Unit 1 MC
Unit 1 MC
Digital communication is made from two words digital and communication. Digital
refers to the discrete time-varying signal. Communication refers to the exchange of
information between two or more sources. Digital refers to the discrete time-varying
signal. Communication refers to the exchange of information between two or more
sources. Digital communication refers to the exchange of digital information between
the sender and receiver using different devices and methods.
The data transmission using analog methods for long-distance communication suffers
from distortion, delays, interferences, and other losses. To overcome these problems,
the digitization and sampling of signals using different techniques help in making the
transmission process more efficient, clear, and accurate.
Source signal
The source signal refers to the input signal applied to the digital communication
system. It is also known as the input signal. Digital communication is generally used as
a conversion system from analog to digital. Thus, the input signal is generally
an analog signal. It can be analog or digital. In case of the analog signal as the input
source signal, the digital communication system also works as an analog to digital
converter by converting the analog input to the digital output.
Input Transducer
The transducer is a device used to convert one form of energy to another. In a
communication system, it converts the non-electrical energy to electrical energy to
make it suitable for transmission within the system. In the case of the analog input, the
block also contains an ADC (Analog to digital converter) to convert analog to the
digital signal for further processing.
Source Encoder
The source encoder compresses the data to the reduced number of bits from the
original bits. It helps in effective bandwidth utilization and also removes unnecessary
bits. It means that the compressed data is in the form of binary digits. We can also say
that the source encoder converts the waveforms to binary data. The output data is
further passed to the channel encoder.
Channel Encoder
The information in the signal may get altered due to the noise during the
transmissions. The channel encoder works as an error correction method. It adds
redundant bits to the binary data that helps in correcting the error bits. It enhances
the transmission quality of the signal and the channel.
Digital Modulator
A carrier signal modulates the received signal. It modulates the digital by varying the
transmitted signal's frequency, amplitude, and phase.
Communication channel
The communication channel is the medium between the transmitter and the receiver.
It helps in transmitting a digital signal from the transmitter to the receiver. The data
rate of the channel is measured in bits per second. The various types of channels in a
digital communication system are email, project management apps, and Intranet.
Digital Demodulator
The signal is demodulated and the source signal is recovered from the carrier signal.
Channel decoder
The function of the channel encoder is to add the redundant bits to the binary data,
as discussed above. The channel decoder works in the same but opposite way. It
removes the parity bits from the binary data. It does not affect the signal quality and
the information and transmits the data securely. The output of the channel decoder is
a pure digital signal with no interference or noise.
Source decoder
The source encoder works oppositely as that of the source encoder. It converts the
binary data back to the waveforms.
Output Transducer
The output transducer works in the opposite was as that of the input transducer. It
converts the electrical energy back into its original form. It makes the information
suitable for the user at the output to capture. The conversion is essential at both the
ends of the communication system to make the system operate at a faster rate.
Output signal
The output signal refers to the output from the digital communication system. It is the
signal that appears at the output after passing through various communication system
components. The output signal is only a digital signal.
Wireless Communication:
The modulated signal is then multiplexed with other signals using different
Multiplexing Techniques like Time Division Multiplexing (TDM) or Frequency
Division Multiplexing (FDM) to share the valuable bandwidth.
The Channel
The channel in Wireless Communication indicates the medium of
transmission of the signal i.e. open space. A wireless channel is
unpredictable and also highly variable and random in nature. A channel
maybe subject to interference, distortion, noise, scattering etc. and the
result is that the received signal may be filled with errors.
1. Infrared Transmission
IR or Infrared radiation is a part of electromagnetic radiation. These rays have
a wavelength greater than visible light, making them invisible to the human eye. We
cannot see Infrared light but feel the rays in the form of heat. Frequency range: 300
GHz to 400 THz.
When we look at a fire, we can feel the heat from it and see it because it emits visible
light and Infrared energy. The human body also emits heat but only in the form of
Infrared light. Instruments such as night-vision goggles and Infrared cameras can
capture Infrared light.
Sun is the biggest source of Infrared radiation. Hence, it causes a lot of interference
in Infrared communication. One most important point about Infrared rays is that these
rays cannot penetrate through walls. Hence, the applications of Infrared rays lie
within a contained space.
2. Radio waves
Like Infrared radiation, Radio waves are also a part of electromagnetic
radiation. These waves have the longest wavelengths, from 1mm to 100km in the
spectrum. The name itself has Radio. A Radio is one of the thousands of wireless
technologies that use Radio waves for communication.
3. Microwaves
These waves are also a part of electromagnetic radiation. The micro indicates that
these waves have short wavelengths from 1 meter to 1 millimeter. These are high-
frequency waves-> Frequency range: 300MHz to 300GHz. These waves fall
between Radio waves and Infrared waves.
These waves are used for point-to-point communication as it only transmits data in
one direction. These can transmit all kinds of data, from audio to video. These waves
can be used to transmit thermal energy too.
1. Wi-Fi (Wireless Fidelity): Wi-Fi technology is widely used for wireless local area networking (WLAN).
It operates in the unlicensed frequency bands and allows devices to connect to a wireless network and
access the internet or share data wirelessly. Wi-Fi is based on the IEEE 802.11 standard and supports
various data rates and transmission ranges.
2. Cellular Networks: Cellular networks enable mobile communication over a wide area. They use a
network of base stations to provide coverage and connectivity to mobile devices. Cellular technologies
have evolved over generations, including 2G (GSM), 3G (UMTS), 4G (LTE), and 5G (fifth-generation)
networks. These networks support voice and data services, and each generation offers improved data
rates, lower latency, and enhanced capabilities.
4. Near Field Communication (NFC): NFC is a short-range wireless technology that allows two devices
to establish communication by bringing them into close proximity. NFC is commonly used for
contactless payment systems, access control, and data exchange between devices.
5. Zigbee: Zigbee is a wireless communication standard designed for low-power, short-range
applications in the Internet of Things (IoT) domain. It operates on the IEEE 802.15.4 standard and
enables devices to communicate wirelessly in a mesh network topology. Zigbee is commonly used in
home automation, smart lighting, and industrial applications.
6. RFID (Radio Frequency Identification): RFID is a technology that uses radio waves to identify and
track objects or people. It consists of tags or labels that contain an electronically stored unique
identifier and readers that communicate with the tags wirelessly. RFID is used in applications such as
inventory management, asset tracking, and access control systems.
7. Satellite Communication: Satellite communication involves the use of satellites orbiting the Earth to
provide long-distance wireless communication. It is used for various applications, including television
broadcasting, internet connectivity in remote areas, and global positioning systems (GPS).
8. WiMAX (Worldwide Interoperability for Microwave Access): WiMAX is a wireless technology that
provides high-speed broadband access over a wide area. It is based on the IEEE 802.16 standard and
offers greater coverage compared to Wi-Fi. WiMAX has been deployed in both fixed and mobile
applications.
9. Ultra-Wideband (UWB): UWB is a wireless communication technology that uses a large portion of
the frequency spectrum for short-range, high-bandwidth data transmission. UWB enables precise
positioning, high data rates, and low power consumption. It is used in applications such as real-time
location systems and wireless connectivity for multimedia devices.
10. LTE-M and NB-IoT: LTE-M (Long-Term Evolution for Machines) and NB-IoT (Narrowband Internet of
Things) are cellular technologies specifically designed for low-power, wide-area IoT applications. They
provide efficient connectivity for IoT devices with long battery life and extended coverage.
These are some of the key technologies in digital wireless communication. Each technology is designed
to meet specific requirements and use cases, ranging from local area networking to long-distance
communication and IoT applications.
WHAT IS A WIRELESS NETWORK OR WI-FI?
A wireless network refers to a computer network that makes use of Radio Frequency (RF)
connections between nodes in the network. Wireless networks are a popular solution for homes,
businesses, and telecommunications networks.
It is common for people to wonder “what is a wireless network” because while they exist nearly
everywhere people live and work, how they work is often a mystery. Similarly, people often
assume that all wireless is Wi-Fi, and many would be surprised to discover that the two are not
synonymous. Both use RF, but there are many different types of wireless networks across a
range of technologies (Bluetooth, ZigBee, LTE, 5G), while Wi-Fi is specific to the wireless
protocol defined by the Institute of Electrical and Electronic Engineers (IEEE) in the 802.11
specification and its amendments.
In addition to a LAN, there are a few other types of common wireless networks: personal-
area network (PAN), metropolitan-area network (MAN), and wide-area network (WAN).
LAN
A local-area network is a computer network that exists at a single site, such as an office
building. It can be used to connect a variety of components, such as computers, printers,
and data storage devices. LANs consist of components like switches, access points,
routers, firewalls, and Ethernet cables to tie it all together. Wi-Fi is the most commonly
known wireless LAN.
PAN
MAN
Large companies, for example, may use a MAN if they have a spacious campus and need
to manage key components, such as HVAC and electrical systems.
WAN
A wide-area network covers a very large area, like an entire city, state, or country. In fact,
the internet is a WAN. Like the internet, a WAN can contain smaller networks, including
LANs or MANs. Cellular services are the most commonly known wireless WANs.
Wireless switching technology refers to the mechanisms and devices used to manage and
control wireless communication in a network. It involves the process of efficiently routing
wireless signals, managing access to the wireless network, and optimizing the performance of
wireless devices. Here are some key wireless switching technologies:
1. Wireless LAN (WLAN) Controllers: WLAN controllers are centralized devices that manage
and control multiple wireless access points (APs) in a wireless network. They handle functions
such as AP configuration, wireless client authentication, roaming, and radio resource
management. WLAN controllers provide a unified management platform for wireless network
administration and help ensure seamless connectivity and performance optimization.
2. Virtual LANs (VLANs): VLANs are used to logically segregate wireless devices into
separate broadcast domains within a network. By dividing the network into VLANs, network
administrators can isolate wireless traffic, improve security, and manage network resources
more efficiently. VLANs allow for the creation of separate wireless networks or segments, each
with its own set of policies and access controls.
3. Mesh Networking: Mesh networking is a wireless switching technology that enables devices
to communicate with each other and extend network coverage through self-configuring
networks. In a mesh network, each device, including access points, acts as a relay, forwarding
data to other devices until it reaches its destination. Mesh networks provide scalability,
redundancy, and flexibility, particularly in scenarios where deploying wired backhaul
connections is challenging.
5. Wireless LAN Switches: Wireless LAN switches are specialized devices that provide
centralized control and management of wireless access points. They typically include features
such as traffic shaping, access control, and security enforcement. Wireless LAN switches
simplify the deployment and management of wireless networks, particularly in large-scale
enterprise environments.
6. Load Balancing: Load balancing techniques distribute network traffic across multiple access
points or channels to optimize performance and avoid congestion. Load balancing algorithms
dynamically assign wireless clients to different access points based on factors such as signal
strength, channel utilization, and client capacity. Load balancing helps ensure even distribution
of client connections and efficient utilization of available network resources.
7. Quality of Service (QoS): QoS mechanisms prioritize certain types of traffic over others in
a wireless network. QoS in wireless switching allows administrators to assign priority levels to
different types of data, ensuring that critical applications or services receive the necessary
bandwidth and lower-priority traffic does not adversely impact performance. QoS mechanisms
help maintain service quality in wireless networks, particularly for real-time applications like
voice and video.
8. Power over Ethernet (PoE): PoE technology enables the delivery of power to wireless access
points over Ethernet cables, eliminating the need for separate power sources. PoE switches
supply power to the access points, simplifying installation and reducing wiring complexity in
wireless networks.
These are some of the key wirelesses switching technologies used to manage and optimize
wireless communication in networks. The specific choice of technologies depends on the
requirements, scale, and complexity of the wireless network deployment.
WIRELESS COMMUNICATION
Before talking about wireless medium, we need to talk about the wired medium. Wired network
is a bounded medium where data travels over a path that a wire or cable takes. In modern era
of advanced and enormous no of devices, wired medium of communication imposes a
restriction on fluent communication. There are various problems with wired networks.
Consider a situation, you want to connect to 10 or more devices around you.
You need exact same no of ports to be able to connect to devices, but large no of ports seems
to be impractical but with wireless network, it can be easily done.
As the name suggests, wireless network eliminates needs to be tethered with wire or cable.
Convenience and Mobility becomes its main characteristics. Many different wireless devices
can connect to network easily and seamlessly. As wireless data travel through air, there must
be some constraints within which wireless communication takes place.
These are:
All wireless devices must follow a common standard i.e., IEEE 802.11
Wireless coverage must be there where devices are expected to use.
Note –
Wired network comes under IEEE standard 802.3
wireless network comes under IEEE standard 802.11
Basics of Wireless Communication:
Wireless communication takes places over free space through RF (radio frequency), one
device, a Transmitter, sends signal to another device, a Receiver. Two devices (transmitter and
receiver) must use same frequency (or channel) to be able to communicate with each other. If
a large number of wireless devices communicate at same time, radio frequency can cause
interference with each other. Interference increases as no of devices increases.
Wireless devices share airtime just like wired devices connect to shared media and share
common bandwidth. For effective use of media, all wireless devices operate in half duplex
mode to avoid collision or interference. Before the transmission begins, devices following
IEEE 802.11 standard must check whether channel is available and clear.
Note –
Wireless communication is always half duplex as transmission uses same frequency or channel.
To achieve full duplex mode, devices use different frequency or channel of transmission and
receiving of signals. You can say that wireless communication is Full duplex but technically it
is not.
Radio Frequency:
In free space, the sender (transmitter) sends an alternating current into a section of wire (an
antenna). This sets up a moving electric and magnetic fields that travel as travelling waves. The
electric and magnetic field moves along each other at a right angle to each other as shown. The
signal must keep changing or alternating by cycle up and down to keep electric and magnetic
field cyclic and pushing forward. The no of cycles a wave taking in a second is called
Frequency of the wave.
So,
frequency = no of cycles per second
UNIT II
A mobile phone (also called mobile cellular network, cell phone or hand phone) is an
example of mobile communication (wireless communication). It is an electric device
used for full duplex two way radio telecommunication over a cellular network of base
stations known as cell site.
CHATGPT
Mobile communication refers to the ability to exchange information wirelessly between mobile devices,
such as smartphones, tablets, and wearable devices. It enables voice calls, text messaging, internet
access, multimedia sharing, and various other communication services while on the move. Mobile
communication has become an integral part of modern society, providing connectivity, convenience,
and access to information anytime and anywhere.
Here are key aspects and technologies involved in mobile communication:
1. Cellular Networks: Cellular networks are the infrastructure that enables mobile communication. They
consist of a network of interconnected base stations or cell towers that provide coverage in specific
geographic areas. Cellular networks use a combination of radio frequencies, protocols, and standards to
facilitate wireless communication. Examples of cellular network technologies include 2G (GSM), 3G
(UMTS), 4G (LTE), and the latest generation, 5G.
2. Wireless Spectrum: Mobile communication relies on the use of specific radio frequency bands within
the electromagnetic spectrum. These frequency bands are allocated by regulatory authorities to different
wireless services. Mobile operators acquire licenses to operate within specific frequency bands,
ensuring efficient and interference-free communication.
3. Mobile Devices: Mobile communication involves a wide range of devices, including smartphones,
tablets, feature phones, and wearable devices. These devices have built-in wireless communication
capabilities, such as cellular connectivity (3G/4G/5G), Wi-Fi, Bluetooth, and NFC. Mobile devices
provide voice calling, text messaging, internet browsing, app usage, and multimedia functionalities.
4. SIM Cards: Subscriber Identity Module (SIM) cards are small integrated circuits that identify and
authenticate mobile devices on cellular networks. SIM cards store information such as the mobile
subscriber's phone number, network authentication data, and personal settings. They enable users to
switch between different mobile devices while retaining their phone number and network identity.
5. Roaming: Roaming allows mobile subscribers to use their devices and services while outside the
coverage area of their home network. When a subscriber's device enters another network's coverage
area, it connects to the visited network, allowing continued mobile communication. Roaming
agreements between mobile operators facilitate seamless connectivity for users traveling outside their
home network.
6. Voice over LTE (VoLTE): Voice over LTE is a technology that enables voice calls to be transmitted
over 4G LTE networks. Unlike traditional voice calls that use separate circuit-switched networks,
VoLTE uses packet-switched data networks for voice communication. VoLTE provides superior voice
quality, faster call setup times, and the ability to use voice and data simultaneously.
7. Mobile Data and Internet Access: Mobile communication allows users to access the internet using
their mobile devices. Mobile data services provide internet connectivity through cellular networks,
allowing users to browse websites, use apps, stream multimedia content, and access online services
while on the go. Data speeds and capacity have significantly improved with the introduction of faster
network technologies like 4G and 5G.
8. Mobile Applications: Mobile communication is enhanced by a vast ecosystem of mobile applications
(apps). Mobile apps provide various functionalities and services, including social networking, instant
messaging, email, gaming, productivity tools, and multimedia content consumption. App stores and
marketplaces offer a wide range of apps for download and installation on mobile devices.
9. Security and Privacy: Mobile communication involves considerations for security and privacy.
Measures such as encryption, authentication protocols, and secure data transmission are implemented
to protect user information and communication. Mobile operating systems and apps often provide
security features like device encryption, biometric authentication, and app permissions to safeguard
user data.
10. Future of Mobile Communication: Mobile communication continues to advance with the
introduction of new technologies and services. The ongoing deployment of 5G networks promises even
faster data speeds, lower latency, massive device connectivity, and support for emerging applications
like augmented reality (AR), virtual reality (VR),
In other words, you can say that mobile computing allows transmission of data, voice
and video via a computer or any other wireless-enabled device without being
connected to a fixed physical link. In this technology, data transmission is done
wirelessly with the help of wireless devices such as mobiles, laptops etc.
This is only because of Mobile Computing technology that you can access and transmit
data from any remote locations without being present there physically. Mobile
computing technology provides a vast coverage diameter for communication. It is one
of the fastest and most reliable sectors of the computing technology field.
o Mobile Communication
o Mobile Hardware
o Mobile Software
Mobile Communication
Mobile Communication specifies a framework that is responsible for the working of
mobile computing technology. In this case, mobile communication refers to an
infrastructure that ensures seamless and reliable communication among wireless
devices. This framework ensures the consistency and reliability of communication
between wireless devices. The mobile communication framework consists of
communication devices such as protocols, services, bandwidth, and portals necessary
to facilitate and support the stated services. These devices are responsible for
delivering a smooth communication process.
Mobile Hardware
Mobile hardware consists of mobile devices or device components that can be used
to receive or access the service of mobility. Examples of mobile hardware can be
smartphones, laptops, portable PCs, tablet PCs, Personal Digital Assistants, etc.
These devices are inbuilt with a receptor medium that can send and receive signals.
These devices are capable of operating in full-duplex. It means they can send and
receive signals at the same time. They don't have to wait until one device has finished
communicating for the other device to initiate communications.
Mobile Software
Mobile software is a program that runs on mobile hardware. This is designed to deal
capably with the characteristics and requirements of mobile applications. This is the
operating system for the appliance of mobile devices. In other words, you can say it
the heart of the mobile systems. This is an essential component that operates the
mobile device.
MOBILE COMPUTING ARCHITECTURE
o This layer presents data to the user and optionally permits data
manipulation and data entry, also this layer requests the data
form Business layer.
o The business logic acts as the server for client requests from
workstations. It acts according Business rules fetch or insert
data through the Data Layer.
o In turn, it determines what data is needed (and where it is
located) and acts as a client in relation to a third tier of
programming that might be located on a local or mainframe
computer.
o The third tier of the 3-tier system is made up of the DBMS that
provides all the data for the above two layers.
1. Smartphones: Smartphones are the most widely used mobile devices. They combine the functionality of a phone
with advanced computing capabilities. Smartphones typically feature touchscreens, built-in sensors (such as
accelerometers and GPS), cameras, and wireless connectivity options (such as cellular, Wi-Fi, and Bluetooth).
They can run various mobile applications and provide access to communication services, internet browsing,
multimedia playback, and more.
2. Tablets: Tablets are larger mobile devices with larger screens compared to smartphones. They offer a more
immersive and comfortable display for tasks like reading, browsing the internet, watching videos, and productivity
applications. Tablets are typically touch-based, although some models also support stylus input. They often have
Wi-Fi and cellular connectivity options.
3. Laptops: Laptops are portable computers designed for mobile computing. They offer a full-sized keyboard,
trackpad or pointing device, and a display that can be opened and closed like a clamshell. Laptops provide a more
powerful computing experience compared to smartphones and tablets and are suitable for tasks that require more
processing power, such as software development, content creation, and heavy multitasking.
4. Wearable Devices: Wearable devices are worn on the body and typically have sensors and wireless connectivity
capabilities. Examples include smartwatches, fitness trackers, smart glasses, and augmented reality (AR) headsets.
Wearable devices are often designed to track health and fitness data, display notifications, provide hands-free
communication, and offer contextual information.
5. E-readers: E-readers, such as Amazon Kindle, are specialized devices designed for reading digital books and
documents. They use e-ink technology that mimics the appearance of ink on paper, resulting in a more comfortable
reading experience. E-readers are lightweight, have long battery life, and are optimized for reading in different
lighting conditions.
6. Portable Media Players: Portable media players, such as iPods, are dedicated devices for playing audio and
video content. They often have a small screen, storage for media files, and support for various file formats.
Portable media players are useful for entertainment on the go, allowing users to listen to music, watch videos, and
view photos.
7. Handheld Gaming Consoles: Handheld gaming consoles, such as the Nintendo Switch and Sony PlayStation
Portable, are mobile devices specifically designed for gaming. They feature game controls, screens optimized for
gaming, and wireless connectivity for multiplayer gaming experiences.
These are just some examples of mobile devices used in mobile computing. The choice of device depends on
individual preferences, required functionalities, and the specific tasks users want to accomplish while being
mobile. Mobile devices continue to evolve with advancements in technology, offering increasingly powerful
computing capabilities, enhanced displays, improved battery life, and additional features to meet users' needs.
1. Cellular Networks: Cellular networks are the backbone of mobile communication. They are composed of a
network of base stations or cell towers that provide coverage over a specific geographic area. Cellular networks
use a combination of radio frequencies, protocols, and standards to enable wireless communication. The most
common cellular network technologies include 2G (GSM), 3G (UMTS), 4G (LTE), and the latest generation, 5G.
2. Wi-Fi Networks: Wi-Fi networks are local area networks (LANs) that provide wireless internet connectivity.
They are commonly used in homes, offices, public spaces, and other areas where high-speed wireless internet
access is required. Wi-Fi networks operate on various frequency bands, such as 2.4 GHz and 5 GHz, and can
support multiple devices simultaneously.
3. Bluetooth: Bluetooth is a short-range wireless communication technology that enables data transfer between
devices over short distances. It is commonly used for connecting peripherals such as headphones, speakers,
keyboards, and other accessories to mobile devices. Bluetooth operates on the 2.4 GHz frequency band and
supports low-power communication.
4. Near Field Communication (NFC): NFC is a short-range wireless technology that allows communication
between devices when they are in close proximity (within a few centimeters). NFC is commonly used for
contactless payments, ticketing, and data exchange between devices. It is widely integrated into mobile devices,
enabling functionalities like mobile payments and access control.
5. Satellite Networks: Satellite networks provide global coverage by utilizing satellites in space. They are used in
remote areas where terrestrial networks are not available or in scenarios that require wide-area coverage, such as
maritime and aviation communications. Satellite networks enable voice calls, data communication, and global
positioning services (GPS).
6. Virtual Private Networks (VPNs): VPNs are used to establish secure connections over public networks, such as
the internet. They create a private and encrypted connection between the mobile device and a remote server,
ensuring secure data transmission. VPNs are commonly used to access corporate networks, protect privacy, and
bypass regional restrictions.
7. Mesh Networks: Mesh networks are decentralized networks where each device acts as a node and can relay
data to other devices. This architecture allows for broader coverage and improved reliability by creating multiple
communication paths. Mesh networks are used in scenarios where traditional network infrastructure is unavailable
or unreliable, such as in disaster recovery or remote areas.
8. Internet of Things (IoT) Networks: IoT networks enable communication between interconnected devices and
objects. These networks support the exchange of data and control signals, allowing devices to communicate and
collaborate. IoT networks use various technologies, including cellular, Wi-Fi, Bluetooth, and Low-Power Wide
Area Networks (LPWAN), depending on the requirements of the IoT application.
Mobile system networks play a crucial role in enabling mobile communication, internet access, and a wide range
of services on mobile devices. These networks continue to evolve with advancements in technology, providing
faster data rates, lower latency, increased capacity, and support for emerging applications and services.
Data Dissemination
The data dissemination is a method of distributing or transmitting the statistical or
another type of data to the end-users. The data can be in the form of audio, video or
any other data services. Organizations use many ways to release data to the public,
such as electronic format, CD-ROM and paper publications, i.e., PDF files based on
aggregated data. Mobile devices receive output data. A mobile device can select, tune
and cache the required data items, which can be used for application programs.
The operating systems found on smartphones include Symbian OS, iPhone OS, RIM's
BlackBerry, Windows Mobile, Palm WebOS, Android, and Maemo. Android, WebOS, and
Maemo are all derived from Linux. The iPhone OS originated from BSD and NeXTSTEP,
which are related to Unix.
It combines the beauty of computer and hand use devices. It typically contains a cellular built-
in modem and SIM tray for telephony and internet connections. If you buy a mobile, the
manufacturer company chooses the OS for that specific device.
Popular platforms of the Mobile OS
1. Android OS: The Android operating system is the most popular operating
system today. It is a mobile OS based on the Linux Kernel and open-source
software. The android operating system was developed by Google. The first Android
device was launched in 2008.
2. Bada (Samsung Electronics): Bada is a Samsung mobile operating system that was
launched in 2010. The Samsung wave was the first mobile to use the bada operating
system. The bada operating system offers many mobile features, such as 3-D graphics,
application installation, and multipoint-touch.
4. iPhone OS / iOS: The iOS was developed by the Apple inc for the use on its device.
The iOS operating system is the most popular operating system today. It is a very
secure operating system. The iOS operating system is not available for any other
mobiles.
5. Symbian OS: Symbian operating system is a mobile operating system that provides
a high-level of integration with communication. The Symbian operating system is
based on the java language. It combines middleware of wireless communications and
personal information management (PIM) functionality. The Symbian operating system
was developed by Symbian Ltd in 1998 for the use of mobile phones. Nokia was the
first company to release Symbian OS on its mobile phone at that time.
6. Windows Mobile OS: The window mobile OS is a mobile operating system that was
developed by Microsoft. It was designed for the pocket PCs and smart mobiles.
7. Harmony OS: The harmony operating system is the latest mobile operating system
that was developed by Huawei for the use of its devices. It is designed primarily for IoT
devices.
8. Palm OS: The palm operating system is a mobile operating system that was
developed by Palm Ltd for use on personal digital assistants (PADs). It was introduced
in 1996. Palm OS is also known as the Garnet OS.
Advantages and disadvantages of mobile
phones
Advantages of mobile phones
Mobile phones have changed the way of communication. Before mobiles, there was a
use of landline phones or letters for communicating with a person who lives far from
you. Mobile phone is not limited to communication; it has various other benefits and
limitations too. Mostly people are aware with the advantages of mobile phones. The
benefits of mobile phones are discussed as follows -
Easy Communication
The main benefit of using the mobile phone is that they make the mode of
communication easier and cheap. Because of the lower price, mobile is affordable and
has been a revolution in the telecom industry where approximately 95% of people use
mobile phones for communication.
Mobile made communication easier, as just by pressing some keys on mobile, we can
contact our friends, family members or colleagues, and others at any time. Mobile also
gives us a facility to contact our fellow person with voice calls, video calls, text
messages, recorded calls, and many more.
Education
It is another major advantage of mobile phones. Mobile phones can be used to acquire
knowledge or information on various topics. For convenience, nowadays, most
colleges, institutions, and schools are offering online education with the proper study
material that can be in the form of images, photos, text, pdf, etc. In the corona
pandemic, we have seen that the students have taken online classes provided by their
respective institutions to ensure the safety and health of students.
Social media
In today's era, mobile phones are not only used for calling purposes. Smartphones are
said to be a gift for social media lovers. Social media apps like Twitter, Instagram, snap
chat, Facebook, etc., are at our fingertips at any time. We can edit and share our
pictures and posts on social media directly from our mobile phones. Mobile gives us
the facility to access social media at all times.
Most people use their mobile phones to scroll through their timeline of social media
platforms in their free time.
Promoting business
Mobile phones can be used for promoting a business. Mobile phones are best for
entrepreneurs or businessmen to promote their business via online or offline sources.
In online sources, one can use social media websites and messaging applications such
as telegram, Instagram, WhatsApp, Pinterest, and others. Most of the leading
companies arrange their meetings on video messaging applications like skype.
One of the old offline methods to promote business using mobile phones is text
messages. In today's era, most companies are still promoting their business via text
messages. At the end of every message, they put a link to their product page or
business website.
Now, mobiles include both front and back cameras, by which we can take selfies. It is
easy to take selfies and pictures from mobile.
GPS location
It is one of the best benefits of the mobile phone. Mobile gives us information about
the current location and destination. Before mobile phones, it was hard to track the
location, but after the development of mobiles, it is easy to track the current location
and destination. We can select a destination on the map, and it will give us the
direction of the ways and also suggest us the shortest route and estimated time to
reach there.
Flashlight
Mobiles have the feature of flashlights. Instead of keeping a torch, it is easy to use a
flashlight on mobile phones. But the flashlight works till the battery is charged.
Calculator
There is a calculator feature present in mobile phones. If we need to calculate bills,
taxes, invoices, mathematical calculations, or other calculations, we can use mobiles.
Some mobiles also have a scientific calculator with them, which can be helpful for
students to calculate their mathematical problems.
Contacts
Before mobile, people used to keep diaries with them to save the mobile numbers. But
now, it is easy to save any contact number on mobile phones. It is also easy to find
someone's contact number on the mobile phone just by searching their name in the
address book.
Online banking
Online banking can also be done via mobile phones. Through mobiles, it is easy to
access the bank accounts, checking the account status, and transferring of money from
one bank to another. We can also pay electricity bills and others via mobile phones.
So these are the advantages of using mobile phones. Now, let's see the negative side
of mobiles. Let us talk about the disadvantages or the harmful effects of using mobile
phones.
Distraction
Sometimes mobile is a disturbing device that creates a distraction between your works.
It is seen in students that are easily distracted from their studies because of mobiles,
as the device contains applications that attract users to enjoy their software. One such
application is the various mobile games that are being played a couple of days make
the people addicted and distracted from their goals.
Ear problems
While listening to songs, watching movies, or calling for a long time with headphones
or headset can damage the listening potential of an individual. It has been seen in
researches that using headphones with the louder hearing sound seriously disturbs
the capability of ears to hear voice properly.
Wastage of time
Although mobiles are helpful in various aspects, it is one of the biggest thing
responsible for the wastage of time. Most students and teenagers are affected by it.
Students want to play games, watching movies, listening songs, and other kinds of
entertainment that waste their precious time.
Addiction to mobile phone
Addiction to mobile phones is termed "Nomophobia". In this mental disorder, people
are unable to stop themselves without using mobile phones. They even can't imagine
themself without a mobile. Using mobile phones too much makes a person addicted
to them.
Cyberbullying
Cyberbullying means to send, post, or share negative, false, and harmful content about
someone else. Research shows that most students and teenagers got cyberbullied.
Cyberbullying puts someone's life in danger.
Security issues
These are the common issues that happen with mobile users. iPhone IOS is little bit
secure but in android phones breaching someone's privacy and data is easier for
hackers. Security issues are the dangerous effects of using mobile phones for people.
People faced a lot of problems due to security issues, such as loss of money, image,
reputation, and others.
Loss of study
Using mobile phones in excessive amounts is a major disadvantage for students.
Mobile phones mostly affect the study of students. Mobile phones distract students
from the study. Students majorly focus on playing games, watching movies, and other
entertainment on mobile that decreases their grades.
Health problems
Excessive use of mobile phones causes the health problems such as swelling of the
eyes and other eyesight problems. Mobile phones include mental disorders such as
Anger, depression, anxiety, tension, and others.
Sleeping issues
Using the mobile phone in an excessive amount badly affects the sleeping routine.
People use mobile even during sleeping time. At night, some people stuck on their
mobile phone's screen that disturbed their sleeping routine a lot.
Accidents
People stuck in their mobiles, even walking on roads, or driving a car. Using a mobile
phone while driving causes accidents and puts the lives of others at risk. It is very
dangerous to use mobile while driving, as mobile users while driving can injure them
and can kill other people by accidents.
The GSM network architecture is defined in the GSM specifications and it can be grouped into
four main areas:
The different elements of the GSM network operate together and the user is not aware of the
different entities within the system.
As the GSM network is defined but the specifications and standards, it enables the system to
operate reliably together regardless of the supplier of the different elements.
A basic diagram of the overall system architecture for the 2G GSM mobile communications
system includes four major elements which are shown below:
Within this diagram the different network areas can be seen - they are grouped into the four
areas that provide different functionality, but all operate to enable reliable mobile
communications to be achieved.
The overall network architecture provided to be very successful and was developed further
to enable 2G evolution to carry data and then with further evolutions to allow 3G to be
established.
It also provides an interface to the PSTN so that the mobile communications calls can be
routed from the mobile network to a phone connected to a landline. Interfaces to other MSCs
are provided to enable calls to be made to mobiles on different networks.
When a user switches on their phone, the phone registers with the network and from this it
is possible to determine which BTS it communicates with so that incoming calls can be routed
appropriately. Even when the phone is not active (but switched on) it re-registers periodically
to ensure that the network (HLR) is aware of its latest position.
There is one HLR per network, although it may be distributed across various sub-centres to
for operational reasons.
This number, as mentioned above, is installed in the equipment and is checked by the
network during registration. Dependent upon the information held in the EIR, the mobile may
be allocated one of three states - allowed onto the network, barred access, or monitored in
case its problems.
The "MSC" part of the term GMSC is misleading, since the gateway operation does not require
any linking to an MSC.
The two gateways handle messages directed in different directions. The SMS-GMSC (Short
Message Service Gateway Mobile Switching Centre) is for short messages being sent to an
ME.
The SMS-IWMSC (Short Message Service Inter-Working Mobile Switching Centre) is used for
short messages originated with a mobile on that network. The SMS-GMSC role is similar to
that of the GMSC, whereas the SMS-IWMSC provides a fixed access point to the Short Message
Service Centre.
These entities were the main ones used within the GSM network. They were typically co-
located, but often the overall core network was distributed around the country where the
network was located. This gave some resilience in case of failure.
Although the GSM system was essential a voice system, the core network was a data network
as all signals were handled digitally.
• Base Transceiver Station (BTS): The BTS used in a GSM network comprises the
radio transmitter receivers, and their associated antennas that transmit and
receive to directly communicate with the mobiles. The BTS is the defining element
for each cell. The BTS communicates with the mobiles and the interface between
the two is known as the Um interface with its associated protocols.
• Base Station Controller (BSC): The BSC forms the next stage back into the GSM
network. It controls a group of BTSs, and is often co-located with one of the BTSs
in its group. It manages the radio resources and controls items such as handover
within the group of BTSs, allocates channels and the like. It communicates with the
BTSs over what is termed the Abis interface.
The base station subsystem element of the GSM network utilised the radio access technology
to enable a number of users to access the system concurrently. Each channel supported up
to eight users and by enabling a base station to have several channels, a large number of
subscribers could be accommodated by each base station.
Base stations are carefully located by the network provider to enable complete coverage of
an area. The area being covered bay a base station often being referred to as a cell.
As it is not possible to prevent overlap of the signals into the adjacent cells, channels used in
one cell are not used in the next. In this way interference which would reduce call quality is
reduced whilst still maintaining sufficient frequency re-use.
It is important to have the different BTSs linked with the BSS and the BSSs linked back to the
core network.
A variety of technologies were used to achieve this. As data rates used within he GSM network
were relatively low, E1 or T1 lines were often used, especially for linking the BSS back to the
core network.
As more data was required with increasing usage of the GSM network, and also as other
cellular technologies like 3G became more widespread, many links used carrier grade
Ethernet.
Often remote BTSs were linked using small microwave links as this could reduce the need for
the installation of specific lines if none were available. As base stations often needed to be
located to provide good coverage rather than in areas where lines could be installed, the
microwave link option provided an attractive method for providing a data link for the network.
Mobile station
Mobile stations (MS), mobile equipment (ME) or as they are most widely known, cell or mobile
phones are the section of a GSM mobile communications network that the user sees and
operates. In recent years their size has fallen dramatically while the level of functionality has
greatly increased. A further advantage is that the time between charges has significantly
increased.
There are a number of elements to the cell phone, although the two main elements are the
main hardware and the SIM.
The hardware itself contains the main elements of the mobile phone including the display,
case, battery, and the electronics used to generate the signal, and process the data receiver
and to be transmitted.
The mobile station, or ME also contains a number known as the International Mobile
Equipment Identity (IMEI). This is installed in the phone at manufacture and "cannot" be
changed. It is accessed by the network during registration to check whether the equipment
has been reported as stolen.
The SIM or Subscriber Identity Module contains the information that provides the identity of
the user to the network. It contains are variety of information including a number known as
the International Mobile Subscriber Identity (IMSI). As this is included in the SIM, and it means
that by moving the SIM card from one mobile to another, the user could easily change
mobiles. The ease of changing mobiles whilst keeping the same number meant that people
would regularly upgrade, thereby creating a further revenue stream for network providers
and helping to increase the overall financial success of GSM.
The 2G GSM network architecture follows a logical method of operation. It is far simpler than
current mobile phone network architectures such as the 5G network architecture which uses
software defined entities to enable very flexible operation.
However the 2G GSM architecture does show the voice and operational basic functions that
are needed and how they fit together. As the GSM system was all digital, the network was a
data network.
Radio interfaces in mobile computing refer to the wireless communication protocols and technologies
used to establish connections and transmit data between mobile devices and networks. These
interfaces enable mobile devices to communicate with cellular networks, connect to Wi-Fi networks,
exchange data with other devices, and access various services. Here are some commonly used radio
interfaces in mobile computing:
1. Cellular Radio Interfaces: Cellular radio interfaces are used to establish connections with cellular
networks, enabling mobile devices to make voice calls, send text messages, and access mobile data
services. These interfaces use technologies like 2G (GSM), 3G (UMTS), 4G (LTE), and 5G to provide
connectivity and high-speed data transfer over cellular networks.
2. Wi-Fi (Wireless Fidelity) Interfaces: Wi-Fi interfaces allow mobile devices to connect to local wireless
networks, commonly found in homes, offices, public spaces, and Wi-Fi hotspots. Wi-Fi interfaces
operate on the IEEE 802.11 standard and enable high-speed wireless internet access and local network
connectivity.
4. Near Field Communication (NFC) Interfaces: NFC interfaces facilitate close-range wireless
communication between devices. NFC is used for contactless payments, ticketing, access control, and
data transfer between devices. NFC interfaces allow devices to exchange information by bringing them
into proximity with each other.
5. Infrared (IR) Interfaces: Infrared interfaces, although less common in modern mobile devices, were
used in the past for short-range wireless communication. IR interfaces used infrared light to transmit
data between devices. They were typically used for tasks like file transfer and remote control
functionality.
6. Satellite Interfaces: Satellite interfaces enable mobile devices to connect to satellite networks for
global coverage, particularly in remote areas where terrestrial networks are not available. Satellite
interfaces are commonly used in applications like satellite phones, maritime communication, and
tracking systems.
These radio interfaces provide the means for mobile devices to connect, communicate, and access a
wide range of services. Mobile devices often support multiple radio interfaces to offer flexibility and
compatibility with different networks and devices. The selection of radio interfaces depends on factors
such as the intended use of the device, network availability, and specific requirements for connectivity
and data transfer.
2. Dialing a Phone Number: To initiate a call, the user enters the phone
number of the intended recipient on the mobile device's dial pad or
selects a contact from the address book. The mobile device then sends
the dialed number to the cellular network for call routing.
3. Call Setup: The cellular network processes the dialed number and
determines the destination of the call. It establishes a connection
between the calling device and the recipient's device by routing the call
through the appropriate network infrastructure.
4. Voice Transmission: Once the call is connected, voice data is
transmitted between the devices using digital audio compression and
encoding techniques. The voice data is divided into small packets and
transmitted over the cellular network.
6. Call Termination: When either party decides to end the call, they can
simply hang up or use the call termination function on their mobile
device. The cellular network receives the termination signal and closes
the call connection.
It's important to note that calling in mobile computing can also involve
additional features and services, such as voicemail, call forwarding,
caller ID, call waiting, and more, depending on the capabilities
provided by the mobile device and the cellular network service
provider.
2. Measurement and Evaluation: The mobile device continuously measures the signal strength
and quality of neighboring base stations or access points. This information is used to evaluate
the suitability of potential target cells for handover. The evaluation includes factors like signal
strength, signal-to-noise ratio, and signal quality metrics.
3. Handover Decision: Based on the measurements and evaluations, the mobile device, in
coordination with the network infrastructure, makes a handover decision. The decision is
typically based on predefined thresholds and algorithms that determine when a handover
should occur.
4. Handover Preparation: Once the handover decision is made, the mobile device and the
network infrastructure prepare for the handover. This involves exchanging control messages
and negotiation between the current and target base stations or access points. The target base
station or access point is instructed to allocate resources for the upcoming connection.
5. Handover Execution: During the handover execution phase, the ongoing call or data session
is transferred from the current base station or access point to the target base station or access
point. This transition is carefully managed to ensure minimal disruption or packet loss. The
mobile device switches its radio connection to the target base station or access point, and the
network infrastructure routes the communication to the new location.
6. Handover Completion: Once the handover is successfully executed, the mobile device
establishes a new connection with the target base station or access point, and the
communication resumes seamlessly. The handover process is considered complete when the
mobile device is fully connected to the target cell, and the quality of the connection is verified.
Security in mobile computing refers to the measures and practices employed to protect mobile
devices, data, and communication from unauthorized access, data breaches, and other security
threats. As mobile devices have become integral to our personal and professional lives,
ensuring their security has become crucial. Here are some key aspects of security in mobile
computing:
1. Device Security: Protecting the physical device is the first line of defense. This includes
measures such as using strong passcodes or biometric authentication (e.g., fingerprint or face
recognition), enabling device encryption, keeping the device's operating system and
applications up to date with security patches, and using remote wipe or tracking features in
case of loss or theft.
2. Network Security: Mobile devices connect to various networks, such as cellular networks,
Wi-Fi networks, and virtual private networks (VPNs). To enhance network security, it is
essential to connect to trusted and secure networks, use strong and unique passwords for Wi-
Fi connections, enable encryption protocols (e.g., WPA2 or WPA3) for Wi-Fi networks, and
utilize VPNs when connecting to public or unsecured networks to protect data transmission.
3. App Security: Mobile devices rely heavily on applications (apps) for various tasks. It's
crucial to download apps from trusted sources, such as official app stores, and verify the
permissions required by apps before installation. Regularly updating apps to their latest
versions is also important, as updates often include security fixes. Additionally, be cautious of
granting unnecessary permissions to apps and consider using reputable mobile security
solutions to scan for malware and potentially harmful apps.
4. Data Protection: Mobile devices store sensitive and personal data. To protect data, it is
important to enable device encryption to safeguard data at rest. Using strong and unique
passwords or biometric authentication for accessing sensitive applications or data is
recommended. It is also advisable to use secure cloud storage services or backup solutions with
encryption to protect data and enable remote data wiping in case of device loss.
5. Secure Communication: Ensure that communication over mobile devices is secure. Use
secure protocols (e.g., HTTPS) for web browsing and avoid transmitting sensitive information
over unencrypted connections. Consider using end-to-end encrypted messaging apps for
sensitive communications, and be cautious of phishing attempts, suspicious links, or
attachments in emails, messages, or social media.
7. User Awareness and Education: Users play a crucial role in mobile security. Educate
yourself about common security threats, safe practices, and how to identify and avoid potential
risks such as phishing, malicious apps, or unsecured networks. Regularly update your
knowledge and stay informed about emerging threats and security best practices.
Mobile computing security requires a combination of technical measures, user awareness, and
best practices to mitigate risks and protect devices, data, and privacy. By implementing these
security measures, users can significantly enhance the security posture of their mobile devices
and ensure a safer mobile computing experience.
Mobile computing continually evolves with the introduction of new data services that cater to
the increasing demands and technological advancements. Here are some examples of new data
services in mobile computing:
1. 5G Networks: The deployment of 5G networks has unlocked new possibilities in mobile
computing. With significantly faster speeds, lower latency, and higher capacity, 5G enables a
range of data-intensive services. These include ultra-high-definition streaming, virtual and
augmented reality experiences, real-time gaming, massive IoT (Internet of Things)
deployments, and mission-critical applications that require low latency and high reliability.
2. Edge Computing: Edge computing brings computation and data storage closer to the network
edge, reducing latency and improving the performance of mobile applications and services.
With edge computing, data processing and analysis occur closer to the source, enabling real-
time analytics, faster response times, and efficient utilization of network resources. This is
particularly beneficial for latency-sensitive applications, IoT deployments, and emerging
technologies like autonomous vehicles and smart cities.
3. Cloud Services: Cloud computing services have transformed mobile computing by providing
scalable and on-demand access to resources, applications, and data storage. Mobile devices can
seamlessly connect to cloud services for data synchronization, backup, and collaboration across
multiple devices. Cloud services also facilitate the development of cloud-based mobile
applications and enable the integration of mobile devices with enterprise systems and
workflows.
4. Mobile Payments and Wallets: Mobile payment services, such as Apple Pay, Google Pay,
Samsung Pay, and various digital wallets, have gained popularity, allowing users to make
secure and convenient payments using their mobile devices. These services leverage near field
communication (NFC), QR codes, or mobile apps to enable contactless payments at retail
stores, online purchases, and peer-to-peer transactions.
6. Internet of Things (IoT) Integration: Mobile computing integrates with IoT devices to enable
remote control, monitoring, and data exchange. Mobile devices act as gateways or control
interfaces for IoT devices, allowing users to manage smart home devices, wearable technology,
industrial sensors, and other connected devices from their mobile devices.
These are just a few examples of new data services in mobile computing. As technology
advances and user demands evolve, we can expect further innovation and the emergence of
additional data services that enhance mobile computing capabilities and provide new
experiences to users.
Modulation in mobile computing
Modulation in mobile computing refers to the process of modifying a carrier signal, typically
an electromagnetic wave, to encode and transmit information. Modulation techniques are used
to transmit data over wireless communication channels in mobile computing systems. Here are
some common modulation techniques used in mobile computing:
2. Frequency Modulation (FM): Frequency modulation involves varying the frequency of the
carrier signal based on the amplitude of the modulating signal. FM is widely used in mobile
computing for FM radio broadcasts and various other applications like wireless microphones
and certain wireless data transmission systems.
3. Phase Modulation (PM): Phase modulation is a technique where the phase of the carrier
signal is modified based on the instantaneous amplitude of the modulating signal. PM is used
in certain digital communication systems, such as phase-shift keying (PSK) and quadrature
amplitude modulation (QAM), which are widely employed in mobile computing for data
transmission.
4. Quadrature Phase Shift Keying (QPSK): QPSK is a digital modulation scheme that encodes
data by varying both the phase and amplitude of the carrier signal. It is widely used in mobile
computing for wireless data transmission, particularly in cellular networks, Wi-Fi, and satellite
communications.
6. Code Division Multiple Access (CDMA): CDMA is a digital modulation technique used in
cellular communication systems. It allows multiple users to share the same frequency band
simultaneously by assigning unique codes to each user. CDMA is employed in mobile
computing for cellular networks, including 3G and some 4G systems.
These are just a few examples of modulation techniques used in mobile computing. The choice
of modulation technique depends on factors such as the desired data rate, signal quality,
available bandwidth, and compatibility with existing communication standards. Different
modulation schemes and techniques are employed to optimize the efficiency, capacity, and
performance of wireless communication systems in mobile computing.
Multiplexing in mobile computing refers to the technique of combining multiple data streams
or signals into a single transmission medium or channel. It allows multiple users or data sources
to share the available bandwidth efficiently. Multiplexing plays a crucial role in optimizing the
utilization of network resources and enabling simultaneous communication between different
devices or applications. Here are some common multiplexing techniques used in mobile
computing:
1. Time Division Multiplexing (TDM): TDM divides the available time slots of a
communication channel into fixed intervals. Each time slot is allocated to a different user or
data stream, and the users take turns transmitting their data during their assigned time slots.
TDM is used in various mobile communication systems, such as 2G and 3G cellular networks,
to allocate time slots to different users.
2. Frequency Division Multiplexing (FDM): FDM divides the available frequency spectrum of
a communication channel into multiple non-overlapping frequency bands. Each frequency
band is allocated to a different user or data stream, and they can simultaneously transmit their
data using their allocated frequency bands. FDM is used in systems like FM radio broadcasting
to allocate different frequencies to different radio stations.
3. Code Division Multiplexing (CDM): CDMA is a form of multiplexing that assigns unique
codes to different users or data streams and allows them to transmit simultaneously over the
same frequency band. CDMA is used in mobile communication systems, such as 3G and some
4G cellular networks, to enable multiple users to share the same frequency band.
5. Space Division Multiplexing (SDM): SDM involves using multiple spatial channels or
antennas to transmit independent data streams simultaneously. Multiple antennas are used to
create separate spatial channels, allowing multiple users or data streams to communicate
concurrently. SDM is used in technologies like Multiple-Input Multiple-Output (MIMO) in
Wi-Fi and cellular networks to improve data throughput and enhance signal quality.
These are some of the key multiplexing techniques employed in mobile computing. Different
multiplexing methods are used depending on the specific requirements, characteristics of the
communication system, and the goals of efficient resource utilization and simultaneous
communication between multiple devices or data sources.
CDMA stands for Code Division Multiple Access. It is a channel access method used by
several radio communication technologies. It is a digital cellular technology and an
example of multiple access. It is generally used for mobile communication.
Multiple access means that several transmitters can send information simultaneously
over a single communication channel. In this system, different CDMA codes are
assigned to different users, and the user can access the whole bandwidth for the entire
duration. It optimizes the use of available bandwidth as it transmits over the entire
frequency range and does not limit the user's frequency range.Thus, CDMA allows
several users to share a band of frequencies without undue interference between the
users. It is used as an access method in many mobile phone standards.
CDMA technology was developed during World War II. It was developed by English
allies to protect their wireless transmissions from jamming. When the war ended,
Qualcomm patented this technology and made it commercially available. The first
CDMA system was launched in September 1995 in Hong Kong by Hutchison Telephone
Co.
Usage
o It is used in the Global Positioning System (GPS).
o It is used by several mobile phone companies (e.g., Qualcomm standard IS-2000, also
known as CDMA2000)
o W-CDMA is used in UTMS 3G mobile phone standards.
o CDMA has been used in OmniTRACS satellite system for transportation.
Categories of CDMA
o Synchronous CDMA (orthogonal codes)
o Asynchronous CDMA (pseudorandom codes)
IMT 2000
• IMT-2000 Stands for International Mobile Telecommunications-2000.
• An initiative of the International Telecommunication Union (ITU) to create a global standard
for wireless data networks.
• The goal of International Mobile Telecommunications-2000 (IMT-2000) is to support data
transmission rates of up to 2 Mbps for fixed stations and 384 Kbps for mobile stations.
• Note that the “2000” in the term “International Mobile Telecommunications-2000” refers to
the transmission speed (approximately 2000 Kbps), not the deployment date (which might be
several years beyond the year 2000).
• The European proposal for IMT-2000 prepared by ETSI is called as Universal Mobile
Telecommunication System(UMTS)
• Features:
• It is used for all radio environments.
• It supports both packet switched and circuit switched data transmission.
• It offers high spectrum efficiency.
• It support wide range of telecommunication services like voice , data, multimedia and internet.
Since the introduction of mobile communication, this technology has come a long way
and has evolved a lot. Many technological developments have been made to make
mobile communication more efficient and serve users better. It was introduced as 1G
(First Generation- Voice-only communication), and today we are widely using 4G
technology. 4G is the fourth Generation of mobile network technology, which is
the successor of 3G and preceded by the 5G network. It provides a much higher data
transmission speed than its successor networks, making it preferable at this stage of a
fast lifestyle. In this topic, we will learn more about 4G Mobile communication, its
introduction, working, availability, etc.
1. IP (Internet Protocol):
- Addressing: IP assigns a unique IP address to each device connected to the network. IPv4 and
IPv6 are the two versions of IP addresses currently in use.
- Routing: IP routers analyze the destination IP address of a packet and determine the
appropriate path to forward the packet through the network. They use routing tables and
protocols such as OSPF (Open Shortest Path First) or BGP (Border Gateway Protocol) to make
routing decisions.
2. Mobile IP:
Mobile IP operates by introducing the concept of a home network and a foreign network:
- Home Network: The home network is the network where a mobile device has a permanent IP
address assigned. It is the network to which the device is originally registered.
- Foreign Network: The foreign network is the network the mobile device visits when it moves
away from its home network. The foreign network provides temporary connectivity to the
device.
- Tunneling: Mobile IP uses tunneling techniques to encapsulate IP packets and carry them
between the home network and the foreign network. The encapsulated packets are then routed
to the appropriate destination.
- Routing Updates: Mobile IP relies on routing updates to inform routers about the current
location of a mobile device, ensuring that packets are forwarded to the correct network.
Mobile IP enables transparent mobility for mobile devices, allowing them to roam between
networks without disrupting ongoing communications or requiring the device to obtain a new
IP address in each network.
In summary, IP is the fundamental protocol responsible for routing and addressing packets in
a network, while Mobile IP is an extension that adds mobility support to IP, enabling mobile
devices to maintain connectivity and ongoing network services while moving between different
networks.
UNIT VI
In other words, you can say that An Mobile Agent is an autonomous program that is capable
of moving from host to host in a network and interact with resources and other agents. In this
process, the chance of data loss is scarce because the state of the running program is saved and
then transported to the new host. It allows the program to continue execution from where it left
off before migration. The most significant advantage of mobile agents is the possibility of
moving complex processing functions to the location where you have enormous amounts of
data and that have to be processed.
Mobile Agents are also called as transportable agents. They are classified into two types:
o Mobile Agents with pre-defined path: They have a static migration path.
o Mobile Agents with undefined path i.e., Roamer: They have dynamic
migration paths. The mobile agents choose their path according to the present
network condition.
o They can adapt to the environment. For example, either home or foreign environment.
o They are capable of switching among the positions of one node to another.
o They are autonomous and focused on the final output.
Advantages of Mobile Agents
The following are some advantages of mobile agents over conventional agents:
o The most significant disadvantage of mobile agents is their security. They are less
secured
Here are some key features and characteristics of mobile file systems:
1. File Organization: Mobile file systems handle the organization of files and directories on the device's
storage. They typically provide a hierarchical structure with directories (folders) and files. The file system
manages naming, location, and metadata associated with each file.
2. File Access and Permissions: Mobile file systems enforce access control and permissions for files and
directories. They ensure that only authorized users or applications can access or modify specific files.
Permissions may include read, write, execute, and ownership rights.
3. File Storage: Mobile file systems manage the physical storage of files on the device's internal memory,
external memory (such as SD cards), or cloud storage. They handle tasks like allocating storage space,
managing file fragmentation, and optimizing storage efficiency.
4. File Metadata: Mobile file systems store metadata associated with files, including attributes like file name,
size, creation date, modification date, file type, and file permissions. Metadata allows for efficient file
searching, sorting, and retrieval.
5. File Sharing and Synchronization: Mobile file systems often provide features for sharing files with other
devices or users. They enable file transfer via wireless communication protocols like Wi-Fi, Bluetooth, or
NFC. Some mobile file systems also support file synchronization across multiple devices or cloud storage,
ensuring consistency and accessibility across different platforms.
6. File Compression and Encryption: Mobile file systems may support file compression to reduce storage
space usage and optimize data transfer. Encryption features can also be provided to secure files and protect
sensitive data from unauthorized access.
7. File System Performance: Mobile file systems aim to optimize performance for mobile devices, which
have limited processing power, memory, and battery life. They employ techniques like caching, buffering,
and file system optimizations to enhance read and write operations, minimize latency, and reduce power
consumption.
Examples of mobile file systems include:
- FAT32 (File Allocation Table 32): A widely used file system supported by various operating systems and
compatible with many mobile devices.
- exFAT (Extended File Allocation Table): A newer file system that supports larger file sizes and storage
capacities than FAT32.
- Ext4 (Fourth Extended File System): A file system commonly used in Android devices based on the Linux
kernel.
- APFS (Apple File System): The default file system used in Apple's macOS, iOS, and other Apple devices.
The choice of mobile file system depends on the underlying operating system, device specifications,
performance requirements, and compatibility with other devices and platforms’