Mobile Computing Unit 1 Notes
Mobile Computing Unit 1 Notes
Mobile computing comprises several fundamental components that work together to enable
seamless connectivity and efficient performance. These include:
1. Mobile Devices: These are the physical hardware devices used for mobile computing,
including smartphones, tablets, laptops, smartwatches, and other handheld computing
devices.
• Mobile App Development: Understanding frameworks like React Native, Flutter, and
Android SDK.
• Wireless Network Security: Studying encryption techniques, firewalls, and VPNs.
• IoT and Mobile Computing: Integrating mobile computing with IoT applications.
1. Enhanced Mobility: Users can access applications and services from virtually
anywhere, improving productivity and flexibility.
Despite its numerous benefits, mobile computing comes with several challenges:
1. Security Risks: Mobile devices are susceptible to hacking, phishing, and malware
attacks, necessitating robust security measures.
2. Battery Limitations: Continuous usage of mobile devices can drain battery life
quickly, requiring advancements in battery technology.
3. Connectivity Issues: Mobile computing relies on stable network connectivity, which
may not always be available in remote or rural areas.
4. Hardware Constraints: Mobile devices have limited processing power and storage
compared to traditional desktops and servers.
The future of mobile computing is driven by emerging technologies and innovations that will
further enhance user experiences and business operations. Key trends include:
1. 5G Technology: The rollout of 5G networks will enable faster internet speeds, lower
latency, and improved connectivity, enhancing mobile computing capabilities.
3. Edge Computing: Processing data closer to the source will reduce latency and improve
efficiency in mobile computing applications.
5. Blockchain and Mobile Security: Blockchain technology will enhance security and
transparency in mobile transactions and data management. B.Tech students can
research blockchain-based mobile security solutions.
This document provides a comprehensive analysis of the major issues in mobile computing,
focusing on security concerns, connectivity limitations, hardware and software constraints,
energy consumption, and other significant challenges.
• Unauthorized access to user data through malware, spyware, and phishing attacks is a
major concern.
• Biometric authentication and advanced security protocols are necessary to protect user
identities.
• Malicious apps and phishing links often trick users into disclosing sensitive
information.
Mobile computing relies heavily on network availability, which can be affected by various
factors.
• Users in remote or rural areas often face network instability, affecting their ability to
access cloud-based services.
• High demand for data-intensive applications like video streaming and cloud computing
can lead to congestion and slow network speeds.
• Real-time applications such as video conferencing and online gaming suffer from
latency problems.
• Edge computing and 5G technology can help reduce delays and improve real-time
performance.
3. Hardware and Software Limitations
• Different operating systems (Android, iOS, Windows) and device configurations can
create compatibility challenges.
• Cross-platform development frameworks like Flutter and React Native offer better
integration solutions.
• Regular software updates are essential for security and performance improvements, but
they may cause compatibility issues with older hardware.
• Developers must ensure backward compatibility and provide software optimization for
older devices.
One of the biggest challenges in mobile computing is battery life, as continuous usage of
mobile devices drains power rapidly.
• Energy-efficient chipsets and power management algorithms can improve battery life.
4.2 Limited Battery Capacity
• Battery technology has not evolved as fast as other mobile computing components,
leading to frequent charging requirements.
• Research into graphene batteries and fast-charging technologies can provide long-term
solutions.
5. Usability and User Experience Challenges
User experience (UX) plays a vital role in the adoption and efficiency of mobile computing
applications.
5.1 Small Screen Size and Limited Input Methods
• Mobile devices have small screens compared to desktops, which can affect usability.
• AI-driven resource allocation and cloud computing integration can improve efficiency.
The deployment and maintenance of mobile computing infrastructure come with significant
costs.
• High-end smartphones and mobile data plans can be expensive, limiting accessibility
for some users.
Mobile computing also raises ethical and environmental concerns that need to be addressed.
• The rapid evolution of mobile technology leads to electronic waste (e-waste) as old
devices become obsolete.
• Companies collecting user data for advertising and analytics raise ethical concerns
about data privacy.
• Strict data protection laws and user consent policies are necessary to safeguard privacy.
8. Future Trends and Solutions
Addressing the challenges of mobile computing requires continuous innovation and research.
• The use of AI-driven threat detection and blockchain-based authentication can enhance
mobile security.
• 6G and beyond promise even faster, more reliable connectivity with lower latency.
• AI-powered mobile applications and edge computing can optimize performance and
reduce dependency on centralized cloud storage.
Wireless Telephony
Wireless telephony is a crucial aspect of modern communication that enables voice and data
transmission over long distances without the need for physical cables. This technology has
evolved significantly since its inception, transforming from simple radio-based communication
systems to sophisticated cellular networks that support high-speed internet and multimedia
services. In this article, we will delve into the history, working principles, technologies, and
future of wireless telephony.
The concept of wireless telephony dates back to the late 19th and early 20th centuries. The
development of radio communication laid the foundation for wireless voice transmission. Some
key milestones in the evolution of wireless telephony include:
o The Improved Mobile Telephone Service (IMTS) followed, with slightly better
call capacity and functionality.
o Martin Cooper of Motorola made the first handheld mobile phone call in 1973.
o The first generation (1G) of cellular networks was introduced in the 1980s.
o The advent of digital cellular networks (2G) in the 1990s paved the way for
SMS and basic data services.
o High-speed data transmission became possible with 3G, 4G, and now 5G
networks.
Wireless telephony relies on radio waves to transmit voice and data signals between mobile
devices and network infrastructure. The key components of a wireless telephony system
include:
1. Mobile Devices: Smartphones, tablets, and feature phones equipped with transceivers
to send and receive signals.
2. Base Stations (Cell Towers): Serve as intermediaries that relay signals between mobile
devices and the core network.
3. Switching Centers: Manage call routing and handover between different base stations.
4. Core Network: Connects mobile users to public telephone networks and the internet.
When a mobile user initiates a call, the following steps take place:
1. The device transmits a signal to the nearest base station.
2. The base station forwards the signal to the mobile switching center (MSC).
3. The MSC processes the call request and connects it to the destination number via the
core network.
4. The recipient's base station relays the signal to their mobile device.
5. The call is established, and voice data is transmitted through digital encoding and
decoding processes.
6. When the call ends, the connection is terminated, and resources are released.
Generations of Wireless Telephony
Wireless telephony has evolved through multiple generations, each offering improvements in
speed, capacity, and features.
• Cellular networks divide geographic areas into small cells to optimize frequency reuse.
1. Spectrum Limitations: Radio frequency bands are finite and heavily regulated.
2. Network Congestion: High user density can lead to performance degradation.
5. Health Concerns: There are ongoing debates regarding the impact of RF radiation on
health.
Wireless telephony continues to evolve, with future innovations expected in the following
areas:
GSM is widely used worldwide, and it serves as the foundation for modern cellular networks,
including 3G, 4G, and even 5G. It operates on different frequency bands and employs various
technologies, such as time-division multiple access (TDMA) and frequency-division
multiple access (FDMA), to enable efficient and secure communication.
Before GSM, the world relied on analog mobile networks, which were limited in capacity,
security, and efficiency. The need for a unified and more efficient digital mobile system led to
the development of GSM.
• 1982: The Groupe Spécial Mobile (GSM) was formed by the Conférence Européenne
des Administrations des Postes et des Télécommunications (CEPT) to develop a
new mobile communication standard.
• 1987: The first GSM specifications were drafted.
• 1992-1995: GSM spread across Europe and other parts of the world.
• 2000s: GSM evolved to support data services (GPRS, EDGE) and served as the
foundation for 3G and later technologies.
Today, GSM has largely been replaced by newer technologies like LTE (4G) and 5G, but it
remains in use in many regions, especially for low-power IoT applications.
2. GSM Network Architecture
The GSM network consists of multiple components that work together to provide seamless
communication. The architecture can be divided into four main subsystems:
The Mobile Station is the device used by the user to communicate. It consists of:
The BSS is responsible for managing communication between the mobile device and the
network. It includes:
• Base Transceiver Station (BTS): Handles radio communication with mobile stations.
Each BTS covers a cell in the network.
• Base Station Controller (BSC): Controls multiple BTS units, manages radio
resources, and handles handovers.
The NSS is responsible for call routing, subscriber management, and mobility management. It
consists of:
• Mobile Switching Center (MSC): The core of the GSM network, responsible for call
setup, routing, and SMS handling.
Divides the frequency spectrum into multiple channels, each assigned to different users.
Each frequency channel is further divided into time slots, allowing multiple users to share the
same channel without interference.
c) Frequency Hopping
Rapidly changes frequencies during a call to reduce interference and improve security.
3. The MSC authenticates the user via the AuC and HLR.
5. The call is established, and voice data is transmitted using digital encoding.
SMS Flow
1. The sender’s mobile sends an SMS request to the SMSC (Short Message Service
Center).
2. The SMSC verifies the recipient’s location via the HLR.
6. Advantages of GSM
• Support for Data Services: SMS, GPRS, and EDGE enable data communication.
7. Limitations of GSM
• Limited Data Speed: GSM (2G) supports slow data speeds compared to 3G, 4G, and
5G.
While GSM remains a foundation for mobile networks, newer technologies have emerged:
Many carriers are phasing out GSM in favor of LTE and 5G.
The Global System for Mobile Communications (GSM) is a widely used digital cellular
network standard that provides voice and data services. One of its key features is its well-
defined channel structure, which ensures efficient use of spectrum and resources. The GSM
channel structure is designed to support multiple users simultaneously using Time Division
Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA) techniques.
This article provides a detailed explanation of the GSM channel structure, including its
classification, functions, and technical parameters.
A channel in GSM refers to a specific frequency and time slot combination used for
communication between the mobile station (MS) and the base transceiver station (BTS). GSM
utilizes TDMA to divide a single frequency into multiple time slots, allowing multiple users to
share the same frequency.
• TDMA (Time Division Multiple Access): Each carrier frequency is further divided
into eight time slots, forming a TDMA frame.
o 900 MHz band (GSM-900): 890–915 MHz (uplink) and 935–960 MHz
(downlink).
o 1800 MHz band (DCS-1800): 1710–1785 MHz (uplink) and 1805–1880 MHz
(downlink).
Traffic channels are used for transmitting voice and data between mobile users. They are
further divided into:
• Full-Rate Traffic Channel (TCH/F): Uses one time slot per frame.
• Half-Rate Traffic Channel (TCH/H): Uses half of a time slot, allowing two users to
share a single time slot.
Control channels are responsible for managing the communication setup, maintenance, and
mobility of the mobile stations. They are further divided into:
BCH channels are downlink-only channels that provide network-related information to all
mobile stations. They include:
• Broadcast Control Channel (BCCH): Transmits cell identity, frequency lists, and
network parameters.
• Synchronization Channel (SCH): Helps mobile stations synchronize with the BTS by
providing frame timing and base station identity code (BSIC).
CCCH channels are used for signaling between the network and all mobile stations in a cell.
They include:
DCCH channels provide signaling for individual mobile stations. They include:
• Standalone Dedicated Control Channel (SDCCH): Used for call setup, SMS
transmission, and location updates.
• Slow Associated Control Channel (SACCH): Transmits power control and timing
advance information.
• Fast Associated Control Channel (FACCH): Used for urgent signaling, such as call
handovers.
GSM organizes channels into frames, which help in efficient data transmission and
synchronization.
Each time slot in a TDMA frame can be used for traffic or control channels.
• TCH uses 24 out of 26 frames in a multiframe, with 2 frames reserved for SACCH.
• Control channels are mapped differently, depending on whether they are BCH,
CCCH, or DCCH.
The GSM channel structure consists of logical channels mapped onto physical channels (time
slots).
4.1 Logical Channels
• Traffic Channels (TCH)
Physical channels correspond to specific time slots in a TDMA frame. Each logical channel is
assigned a physical time slot.
6. Handover in GSM
Handover occurs when a mobile station moves from one cell to another.
• Timing advance (TA): Ensures MS transmits at the correct time to avoid overlapping
signals.
Introduction
In mobile communication networks, particularly in GSM (Global System for Mobile
Communications) and UMTS (Universal Mobile Telecommunications System), two essential
components of the core network are the Home Location Register (HLR) and the Visitor
Location Register (VLR). These components are responsible for managing subscriber
information and ensuring seamless communication as users move between different locations.
The HLR and VLR work together to provide efficient mobility management, authentication,
and call routing, playing a crucial role in cellular networks. In this detailed discussion, we will
explore their structure, functions, interactions, and their significance in mobile communication
systems.
The Home Location Register (HLR) is a centralized database that stores permanent subscriber
information for mobile network users. It is part of the core network and is responsible for
maintaining user authentication details, subscription plans, and location-related data. The HLR
is unique for each mobile network operator and ensures that subscribers can use network
services regardless of their geographical location.
• Keeps track of the current location of each subscriber by storing the address of the VLR
where the subscriber is currently registered.
• Updates subscriber location whenever they move from one region to another.
• Works with the Authentication Center (AuC) to verify subscriber identity before
allowing network access.
• Uses encryption keys to ensure secure communication between the user and the
network.
• Provides location information to route incoming calls and messages to the correct VLR.
The VLR handles temporary subscriber information and performs the following key tasks:
• Reduces the need to frequently query the HLR, thereby improving network efficiency.
2.2.2 Location Update Handling
• Registers mobile subscribers when they enter a new location and informs the HLR
about their updated position.
• Deletes subscriber information once they move to another location to free up resources.
• Works with the MSC to manage call setup, handovers, and disconnections.
• Interacts with the HLR and AuC to verify subscriber identity during call setup and
service access.
• Uses the authentication keys provided by the HLR to ensure secure network access.
• Aids in delivering SMS by ensuring that messages reach the subscriber even when they
move between different locations.
• Coordinates with the Short Message Service Center (SMSC) for efficient message
routing.
1. When a mobile subscriber switches on their phone, the Mobile Station (MS) sends a
registration request to the nearest Base Station Subsystem (BSS).
2. The BSS forwards this request to the MSC.
3. The MSC consults the VLR to check if the subscriber is already registered.
4. If the subscriber is new to the area, the VLR requests the subscriber's details from the
HLR.
5. The HLR sends the necessary information to the VLR, which stores it temporarily.
6. The VLR assigns a Temporary Mobile Subscriber Identity (TMSI) to the subscriber
to enhance security and reduce network load.
1. When a call is made to a mobile subscriber, the originating MSC queries the
subscriber’s HLR to find their current VLR.
2. The HLR forwards the query to the VLR where the subscriber is currently registered.
3. The VLR provides routing information to the MSC to establish the call connection.
4. The call is then routed to the subscriber’s location, ensuring seamless communication.
3. The HLR instructs the previous VLR to remove the subscriber’s data to prevent
redundancy.
4. The new VLR assigns a TMSI to the subscriber and updates the HLR accordingly.
Subscriber Maintains records for all network Stores details of users within a
Management subscribers specific area
• HLR and VLR ensure that mobile networks can handle millions of users without
excessive data duplication.
• They improve system efficiency by distributing data storage and processing load.
• By updating user location dynamically, HLR and VLR enable smooth handovers and
uninterrupted service during movement.
• Efficient coordination between HLR and VLR ensures quick call setup and reliable
message delivery.
In cellular communication, a channel refers to a specific frequency band or time slot allocated
for communication between mobile devices and the network. Channels are divided into:
• Control Channels – Used for signaling and network management (e.g., call setup).
Since the radio spectrum is a limited resource, cellular networks must optimize its use by
employing efficient channel allocation strategies.
Channel allocation techniques in cellular systems can be broadly classified into Fixed Channel
Allocation (FCA), Dynamic Channel Allocation (DCA), and Hybrid Channel Allocation
(HCA).
Definition:
In Fixed Channel Allocation (FCA), a predetermined set of channels is permanently assigned
to each cell. These channels cannot be used by other cells, even if they are free.
Working Principle
• The same frequency cannot be used in adjacent cells to avoid interference (frequency
reuse pattern).
Example:
Consider a cellular network with 100 channels and 10 cells. If each cell gets 10 channels,
these channels remain fixed and cannot be reassigned dynamically.
Advantages of FCA:
• Simple to implement.
Use Cases:
• Rural areas with stable traffic patterns.
Definition:
In Dynamic Channel Allocation (DCA), channels are not permanently assigned to cells.
Instead, they are dynamically allocated based on real-time demand.
Working Principle
• The allocation is based on network conditions such as traffic load, interference levels,
and user mobility.
• When the call ends, the channel is released and made available for others.
Example:
If a cell is experiencing heavy traffic, it can borrow free channels from neighboring cells instead
of rejecting calls due to congestion.
Advantages of DCA:
Disadvantages of DCA:
Use Cases:
Definition:
Hybrid Channel Allocation (HCA) is a combination of FCA and DCA, aiming to balance
efficiency and complexity.
Working Principle
• A pool of dynamic channels is shared among all cells and assigned based on demand
(like DCA).
Example:
A city network may have 70% FCA channels and 30% DCA channels, ensuring that some
capacity is fixed while the rest can adapt dynamically.
Advantages of HCA:
Disadvantages of HCA:
Use Cases:
• Frequencies must be reused across different cells while minimizing co-channel and
adjacent-channel interference.
3.3 Mobility and Handover Management
• Mobile users moving between cells require efficient handover mechanisms.
• A cell can borrow unused channels from neighboring cells when needed.
Interference
Moderate High High
Handling
Call Blocking
High Low Medium
Probability
Fixed Channel Dynamic Channel Hybrid Channel
Feature
Allocation (FCA) Allocation (DCA) Allocation (HCA)
Introduction
DCA plays a crucial role in improving spectrum utilization, reducing call blocking, and
enhancing Quality of Service (QoS) in modern wireless networks. This article explores
Dynamic Channel Allocation in detail, covering its principles, working mechanisms,
advantages, disadvantages, types, and real-world applications.
Dynamic Channel Allocation (DCA) refers to the real-time assignment of radio channels to
cells or users based on current network conditions. Unlike Fixed Channel Allocation (FCA),
where a cell has a fixed number of channels, in DCA:
• Once a call is completed, the channel is returned to the central pool for reassignment.
DCA allows adaptive spectrum management, making it ideal for networks with fluctuating
traffic patterns.
• Enhancing Mobility Support: Ensuring smooth handovers for users moving between
cells.
In modern cellular networks (such as 4G and 5G), user demand fluctuates significantly. Some
cells experience high traffic at certain times, while others remain underutilized. DCA
dynamically adjusts channel assignments, allowing networks to:
1. Channel Request: When a mobile user initiates a call or data session, the base station
sends a request to the network for a free channel.
2. Channel Selection: The network dynamically selects an available channel based on:
o Interference levels
o Signal strength
o Traffic conditions
4. Channel Release: When the call or session ends, the channel is returned to the central
pool and becomes available for reassignment.
DCA can be categorized into different types based on how channels are assigned and managed.
Disadvantages:
• Each base station independently selects and assigns channels based on local
conditions.
Advantages:
Disadvantages:
• The central controller provides guidelines, but base stations make local decisions.
Advantages:
Disadvantages:
• If a cell experiences high traffic, it can borrow channels from neighboring cells.
Dynamic Channel Allocation is widely used in modern 4G, 5G, and beyond to optimize
spectrum usage.
6.2 DCA in 5G
• AI and Machine Learning (ML): Predicts traffic patterns and optimizes channel
allocation.
Spectrum
Low High Medium
Utilization
Interference
Moderate High High
Management
Computational
Low High Medium
Complexity
Introduction
In this article, we will explore Hybrid Channel Allocation (HCA) in detail, including its
working principles, advantages, disadvantages, types, and real-world applications in
modern wireless networks.
• A portion of the frequency spectrum is statically allocated (fixed) to each cell (similar
to FCA).
• The remaining channels are dynamically assigned based on network demand (similar
to DCA).
HCA is used to improve spectrum efficiency, reduce call blocking, and enhance network
performance while maintaining a balance between predictability and adaptability.
• FCA suffers from inefficient spectrum utilization in areas with fluctuating traffic.
HCA solves these issues by allocating some channels permanently while dynamically
assigning others when needed.
o These channels are reserved for regular traffic and always available.
o When a cell runs out of fixed channels, it requests additional channels from
the pool.
HCA can be implemented in various ways based on how channels are assigned and managed.
The most common types include:
• When demand exceeds the available fixed channels, a cell borrows channels from
neighboring cells if they are free.
• A central controller monitors network traffic and assigns dynamic channels based on
demand.
• Base stations request additional channels from the centralized pool when needed.
• The controller ensures interference-free assignment.
• Each base station independently manages its own dynamic channel allocation.
• Channels are shared only among neighboring cells without centralized control.
• Priority levels are assigned to different users (e.g., emergency calls, VIP users, regular
calls).
• High-priority users can access dynamic channels even if lower-priority users are
waiting.
• If fixed channels are fully occupied, the system can dynamically assign additional
channels.
• LTE uses hybrid resource allocation where a portion of bandwidth is reserved for
fixed users, and the rest is allocated dynamically.
• Carrier aggregation helps in dynamically increasing available bandwidth.
• AI and Machine Learning (ML) are used to optimize hybrid allocation based on real-
time demand.
• Network slicing allows for fixed and dynamic allocation for different use cases (e.g.,
IoT vs. high-speed internet).
• Dynamic Spectrum Sharing (DSS): 4G and 5G can share spectrum dynamically using
hybrid approaches.
Spectrum
Low High High
Utilization
Call Blocking
High Low Medium
Probability
Interference
Moderate High High
Management
Computational
Low High Medium
Complexity
CDMA is widely used in 3G cellular networks (such as CDMA2000 and WCDMA) and
forms the foundation of modern wireless communication standards.
In this article, we will explore CDMA in detail, including its principles, working
mechanisms, advantages, disadvantages, types, and applications in modern wireless
systems.
1. What is CDMA?
1.1 Definition
CDMA (Code Division Multiple Access) is a spread spectrum multiple access technique
where multiple users share the same frequency channel at the same time but are separated
using unique pseudo-random codes. These codes allow the receiver to distinguish each
user's signal while rejecting interference from others.
CDMA is based on spread spectrum technology, where the transmitted signal is spread over
a wide frequency band using a unique code.
• The user’s data signal is multiplied by this spreading code, spreading it over a wider
frequency spectrum.
Step 2: Transmission
• The spread signal is transmitted over the same frequency band used by other users.
• Multiple users transmit simultaneously, but their signals remain distinguishable due
to their unique codes.
• The receiver uses the same unique code to extract the original data.
CDMA technology has evolved into different standards used in modern wireless networks.
• However, CDMA principles are still used in advanced wireless systems for security
and interference reduction.
4. Advantages of CDMA
4.1 High Spectrum Efficiency
• Spread spectrum technology makes CDMA highly resistant to noise and interference.
• Unlike FDMA/TDMA, where capacity is fixed, CDMA can accommodate more users
by slightly reducing quality.
5. Disadvantages of CDMA
5.1 Near-Far Problem
• If a strong signal from a nearby user interferes with a weaker signal from a distant
user, reception becomes difficult.
• Power control algorithms are used to solve this issue.
5.2 Higher Complexity
• Continuous power control requires more processing, leading to higher battery usage
in mobile devices.
• LTE and 5G have replaced CDMA with OFDMA due to higher efficiency.
7. Applications of CDMA
• Though 5G primarily uses OFDMA, CDMA principles are applied for interference
reduction.
General Packet Radio Service (GPRS) is a mobile data service that extends the capabilities
of 2G GSM networks by enabling packet-switched data transmission. It was a significant
advancement over circuit-switched data (CSD), allowing users to access internet services,
multimedia messaging (MMS), WAP browsing, and email with better efficiency and lower
costs.
In this article, we will explore GPRS in detail, covering its architecture, working principles,
features, advantages, limitations, and applications in modern wireless communication.
1. What is GPRS?
1.1 Definition
Before GPRS, GSM networks primarily supported voice calls and slow data transmission
using Circuit Switched Data (CSD), which was inefficient and expensive. GPRS was
introduced to:
• Users had to pay for the duration of the connection, even when no data was
transmitted.
Packet-Switched Data (GPRS)
• Data is divided into packets and sent over shared network resources.
• Multiple users can share the same bandwidth, making it more efficient.
• Users are charged based on actual data transferred instead of connection time.
1. Data Packetization: The user’s data is split into small packets before transmission.
2. Routing & Transmission: These packets are sent through the network only when
needed, rather than keeping a dedicated connection.
3. Reassembly: At the receiving end, the packets are reassembled into the original data.
2.3 GPRS Speed and Multislot Classes
GPRS data rates depend on how many timeslots a mobile device can use at once. A GPRS
channel can use up to 8 timeslots per user.
• Typical GPRS speeds range between 40-60 kbps, which is much faster than traditional
CSD (9.6 kbps).
• GPRS was later enhanced by EDGE (Enhanced Data rates for GSM Evolution),
which provided speeds up to 384 kbps.
GPRS introduces new network elements to the existing GSM architecture, enabling packet-
switched services.
o Acts as a bridge between GPRS and external networks (e.g., the Internet,
corporate intranets).
2. The SGSN communicates with the GGSN, which establishes a connection with the
external network.
4. When the session ends, resources are released, allowing others to use them.
4. Features of GPRS
4.1 Always-On Connectivity
• Unlike CSD, GPRS allows continuous internet access without requiring a new
connection for each session.
4.3 Cost-Effective
• Charges users based on data usage (MB/KB) rather than time-based billing.
5. Advantages of GPRS
Faster Data Speeds than traditional GSM CSD (up to 171.2 kbps with Class 10 GPRS).
More Efficient Use of Network Resources compared to circuit-switched data.
Lower Costs since users are billed based on data volume instead of connection time.
Supports Multiple Services, including MMS, push-to-talk, and IoT connectivity.
Seamless Integration with GSM, allowing existing infrastructure to support data services.
6. Disadvantages of GPRS
Slower than 3G & 4G Technologies – Maximum speeds (171.2 kbps) are lower than 3G
(up to 2 Mbps).
Higher Latency – Packet-switched networks introduce more delays compared to circuit-
switched systems.
Limited Multimedia Capabilities – Not suitable for high-speed video streaming.
Security Concerns – Packet-based communication is more vulnerable to cyber threats
than circuit-switched systems.
7. Applications of GPRS