Sjit MC Unit1
Sjit MC Unit1
Sjit MC Unit1
UNIT I INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations
of Mobile Communication Technologies- Multiplexing – Spread spectrum -MAC
Protocols – SDMA- TDMA- FDMA- CDMA
Mobile Computing
Mobile Computing is a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device without having to be connected to a fixed
physical link.
Mobile computing Wireless networking
Mobile computing refers to computing Information between a computing device
devices that are not restricted to a Wireless refers to the method of
desktop. A mobile device may be a PDA, transferring, and a data source, such as an
a smart phone or a web phone, a laptop agency database server, without a
computer, or any one of numerous other physical connection
devices that allow the user to complete
tasks without being tethered, or
connected, to a network. Accessing
information and remote computational
service while on the move.
First Generation, 1G
These phones were the first mobile phones to be used, which was introduced in 1982 and completed
in early 1990. It was used for voice services and was based on technology called as Advanced
Mobile Phone System (AMPS). The AMPS system was frequency modulated and used frequency
division multiple access (FDMA) with a channel capacity of 30 KHz and frequency band of 824-
894MHz. Its basic features are:
Speed-2.4 kbps
Allows voice calls in 1 country
Use analog signal.
Poor voice quality
Poor battery life
Large phone size
Limited capacity
Poor handoff reliability
Poor security
Offered very low level of spectrum efficiency
It introduces mobile technologies such as Mobile Telephone System (MTS), Advanced Mobile
Telephone System (AMTS), Improved Mobile Telephone Service (IMTS), and Push to Talk (PTT).
It has low capacity, unreliable handoff, poor voice links, and no security at all since voice calls were
played back in radio towers, making these calls susceptible to unwanted eavesdropping by third
parties
Architecture of AMPS
Spread Spectrum
A collective class of signaling techniques are employed before transmitting a signal to
provide a secure communication, known as the Spread Spectrum Modulation. The main
advantage of spread spectrum communication technique is to prevent “interference” .
These spread spectrum signals transmit at low power density and has a wide spread of
signals.
Pseudo-Noise Sequence
A coded sequence of 1s and 0s with certain auto-correlation properties, called as Pseudo-
Noise coding sequence is used in spread spectrum techniques. It is a maximum-length
sequence, which is a type of cyclic code.
Spread spectrum multiple access techniques uses signals which have a transmission
bandwidth of a magnitude greater than the minimum required RF bandwidth.
Hard to find the user’s frequency at any instant User frequency, once allotted is always
of time the same
Sender need not wait Sender has to wait if the spectrum is busy
Power strength of the signal is high Power strength of the signal is low
It is cheaper It is expensive
This is the commonly used technique This technique is not frequently used
Cross-talk elimination
Better output with data integrity
Reduced effect of multipath fading
Better security
Reduction in noise
Co-existence with other systems
Longer operative distances
Hard to detect
Not easy to demodulate/decode
Difficult to jam the signals
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY)
specifications for implementing wireless local area network (WLAN) computer
communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.
Demand-based schemes
960
124
MHz
935.2 1 200
MHz kHz
20
915 MHz
124
MHz
890.2 1
MHz t
417 µs
1 2 3 11 12 1 2 3 11 12
t
downlink uplink
let the binary sequence be 1001, then the representation sequence is +1-1-1+1
On the receiving end, only the same PN sequence is able to demodulate the signal to
successfully convert the input data
Pseudorandom sequence generator(PRSG)
To generate a series of pseudorandom numbers,
collision
sender A
sender B
sender C
Slotted Aloha
t
collision
sender A
sender B
sender C
t
Slotted ALOHA
CSMA/CD
- sender starts to transmit if it senses the channel to be free
- even if it senses the channel to be free, there can be a collision during transmission
- in wireless network, it is very difficult for a transmitting node to detect a collision,
since any received signal from other nodes would be too feeble compared to its own signal
and can easily be masked by noise.
- As result, a transmitting node would continue to transmit frame, and only the
destination node would notice the corrupted frame after it computes checksum.
This leads to retransmission and severe wastage of channel utilization
In a wired network when a node detects a collision, it immediately stops transmitting ,
thereby minimizing channel wastage
In wireless network, CA scheme works much better than CD.
CA scheme - based on the idea that is necessary to prevent collisions at the moment they
are most likely to occur ie., when the bus is released after a pkt transmission
- During the time a node is transmitting, several nodes might be wanting to transmit
- these nodes would be monitoring the channel and waiting for it to become free
- the moment the transmitting node completes its transmission, these waiting nodes would
sense the channel to be free, and would all start transmitting at the same time
To overcome such collisions, in CD scheme, all nodes are forced to wait for a random time
and then sense the medium again, before starting their transmission
If the medium is sensed to be busy, a node waiting to transmit waits for a further random
amount of time and so on. Thus, the chance of 2 nodes starting to transmit at the same time
would be greatly reduced
III. Reservation-based Schemes
- RTS/CTS Scheme - short, fixed-length (32 byte) signalling packets
– a sender transmits an RTS (Ready To Send) pkt to receiver before the actual data
transmission
- on receiving this, the receiver sends a CTS (Clear To Send) pkt, and the actual data
transfer commences only after that
- when the other node sharing the medium senses the CTS pkt, they refrain from
transmitting until the transmission from the sending node is complete
In contention-based MAC protocol a node wanting to send amsg first reserves the medium
by using an appropriate control msg
Eg. Reservation of the medium can be achieved by transmitting a RTS msg and
corresponding destination node accepting this request answers with a CTS msg
Every node that hears the RTS and CTS msgs defers its transmission during the specified
tome period in order to avoid a collision
Egs of RTS-CTS based MAC protocols are
MACA - Multiple Access Collision Access
The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.
RTS RTS
CTS
A B C
The sender senses the carrier to see and transmits a RTS (Request To Send) frame if
no nearby station transmits a RTS.
The receiver replies with a CTS (Clear To Send) frame.
Neighbors
see CTS, then keep quiet.
see RTS but not CTS, then keep quiet until the CTS is back to the sender.
The receiver sends an ACK when receiving an frame.
Neighbors keep silent until see ACK.
Collisions
There is no collision detection.
The senders know collision when they don’t receive CTS.
They each wait for the exponential backoff time.