UNIT - 2-Mobile Computing
UNIT - 2-Mobile Computing
UNIT-II
by- applications, Data broadcasting, Mobile IP, WAP architecture, Protocol stack,
Ashutosh Pandey
Assistant Professor application environnent, applications.
UIM (011)
Wireless networking is a computer network that uses radio frequency (RF) Wireless networking refers to the communication between devices such as
connections between devices. This allows devices to connect to a network computers, smartphones, tablets, and other hardware using radio
while still moving around, unlike wired networks, which use cables. frequency signals instead of traditional wired connections.
Wireless networking is popular in homes, businesses, and This technology allows users to access networks and the internet without
telecommunications networks. the constraints of physical cables, providing flexibility and mobility.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 3 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 4
1
5/10/2024
2
5/10/2024
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 9 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 10
Authentication: Users and devices are authenticated before being Range and Coverage: The range of a wireless network depends on factors
granted access to the network, typically through passwords, digital like the transmission power of the devices, obstacles in the environment,
certificates, or other authentication methods. and the frequency band used. Extenders or mesh networking systems can be
used to extend coverage in large or challenging environments.
Access Control: Access control mechanisms, such as MAC address
filtering and network segmentation, help control which devices can Performance: Factors like network congestion, signal strength, and the
connect to the wireless network and what resources they can access. number of connected devices can impact the performance of a wireless
network. Proper network design, channel planning, and Quality of Service
(QoS) configurations can help optimize performance.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 11 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 12
3
5/10/2024
4
5/10/2024
1. Collision Avoidance Collision Avoidance: In wireless LANs, multiple devices share the same
2. Hidden Terminal Problem medium for transmission. To avoid collisions where two or more devices
3. MAC Address Filtering transmit data simultaneously, a mechanism known as Carrier Sense
4. Quality of Service (QoS) Multiple Access with Collision Avoidance (CSMA/CA) is employed.
5. Channel Allocation However, collisions can still occur due to hidden terminal problems or other
issues, leading to degraded network performance.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 17 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 18
Hidden Terminal Problem: This occurs when two nodes within the network MAC Address Filtering: Wireless LANs often implement MAC address
are out of range of each other but are within the range of a common filtering as a security measure, allowing only devices with approved MAC
access point. As a result, they may not be able to detect each other's addresses to connect to the network. However, managing a large number of
transmissions and may inadvertently transmit simultaneously, leading to MAC addresses can be cumbersome, and spoofing MAC addresses is
collisions. relatively easy for determined attackers.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 19 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 20
5
5/10/2024
Quality of Service (QoS): MAC layer protocols often include mechanisms Channel Allocation: Wi-Fi networks operate on different channels within
for prioritizing certain types of traffic over others to ensure that real-time the RF spectrum. Proper channel allocation is essential to minimize
applications such as voice or video streaming receive adequate bandwidth interference between neighboring access points and maximize the available
and minimal latency. However, misconfigurations or improper QoS bandwidth. However, overlapping channels or insufficient channel separation
settings can lead to suboptimal performance for critical applications. can lead to co-channel interference, reducing network performance.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 21 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 22
6
5/10/2024
IEEE 802.11
The IEEE 802.11 standard, commonly known as Wi-Fi.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 27 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 28
7
5/10/2024
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 29 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 30
Bluetooth
Bluetooth technology plays a significant role in mobile computing, enabling
wireless communication between devices over short distances using a band
of 2.4 to 2.485 GHz..
Bluetooth Bluetooth is also known as IEEE 802.15 standard or specification that uses
low power radio communications to link phones, computers and other
network devices over a short distance without using any type of connecting
wires.
8
5/10/2024
In Bluetooth technology, the wireless signals transmit data and files over a
short distance, typically up to 30 feet or 10 meters.
Bluetooth technology was developed by a group of 5 companies known as
Special Interest Group formed in 1998.
The companies are Ericsson, Intel, Nokia, IBM, and Toshiba.
Baseband Layer /
Radio Layer /
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 33 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 34
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 35 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 36
9
5/10/2024
The radio layer defines the air interface's details, including frequency,
transmit power, and frequency hopping.
Wireless Application Protocol
The baseband layer defines the addressing scheme, packet frame format,
timing, and power control algorithms. The baseband layer also establishes the
ACL link, defines master/slave relationships, and controls the radio signal
strength.
10
5/10/2024
Mobile IP
Mobile IP is a communication protocol
(created by extending Internet Protocol,
IP) that allows the users to move from one
network to another with the same IP
Mobile IP address.
It ensures that the communication will
continue without user’s sessions or
connections being dropped.
11
5/10/2024
Server X
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 47 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 48
12
5/10/2024
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 49 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 50
Enables hosts to be tracked without needing to change their IP address Transaction Layer (WTP)
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 51 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 52
13
5/10/2024
with WML-Script
TLS/SSL WML Encoder CGI
WML Decks
TCP/IP WML- Scripts
WSP/WTP WMLScript
HTTP etc.
Script
Compiler
WTAI
Protocol Adapters Content
Etc.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 53 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 54
14