Mobile Computing
Mobile Computing
7. What is WEP ?
Wired Equivalent Privacy (WEP) : A security protocol for wireless networks defined within the
802.11b standard. WEP is designed to provide the same level of security as that of a wired network.
Recent reports indicate that the use of WEP alone is insufficient to ensure privacy unless used in
conjunction with other mechanisms for data encryption.
8. What is WPA ?
WPA : Short for Wi-Fi Protected Access, a Wi-Fi standard that was designed to improve upon the
security features of WEP. This technology features improved data encryption through the temporal
key integrity protocol (TKIP) and user authentication through the extensible authentication protocol
(EAP), PEAP – MSChapV2. PittNet Wi-Fi utilizes the WPA protocol.
9. What is Ad Hoc Network Architecture ?
If there is no access point in WLAN architecture then it will be adhoc architecture.
It have stand alone network.
It cannot sends data to other BSS.
In adhoc architecture, stations can locate the another stations in same BSS but can communicate only if they have
agreement between them.
It is a peer to peer network topology.
10. Explain WLAN Architecture ?
Stations: Stations are network components that communicate wirelessly. They might be access points or
endpoints, and each has its own network address.
Basic Service Set (BSS): It is the Building Block of WLAN. BSS is a set of all stationsthat can communicate
with each other at physical layer. Every BSS has an BSSID which is the MAC address of the access point
servicing the BSS.
Extended Service Set(ESS): An Extended Service Set (ESS) is a collection of connected BSSs that
communicate with each other. Access Point in an ESS are connected by distributed system. Each ESShas an
SSID which is a 32byte(max) character string.
Distribution system : In an ESS, the distribution system connects access points. Wired or wireless connectivity
are available. Mesh or its own WDS protocol can be used by a wireless distribution system (WDS). Fixed
wireless is a type of radio transmission used to connect two geographically separated access points.
Access point : The base station that serves as a connection point for other stations is known as the access
point. The term "access" refers to the stations' network connection, but it could also refer to internet access
because many routers also function as modems. Ethernet cables or wireless connections can be used to
connect access points in an ESS.
11. Advantage and Disadvantages of WLAN ?
Advantages of WLANs
o Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio waves can
penetrate walls, senders and receivers can be placed anywhere.
o Planning: Only wireless ad-hoc networks allow for communication without previous planning, any wired
network needs wiring plans.
o Design: Wireless networks allow for the design of independent, small devices which can for example be
put into a pocket. Cables not only restrict users but also designers of small notepads, PDAs, etc.
o Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc. whereas, networks
requiring a wired infrastructure will usually break down completely in disasters.
o Cost: The cost of installing and maintaining a wireless LAN is on average lower than the cost of installing
and maintaining a traditional wired LAN.
o Ease of Use: Wireless LAN is easy to use and the users need very little new information to take advantage
of WLANs.
Disadvantages of WLANs
o Quality of Services: Quality of wireless LAN is typically lower than wired networks. The main reason for
this is the lower bandwidth due to limitations is radio transmission, higher error rates due to interference
and higher delay/delay variation due to extensive error correction and detection mechanisms.
o Proprietary Solutions: Due to slow standardization procedures, many companies have come up with
proprietary solutions offering standardization functionality plus many enhanced features. Most components
today adhere to the basic standards IEEE 802.11a or 802.11b.
o Restrictions: Several govt. and non-govt. institutions world-wide regulate the operation and restrict
frequencies to minimize interference.
o Global operation: Wireless LAN products are sold in all countries so, national and international
frequency regulations have to be considered.
o Low Power: Devices communicating via a wireless LAN are typically power consuming, also wireless
devices running on battery power. Whereas the LAN design should take this into account and implement
special power saving modes and power management functions.
o License free operation: LAN operators don't want to apply for a special license to be able to use the
product. The equipment must operate in a license free band, such as the 2.4 GHz ISM band.
o Robust transmission technology: If wireless LAN uses radio transmission, many other electrical devices
can interfere with them (such as vacuum cleaner, train engines, hair dryers, etc.).Wireless LAN
transceivers cannot be adjusted for perfect transmission is a standard office or production environment.
Healthcare : Doctors and nurses equipped with laptops or PDAs have faster access to patient
data. Furthermore, in an emergency situation they can communicate with other departments
within the hospital by using WLAN in order to provide quick diagnostics. This is an area where
WLAN is allready relatively widely used. As in a majority of cases, WLAN is used to enhance an
allready existing wired network.
Conducting everyday business : In business, people can work productively with customers or
suppliers in meeting rooms - there is no need to leave the room to check if important emails have
arrived or print big files. Instead you can send them from one laptop to another. Senior executives
in meetings can make quicker decisions because they have access to real-time information.
Network managers in older buildings : Network managers in older buildings, such as schools,
hospitals, and warehouses, find WLANs to be a most cost-effective infrastructure solution. When
building a new network or expanding the old in-house network, few if any cables need be drawn
thru the walls and ceilings.
Network managers in dynamic environments : Network managers in dynamic environments
minimize the cost of moves, network extensions, and other changes by eliminating the cost of
cabling and installation. The mobile nature of WLAN allows the building and testing of a new
network before moving to mission-critical surroundings.
13. What are the difference between LAN and WLAN ?
14. What are the Difference between Wireless Networking and Mobile Computing ?
Radio − This is a physical layer equivalent protocol that lays down the physical structure and
specifications for transmission of radio waves. It defines air interface, frequency bands, frequency
hopping specifications and modulation techniques.
Baseband − This protocol takes the services of radio protocol. It defines the addressing scheme,
packet frame format, timing, and power control algorithms.
Link Manager Protocol (LMP) − LMP establishes logical links between Bluetooth devices and
maintains the links for enabling communications. The other main functions of LMP are device
authentication, message encryption, and negotiation of packet sizes.
Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP provides adaption between
upper layer frame and baseband layer frame format. L2CAP provides support for both
connection-oriented as well as connectionless services.
Service Discovery Protocol (SDP)− SDP takes care of service-related queries like device
information so as to establish a connection between contending Bluetooth devices.
18. What are the characteristics of Mobile Computing ?
1. Portability - The Ability to move a device within a learning environment or to different environments with ease.
2. Social Interactivity - The ability to share data and collaboration between users.
3. Context Sensitivity - The ability to gather and respond to real or simulated data unique to a current location,
environment, or time.
4. Connectivity - The ability to be digitally connected for the purpose of communication of data in any environment.
5. Individual - The ability to use the technology to provide scaffolding on difficult activities and lesson customization for
individual learners.
6. Small Size - Mobile devices are also known as handhelds, palmtops and smart phones due to their roughly phone-like
dimensions. A typical mobile device will fit in the average adult's hand or pocket.
7. Wireless Communication - Mobile devices are typically capable of communication with other similar devices, with
stationary computers and systems, with networks and portable phones.
19. Explain Mobile Computing Application Structure ?
Each tier is distributed to a different place or places in a network. These tiers do not necessarily
correspond to physical locations on various computers on a network, but rather to logical layers of
the application.
1. Presentation Layer (UI):
o This layer presents data to the user and optionally permits data manipulation and
data entry, also this layer requests the data form Business layer.
o This layer accomplished through use of Dynamic HTML and client-side data
sources and data cursors.
2. Application Layer (AL):
o The business logic acts as the server for client requests from workstations. It acts
according Business rules fetch or insert data through the Data Layer.
o In turn, it determines what data is needed (and where it is located) and acts as a
client in relation to a third tier of programming that might be located on a local or
mainframe computer.
o Because these middle-tier components are not tied to a specific client, they can be
used by all applications and can be moved to different locations, as response time
and other rules require.
3. Data Access Layer (DA):
o The third tier of the 3-tier system is made up of the DBMS that provides all the data
for the above two layers.
o This is the actual DBMS access layer.
o Avoiding dependencies on the storage mechanisms allows for updates or changes
without the application tier clients being affected by or even aware of the change.
Conferencing, Call Waiting, Call Hold, Call Forwarding, Call Barring, Number Identification,
Advice of Charge (AoC), Closed User Groups (CUGs), supplementary services data (USSD)
25. Describe the Architecture of GSM ?
The GSM architecture is made up of three central systems. The following are the primary
components of the GSM architecture:
1. BSS : BSS stands for Base Station Subsystem. BSS handles traffic and signaling between a
mobile phone and the network switching subsystem. BSS having two
components BTS and BSC.
2. NSS : NSS stands for Network and Switching Subsystem. NSS is the core network of GSM.
That carried out call and mobility management functions for mobile phone present in network.
NSS have different components like VLR, HLR and EIR.
3. OSS : OSS stands for Operating Subsystem. OSS is a functional entity which the network
operator monitor and control the system. OMC is the part of OSS. Purpose of OSS is to offer
the customer cost-effective support for all GSM related maintenance services.
MS : MS stands for Mobile System. MS comprises user equipment and software needed for communication with
a mobile network.
BTS : BTS stands for Base Transceiver Station which facilitates wireless communication
between user equipment and a network. Every tower has BTS.
BSC : BSC stands for Base Station Controller. BSC has multiple BTS. You can consider
the BSC as a local exchange of your area which has multiple towers and multiple towers
have BTS.
MSC : MSC stands for Mobile Switching Center. MSC is associated with communication
switching functions such as call setup, call release and routing. Call tracing, call forwarding
all functions are performed at the MSC level. MSC is having further components like
VLR, HLR, AUC, EIR and PSTN.
VLR : VLR stands for Visitor Location Register. VLR is a database which contains the
exact location of all mobile subscribers currently present in the service area of MSC. If you
are going from one state to another state then your entry is marked into the database of
VLR.
HLR : HLR stands for Home Location Register. HLR is a database containing pertinent
data regarding subscribers authorized to use a GSM network.. If you purchase SIM card
from in the HLR. HLR is like a home which contains all data like your ID proof, which
plan you are taking, which caller tune you are using etc.
OMC : OMC stands for Operation Maintenance Center. OMC monitor and maintain the
performance of each MS, BSC and MSC within a GSM system.
AUC : AUC stands for Authentication Center. AUC authenticates the mobile subscriber
that wants to connect in the network.
EIR : EIR stands for Equipment Identity Register. EIR is a database that keeps the record
of all allowed or banned in the network. If you are banned in the network them you can’t
enter the network, and you can’t make the calls.
PSTN : PSTN stands for Public Switched Telephone Network. PSTN connects with MSC.
PSTN originally a network of fixed line analog telephone systems. Now almost entirely
digital in its core network and includes mobile and other networks as well as fixed
telephones. The earlier landline phones which places at our home is nothing but PSTN.
In GSM architecture there is one component called BSC. But in GPRS there is one component is added to BSC called
PCU. PCU stands for Packet Control Unit. If signal comes to BSC and that signal contains data, then PCU routes to the
SGSN. Interface is used between BSC and PCU is FRI interface. After signal comes to SGSN, it delivers the data packet
to the GGSN. GGSN routes the data packet to the data network (PDN- Predefined Data Network).
Task of SGSN :
1. Packet Delivery
2. Mobility management
apply/ sign off of terminals
localization
3. LLC (Logical Link Control) management
4. Authentication
5. billing
Task of GGSN :
1. Mediator between GPRS between backbone and external data networks.
2. Saves current data for the SGSN address of the participant as well as their profile and data for
authentication and invoice.
29. Describe UMTS ?
Universal mobile telecommunication system (UMTS) refers to the third generation (3G) mobile network built on the
global GSM standard, compatible with data transfer up to 2 megabits per second.
UMTS Applications
Streaming / Download (Video, Audio)
Videoconferences.
Fast Internet / Intranet.
Mobile E-Commerce (M-Commerce)
Remote Login
Background Class applications
Multimedia-Messaging, E-Mail
FTP Access
Mobile Entertainment (Games)
Advantages of UMTS
UMTS could be a successor to 2G based GSM advances counting GPRS and EDGE . Gaining
a 3rd title 3GSM since it could be a 3G relocation for GSM
Support 2Mbit/s information rates.
Higher Information rates at lower incremental costs.
Benefits of programmed universal wandering also necessarily security and charging capacities,
permitting administrators emigrate from 2G to 3G whereas holding numerous of their existing
back-office frameworks
Gives administrators the adaptability to present unused mixed media administrations to trade
clients and buyers
This not as it were gives client a valuable phone but moreover deciphers higher incomes for
the administrator.
Disadvantages of UMTS
It is more expensive than GSM.
Universal Mobile Telecommunication System has poor video experience.
Universal Mobile Telecommunication System still not broadband.
Mobile switching centre (MSC): This was essentially the same as that within GSM, and it
managed the circuit switched calls under way.
Gateway MSC (GMSC): This was effectively the interface to the external networks.
Serving GPRS Support Node (SGSN): As the name implies, this entity was first developed when
GPRS was introduced, and its use has been carried over into the UMTS network architecture. The
SGSN provided a number of functions within the UMTS network architecture.
Gateway GPRS Support Node (GGSN): Like the SGSN, this entity was also first introduced into
the GPRS network. The Gateway GPRS Support Node (GGSN) was the central element within the
UMTS packet switched network. It handled inter-working between the UMTS packet switched network
and external packet switched networks, and could be considered as a very sophisticated router. In
operation, when the GGSN received data addressed to a specific user, it checked if the user was
active and then forwarded the data to the SGSN serving the particular UE.
Equipment identity register (EIR): The EIR was the entity that decided whether a given UE
equipment could be allowed onto the network. Each UE equipment had a number known as the
International Mobile Equipment Identity. This number, as mentioned above, was installed in the
equipment and was checked by the network during registration.
Authentication centre (AuC) : The AuC was a protected database that contained the secret key
also contained in the user's USIM card.
31. Describe SDR (Software Defined Radio) ?
A software defined radio is one that can be configured to any radio or frequency standard through the use of software.
The phone should automatically switch from operating on CDMA frequency to a TDMA frequency whenever it is
required.
The user can download Digital Signal Processing Software (DSPS) describing the desired elemental components with
Digital Signal Processing Hardware (DSPH) of only 1 terminal.
An SDR is a radio communication system where components that have typically been implemented in hardware such
as mixers, filters, amplifiers, modulators, detectors, are instead implemented in software.
Benefits Of SDR :
SDR gives freedom to user to select the most appropriate air interface to be used based on channel conditions, traffic,
cost.
SDR reduces the amount of software.
It reduces the amount of industrial waste.
An SDR can provide software control of a variety of modulation techniques, wideband or narrowband operations,
security mechanisms.
Software-defined radios have significant utility for cell phone services, which must serve a wide variety of changing
radio protocols in real time.
Advantages:
Unlimited global roaming.
One terminal for many service.
New services provided without needing to upgrade hardware.
Bugs fixed without need to recall the product.
32. What are the M-Commerce Applications ?
Mobile Banking: Using a mobile website or application to perform all your banking functions. It
is one step ahead of online banking and has become commonplace these days. For example, in
Nigeria, the majority of banking transactions happen on mobile phones.
Mobile Ticketing and Booking: Making bookings and receiving your tickets on the mobile. The
digital ticket or boarding pass is sent directly to your phone after you make the payment from it.
Even in India now IRTC and other services provide m-ticketing services.
E-bills: This includes mobile vouchers, mobile coupons to be redeemed and even loyalty points
or cards system.
Auctions: Online auctions having now been developed to be made available via mobile phones as well.
Stock Market Reports and even stock market trading over mobile applications.
33. Advantages and Disadvantages of M-Commerce ?
Advantages:
It provides a very convenient and easy to use the system to conduct business transactions.
Mobile commerce has a very wide reach. A huge part of the world’s population has a mobile phone in
their pocket. So the sheer size of the market is tremendous.
M-commerce also helps businesses target customers according to their location, service provider, the
type of device they use and various other criteria. This can be a good marketing tool.
The costs of the company also reduced. This is due to the streamlined processes, now transaction cost,
low carrying cost and low order processing cost as well.
Disadvantages:
The existing technology to set up an m-commerce business is very expensive. It has great start-
up costs and many complications arise.
In developing countries, the networks and service providers are not reliable. It is not most suitable for
data transfer.
Then there is the issue of security. There are many concerns about the safety of the customer’s private
information. And the possibility of a data leak is very daunting.
1. Mobile commerce applications: A content provider implements an application by providing two sets of programs:
client-side programs, such as a user interface on a micro browser, and server-side programs, such as database accesses
and updating.
2. Mobile stations: Mobile stations present user interfaces to the end users, who specify their requests on the interfaces.
The mobile stations then relay user requests to the other components and display the processing results later using the
interfaces.
3. Mobile middleware: The major purpose of mobile middleware is to seamlessly and transparently map Internet
contents to mobile stations that support a wide variety of operating systems, mark up languages, micro browsers, and
protocols. Most mobile middleware also encrypts the communication in order to provide some level of security for
transactions.
4. Wireless networks: Mobile commerce is possible mainly because of the availability of wireless networks. User
requests are delivered to either the closest wireless access point (in a wireless local area network environment) or a base
station (in a cellular network environment).
5. Wired networks: This component is optional for a mobile commerce system. However, most computers (servers)
usually reside on wired networks, such as the Internet, so user requests are routed to these servers using transport and/or
security mechanisms provided by wired networks.
6. Host computers: This component is similar to the one used in electronic commerce, which includes three kinds of
software. User requests are generally acted upon in this component.
35. What is B2C ?
B2C, short for “business-to-consumer”, is a commerce model between a business and an individual consumer. While B2C
applies to any type of direct-to-consumer selling, it has come to be associated with running an online store, also known as
ecommerce or retailing. Advantages of B2C application are :
• Purchasing is faster and more convenient.
• Prices change instantaneously as per the market requirements.
36. What are the B2C Applications ?
37. What is B2B ?
B2B (business-to-business), a type of electronic commerce (e-commerce), is the exchange of products, services or
information between businesses, rather than between businesses and consumers (B2C). A B2B transaction is conducted
between two companies, such as wholesalers and online retailers.
38. What are the B2B Applications ?
etc.
44.