0% found this document useful (0 votes)
23 views31 pages

El Iv - MC - Notes - Unit I

mobile computing

Uploaded by

kdshinde.08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views31 pages

El Iv - MC - Notes - Unit I

mobile computing

Uploaded by

kdshinde.08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

ZCOER Subject: Mobile Computing A. Y.

2024-25

Zeal Education Society‟s


Zeal College of Engineering & Research

Department: Computer Engineering

Class: BE Div.: A & B

A. Y.: 2024-25

Subject: Mobile Computing (Elective IV)

Course Code: 410245 (C)

Course Notes

Prof. N. P. Joshi Class : BE Div: A & B Page 1


ZCOER Subject: Mobile Computing A. Y. 2024-25

UNIT I

INTRODUCTION TO MOBILE COMPUTING

TOPIC 1: Introduction to Mobile computing

What is Mobile Computing?

• It is a technology that allows transmission of data, voice & video to and from a
portable device to and from a service provider.

• Mobile Computing is using a computer while on the move (anywhere & anytime)

• Features of Mobile Computing:-

• Allows to perform any task

• Communication is possible on Wired as well as Wireless Networks

• Set of distributed computing systems participate, connect & synchronize the


data through mobile communication protocol

• There are three main components involved in Mobile Computing:-

• Mobile Communication

• Mobile Hardware

• Mobile Software

Wired Network & Mobile Network

Wired Network Mobile Network

Uses physical cables such as fibre optics Uses wireless infrastructure consisting of
to connect the devices cell towers and antennas. Use
technologies like GSM, CDMA, LTE &
5G

Physical connections ensure faster data Connectivity is through radio waves.


transmission rates and high bandwidth Factors like signal strength, network
congestion and distance from cell towers
affect connectivity.

Provides low bandwidth & lower data


transmission rates

Prof. N. P. Joshi Class : BE Div: A & B Page 2


ZCOER Subject: Mobile Computing A. Y. 2024-25

Offers low delays Offers high delays

Applications like streaming HD videos, Applications like voice calls, messaging,


online gaming, real-time data processing internet browsing, location based services

Prof. N. P. Joshi Class : BE Div: A & B Page 3


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 2: Constraints in Mobile Computing


• Limited Battery Life: Mobile devices have finite battery capacities, and power-
hungry applications can drain them quickly. This restricts the amount of processing,
communication, and networking activities that can be performed without recharging.

• Limited Processing Power: Compared to desktop computers, mobile devices often


have less processing power and memory. This affects the complexity of applications
that can run smoothly and may require optimization of software.

• Limited Storage: Mobile devices generally have less storage capacity than desktops
or servers. This can impact the amount of data that can be stored locally and may
necessitate cloud storage solutions.

• Limited Bandwidth: Mobile networks have varying levels of bandwidth, and


connectivity can be inconsistent depending on location and network congestion. This
affects the speed and reliability of data transmission.

• Screen Size and Interface: Mobile devices have smaller screens and different
interaction methods (touchscreens, virtual keyboards) compared to desktops.
Designing user interfaces that are effective and usable on small screens can be
challenging.

• Environmental Conditions: Mobile devices are used in diverse environments,


including areas with poor network coverage, high temperatures, humidity, and
physical shocks. They must be designed to withstand such conditions.

• Security Concerns: Mobile devices are more prone to theft and loss than desktops.
They also face unique security challenges such as unauthorized access to data through
unsecured networks and applications.

• Interoperability: Mobile applications need to function across different platforms


(iOS, Android, etc.) and versions, which requires careful consideration of
compatibility issues.

• Regulatory Compliance: Mobile applications often need to adhere to specific


regulations and standards, such as data protection laws (GDPR, CCPA) and industry-
specific requirements (healthcare, finance).

Prof. N. P. Joshi Class : BE Div: A & B Page 4


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 3: Applications of Mobile Computing


1. Communication: Mobile devices enable voice calls, video calls, messaging (SMS,
MMS, instant messaging), and email communication from virtually anywhere with
network coverage.

2. Internet Access: Mobile computing allows users to access the internet for browsing,
searching information, accessing social media, online shopping, and more using web
browsers and mobile apps.

3. Navigation and GPS: GPS-enabled mobile devices provide location-based services


such as maps, navigation assistance, real-time traffic updates, and location-based
recommendations.

4. Entertainment: Mobile computing supports multimedia applications including


streaming videos, music, gaming, e-books, and other forms of digital entertainment.

5. Business Applications: Mobile computing facilitates business operations through


mobile productivity apps, enterprise resource planning (ERP) systems, customer
relationship management (CRM) tools, and mobile banking applications.

6. Healthcare: Mobile computing enhances healthcare delivery through telemedicine,


remote patient monitoring, medical record access, and health tracking apps

7. Education: Mobile devices support e-learning platforms, educational apps, digital


textbooks, and online collaboration tools for remote learning and educational
purposes.

8. Transportation and Logistics: Mobile computing is used for fleet management,


package tracking, route optimization, and real-time logistics management in
transportation and delivery services.

9. Field Service: Mobile devices enable field workers (e.g., technicians, inspectors,
sales representatives) to access job-related information, update records, and
communicate with headquarters or customers while on-site.

10. Personal Assistance: Mobile computing integrates voice assistants (e.g., Siri, Google
Assistant) for voice commands, reminders, scheduling tasks, and controlling smart
home devices.

Prof. N. P. Joshi Class : BE Div: A & B Page 5


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 4: Generations of Mobile Wireless 1G to 5G

Generation of Mobile Wireless 1G


• First generation of wireless communication system.

• Nippon Telephone & Telegraph(N.T.T) was launched in 1980s in Japan.

• In 1G technology, speech was put into code as analog radio signal.

• Audio transmissions on 1G networks was completely Analog.

• Only higher freq. like 150MHz and above were modulated in 1G.

• Speed of transmission was 2.4kbps.

• It enables voice calls within a single region.

• Drawbacks- Low bandwidth, unstable handoff, weak voice connections and no


encryption.

• It used AMPS , Advanced Mobile Phone System which is a primary analog cellular
system used in US.

Prof. N. P. Joshi Class : BE Div: A & B Page 6


ZCOER Subject: Mobile Computing A. Y. 2024-25

• AMPS – It was designed to provide mobile voice communication using analog


modulation technique.

• It used frequency modulation technique for transmitting voice signals as FM provides


simplicity and robustness in transmitting voice over long distances without significant
degradation.

• Bandwidth for AMPS – 40MHz within 800/900 MNz frequency spectrum.

Generation of Mobile Wireless 2G


• 2G launched data communications for smartphones.

• Started with SMS plain text-based calls

• In Finland, Radiolinjaor Elisa Oyj commercialized 2ndG cellular communication


networks based on the group special mobile (GSM) standard in 1991.

• GSM, PDC, iDEN, and iS-136 are examples of TDMA technologies in 2nd G time.

• IS-95 is the standard for CDMA technology

• Group Special Mobile (G.S.M.) is a technology that was launched in Europe.

• GSM is the world's most common mobile technology standard with over 212
countries using it.

• Universal roaming between cell phone networks is very popular due to the GSM
standard, which enables customers to use their phones in a variety of locations
throughout the world.

• IS-54 & IS-136 were 2G telephone networks that used TDMA with some time slots
in each 30kHz band .

• It used 900 MHz & 1800MHz bands with speed upto 14.4 kbps.

Benefits of 2G technology

(i) Text messages, image messages, SMS and MMS are all possible with it.

(ii) Signals are digitally encoded, which increases speech quality and lowers line noise.

(iii) Improved Spectrum Efficiency, Enhanced security, better quality and capacity.

(iv) Voice and data service

(v) Network coverage has been increased.

Prof. N. P. Joshi Class : BE Div: A & B Page 7


ZCOER Subject: Mobile Computing A. Y. 2024-25

Generation of Mobile Wireless 2.5G (GPRS)

• It‟s a 2G system with packet switched and circuit switched domain.

• It used GPRS (General Packet Radio Service) technique.

• GPRS is an extension to the current 2G network that enables packet-based


applications to be launched while also rising the traffic speeds provided by these
networks.

• GPRS is a packet-oriented mobile data protocol that is used on GSM-based 2G and


3G cellular networks (GSM).

Generation of Mobile Wireless 2.75G (EDGE)

• It is called „enhanced data rates for GSM evolution‟.

• It is also called as Enhanced GPRS.

• It enables the transmission of data in a more timely manner.

• EDGE technique uses phase shift keying technique.

Generation of Mobile Wireless 3G


• It proposed a global frequency band of 2000MHz range to facilitate a single,
standardized wireless communication protocol for all countries worldwide.

• 3G technology has a data rate of at minimum 144 kbit/s.

• Smart mobile phones and cellular modems in desktop and computers with wireless
broadband access of many Mbit/s was started in 3G.

• CDMA 2000 is the result of 3rdG evolution for Code division multiple access

The following are some of the benefits of 3G technology:

(i)Streaming audio and video has been improved

(ii) Several times faster data transmission. 3G networks can deliver speeds of up to
3Mbps.

(iii) Multimedia applications such as video and photography are supported.

(iv) Higher-speed, web WAP browsing and more security

(v) Broadband with Large Capacity

(vi) Global Positioning system or GSM , mobile television, phone calls, and live video
conferencing are examples of value added services.
Prof. N. P. Joshi Class : BE Div: A & B Page 8
ZCOER Subject: Mobile Computing A. Y. 2024-25

Features of 3G:
Broadband Data

3G was the third generation of mobile wireless technology. It offered significantly faster
data speeds than 2G, enabling broadband mobile internet access.

Video Calls

3G enabled video calling, which allowed users to make calls and see the other person.

Mobile Apps

3G paved the way for the development of mobile apps, as it provided the necessary speed
and bandwidth.

Higher Bandwidth

3G provided higher bandwidth, which enabled more users to access the network
simultaneously.

Generation of Mobile Wireless 4G


• 4G was the early stage L.T.E. (Long Term Evolution)

• It provides speed of 5Mbps to 100 Mbps

• The maximum speed of the 4G network for fast movability communication is


100Mbits/sec (like cars, bus and trains).

• The speed of low mobility communications (such as pedestrians or stationary) is


1Gbits/sec.

The following are some of the benefits of 3G technology:

(i) High Speed, more security, high capacity

(ii) Access the internet, streaming media, and video conferencing with ease.

(iii) Exceptional spectral efficiency


(iv) Provide any type of service to users at any time and in any place

(v) High QoS and low cost per bit.

Features of 4G:
High Speed Data

4G was the fourth generation of mobile wireless technology. It offered even faster data
speeds than 3G, making mobile internet access comparable to fixed broadband.

Prof. N. P. Joshi Class : BE Div: A & B Page 9


ZCOER Subject: Mobile Computing A. Y. 2024-25

LTE and WiMAX

4G introduced standards like LTE and WiMAX, which provided significantly improved
network performance.

HD Video Streaming

4G enabled high-definition video streaming, allowing users to watch movies and videos
on their mobile devices without buffering.

Mobile Gaming

4G supported mobile gaming with its high speed data and low latency.

Generation of Mobile Wireless 5G


Ultra-Fast Speeds

5G is the fifth generation of mobile wireless technology. It offers incredibly fast data
speeds, significantly faster than previous generations.

Low Latency

5G has low latency, which means there is a minimal delay between sending and receiving
data.

Massive Capacity

5G can support a massive number of connected devices, enabling the Internet of Things
(IoT).

New Applications

5G enables new applications and services, including autonomous vehicles, virtual reality,
and augmented reality.

Prof. N. P. Joshi Class : BE Div: A & B Page 10


ZCOER Subject: Mobile Computing A. Y. 2024-25

Prof. N. P. Joshi Class : BE Div: A & B Page 11


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 5: Future of Mobile Computing


Enhanced Connectivity

Mobile networks will continue to improve, providing even faster speeds and wider
coverage.

Artificial Intelligence

AI will play a crucial role in mobile devices, enhancing features like personal assistants
and predictive analysis.

Internet of Things

Mobile devices will be increasingly connected to other devices and sensors, enabling the
IoT.

Wearable Technology

Wearable devices like smartwatches and fitness trackers will become more integrated into
mobile computing.

Prof. N. P. Joshi Class : BE Div: A & B Page 12


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 6: Radio Frequency Technology


 Wireless communications are transmitted through the air via radio waves of
various frequencies. Radio frequency radiation (RFR) is one of several types of
electromagnetic radiation. A cellular operates at frequencies between 800 and 900
MHz, and PCS operates at both 900 MHz as well as between 1,850 and 2,200
MHz.

 Data transmission generally can happen using Guided Media (propagation is done
though twisted pair, coaxial cable or optical fiber) or using unguided media
(propagation is done though air, water, vacuum).

 Data transmission in a Wireless Communication is done by means of an unguided


medium. In an unguided medium transmission and reception are achieved by
means of an antenna. In the case of wireless for transmission the antenna radiates
electromagnetic energy into the medium (usually air), and for reception, the
antenna picks up electromagnetic waves from the surrounding medium.

 The transmission is classified into directional and omni directional. In the case of
directional configuration the transmitting antenna puts out a focused
electromagnetic beam.

 The transmitting and receiving antennas must be aligned carefully. In omni


directional configuration the transmitted signal spreads out in all direction and can
be received by many antennas. It purely depends on the signal frequency, the
higher the frequency of a signal, the more possibility of focusing into a directional
beam.

 If the frequency range of 2Ghz to 40Ghz are referred as microwave frequencies.


This frequency makes it possible to have directional configuration. Frequency
range of 30Mhz to 1Ghz will be using omni directional configuration.

 Microwave signals propagate in straight lines and are affected very little by the
troposphere. They are not refracted or reflected by ionized regions in the upper
atmosphere.

 Microwave beams do not readily diffract around barriers such as hills, mountains,
and large human-made structures. Some attenuation (Loss of strength of the
signal) occurs when microwave energy passes through trees and frame houses.

 There are three general types of transmitting and receiving antennas used in the
wireless communications technology. These include whip antennas, panel

Prof. N. P. Joshi Class : BE Div: A & B Page 13


ZCOER Subject: Mobile Computing A. Y. 2024-25

antennas, and dish antennas as shown in Figure-1. While whip and panel antennas
are used to transmit and receive radio waves carrying conversation signals, dish
antennas provide the link between the central computer switching system and the
various whip and panel antennas used throughout the mobile conversation.

 A common type of microwave antenna is the parabolic “dish”. It has a size of


about 3m in diameter. These antennas are mounted in a substantially heights
above the ground level. With no intervening obstacles the maximum distance
between the antenna is d=7.14 Kh. Here d is the distance between the antennas in
kilometers, h is the antenna height in meters and K is an adjustment factor to
account for the fact that microwaves are bent or refracted with the curvature of the
earth and will hence propagate farther than the optical line of sight.

 Antennas need to be placed at specific heights in relation to one another in order


to transmit and receive signals. As a result, height is a determining factor in the
design and siting of wireless communications facilities. Typically there are three
types of antenna support-structures used to place antennas at desired heights:
lattice towers, monopoles, and building-attached facilities.

Analog and Digital Technologies

Traditionally, cellular phones have utilized analog transmission signals. In the analog
technology, voice messages are electronically replicated and amplified as they are carried
from the transmitting antenna to the receiving antenna. A problem with this technology is
that the amplification procedure tends to pick up "noise," sometimes making the message
difficult to hear.

In order to diminish this noise and to provide greater calling capacity per channel, the
cellular industry is beginning to use digital transmission signals. In the digital technology,
voice messages are converted into digits (zeroes and ones) that represent sound intensities

Prof. N. P. Joshi Class : BE Div: A & B Page 14


ZCOER Subject: Mobile Computing A. Y. 2024-25

at specific points in time. Because natural pauses in the conversation are eliminated, more
calling capacity becomes available from the same amount of spectrum, thus reducing the
need for new sites.

An added benefit is that the background noise that is generally heard in the analog system
becomes inaudible. As illustrated in figure below the graphic difference between the two
technologies is that analog signals are transmitted as continuous waves while digital
technology converts the analog signal to binary digits. Figure- 2 shows the two different
kinds of transmission signals.

There are currently two forms of digital technology: time division multiple access
(TDMA) and code division multiple access (CDMA). Both of these forms of digital
technology attempt to provide multiple access over one frequency, or channel. While
TDMA is expected to increase calling capacity three to ten times over analog technology,
CDMA is expected to increase calling capacity by ten to twenty times.

Time division multiple access (TDMA)

TDMA is a digital transmission technology that allows a number of users to access a


single radio-frequency (RF) channel without interference by allocating unique time slots
to each user within each channel. The TDMA digital transmission scheme multiplexes
three signals over a single channel.

TDMA is based on the IS-136 standard. The current TDMA standard for cellular divides
a single channel into six time slots, with each signal using two slots, providing a 3 to 1
gain in capacity over advanced mobile-phone service (AMPS). Each caller is assigned a
specific time slot for transmission. It offers efficient coverage and is well suited to
emerging applications, such as wireless virtual private networks (VPNs),

Code division multiple access (CDMA)

CDMA is a coding scheme, used as a modulation technique, in which multiple channels


are independently coded for transmission over a single wide band channel. In some
communication systems, CDMA is used as an access method that permits carriers from
different stations to use the same transmission equipment by using a wider bandwidth
than the individual carriers. On reception, each carrier can be distinguished from the
others by means of a specific modulation code, thereby allowing for the reception of
signals that were originally overlapping in frequency and time. Thus, several

Prof. N. P. Joshi Class : BE Div: A & B Page 15


ZCOER Subject: Mobile Computing A. Y. 2024-25

transmissions can occur simultaneously within the same bandwidth, with the mutual
interference reduced by the degree of orthogonality of the unique codes used in each
transmission. CDMA permits a more uniform distribution of energy in the emitted
bandwidth. The technology is used in ultra-high-frequency (UHF) cellular telephone
systems in the 800-MHz and 1.9-GHz bands.

CDMA employs analog-to-digital conversion (ADC) in combination with spread


spectrum technology. Audio input is first digitized into binary elements. The frequency of
the transmitted signal is then made to vary according to a defined pattern (code), so it can
be intercepted only by a receiver whose frequency response is programmed with the same
code, so it follows exactly along with the transmitter frequency. There are trillions of
possible frequency-sequencing codes; this enhances privacy and makes cloning difficult.

The CDMA channel is nominally 1.23 MHz wide. CDMA networks use a scheme called
soft handoff, which minimizes signal breakup as a handset passes from one cell to
another. The combination of digital and spread-spectrum modes supports several times as
many signals per unit bandwidth as analog modes. CDMA is compatible with other
cellular technologies; this allows for nationwide roaming.

Prof. N. P. Joshi Class : BE Div: A & B Page 16


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 7: Bluetooth
• Bluetooth is also known as IEEE 802.15 standard

• It is a network technology that connects mobile devices wirelessly over a short range
to form a personal area network (PAN).

• They use short-wavelength, ultra-high frequency (UHF) radio waves within the range
2.400 to 2.485 GHz, instead of RS-232 data cables of wired PANs.

• Previous versions of Bluetooth could work from 30ft-10m of distance. Higher


versions can work from 40-400m.

Types of Bluetooth:-

1. Piconets

2. Scatternets

Piconet :-

• At most 8 stations

• Max. 7 slaves

• Master node is the primary station

• Slave stations are secondary stations synchronized with Master

• Communication is possible only Master to slave in either One to one or one to many
manner.

• Communication between slaves is not possible.

• Each station is associated with a 48-bit fix device address.

• 255 number of parked nodes which are in low power state for energy conservartion.

Prof. N. P. Joshi Class : BE Div: A & B Page 17


ZCOER Subject: Mobile Computing A. Y. 2024-25

Scatternet :-

• Interconnected collection of 2 or more piconets

• Any node either master or slave of a piconet can act as a Bridge between 2 piconets.

Bluetooth Protocol Stack :-

Prof. N. P. Joshi Class : BE Div: A & B Page 18


ZCOER Subject: Mobile Computing A. Y. 2024-25

• Physical Layer − This includes Bluetooth radio and Baseband (also in the

data link layer.

Radio −

-This is a physical layer equivalent protocol that lays down the physical structure and
specifications for transmission of radio waves.

-It provides an electrical interface.

-It defines air interface, frequency bands, **frequency hopping specifications, and
modulation techniques.

-It operates in ISM band which requires smart antenna, power controller,

GFSK modulator & transmitter/receiver switch

**Freq. hopping –It is a method of transmitting radio signals by rapidly switching a


carrier among many channels, using a pseudorandom sequence known to both transmitter
& receiver. It is used as a FH-CDMA. It is a transmission technology used in LAWN
transmissions where data signal is modulated with a narrowband carrier signal that hops
in a random but predictable sequence from frequency to frequency as a function of time
over a wide band of frequencies.

Baseband −

-This protocol takes the services of radio protocol.

-It defines the addressing scheme, packet frame format, timing, and power control
algorithms.

• ACL & SCO links

SCO is a symmetric, point-to-point link between the master device and the
slave device connected via Bluetooth.
SCO provides a circuit switched connection, where a dedicated, point-to-point
link is established between the master device and the slave device before
communication starts.
SCO is a symmetric link, i.e. fixed slots are allocated for each direction.
SCO radio links are used for time critical data transfer, mainly voice data.

Prof. N. P. Joshi Class : BE Div: A & B Page 19


ZCOER Subject: Mobile Computing A. Y. 2024-25

A master device can support three SCO links with the same or different slaves.
A slave device can have a maximum of three SCO links with its master
device.
The focus is minimization of time latency.
The maximum data rate of SCO link is 64,000 bps (bits per second).
Packet retransmissions are not allowed, for assuring real-time transfer of voice
traffic.

ACL is a point – to – multipoint link for transmitting general data packets


using Bluetooth connection. ACL is used for irregular traffic between a master
device and one or more slave devices.
ACL is a packet oriented link, i.e. the link establishes a packet – switched
network.
Both symmetric and asymmetric traffic are supported. The master device
controls the bandwidth of the ACL link.
ACL is used for transmission of data traffic which are delivered at irregular
intervals.
One master device which connects with maximum seven slave devices via
ACL links to form a Piconet.
The main objective is to maintain data integrity rather than time latency.
The maximum data rates of ACL links can reach a 57.6 Kbps in downlink and
721 bps in uplink.
Packet retransmissions are allowed to ensure data integrity.

• Logical channels

On top of physical links, there is a sub layer of logical channels, representing


different types of information carried through the physical links.

LC channel carries low-level link control information such as ARQ and flow
control

LM channel carries messages for the Link Manager layer

UA, UI and US channel carries asynchronous, isochronous and synchronous


user data respectively.

LC channel is carried in the packet header, others are in the payload.

Prof. N. P. Joshi Class : BE Div: A & B Page 20


ZCOER Subject: Mobile Computing A. Y. 2024-25

• Bluetooth Addressing

• BD_ADDR (48),

Bluetooth Device Address (or BD_ADDR) is a unique 48-bit identifier


assigned to each Bluetooth device by the manufacturer.
Bluetooth Address is usually displayed as 6 bytes written in hexadecimal and
separated by colons (example - 00:11:22:33:FF:EE).

• AM_ADDR(3)

The Bluetooth AM_ADDR (Active Member Address) represents an address


used to distinguish between the active members participating in a piconet.
Each piconet has one or more slaves connected to a master. The master
allocates each active slave a temporary 3bit address. Any packets exchanged
between master and an active slave will carry the associated AM_ADDR.
The AM_ADDR is used for both master-to-slave packets and slave-to-master
packets. The all-zero address (000) is used by the master for broadcasting
packets.

• PM_ADDR(8)

In a piconet, each slave in the park mode can be identified by a BD_ADDR


(Bluetooth Device Address) or a dedicated PM_ADDR (Parked Member
Address).
The PM_ADDR is an 8bit member address allocated by the master to separate
parked devices. Once a slave is in the active mode, it will lose the PM_ADDR
and be assigned an AM_ADDR (Active Member Address).
The PM_ADDR is set to eight zeros for the parked slaves who only use their
BD_ADDR to communicate.

• AR_ADDR(16)

The Bluetooth AR_ADDR (Access Request Address) is used by the parked


slave to determine the slave -to- master half slot in the access window it is
allowed to send access request messages in.
The AR_ADDR is assigned to the slave when it enters the park mode and is
only valid as long as the slave is parked and is not necessarily unique.

• Bluetooth Packets

Prof. N. P. Joshi Class : BE Div: A & B Page 21


ZCOER Subject: Mobile Computing A. Y. 2024-25

• ACCESS CODE (72)

In Bluetooth, each baseband packet starts with an Access code, which can be
one of 3 types: CAC (Channel Access Code), DAC (Device Access Code) and
IAC (Inquiry Access Code). The respective access code types are used for a
Bluetooth unit in different operating modes.

• CAC

The CAC (Channel Access Code) identifies a piconet.

• DAC

The DAC (Device Access Code) is used for special signalling


procedures

• IAC

IAC (Inquiry Access Code) is used to discover other Bluetooth units


that are in range.

• Header

• Packet acknowledgement, error check, flow control, slave address

• ADDR: 3-bit logical transport address


• TYPE: 4-bit type code
• FLOW: 1-bit flow control
• ARQN: 1-bit acknowledge indication
• SEQN: 1-bit sequence number

Prof. N. P. Joshi Class : BE Div: A & B Page 22


ZCOER Subject: Mobile Computing A. Y. 2024-25

• CRC: 8-bit header error check

• Payload

• Carries 16-Bit CRC for error detection & correction

• Controller States

• Unconnected state

• Connecting state

• Active State

• Low Power state

 Connection setup between Master & Slave

• Data Link Layer − This includes Baseband, Link Manager Protocol (LMP) and
Logical Link Control and Adaptation Protocol (L2CAP).

Link Manager Protocol (LMP) −

LMP establishes logical links between Bluetooth devices and maintains the links for
enabling communications.

Prof. N. P. Joshi Class : BE Div: A & B Page 23


ZCOER Subject: Mobile Computing A. Y. 2024-25

The main functions of LMP are

• Administration & control of all link actions

• Monitoring state changes

• Device authentication

• Handling data encryption

• Negotiation of packet sizes

• Device pairing

Logical Link Control and Adaptation Protocol (L2CAP) −

• L2CAP provides adaption between upper layer frame and baseband layer
frame format.

• L2CAP provides support for both connection-oriented as well as


connectionless services.

• Packets (upto 64kbps) from upper layers are broken into frames for
transmission

• Multiplexing & demultiplexing of multiple packet sources (RFComm orSDP)

• Error control & retransmission

• Enforces QoS requirements between multiple links

• L2CAP Events & actions-

• It operates on commands received from/to upper or lower layers

• Upper layer- connection request, data write request or disconnection


request

• Lower layer- incoming connection or disconnection

• L2CAPs of two devices communicate with each other using special commands
called signalling commands

• Middleware Layer −

This includes Radio Frequency Communications (RFComm) protocol, adopted


protocols, SDP, and AT commands.

Prof. N. P. Joshi Class : BE Div: A & B Page 24


ZCOER Subject: Mobile Computing A. Y. 2024-25

RFComm (cable replacement protocol) −

• It is short for Radio Frontend Component. It provides a serial interface with


WAP.

Adopted Protocols −

• These are the protocols that are adopted from standard models.

• Point-to-point protocol(PPP), Internet Protocol (IP), User Datagram Protocol


(UDP),Transmission Control Protocol (TCP), and Wireless Application
Protocol (WAP).

Service Discovery Protocol (SDP)−

• SDP takes care of service-related queries like device information so as to


establish a connection between contending Bluetooth devices.

• Enables a BT device to join a piconet

• Uses client-server model

• Server has list of services defined through service records

• One service record contains characteristics of that service

• A BT device in inquiry mode sends ID packets on 32 frequency


channels at every 625ms & waits for responses

• Then one of the devices sets up connection using its BT global ID &
both start to exchange data.

AT Commands −

• ATtention command set.

• A set of commands by which a mobile phone can be used and controlled as a


Modem for fax & data transfers

• Host Controller Interface (HCI) –

• It acts as a transportation interface between various layers

• Information Exchange & request

• Applications Layer − This includes the application profiles that allow the user to
interact with the Bluetooth applications.

• Bluetooth Profiles-

• Specific part of the BT stack is used by each profile.

Prof. N. P. Joshi Class : BE Div: A & B Page 25


ZCOER Subject: Mobile Computing A. Y. 2024-25

• Developers have to follow profile procedures to make sure device works


correctly for every application.

• Serial port profile

• Generic Access profile

• Service Discovery Application profile

• Generic Object exchange profile

Bluetooth Profiles-

• Generic Access profile -It defines

• Baseband link between BT devices

• Which features must be implemented in all devices

• Basic user-interface terminology

• Generic procedures for discovering and linking to devices

• Service discovery access profile- It describes

• How an application should use SDP to discover services on a remote


device

• It helps to discover that which services are available in a BT device it


connects to.

• Serial port profile

• It defines RS-232 emulation for BT devices

• It uses RFComm protocol to provide the serial-port emulation.

• Headset profile

• It defines how BT enabled headset should communicate with a


computer or other BT devices (mobile phone)

• File Transfer profile

• Synchronization Profile

Prof. N. P. Joshi Class : BE Div: A & B Page 26


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 8: PCS Architecture

• Mobile station

• PCS use mobile stations (MSs) to communicate with the base stations (BSs) in a PCS
network.
• MS is also referred to as handset, mobile phone, subscriber unit, or portable.
• Mobile stations (MS), mobile equipment (ME) or as they are most widely known, cell
or mobile phones are the section of a cellular network.

• BS- Base Station

• The Base Station (BS) section of the PCS architecture that is fundamentally
associated with communicating with the mobiles on the network. It consists of two
elements:

• BTS- Base Transceiver Station

1. The BTS used in a PCS network comprises the radio transmitter


receivers, and their associated antennas that transmit and receive to
directly communicate with the mobiles.
2. The BTS is the defining element for each cell. The BTS
communicates with the mobiles with the help of an interface between
the two.

• BSC- Base Station Centre

Prof. N. P. Joshi Class : BE Div: A & B Page 27


ZCOER Subject: Mobile Computing A. Y. 2024-25

1. The BSC forms the next stage back into the PCS network.
2. It controls a group of BTSs, and is often co-located with one of the
BTSs in its group.
3. It manages the radio resources and controls items such as handover
within the group of BTSs, allocates channels and the like.
4. It communicates with the BTSs over an interface.

• MSC- Mobile Switching Centre

1. The main element within the core network area of the overall PCS
network architecture is the Mobile switching Services Centre (MSC).
2. The MSC acts like a normal switching node within a PSTN or ISDN,
but also provides additional functionality to enable the requirements of
a mobile user to be supported.
3. These include registration, authentication, call location, inter-MSC
handovers and call routing to a mobile subscriber.
4. It also provides an interface to the PSTN so that calls can be routed
from the mobile network to a phone connected to a landline.
5. Interfaces to other MSCs are provided to enable calls to be made to
mobiles on different networks.

• DB- Database

1. HLR (Home Location Register):


This database contains all the administrative information about each
subscriber along with their last known location.
In this way, the network is able to route calls to the relevant base station for
the MS. When a user switches on their phone, the phone registers with the
network and from this it is possible to determine which BTS it communicates
with so that incoming calls can be routed appropriately.
Even when the phone is not active (but switched on) it re-registers periodically
to ensure that the network (HLR) is aware of its latest position.
There is one HLR per network, although it may be distributed across various
sub-centres to for operational reasons.

2. VLR (Visitors Location Register):


This contains selected information from the HLR that enables the selected
services for the individual subscriber to be provided.
The VLR can be implemented as a separate entity, but it is commonly realised
as an integral part of the MSC, rather than a separate entity. In this way access
is made faster and more convenient.

Prof. N. P. Joshi Class : BE Div: A & B Page 28


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 9: PSTN- Public Switched Telephone Network


PSTN stands for Public Switched Telephone Network. Also known as the traditional circuit-
switched telephone network, this legacy platform has been in use since the late 1800s.
Several businesses and households relied on this communication platform to connect with
anyone throughout the world. In fact, PSTN phones were widely accepted as a standard form
of communication. People know PSTN by several names such as:

 PSTN
 Landlines
 Plain Old Telephone Service (POTS)
 Fixed-line telephones

This platform encompasses all the switched telephone networks throughout the world that are
run by local, national, or international carriers. These networks offer the required
infrastructure and services for public telecommunication.

Prof. N. P. Joshi Class : BE Div: A & B Page 29


ZCOER Subject: Mobile Computing A. Y. 2024-25

TOPIC 10: AD HOC NETWORK

 An ad hoc network is one that is spontaneously formed when devices connect and
communicate with each other.

 Ad hoc networks are mostly wireless local area networks (WLANs).

 The devices communicate with each other directly instead of relying on a base station or
access points as in wireless LANs for data transfer co-ordination.

 Each device participates in routing activity, by determining the route using the routing
algorithm and forwarding data to other devices via this route.

Prof. N. P. Joshi Class : BE Div: A & B Page 30


ZCOER Subject: Mobile Computing A. Y. 2024-25

Classification of Ad Hoc Networks:

Prof. N. P. Joshi Class : BE Div: A & B Page 31

You might also like