Ch1-Mobile Computing
Ch1-Mobile Computing
Ch1-Mobile Computing
The cellular wireless Generation (G) generally refers to a change in the nature of the
system, speed, technology and frequency. Each generation have some standards,
capacities, techniques and new features which differentiate it from the previous one.
The fourth Generation mobile system was introduced in the late 2000s and was all IP
based network system. The main goal of 4G technology is to provide high speed, high
quality, high capacity, security and low cost services for voice and data services,
multimedia and internet over IP.The reason for the transition to all IP is to have a
common platform to all the technologies developed so far. It has the capability
100Mbps and 1Gbps of .To use 4G mobile network, multimode user terminals should
be able to select the target wireless system. To provide wireless services anytime and
anywhere, terminal mobility is a key factor in 4G.Terminal mobility implies
automatic roaming between different wireless networks. The 4G technology integrate
different existing and future wireless technologies(e.g. OFDM, MC-CDMA, LAS-
CDMA and Network-LMDS) to provide freedom of movement and uninterrupted
roaming from one technology to another.LTE(Long Term Evolution) and
WiMAX(Wireless Interoperability for Microwave Access) are considered as 4G
technologies
The frequency reuse concept led to the development of cellular technology as originally
conceived by AT&T and Bell Labs way back in 1947. The essential characteristics of this
reuse are as follows:
The area to be covered is subdivided into radio zones or cells (Figure 1.1).Though in
reality these cells could be of any shape, for convenient modeling purposes these are
modeled as hexagons. Base stations are positioned at the center of these cells.
Each cell i receives a subset of frequencies fbi from the total set assigned to the
respective mobile network. To avoid any type of co-channel interference, two
neighboring cells never use the same frequencies.
Only at a distance of D (known as frequency reuse distance), the same frequency
from the set fb, can be reused. Cells with distance D from cell i; can be assigned
one or all the frequencies from the set fbi belonging to cell i
When moving from one cell to another during an ongoing conversation, an automatic
channel change occurs. This phenomenon is called handover. Handover maintains an
active speech and data connection over cell boundaries.
The regular repetition of frequencies in cells result in a clustering of cells. The clusters
generated in this way can consume the whole frequency band. The size of a cluster is
2 G.P. Porbandar Prepared By: Mehul Gundaliya
Introduction to Mobile Computing
defined by k, the number of cells in the cluster. This also defines the frequency reuse
distance D. Figure 1.1 shows an example of cluster size of 4.
This unwanted signal is called noise. Noise is a random signal that exists in a
communication system.
Noise may be put into following two categories.
1. External noises, i.e. noise whose sources are external.
External noise may be classified into the following three types:
i. Atmospheric noises
ii. Extraterrestrial noises
iii. Man-made noises or industrial noises.
2. Internal noise in communication, i.e. noises which get, generated within the receiver
or communication system.
Internal noise may be put into the following four categories.
i. Thermal noise or white noise or Johnson noise
ii. Shot noise.
iii. Transit time noise
iv. Miscellaneous internal noise.
External noise cannot be reduced except by changing the location of the receiver or the
entire system. Internal noise on the other hand can be easily evaluated Mathematically
and can be reduced to a great extent by proper design. As already said, because of the fact
that internal noise can be reduced to a great extent, study of noise characteristics is a very
important part of the communication engineering.
GSM (Global System for Mobile Communication) and CDMA (Code Division Multiple
Access) are two dominant technologies for mobile communication. These two
technologies differ in the way calls and data travel over the mobile phone networks take
place. On comparing both the technologies GSM has some limitation when the call
quality is concerned but still has more flexibility and an easy implementation relative to
the CDMA technology. The major difference between the two lies in terms of the
technology they use, security factors, their global reach and the data transfer speeds.
Difference between GSM and CDMA are:
GSM CDMA
Stands for Global System for Mobile Code Division Multiple Access
communication
Storage Type SIM (subscriber identity Internal Memory
module) Card
Global market 75% 25%
share
Frequency Multiple (850/900/1800/1900 Single (850 MHz)
band MHz)
Dominance Dominant standard worldwide Dominant standard in the U.S.
except the U.S.
Data transfer GPRS/EDGE/3G/4G/LTE EVDO/3G/4G/LTE
Network Every cell has a corresponding There is one physical channel and
network tower, which serves the a special code for every device in
mobile phones in that cellular the coverage network. Using this
area. code, the signal of the device is
multiplexed, and the same
physical channel is used to send
the signal.
International Most Accessible Less Accessible
roaming
Network SIM specific. User has option to Handset specific
service select handset of his choice.
1.6 Basics of GSM architecture and services like voice call, SMS, MMS, LBS, VAS
GSM is based on a set of standards, formulated in the early 1980s. In 1982, the
Conference of European Posts and Telegraphs (CEPT) formed a study group called the
Groupe Special Mobile ( GSM) to study and develop a pan-European mobile system,
which was later rechristened as Global System for Mobile Communication. The proposed
GSM system had to meet certain business objectives.
GSM uses a combination of FDMA (Frequency Division Multiple Access) and TDMA
(Time Division Multiple Access). The GSM system has an allocation of 50 MHz
(890-915 MHz and 935-960 MHz) bandwidth in the 900 MHz frequency band. Using
FDMA, this band is divided into 124 ( 125 channels, 1 not used) channels each with a
carrier bandwidth of 200 KHz. Using TDMA, each of these channels is then further
divided into 8 time slots. Therefore, with the combination of FDMA and TDMA we can
realize a maximum of 992 channels for transmit and receive. In order to be able to serve
hundreds of thousands of users, the frequency must be reused. This is done through cells.
GSM ENTITIES:
The GSM technical specifications define different entities that form the GSM network by
defining their functions and interface requirements. The GSM network can be divided
into four main groups.
The Mobile Station (MS). This includes the Mobile Equipment (ME) and the
Subscriber Identity Module (SIM).
The Base Station Subsystem (BSS). This includes the Base Transceiver Station
(BTS) and the Base Station Controller (BSC).
The Network and Switching Subsystem (NSS). This includes Mobile Switching
Center (MSC), Home Location Register (HLR), Visitor Location Register (VLR),
Equipment Identity Register (EIR), and the Authentication Center (AUC).
The Operation and Support Subsystem (OSS). This includes the Operation and
Maintenance Center (OMC).
I) Mobile Station
Mobile Station is the technical name of the mobile or the cellular phone. In early days
mobile phones were a little bulky and were sometimes installed in cars like other
equipments. Even the handheld terminals were quite big. Though the phones have
become smaller and lighter, they are still called Mobile Stations. MS consists of two
main elements:
• The mobile equipment or the mobile device. In other words, this is the phone
without the SIM card.
• The Subscriber Identity Module (SIM).
Base Station Controller is the connection between the BTS and the Mobile service
Switching Center (MSC). The BSC manages the radio resources for one or more
BTSs. It handles handovers, radio-channel setup, control of radio frequency power
levels of the BTSs, exchange function, and the frequency hopping.
The MSC together with Home Location Register (HLR) and Visitor Location Register
(VLR) databases, provide the call-routing and roaming capabilities of GSM. The HLR
is considered a very important database that stores information of subscribers
belonging to the covering area of a MSC.
The VLR can be considered a temporary copy of some of the important information
stored in the HLR. VLR is similar to a cache, whereas HLR is the persistent storage.
The VLR contains selected administrative information borrowed from the HLR,
necessary for call control and provisioning of the subscribed services. This is true for
each mobile currently located in the geographical area controlled by a VLR.
When initiating a call, a mobile telephone attempts to gain service from the GSM
system by transmitting a system access request and indicating the access request is a
call origination type. The access type is indicated by a 3-bit code that is contained in
the access request message.
This figure shows a functional diagram of how a mobile telephone initiates a call to a
GSM network.
Mobile Terminated call or Mobile call reception is the process of the GSM system
sending paging messages on a paging control channel to alert mobile devices that they
are receiving a call. Mobile devices listen for paging messages with their
identification code (IMSI number or TMSI) on a paging channel.
Today SMS is the most popular data bearer/service within GSM with an average of
one billion SMS messages (at the end of 2002) transacted every day around the world,
with a growth of on an average half a billion every month. The SS=#=7 signaling
channels are always physically present but mostly unused, be it during an active user
connection or in the idle state. It is, therefore, quite an attractive proposition to use
these channels for transmission of used data. SMS uses the free capacity of the
signaling channel. Each short message is up to 160 characters in length when 7-bit
English characters are used. It is 140 octets when 8-bit characters (some European
alphabets) are used, and 70 characters in length when non-Latin alphabets such as
Arabic, Chinese or Hindi are used (70 characters of 16 bit Unicode).
SMS are basically of two types, SM MT (Short Message Mobile Terminated Point-to-
Point), and SM MO (Short Message Mobile Originated Point-to-Point). SM MT is an
incoming short message from the network side and is terminated in the MS. SM MO
is an outgoing message, originated in the user device (MS), and forwarded to the
network for delivery. For outgoing message, the path is from MS to SC via the VLR
and the IWMSC function of the serving MSC, whereas for incoming message the path
is from SC to the MS via HLR and the GMSC function of the home MSC.
In the third generation of messaging, the message content will be multimedia objects.
This is called Multimedia Messaging Service or MMS in short. An MMS message can
contain formatted text, graphics, data, animations, images, audio clips, voice
transmissions and video sequences.
Though MMS is targeted for the 3G networks, it can work under a 2G or 2.5G
network as well. All it needs is a MMS handset and the MMS infrastructure.
A location-based service (LBS) is a service that uses location data to control features.
Most of Location Based Services require several components.
1. Positioning systems – allow geographically localizing the mobile device both
outdoor and indoor using: satellite-based systems, Cell-ID, RFID, Bluetooth,
WiMax, Wireless LANs.
2. Communication Network – the wireless network that allows for transfer of data
between user (thought mobile device) and server (service provider). Nowadays it
is in most cases wireless internet (e.g. GPRS, 3G, 4G)
3. Service and Application Provider – the LBS provider, including the software
(e.g. GIS) and other distributed services and components that are used to resolve
the query and provide the tailored response to the user.
4. Data and Content Provider – service providers will usually not store and
maintain all the information, which can be requested by users. Therefore
geographic base data and location information data will be usually requested from
the maintaining authority (e.g. mapping agencies) or business and industry
partners (e.g. yellow pages, traffic companies).
5. Mobile Devices – any portable device that has capabilities to utilize stated above
components of LBS, for example: mobile phones (including smartphones), tablets,
palmtops, personal navigation devices, laptops etc.
Applications of LBS:
Marketing
Emergency
Information Services
Navigation
Location Based Social Media
Mobile Location-Based Gaming
Sports
Billing
Geotagging
Tracking
Augmented Reality
1.8 Architecture of Mobile Computing(3 tier)
system interface where user services (such as session, text input, dialog and display
management) reside. The second tier is the Process Management or Application Tier.
This layer is for application programs or process management where business logic and
rules are executed. This layer is capable of accommodating hundreds of users.