Introduction To Mobile Computing
Introduction To Mobile Computing
- Mobile computing refers to the ability to use computers and access data from anywhere, without
being tied to a single location. It involves the use of portable computing devices like smartphones,
tablets, laptops, and wearable that can connect to the internet or a private network wirelessly.
- It enables communication of information while not having to be connected to a place physically.
- Portability: Users can work from anywhere - home, office, coffee shop, etc.
- Flexibility: Mobile devices are lightweight and easy to carry around.
- Connectivity: Constant access to email, internet, apps through wireless networks.
- Productivity: Users can utilize "dead time" like commutes to get work done.
-Affordability: Over a time devices become less expensive and easier to obtain.
1) Mobile Commerce: Users can shop online, book tickets, do mobile banking, and make payments
through mobile apps and browsers. E.g. Amazon, Uber.
2) Location-based Services: Apps that use your location data to provide navigation, finding nearby
places like restaurants/ATMs, tracking shipments etc. E.g. Google Maps, Food delivery apps.
3) Mobile Learning: Educational content like video lectures, e-books can be accessed on mobile
devices anywhere. Online courses have become popular.
4) Entertainment: Streaming music, videos, mobile games, ebooks etc. on smartphones and tablets.
E.g. Netflix, Spotify.
5) Social Networking: Sharing updates, photos/videos, chatting with friends through apps like
Facebook, WhatsApp, Instagram etc.
6) Mobile Payments: Using smartphone e-wallets for contactless payments at stores, paying bills etc.
E.g. Apple Pay, Google Pay.
Issues of Mobile Computing
1. Network Limitations
- Bandwidth: Wireless networks have lower bandwidth compared to wired networks, resulting in
slower data transfer speeds.
- Coverage: There can be gaps in network coverage or poor signal strength in some areas like
basements or rural regions.
- Latency: Wireless networks tend to have higher latency (delay) which can affect real-time
applications.
2. Security Risks
- Data Theft: Mobile devices can be lost or stolen, resulting in sensitive data falling into wrong
hands.
- Malware: Malicious software like viruses or trojans can infect mobile devices through apps,
websites or networks.
- Unauthorized Access: Without proper authentication, cyber-criminals can remotely access data on
mobile devices.
3. Power Constraints
- Battery Life: Mobile devices have limited battery capacity, requiring frequent recharging.
- Power-Hungry Applications: Apps like video streaming, gaming, etc. drain the battery faster.
- Network Connectivity: Maintaining an active wireless connection also consumes significant
battery power.
4. User Distraction
- Notification Overload: Frequent notifications from apps, emails, messages can reduce productivity.
- Addiction: Some users develop addictive behavior towards social media, games on their mobile
devices.
- Situational Impairment: Using mobile devices while driving, walking can lead to accidents.
5. Supporting Mobility
- Maintaining Connectivity: As users move, their mobile devices need to seamlessly switch between
networks.
- Synchronizing Data: User data needs to be consistently synchronized across multiple devices.
- Adapting Applications: Applications need to adapt their user interface for different screen sizes.
6. Performance Constraints
- Limited Processing Power: Mobile CPUs are less powerful compared to desktop/laptop processors.
- Limited Memory: Mobile devices have limited RAM which impacts multitasking capabilities.
- Smaller Storage: Limited internal flash storage on mobile devices compared to traditional
computers.
7. Cost Factors
- Device Cost: High-end smartphones and tablets can be expensive for users.
- Network Costs: Mobile data plans from cellular carriers have recurring costs.
- Application Costs: Paid apps, in-app purchases add to the overall costs for users.
Unit-2
GSM - Global System for Mobile Communications
GSM is a widely adopted and comprehensive standard for digital cellular networks. It was
developed by the European Telecommunications Standards Institute (ETSI) in the 1980s.
It is an open & digital cellular technology used for mobile communication.
Its is basically a combination of FDMA and TDMA.
GSM Architecture:
- Mobile Station (MS): The mobile phone handset with a SIM card
- Base Station Subsystem (BSS): It handles traffic and signal between a mobile phone and NSS.
- Network and Switching Subsystem (NSS): It manages the network switching functions
- Operation Support System (OSS): It offers cost effective support for all GSM related services.
Key Components:
2. Base Station Controller (BSC): Controls multiple BTSs, handles radio channel setup
3. Mobile Switching Center (MSC): Connects GSM network to other networks like PSTN
4. Home Location Register (HLR): Central database that stores subscriber information
5. Visitor Location Register (VLR): Database that tracks subscribers roaming in the area
Advantages:
1. Global Roaming: You can use your mobile phone in over 200 countries around the world with
GSM networks.
2. Efficient Use of Bandwidth: GSM smartly shares limited bandwidth among multiple users, so
more people can use the network.
3. Additional Services: Besides voice calls, GSM also supports text messaging (SMS), internet access,
and other advanced services.
4. Secure Communication: GSM has features like user authentication and encryption to protect
your identity and keep your calls/data secure.
5. Easy Phone Switching: With a SIM card, you can easily switch to a new mobile phone while
keeping your phone number and contacts.
6. Good Call Quality: GSM provides dedicated channels for voice calls, ensuring clear and high-
quality audio.
Disadvantages:
1. Slow Data Speeds: GSM was designed mainly for voice calls, and its data transfer speeds are very
slow (up to 9.6 kbps), making it unsuitable for modern internet usage.
2. Proprietary Standard: The GSM specifications are controlled by organizations, making it difficult
to customize or introduce new features easily.
3. Limited Frequency Range: GSM operates in specific frequency bands (900MHz, 1800MHz) which
have limited capacity for the growing number of users.
4. Incompatible with Old Networks: GSM is not compatible with older analog mobile networks,
making it difficult for users to transition from analog to digital.
5. Security Risks: Despite encryption, GSM has some security weaknesses that could allow
eavesdropping, location tracking, or service disruption.
CDMA is a channel access method used in various radio communication technologies, including
cellular networks. It is a form of multiplexing that allows multiple users to share the same
frequency channel simultaneously.
Uses spread-spectrum technology to spread data over the entire available frequency band
Assigns unique code sequences to each user for encoding data
Enables multiple users to transmit data at the same time on the same frequency
Provides better security and privacy compared to other access methods
CDMA Architecture:
1. Each user's data is encoded with a unique code sequence (spreading code)
2. The encoded data is then modulated and transmitted over the entire frequency band
3. At the receiver end, the same code sequence is used to decode and extract the original data
4. Spreading codes ensure that signals from different users appear as noise to others
Advantages of CDMA:
Efficient Use of Bandwidth: Multiple users can share the same frequency channel
Increased Capacity: Can accommodate more users compared to TDMA or FDMA
Improved Call Quality: Better resistance to interference and noise
Enhanced Security: Spread-spectrum technology provides inherent protection
Soft Handoff: Seamless handoff between cells without interruption
Disadvantages of CDMA:
Complex Hardware: CDMA systems require more complex and expensive hardware
Power Control Challenges: Need to tightly control transmission power levels
Limited Global Roaming: CDMA standards are not as widely adopted globally
FDMA is a channel access method used in multiple-access communication systems, including early
analog cellular networks. It is a form of multiplexing that divides the available bandwidth into
separate frequency channels.
Key Features of FDMA:
FDMA Architecture:
- Simple Implementation: FDMA systems are relatively simple and easy to implement
- No Synchronization Required: Users can transmit data independently without synchronization
- Reliable Communication: Users have dedicated channels, reducing interference
Disadvantages of FDMA:
Applications of FDMA:
- Analog Cellular Networks: Early analog mobile phone systems like AMPS used FDMA
- Satellite Communication: FDMA is used in satellite communication systems
- Cable TV Systems: FDMA is used to transmit multiple TV channels over cable networks
TDMA is a channel access method used in various digital communication systems, including cellular
networks. It is a form of multiplexing that divides the available bandwidth into time slots.
Key Features of TDMA:
TDMA Architecture:
Advantages of TDMA:
- Efficient Use of Bandwidth: Multiple users can share the same frequency channel
- Increased Capacity: Can accommodate more users compared to FDMA
- Flexible Resource Allocation: Time slots can be dynamically assigned based on demand
- Digital Transmission: Enables advanced features like data services and encryption
Disadvantages of TDMA: