0% found this document useful (0 votes)
23 views

Introduction To Mobile Computing

The document provides an introduction to mobile computing including its key components, advantages, limitations, applications and issues. Mobile computing allows using portable devices like smartphones and tablets to access data wirelessly. It discusses concepts like mobile devices, networks, software and applications of mobile commerce, maps, learning, entertainment and payments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Introduction To Mobile Computing

The document provides an introduction to mobile computing including its key components, advantages, limitations, applications and issues. Mobile computing allows using portable devices like smartphones and tablets to access data wirelessly. It discusses concepts like mobile devices, networks, software and applications of mobile commerce, maps, learning, entertainment and payments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Introduction to Mobile Computing

- Mobile computing refers to the ability to use computers and access data from anywhere, without
being tied to a single location. It involves the use of portable computing devices like smartphones,
tablets, laptops, and wearable that can connect to the internet or a private network wirelessly.
- It enables communication of information while not having to be connected to a place physically.

The key components of mobile computing are:


1) Mobile devices: Handheld gadgets with processing power, memory, and wireless connectivity.
2) Mobile communication: Wireless networks (like 4G, 5G, Wi-Fi) that allow devices to transmit
data.
3) Mobile software: Applications and services designed for mobile use.

Advantages of Mobile Computing:

- Portability: Users can work from anywhere - home, office, coffee shop, etc.
- Flexibility: Mobile devices are lightweight and easy to carry around.
- Connectivity: Constant access to email, internet, apps through wireless networks.
- Productivity: Users can utilize "dead time" like commutes to get work done.
-Affordability: Over a time devices become less expensive and easier to obtain.

Limitations of Mobile Computing:

 Network Constraints: Wireless networks have lower bandwidth, higher latency


 Power Constraints: Mobile devices have limited battery life.
 Mobile Device Constraints: Smaller screen size, processing power, memory.
 Security Concerns: Risk of data theft, malware, unauthorized access.
 Distraction: Mobile devices can be distracting and addictive.
 Cost: Purchasing devices, data plans can be expensive.

Applications of Mobile Computing:

1) Mobile Commerce: Users can shop online, book tickets, do mobile banking, and make payments
through mobile apps and browsers. E.g. Amazon, Uber.

2) Location-based Services: Apps that use your location data to provide navigation, finding nearby
places like restaurants/ATMs, tracking shipments etc. E.g. Google Maps, Food delivery apps.

3) Mobile Learning: Educational content like video lectures, e-books can be accessed on mobile
devices anywhere. Online courses have become popular.

4) Entertainment: Streaming music, videos, mobile games, ebooks etc. on smartphones and tablets.
E.g. Netflix, Spotify.

5) Social Networking: Sharing updates, photos/videos, chatting with friends through apps like
Facebook, WhatsApp, Instagram etc.

6) Mobile Payments: Using smartphone e-wallets for contactless payments at stores, paying bills etc.
E.g. Apple Pay, Google Pay.
Issues of Mobile Computing

1. Network Limitations
- Bandwidth: Wireless networks have lower bandwidth compared to wired networks, resulting in
slower data transfer speeds.
- Coverage: There can be gaps in network coverage or poor signal strength in some areas like
basements or rural regions.
- Latency: Wireless networks tend to have higher latency (delay) which can affect real-time
applications.

2. Security Risks
- Data Theft: Mobile devices can be lost or stolen, resulting in sensitive data falling into wrong
hands.
- Malware: Malicious software like viruses or trojans can infect mobile devices through apps,
websites or networks.
- Unauthorized Access: Without proper authentication, cyber-criminals can remotely access data on
mobile devices.

3. Power Constraints
- Battery Life: Mobile devices have limited battery capacity, requiring frequent recharging.
- Power-Hungry Applications: Apps like video streaming, gaming, etc. drain the battery faster.
- Network Connectivity: Maintaining an active wireless connection also consumes significant
battery power.

4. User Distraction
- Notification Overload: Frequent notifications from apps, emails, messages can reduce productivity.
- Addiction: Some users develop addictive behavior towards social media, games on their mobile
devices.
- Situational Impairment: Using mobile devices while driving, walking can lead to accidents.

5. Supporting Mobility
- Maintaining Connectivity: As users move, their mobile devices need to seamlessly switch between
networks.
- Synchronizing Data: User data needs to be consistently synchronized across multiple devices.
- Adapting Applications: Applications need to adapt their user interface for different screen sizes.

6. Performance Constraints
- Limited Processing Power: Mobile CPUs are less powerful compared to desktop/laptop processors.
- Limited Memory: Mobile devices have limited RAM which impacts multitasking capabilities.
- Smaller Storage: Limited internal flash storage on mobile devices compared to traditional
computers.

7. Cost Factors
- Device Cost: High-end smartphones and tablets can be expensive for users.
- Network Costs: Mobile data plans from cellular carriers have recurring costs.
- Application Costs: Paid apps, in-app purchases add to the overall costs for users.
Unit-2
GSM - Global System for Mobile Communications

GSM is a widely adopted and comprehensive standard for digital cellular networks. It was
developed by the European Telecommunications Standards Institute (ETSI) in the 1980s.
It is an open & digital cellular technology used for mobile communication.
Its is basically a combination of FDMA and TDMA.

Key Features of GSM:


- Uses digital technology and time division multiple access (TDMA)
- Operates in the 900MHz and 1800MHz frequency bands
- Provides voice, data, and messaging services
- Utilizes SIM (Subscriber Identity Module) cards for user authentication
- Supports international roaming across networks

GSM Architecture:

- Mobile Station (MS): The mobile phone handset with a SIM card
- Base Station Subsystem (BSS): It handles traffic and signal between a mobile phone and NSS.
- Network and Switching Subsystem (NSS): It manages the network switching functions
- Operation Support System (OSS): It offers cost effective support for all GSM related services.

Key Components:

1. Base Transceiver Station (BTS): Handles radio transmission/reception with mobiles

2. Base Station Controller (BSC): Controls multiple BTSs, handles radio channel setup

3. Mobile Switching Center (MSC): Connects GSM network to other networks like PSTN

4. Home Location Register (HLR): Central database that stores subscriber information

5. Visitor Location Register (VLR): Database that tracks subscribers roaming in the area

6. Authentication Center (AuC): Generates encryption keys for user authentication

GSM Security Features:

- Authentication of user identity through challenge-response process


- Encryption of voice and data over the air interface
- Subscriber identity confidentiality through use of temporary identities
GSM Services:

- Voice Calls: The primary service for voice communication


- SMS (Short Message Service): Allows sending/receiving text messages
- Data Services: Enables access to services like email, web browsing
- Roaming: Ability to use your mobile across different operator networks

Advantages:

1. Global Roaming: You can use your mobile phone in over 200 countries around the world with
GSM networks.

2. Efficient Use of Bandwidth: GSM smartly shares limited bandwidth among multiple users, so
more people can use the network.

3. Additional Services: Besides voice calls, GSM also supports text messaging (SMS), internet access,
and other advanced services.

4. Secure Communication: GSM has features like user authentication and encryption to protect
your identity and keep your calls/data secure.

5. Easy Phone Switching: With a SIM card, you can easily switch to a new mobile phone while
keeping your phone number and contacts.

6. Good Call Quality: GSM provides dedicated channels for voice calls, ensuring clear and high-
quality audio.

Disadvantages:

1. Slow Data Speeds: GSM was designed mainly for voice calls, and its data transfer speeds are very
slow (up to 9.6 kbps), making it unsuitable for modern internet usage.

2. Proprietary Standard: The GSM specifications are controlled by organizations, making it difficult
to customize or introduce new features easily.

3. Limited Frequency Range: GSM operates in specific frequency bands (900MHz, 1800MHz) which
have limited capacity for the growing number of users.

4. Incompatible with Old Networks: GSM is not compatible with older analog mobile networks,
making it difficult for users to transition from analog to digital.

5. Security Risks: Despite encryption, GSM has some security weaknesses that could allow
eavesdropping, location tracking, or service disruption.

6. High Implementation Costs: Setting up a nationwide GSM network infrastructure requires


significant investments in equipment, towers, and licensing fees.
CDMA - Code Division Multiple Access

CDMA is a channel access method used in various radio communication technologies, including
cellular networks. It is a form of multiplexing that allows multiple users to share the same
frequency channel simultaneously.

Key Features of CDMA:

 Uses spread-spectrum technology to spread data over the entire available frequency band
 Assigns unique code sequences to each user for encoding data
 Enables multiple users to transmit data at the same time on the same frequency
 Provides better security and privacy compared to other access methods

CDMA Architecture:

 Mobile Station (MS): The mobile phone handset


 Base Transceiver Station (BTS): Handles radio transmission/reception with mobiles
 Base Station Controller (BSC): Controls multiple BTSs, manages radio resources
 Mobile Switching Center (MSC): Connects the CDMA network to other networks

How CDMA Works:

1. Each user's data is encoded with a unique code sequence (spreading code)
2. The encoded data is then modulated and transmitted over the entire frequency band
3. At the receiver end, the same code sequence is used to decode and extract the original data
4. Spreading codes ensure that signals from different users appear as noise to others

Advantages of CDMA:

 Efficient Use of Bandwidth: Multiple users can share the same frequency channel
 Increased Capacity: Can accommodate more users compared to TDMA or FDMA
 Improved Call Quality: Better resistance to interference and noise
 Enhanced Security: Spread-spectrum technology provides inherent protection
 Soft Handoff: Seamless handoff between cells without interruption

Disadvantages of CDMA:

 Complex Hardware: CDMA systems require more complex and expensive hardware
 Power Control Challenges: Need to tightly control transmission power levels
 Limited Global Roaming: CDMA standards are not as widely adopted globally

FDMA - Frequency Division Multiple Access

FDMA is a channel access method used in multiple-access communication systems, including early
analog cellular networks. It is a form of multiplexing that divides the available bandwidth into
separate frequency channels.
Key Features of FDMA:

- The available bandwidth is divided into non-overlapping frequency sub-bands


- Each user is assigned a unique frequency channel for communication
- Users transmit data over their designated frequency band
- No two users can be assigned the same frequency channel

FDMA Architecture:

- Mobile Station (MS): The mobile phone handset


- Base Transceiver Station (BTS): Handles radio transmission/reception with mobiles
- Base Station Controller (BSC): Controls multiple BTSs, manages radio resources
- Mobile Switching Center (MSC): Connects the cellular network to other networks

How FDMA Works:

1. The available bandwidth is divided into N non-overlapping frequency bands


2. Each user is allocated one frequency band for transmission and reception
3. User data is modulated onto the assigned frequency carrier
4. At the receiver end, filters are used to extract the desired frequency band

Key Advantages of FDMA:

- Simple Implementation: FDMA systems are relatively simple and easy to implement
- No Synchronization Required: Users can transmit data independently without synchronization
- Reliable Communication: Users have dedicated channels, reducing interference

Disadvantages of FDMA:

- Bandwidth Inefficient: A portion of the bandwidth is wasted as guard bands


- Limited Capacity: Can only accommodate a limited number of users equal to available channels
- Frequency Reuse Issues: Careful frequency planning needed to avoid co-channel interference

Applications of FDMA:

- Analog Cellular Networks: Early analog mobile phone systems like AMPS used FDMA
- Satellite Communication: FDMA is used in satellite communication systems
- Cable TV Systems: FDMA is used to transmit multiple TV channels over cable networks

TDMA - Time Division Multiple Access

TDMA is a channel access method used in various digital communication systems, including cellular
networks. It is a form of multiplexing that divides the available bandwidth into time slots.
Key Features of TDMA:

- A single frequency channel is divided into multiple time slots


- Each user is assigned specific time slots for transmission and reception
- Users share the same frequency channel but transmit data in different time slots
- Requires synchronization between transmitters and receivers

TDMA Architecture:

- Mobile Station (MS): The mobile phone handset


- Base Transceiver Station (BTS): Handles radio transmission/reception with mobiles
- Base Station Controller (BSC): Controls multiple BTSs, manages radio resources
- Mobile Switching Center (MSC): Connects the TDMA network to other networks

How TDMA Works:

1. The available frequency bandwidth is divided into multiple time slots


2. Each user is allocated one or more time slots for transmission and reception
3. User data is transmitted only during the assigned time slots
4. Time slots are coordinated by a synchronization mechanism to avoid overlaps
5. At the receiver end, only data from the assigned time slots is extracted

Advantages of TDMA:

- Efficient Use of Bandwidth: Multiple users can share the same frequency channel
- Increased Capacity: Can accommodate more users compared to FDMA
- Flexible Resource Allocation: Time slots can be dynamically assigned based on demand
- Digital Transmission: Enables advanced features like data services and encryption

Disadvantages of TDMA:

- Synchronization Requirement: Strict time synchronization is needed between users


- Guard Time: Guard times between slots are needed, reducing efficiency
- Multi-path Issues: Signals from different time slots can interfere with each other

You might also like