The document discusses the history and development of wireless local area networks (WLANs). It explains that in the late 1980s, vendors began offering wireless products as alternatives to wired local area networks to avoid cable costs and ease relocation. The IEEE formed a standard committee and developed the 802.11 series of standards to address interoperability between different WLAN products. WLANs use unlicensed radio frequency bands and can operate in both infrastructure and ad hoc modes.
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
28 views
Mobile Computing Lecture3
The document discusses the history and development of wireless local area networks (WLANs). It explains that in the late 1980s, vendors began offering wireless products as alternatives to wired local area networks to avoid cable costs and ease relocation. The IEEE formed a standard committee and developed the 802.11 series of standards to address interoperability between different WLAN products. WLANs use unlicensed radio frequency bands and can operate in both infrastructure and ad hoc modes.
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 26
Lecture 2
In late 1980s, vendors started offering wireless
products, which were to substitute the traditional wired LAN (Local Area Network) products. The idea was to use a wireless local area network to avoid the cost of installing LAN cabling and ease the task of relocation or otherwise modifying the network's structure. The question of interoperability between different wireless LAN products became critical. IEEE standard committee took the responsibility to form the standard for WLAN. As a result IEEE 802.11 series of standards emerged. WLAN uses the unlicensed Industrial, Scientific, and Medical (ISM) band that different products can use as long as they comply with certain regulatory rules WLAN is also known as Wireless Fidelity or WiFi in short There are many products which use these unlicensed bands along with WLAN. Examples could be cordless telephone, microwave oven etc. There are 3 bands within the ISM bands. These are 900-MHz ISM band, which ranges from 902 to 928 MHz; 2.4-GHz ISM band, which ranges from 2.4 to 2.4853 GHz; and the 5.4 GHz band, which range from 5.275 to 5.85 GHz. WLAN uses 2.4 GHz and 5.4 GHz bands. WLAN works both in infrastructure mode and ad hoc mode Techniques for WPANs are infrared and radio waves. Most of the Laptop computers support communication through infrared, for which standards have been formulated by IrDA (Infrared Data Association- www.irda.org). Through WPAN, a PC can communicate with another IrDA device like another PC or a Personal Digital Assistant (PDA) or a Cellular phone. The other best known PAN technology standard is Bluetooth. Bluetooth uses radio instead of infrared. It offers a peak over the air speed of about 1 Mbps over a short range of about 10 meters. The advantage of radio wave is that unlike infrared it does not need a line of sight. WPAN works in ad hoc mode only Mobile computing can be defined as a computing environment over physical mobility. The user of a mobile computing environment will be able to access data, information or other logical objects from any device in any network while on the move. Mobile computing system allows a user to perform a task from anywhere using a computing device in the public (the Web), corporate (business information) and personal information spaces (medical record, address book). Mobile computing is used in different contexts with different names. The most common names are: Mobile Computing: ▪ The computing environment is mobile and moves along with the user. ▪ This is similar to the telephone number of a GSM (Global System for Mobile communication) phone, which moves with the phone. ▪ The offline (local) and real-time (remote) computing environment will move with the user. ▪ In real-time mode user will be able to use all his remote data and services online. Anywhere, Anytime Information: This is the generic definition of ubiquity, where the information is available anywhere, all the time. Virtual Home Environment: (VHE) is defined as an environment in a foreign network such that the mobile users can experience the same computing experience as they have in their home or corporate computing environment. ▪ For example, one would like to put ones room heater on when one is about 15 minutes away from home. Nomadic Computing: The computing environment is nomadic and moves along with the mobile user. ▪ This is true for both local and remote services. Pervasive Computing: A computing environment, which is pervasive in nature and can be made available in any environment. Ubiquitous Computing: A disappearing (nobody will notice its presence) everyplace computing environment. User will be able to use both local and remote services. Global Service Portability: Making a service portable and available in every environment. Any service of any environment will be available globally. Wearable Computers: Wearable computers are those computers that may be adorned by humans like a hat, shoe or clothes (these are wearable accessories). We can define a computing environment as mobile if it supports one or more of the following characteristics: User Mobility: User should be able to move from one physical location to another location and use the same service. The service could be in the home network or a remote network. Example could be a user moves from London to New York and uses Internet to access the corporate application the same way the user uses in the home office. Network Mobility: User should be able to move from one network to another network and use the same service. Example could be a user moves from Hong Kong to New Delhi and uses the same GSM phone to access the corporate application through WAP (Wireless Application Protocol). In home network he uses this service over GPRS (General Packet Radio Service) whereas in Delhi he accesses it over the GSM network. Bearer Mobility: User should be able to move from one bearer to another and use the same service. Example could be a user was using a service through WAP bearer in his home network in Bangalore. He moves to Coimbatore, where WAP is not supported, he switch over to voice or SMS(Short Message Service) bearer to access the same application. Device Mobility: User should be able to move from one device to another and use the same service. Example could be sales representatives using their desktop computer in home office. During the day while they are on the street they would like to use their Palmtop to access the application. Session Mobility: A user session should be able to move from one user-agent environment to another. Example could be a user was using his service through a CDMA (Code Division Multiple Access) IX network. The user entered into the basement to park the car and got disconnected from his CDMA network. User goes to home office and starts using the desktop. The unfinished session in the CDMA device moves from the mobile device to the desktop computer. Service Mobility: User should be able to move from one service to another. Example could be a user is writing a mail. To complete the mail user needs to refer to some other information. In a desktop PC, user simply opens another service (browser) and moves between them using the task bar. User should be able to switch amongst services in small footprint wireless devices like in the desktop. Host Mobility: The user device can be either a client or server. When it is a server or host, some of the complexities change. In case of host mobility the mobility of IP needs to be taken care of. The mobile computing functions can be logically divided into following major segments: 1. User with device: ▪ The user device, this could be a fixed device like desktop computer in office or a portable device like mobile phone. ▪ Example: laptop computers, desktop computers, fixed telephone, mobile phones, digital TV with set-top box, palmtop computers, pocket PCs, two way pagers, handheld terminals, etc. 2. Network: ▪ Whenever a user is mobile, he will be using different networks at different places at different time. ▪ Example: GSM, CDMA, iMode, Ethernet, Wireless LAN, Bluetooth etc. 3. Gateway: ▪ This is required to interface different transport bearers. ▪ These gateways convert one specific transport bearer to another transport bearer. ▪ Example: From a fixed phone (with voice interface) we access a service by pressing different keys on the telephone. These keys generate DTMF (Dual Tone Multi Frequency) signals. ▪ These analog signals are converted into digital data by the IVR (Interactive Voice Response) gateway to interface with a computer application. ▪ Other examples will be WAP gateway, SMS gateway etc. 4. Middleware: ▪ This is more of a function rather than a separate visible node. ▪ In the present context middleware handles the presentation and rendering of the content on a particular device. ▪ It will also handle the security and personalization for different users 5. Content: ▪ This is the domain where the origin server and content is. ▪ This could be an application, system, or even an aggregation of systems. ▪ The content can be mass market, personal or corporate content. ▪ Origin server will have some means to accessing the database and the storage devices
PDF (Ebook) Foundations of Mobile Media Studies: Essential Texts on the Formation of a Field by Jason Farman (editor) ISBN 9781138235823, 1138235822 download
PDF (Ebook) Foundations of Mobile Media Studies: Essential Texts on the Formation of a Field by Jason Farman (editor) ISBN 9781138235823, 1138235822 download