Mobile Computing
Mobile Computing
Introduction – UNIT 1
❖ Mobile Computing
➢ Mobile Computing Vs Wireless Networking
➢ Applications
➢ Characteristics
➢ Structure
❖ MAC Protocols
➢ Wireless MAC Issues
➢ Fixed Assignment Schemes
➢ Random Assignment Schemes
➢ Reservation Based Schemes
Mobile computing
• Mobile Computing is a technology that allows transmission of data, voice and
video via a computer or any other wireless enabled device without having to be
connected to a fixed physical link.
• Mobile Computing is the use of portable computing devices conjunction with
mobile communications technologies to enable users to access the Internet and
data on their home or work computers from anywhere in the world.
• It provides decentralized (distributed) computations on diversified devices, systems,
and networks, which are mobile, synchronized, and interconnected via mobile
communication standards and protocols.
The main concept involves
➢ Mobile communication
➢ Mobile hardware
➢ Mobile software
Mobile communication
• It refers to a form of communications which does not depend on a physical
connection between the sender and receiver.
• These would include devices such as protocols, services, bandwidth, and portals
necessary to facilitate and support the stated services.
• That is, the signals are carried over the air to intended devices that are capable of
receiving and sending similar kinds of signals.
• the devices are fixed at a position, and they are connected through a physical link
to communicate with other devices. (Desktop Computer.)
• the devices are fixed at a position, and they are connected through a wireless link
to make communication with other devices.(WiFi router)
• some devices are wired, and some are mobile. They altogether make communication
with other devices.(Laptops)
• the devices can communicate with each other irrespective of their position. They can
also connect to any network without the use of any wired device.(WiFi Dongle.)
Mobile Hardware
• Mobile hardware includes mobile devices or device components that receive or
access the service of mobility. They would range from portable laptops, smart
phones, tablet Pc's, Personal Digital Assistants(PDA).
• These devices will have a receptor medium that is capable of sensing and receiving
signals. These devices are configured to operate in full- duplex, whereby they are
capable of sending and receiving signals at the same time.
Mobile software :
• Mobile software is the actual program that runs on the mobile hardware. It deals
with the characteristics and requirements of mobile applications. This is the engine of
the mobile device. In other terms, it is the operating system of the appliance. It's the
essential component that operates the mobile device.
• Programming languages are used for mobile system software. Operating system
functions to run the software components onto the hardware. Middleware
components deployment. Layered structure arrangement of mobile computing
components is used. Protocols and layers are used for transmission and reception
Programming Languages :
• C and C++
• Visual C++
• Visual Basic
• Java - J2SE.
• J2ME (Java2 Micro edition)
• JavaCard (Java for smart card)
Operating System:
❖ Symbian OS, Window CE, Mac OS are the operating systems used in
Mobile computing applications.
❖ It offers the user to run an application without considering the hardware
specifications and functionalities.
❖ It provides functions which are used for scheduling the multiple tasks in a system.
It provides the functions required for the synchronization of multiple tasks in the
system.
❖ It uses multiple threads synchronization and priority allocation. Management
functions (such as creation, activation, deletion, suspension, and delay) are used
for tasks and memory.
❖ It provides Interfaces for communication between software components at the
application layer, middleware layers, and hardware devices.
❖ It facilitates the execution of software components on diversified hardware
❖ It provides Configurable libraries for the GUI (graphic user interface) in the device.
❖ It provides User application‘s GUIs, VUI (voice user interface) components, and
phone API.
❖ It provides the device drivers for the keyboard, display, USB, and other devices.
Middleware :
• Software components that link the application components with the network-
distributed components.
• It is used to discover the nearby device such as Bluetooth. It is used to discover the
nearby hot spot for achieving device synchronization with the server or an enterprise
server.
• It is used for retrieving data (which may be in Oracle or DB2) from a network
database. It is used for service discovery at network.
• It is used for adaptation of the application to the platform and service availability
Presentation layer:
➢ Top most level of mobile computing application.
➢ Good user interface that is responsible to produces the results in a meaningful manner.
➢ Run on client side.
➢ Compatible with browser and customized client application.
• Eg : amazon, flipkart
Application layer:
Data layer :
MAC PROTOCALS :
Protocols :
• It is a set of rules that need to be followed by the communicating parties in order to
have successful and reliable data communication.
• Each protocols has its own method of how data is formatted when sent and what to do
with it once received, how that data is compressed or how to check for errors in data.
MAC:
• In the below shown diagram, RTS (request to send )message from B reaches A but not
C. However, both B and C are within range of A. CTS(clear to send) message containing
duration of data transmission from B to A, reaches C. Thus C knows some hidden
station is using channel and does not transmit until that duration is over.
Problem Illustration
• Suppose that there are four stations labelled STA, STB, STC, and STD, where STB
and STC are transmitters while STA and STD are receivers at some slot of time.
The stations are in a configuration such that the two receivers STA and STD are out
of radio range of each other, but the two transmitters STB and STC are in radio
range of each other.
• The above diagram shows that a transmission is going on from STB to STA. STC falsely
concludes that the above transmission will cause interference and so stops its
transmission attempts to STD. However, the interference would not have occurred since
the transmission from STC to STD is out of range of STB. This prevention of
transmission is called exposed terminal problem.
• the communication channel is divided into fixed time slots, and each device is assigned
a specific time slot for its transmissions. This ensures that each device gets a fair share
of the channel and reduces the likelihood of collisions.
• It allows the user to use multiple channels based on different time slots.
• All sources are uses the same channel but it will wait for time slots.
• TDMA technology was more popular in Europe, Japan and Asian countries
• CDMA is widely used in North and South America. But now a days both technologies
are very popular through out of the world
Advantages of TDMA :
• TDMA can easily adapt to transmission of data as well as voice communication.
• TDMA has an ability to carry 64 kbps to 120 Mbps of data rates.
• TDMA allows the operator to do services like fax, voice band data, and SMS as well as
bandwidth-intensive application such as multimedia and video conferencing.
Disadvantages of TDMA:
• Disadvantage using TDMA technology is that the users has a predefined time slot.
When moving from one cell site to other, if all the time slots in this cell are full the user
might be disconnected.
• Another problem in TDMA is that it is subjected to multipath distortion. To overcome
this distortion, a time limit can be used on the system. Once the time limit is expired
the signal is ignored.
FDMA :
• Frequency Division Multiple Access
• The communication channel is divided into fixed frequency channels, and each device
is assigned a specific frequency channel for its transmissions. This ensures that each
device gets a dedicated frequency band and reduces the likelihood of interference.
• Code Division Multiple Access (CDMA) is a digital wireless technology that uses
spread-spectrum techniques. CDMA does not assign a specific frequency to each user.
Instead, every channel uses the full available spectrum.
Advantages
• Increased user capacity is an advantage of the CDMA as it supports a lot more users
in comparison to TDMA or FDMA.
• CDMA is more secure as the information transmitted is below the noise floor making
the intrusion of the spectrum difficult.
• CDMA systems have comparatively fewer dropouts than GSM. Thus, it can also be
used in rural areas.
• The cost of the calls in CDMA is lower in comparison to the cost in GSM.
• CDMA provides a high quality of voice with almost no noise during the calls.
• Using CDMA problems like multipath and fading do not occur.
• CDMA has a very low power requirement.
Disadvantages
• CDMA lacks the facility of international roaming which is provided by GSM.
• Since there is no limit to the number of users the system performance degrades with
an increase in the number of users.
• Self-jamming problem occurs in CDMA systems because of loss of orthogonality.
• The problem of channel pollution occurs in CDMA systems which thus degrades the
quality of audio.
• Since most of the mobile companies use GSM thus there is a lack of handsets for
CDMA technology.
• When any station transmits the data frame to a channel, the pure Aloha waits for the
receiver's acknowledgment. If it does not acknowledge the receiver end within the
specified time, the station waits for a random amount of time, called the backoff time
(Tb). And the station may assume the frame has been lost or destroyed. Therefore, it
retransmits the frame until all the data are successfully transmitted to the receiver.
Slotted Aloha:
• The slotted Aloha is designed to overcome the pure Aloha's efficiency because pure
Aloha has a very high possibility of frame hitting. In slotted Aloha, the shared channel
is divided into a fixed time interval called slots. So that, if a station wants to send a
frame to a shared channel, the frame can only be sent at the beginning of the slot,
and only one frame is allowed to be sent to each slot. And if the stations are unable
to send data to the beginning of the slot, the station will have to wait until the
beginning of the slot for the next time. However, the possibility of a collision remains
when trying to send a frame at the beginning of two or more station time slot.
CSMA
• It is a carrier sense multiple access based on media access protocol to sense the
traffic on a channel (idle or busy) before transmitting the data. It means that if the
channel is idle, the station can send data to the channel. Otherwise, it must wait until
the channel becomes idle. Hence, it reduces the chances of a collision on a
transmission medium.
❖ 1-Persistent
❖ Non-Persistent
❖ P-Persistent
❖ O- Persistent
❖ 1-Persistent: In the 1-Persistent mode of CSMA that defines each node, first sense the
shared channel and if the channel is idle, it immediately sends the data. Else it must
wait and keep track of the status of the channel to be idle and broadcast the frame
unconditionally as soon as the channel is idle.
❖ Non-Persistent: It is the access mode of CSMA that defines before transmitting the
data, each node must sense the channel, and if the channel is inactive, it
immediately sends the data. Otherwise, the station must wait for a random time
(not continuously), and when the channel is found to be idle, it transmits the frames.
• If the frame is successfully received, the station sends another frame. If any collision
is detected in the CSMA/CD, the station sends a jam/ stop signal to the shared
channel to terminate data transmission. After that, it waits for a random time before
sending a frame to a channel.
CSMA/ CA
• If the station receives only a single (own) acknowledgments, that means the data
frame has been successfully transmitted to the receiver. But if it gets two signals (its
own and one more in which the collision of frames), a collision of the frame occurs in
the shared channel. Detects the collision of the frame when a sender receives an
acknowledgment signal.
• In the reservation schemes, a node makes explicit reservation of the channel for an
entire call before transmitting. This is analogous to a connection based packet-
switching scheme.
• reservation-based MAC schemes are suitable to handle calls with widely varying traffic
characteristics.
❖ Polling
➢ Polling cycle
➢ Hub polling
❖ Token bus
Polling
• Polling is the process where the computer or controlling device waits for an external
device to check for its readiness or state, often with low-level hardware.
• For example, when a printer is connected via a parallel port, the computer waits until
the printer has received the next character. These processes can be as minute as only
reading one bit.
• Polling is sometimes used synonymously with busy-wait polling. In this situation, when
an I/O operation is required, the computer does nothing other than check the status of
the I/O device until it is ready, at which point the device is accessed. In other words,
the computer waits until the device is ready. Polling also refers to the situation where a
device is repeatedly checked for readiness, and if it is not, the computer returns to a
different task. Although not as wasteful of CPU cycles as busy waiting, this is generally
not as efficient as the alternative to polling, interrupt-driven I/O.
Algorithm
• In roll call polling, the polling device or process queries each element on a list in a
fixed sequence. Because it waits for a response from each element, a timing mechanism
is necessary to prevent lock-ups caused by non-responding elements. Roll call polling
can be inefficient if the overhead for the polling messages is high, there are numerous
elements to be polled in each polling cycle and only a few elements are active.
• In hub polling, also referred to as token polling, each element polls the next element in
some fixed sequence. This continues until the first element is reached, at which time
the polling cycle starts all over again.
• Polling can be employed in various computing contexts in order to control the execution
or transmission sequence of the elements involved. For example, in multitasking
operating systems, polling can be used to allocate processor time and other resources
to the various competing processes. In networks, polling is used to determine which
nodes want to access the network. It is also used by routing protocols to retrieve routing
information, as is the case with EGP (exterior gateway protocol).
• An alternative to polling is the use of interrupts, which are signals generated by devices
or processes to indicate that they need attention, want to communicate, etc. Although
polling can be very simple, in many situations (e.g., multitasking operating systems) it
is more efficient to use interrupts because it can reduce processor usage and/or
bandwidth consumption.
Token Bus :
• Token Bus is described in the IEEE 802.4 specification, and is a Local Area Network
(LAN) in which the stations on the bus or tree form a logical ring. Each station is
assigned a place in an ordered sequence, with the last station in the sequence being
followed by the first, as shown below. Each station knows the address of the station to
its "left" and "right" in the sequence.
• This type of network, like a Token Ring network, employs a small data frame only a
few bytes in size, known as a token, to grant individual stations exclusive access to the
network transmission medium. Token-passing networks are deterministic in the way
that they control access to the network, with each node playing an active role in the
process. When a station acquires control of the token, it is allowed to transmit one or
more data frames, depending on the time limit imposed by the network.
Token Bus Network
• When the station has finished using the token to transmit data, or the time limit has
expired, it relinquishes control of the token, which is then available to the next station
in the logical sequence. When the ring is initialized, the station with the highest number
in the sequence has control of the token. The physical topology of the network is either
a bus or a tree, although the order in which stations are connected to the network is not
important.