0% found this document useful (0 votes)
18 views

Mobile Computing - I

Mobile Computing Unit I

Uploaded by

deepuarumugam22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Mobile Computing - I

Mobile Computing Unit I

Uploaded by

deepuarumugam22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

MOBILE

COMPUTING
COMMUNICATION TECHNOLOGIES
Mobile handsets, Wireless
communications and server applications
• Mobile computing refers to the computational tasks performed
by mobile users using their handsets.
• Since the handsets have very limited processing power and
memory these devices by themselves do not have the
capability to carry out any significant and meaningful
computations under can only serve as the front end for
invoking remote applications.
• Therefore, this involves the invocation of applications running
on remote servers
Marconi,
1895
invented
Radio.
Starting with the elementary,
ground-breaking
point-to-point wireless
communication achieved by
Marconi, there has
been continually the induction
of new and increasingly
sophisticated
technologies.
RADIO SYSTEM
• Terrestrial Radio System: When all the intermediaries are located on the ground, then
• the communication system is referred to as a terrestrial radio system
• Satellite Radio System: If at least one of the intermediaries is satellite borne, then it is
referred to as a satellite radio system.

• Cell Phone System:


• The flexibility of communicating while on the move, the cell phone system also provides
data services such as Short Message Service (SMS), Multimedia Messaging Service
(MMS), and even email and web browsing while on the move.
• It possible for people to communicate and carry out important work anytime and from
anywhere. For this reason, mobile computing is often referred to as ubiquitous
computing.
Types of Telecommunication Networks

• A popular way of classifying telecommunication networks is into voice


networks and data networks.
• The voice networks were the first ones to be developed and formed the
predominant telecommunication networks in the nineteenth and twentieth
centuries.
• In a voice network, analog traffic is usually modulated on a carrier signal for
spectral and transmission efficiency. The traditional telephone networks that
carry voice traffic in analog form.
• The data networks carry data in digital form. The data signals are also
modulated on an analog carrier signal for spectral and transmission
efficiency.
• The term data here refers to any information such as text,
documents, picture, movie, sound, etc., which needs to be first
coded into a bit stream.
• Analog signals such as voice, video, etc., have to be first quantized
into digital data for coding into bit streams.
• Traditional voice networks such as PSTN (public switched
telephone networks) relied on circuit switching, whereas data
networks are more recent and are based on the store-and-forward
packet switching mechanism.
• Advantage of the packet-switched networks:
• Efficient use of the transmission medium
• Cost effective
• Depending on the traffic conditions, packets can get stored at a
switch for a significant amount of time causing queues to get built
up at various switches
• The modern day networks deploy high-speed, powerful switches and routers.
• This has made it possible for voice to be transmitted over packet-switched networks and
hence VoIP (Voice over Internet Protocol) has become a very popular and cheap medium of
communication.
• Computer Networks:
• Controller Area Networks (CANs)
• Local Area Networks (LANs)
• Internetworks.
• Controller Area Networks:
• A Controller Area Network (CAN) is essentially a very small network that is typically used
to connect the different components of an embedded controller.
• The end-to-end length of a CAN is usually less than 50 metres.
• Since the propagation time of a CAN is very small, it behaves more like a local bus in a
computer.
• the use of CAN has extended beyond its automotive origins and can now be found in divers
application areas such as industrial automation systems, trains, ships, agricultural
machinery, household appliances, office automation systems and elevators.
Local Area Networks
• A Local Area Network (LAN) is typically deployed in a building or a campus and is
usually privately owned. For example, a LAN can be used to connect a number of
computers within an organization to share data and other resources such as files,
printers, FAX services, etc. LANs typically operate at data rates exceeding 10 Mbps and
many present-day LANs(gigabit Ethernets) operate at 1 Gbps.

• Internetworks
• Several LANs can be interconnected using switches to realize internetworks or internet
in short.
LAN Architectures
• Two major LAN architectures are being used:
• The bus architecture
• The ring architecture.

Bus Architecture:
• In a bus-based architecture, nodes are connected to the network able using T-shaped
network interface connectors.
• The terminating points are placed at each end of the network cable.
• There is a single, shared channel (bus) for which the transmitting nodes contend to
gain access to it.
• In a bus architecture, nodes communicate using broadcasting.
• The most commonly used protocol for access control in traditional bus networks is
theCarrier Sense Multiple Access with Collision Detection (CSMA/CD).
• These networks are also called multiple access networks.
• In these networks, when two or more nodes transmit packets
simultaneously, the transmissions overlap in time and the resulting signal gets
garbled. Such an event is called a collision.
• A collision entails retransmission of the corrupted frame.
• In CSMA/CD networks, nodes continuously sense the channel to determine whether
the channel is idle. A node transmits a packet only if it senses the channel to be idle.
• Ethernet is a LAN standard based on the CSMA/CD media access control protocol.
CSMA/CD protocol does not define any specific collision resolution mechanism.
• On the other hand, Ethernet uses the Binary Exponential Back-off (BEB)
algorithm for collision resolution. Due to its ubiquity, high speed, simplicity and low
cost, Ethernet has over the years emerged as one of the most preferred LAN
protocols.
Ring Architecture
• Nodes are placed along the ring.
• The nodes transmit in turn. Each node usually transmits for a certain predetermined period
of time. Therefore, packet transmission delays become predictable and can be made
sufficiently small as per requirement.
• As a result, ring-based architectures are often preferred in real-time applications.
• The ring architecture, however, suffers from a few important problems. First, any break in
the ring can bring the whole network down.
• Ring is a poor fit to the linear topology normally found in many situations. This
made researchers to look for alternative technologies which can have the
advantages of both the bus and ring architectures.

• Token bus architecture:


• A token bus is a bus-based architecture where the stations on the bus are
logically arranged in a ring with each station knowing the address of the station
to its “left” and “right”.
• When the logical ring is initialized, the highest numbered station gets a chance
to start its transmission. After transmitting for a predetermined duration, this
station passes the transmission permission to its immediate neighbour (left or
right as per the convention adopted) by sending a special control frame called a
token. The token propagates around the logical ring.
• At any time, only the token holder is permitted to transmit packets.
• Collisions cannot occur.
Components of a Wireless Communication System
• A wireless communication system is built from various types of
basic components. The following are some of these basic types of
components.
• Transmitter:
• The input to a wireless transmitter may be voice, video, data or other
types of signal meant to be transmitted to one or more distant receivers.
This signal is called the baseband signal.
• The basic function of the transmitter is to modulate, or encode several
baseband signals onto ahigh frequency carrier signal.
• A modulated high frequency signal can be radiated and propagated more
effectively and helps make more efficient use of the radio frequency
(RF) spectrum than what the direct transmission of the individual
baseband signals can achieve.
• Receiver: The receiver receives the modulated signals and reverses the
functions of the transmitter component and thereby recovers the
transmitted baseband signal. The antenna of the receiver is usually
capable of receiving the electromagnetic waves radiated from many
sources over a relatively broad frequency range.
• Antenna: The function of an antenna is to convert the electric signal
from a transmitter to a propagating electromagnetic RF wave; or
conversely, to convert a propagating RF wave to an electric signal in a
receiver. In a transceiver, a transmitter and a receiver are co-located for
supporting fullduplex communications.
• There are mainly two types of antennas that are used on wireless
networks:
• omni-directional
• directional.
Components of a Wireless Communication System
• Filters: Filters are a key component present in all wireless
transmitters and receivers. They are used to reject interfering signals
lying outside the operating band of receivers and transmitters. They
also reject unwanted noise signals generated by the amplifier circuitry.
• Amplifiers: An amplifier amplifies the strength (usually voltage) of a
signal. The important specifications of an amplifier include power gain
and the noise figure. The noise figure of an amplifier is a measure of
how much noise is added to the amplified signal by the amplifier
circuitry.
Components of a Wireless Communication System
• Mixers: A mixer is typically used to achieve frequency conversion
at the transmitters and receivers. Frequency conversion is
required because it is advantageous to transmit signals at a higher
frequency. This is achieved by modulating a carrier waveform using
the original baseband frequency.
• When a baseband signal is mixed appropriately with a high
frequency on a carrier, it can be easily and efficiently radiated and
becomes less susceptible to noise and attenuation.
Architecture of a Mobile Telecommunication System
• Mobile handsets communicate over the radio access network. The radio access
network is primarily composed of the base stations which communicate with the
mobile phones using radio frequency electromagnetic waves.
• the coverage area is decomposed into hexagonal cells. In each hexagonal cell, one
base station is located. Two types of radio channels are usually involved in the
communication between a base station and the cell phones: control channels and
voice channels.
• Control channels typically use frequency shift keying (FSK) and are used for
transferring control messages (data) between the mobile phone and the base
station.
• Voice channels typically use frequency modulation (FM). A base station
typically has two antennas of different characteristics. One antenna is used for
receiving and the other for transmitting.
• The use of the two different types of antennas at the base station increases the
ability of the base station to receive the radio signal from mobiles that use very
low transmitter power levels. On the other hand, mobile handsets typically use
the same antenna for both receiving and transmitting.
Bluetooth Technology
• The Bluetooth technology has become a popular means to implement a Personal Area
Network (PAN). A PAN helps to interconnect a set of computerized devices that an
individual person might require. For example, a PAN makes it possible to network
various appliances used in daily life such as a microwave oven, fridge, air conditioner,
mobile phones, etc.
• This connectivity makes some meaningful applications to become possible. For
example, the fridge might automatically send the list of items that are out of stock to
the mobile, which can remind a housewife when shopping in the mall.
• A prominent advantage of Bluetooth is that it can be used to get rid of the mesh of
wires that are required for interconnecting various devices that are positioned near
each other.
• For example, the mouse, the camera, the printer, etc. can all communicate with the
computer using Bluetooth connectivity, making it possible to get rid of the mesh of
wires.
• Such a Bluetooth connectivity among a set of devices is called a piconet.
BLUETOOTH PICONET
• In Bluetooth communication, the slave units only respond to commands from
the master. This allows the Bluetooth MAC to be simple, efficient, and non-
contention based.
• In a piconet, data transfer rates of up to 2.1 Mbits are possible.
• A scatternet is formed when an ad hoc network of more than one piconets is
formed.
Protocol Stack of Bluetooth
• Bluetooth protocol stack makes possible the communication of both data and
control among many devices in a PAN.
Protocol Stack of Bluetooth
• The lowermost layer is called the Radio Frequency (RF) layer. Radio
modem is specified in this layer.
• This link controls the packet but the bit levels are specified by the
baseband layer.
• The Link Management Protocol (LMP) is capable of configuring links
with other devices. It provides power modes, traffic scheduling, packet
format, authentication and encryption.
• Logical Link Control and Adaptation Protocol (L2CAP) provide
connection oriented and connectionless data services to the upper
layers of the protocol.
• Service Discovery Protocol (SDP) enables two or more Bluetooth devices
to support a particular service.
• Radio layer: It defines the requirements on the Bluetooth
transceiver device that provides the required wireless
support for master-slave communications.
• The Baseband: is the physical layer of the Bluetooth. This
layer lies on top of the Bluetooth radio layer in the
Bluetooth stack. The functionalities of this layer include link
establishment and power control. It also defines the packet
format and timing issues. The baseband protocol
implementation is called a Link Controller (LC).
• Link Management Protocol (LMP) LMP is a data link
layer protocol and is responsible for link setup between the
Bluetooth devices.
• Two types of links are possible:
• Asynchronous Connectionless Links
• Synchronous Connection-Oriented

• Services Discovery Protocol (SDP):


Each Bluetooth device maintains an SDP server application that
keeps track of the services available on that device.
• Radio Frequency Communication (RFCOMM):
RFCOMM is a simple set of transport protocols that are built on
top of L2CAP, and helps realize TCP/IP connectivity. It also provides
an emulated RS-232 serial port with other Bluetooth devices, thus
simplifying connectivity with many simple and small devices without
using wires.
• Telephony Control Protocol Specification (TCS): TCS
defines the call control signals for establishing a voice
connection between Bluetooth devices.

You might also like