Memory exchange is that it takes one and a half round-trip
Storage space
times (RTTs) for the two systems to synchronize
Working in Uncertainty
state before any data can be sent.
Networks come and go
Other devices appear and disappear
OS need to provide robust methods for handling
connections and coping with service interruptions and
ad hoc attempts to communicate
Today's mobile devices are multifunctional devices
capable of hosting a broad range of applications for
both business and consumer use. Smartphones and
tablets enable people to use their mobile device to
access the Internet for email, instant messaging, text
messaging and Web browsing, as well as work
documents, contact lists and more.
Mobile devices are often seen as an extension to your
own PC or laptop, and in some cases newer, more
powerful mobile devices can even completely replace
PCs. And when the devices are used together, work
done remotely on a mobile device can be synchronized
with PCs to reflect changes and new information while
away from the computer.
Much like the Linux or Windows operating system BEST OF LUCK !!
controls your desktop or laptop computer, a mobile
operating system is the software platform on top of Jara Japun kar Vatavaran Strict
which other programs can run on mobile devices.
A mobile operating system, also called a mobile OS, is ahe.
an operating system that is specifically designed to run
on mobile devices such as mobile phones,

You might also like