Mobile Computing
Mobile Computing
Mobile Computing Architecture refers to the design of systems and frameworks that allow
mobile devices (such as smartphones, tablets, and laptops) to communicate and interact with
data and other devices over various networks. These systems are typically comprised of several
key components, each serving specific purposes to facilitate mobile communication and data
processing.
Mobile devices are portable computing devices that are capable of connecting to the internet
and other networks. Examples include smartphones, laptops, tablets, and smartwatches. These
devices are typically equipped with a combination of hardware and software to enable mobile
computing.
● Hardware Components:
○ CPU/Processor: Handles the main computational tasks and operations of the
device.
○ Memory: RAM and storage (internal and external), used for running apps and
storing data.
○ Battery: Powers the device, which is crucial for mobile computing as these
devices rely on battery power.
○ Display: Screens that provide user interaction, such as touchscreens.
○ Sensors: GPS, accelerometers, gyroscopes, proximity sensors, etc., which
enable various mobile functionalities.
○ Communication Modules: Cellular radios, Wi-Fi, Bluetooth, and NFC are
included to facilitate communication with external networks and other devices.
● Software Components:
○ Operating System: The software platform that manages hardware resources
and provides a user interface. Examples include Android, iOS, and Windows.
○ Mobile Applications: The software programs that perform specific tasks or
provide services to users. Examples include browsers, social media apps, and
email clients.
The wireless network is the backbone that allows mobile devices to connect to the internet and
communicate with other devices or servers. The connectivity can be provided through a variety
of wireless technologies, which include:
● Wi-Fi (Wireless Fidelity): Provides wireless internet access in local areas. It operates
on a local area network (LAN) using radio waves. Wi-Fi is often used in homes, offices,
and public spaces like cafes and airports.
● Cellular Networks (3G, 4G, 5G): Cellular networks provide connectivity for mobile
devices over wide geographical areas. These networks use cellular towers to transmit
and receive data. The key generations include:
○ 3G: Introduced faster internet speeds and multimedia services.
○ 4G: Introduced broadband-like speeds, making it possible to stream
high-definition video and play real-time games.
○ 5G: Provides ultra-fast internet with high bandwidth and low latency, enabling
technologies like autonomous vehicles, augmented reality (AR), and the Internet
of Things (IoT).
● Bluetooth: A short-range wireless technology for connecting devices such as wireless
earphones, fitness trackers, or keyboards to mobile devices. It has low power
consumption and is used for local data exchange.
● Near Field Communication (NFC): A short-range communication technology used for
payment systems, data transfer, and device pairing.
Back-end servers or cloud platforms are the infrastructure that stores data, processes requests
from mobile devices, and provides services to support mobile applications. These servers
typically perform the following functions:
● Data Storage: Store user data, settings, media, and other types of information.
● Processing: Perform complex calculations, analytics, or business logic that is too
resource-intensive to be done on the mobile device.
● Cloud Services: Mobile devices interact with cloud platforms such as Amazon Web
Services (AWS), Google Cloud, and Microsoft Azure, which offer scalable resources
for data storage, computing, and analytics. This allows mobile apps to offload
computation-heavy tasks and access data remotely.
● APIs: Provide communication interfaces for mobile apps to interact with back-end
systems and other services.
The three-tier architecture is a common model used in mobile computing systems. This
architecture divides the system into three layers, with each layer responsible for specific tasks:
Mobile computing over the internet is the ability of mobile devices to connect to and utilize
internet-based services. It is a fundamental aspect of the Internet of Things (IoT), as mobile
devices frequently serve as access points for users to interact with online data, services, and
devices. Here’s how mobile computing over the internet operates:
● Wi-Fi: Many mobile devices rely on Wi-Fi networks to access the internet when they are
within range of a wireless access point. Wi-Fi is often the preferred method because it
offers high-speed data transfer with no additional cost beyond the subscription fee for
internet services.
● Mobile Data: Cellular networks, such as 3G, 4G, and 5G, provide internet access in
areas where Wi-Fi is unavailable. These technologies allow mobile devices to connect to
the internet through mobile broadband. 4G/5G networks enable high-speed data
transfer, supporting streaming, video conferencing, and other bandwidth-intensive
activities.
● Bluetooth: While not typically used for general internet access, Bluetooth is useful for
connecting to devices for data exchange or internet sharing (tethering) from another
device.
● Mobile computing enables users to interact with a wide range of IoT devices such as
smart home systems (thermostats, lights, etc.), wearables, autonomous vehicles, and
industrial sensors. By connecting to the internet, mobile devices act as controllers for
remote devices and gateways for data transmission.
3. Design Considerations for Mobile Computing
Designing mobile computing systems requires addressing several unique challenges due to the
constraints and characteristics of mobile devices and wireless networks.
Mobile devices rely on batteries, which limits their operational time. To optimize power
consumption:
Wireless networks typically have limited bandwidth compared to wired networks. To optimize
data transmission:
● Data compression: Reduces the size of data being sent or received, which is crucial for
slow networks.
● Caching: Frequently used data is stored locally on the mobile device so that it can be
accessed without needing a constant connection to the server.
● Optimized communication protocols: Mobile computing systems use efficient
communication protocols (e.g., HTTP/2, WebSockets) to reduce the overhead and
improve the responsiveness of mobile applications.
3.3 Security
Mobile computing systems are vulnerable to various security risks due to the open nature of
wireless networks. Ensuring security is a priority, and several techniques are implemented:
● Encryption: Data transmitted over wireless networks is often encrypted using protocols
like TLS/SSL to prevent interception by unauthorized users.
● Authentication: Mobile apps implement various forms of authentication, including
passwords, biometrics (fingerprint or facial recognition), and two-factor
authentication (2FA).
● Secure storage: Sensitive data is stored securely using encryption on the device or
remote servers, preventing unauthorized access even if the device is lost or stolen.
4. Evolution of Mobile Computing
Mobile computing has evolved significantly over the past few decades. This evolution has been
driven by advancements in wireless communication technologies, hardware capabilities, and
software development.
● First Generation (1G): The earliest mobile networks used analog signals for voice
communication, offering limited capacity and no support for data services.
● Second Generation (2G): Digital networks were introduced, allowing for improved voice
quality, SMS (Short Message Service), and limited data transmission (e.g., GPRS).
● Third Generation (3G): Enabled mobile internet, video calling, and higher-speed data
transmission, leading to the early adoption of smartphones and mobile apps.
● Fourth Generation (4G): With speeds of up to 100 Mbps, 4G allowed users to stream
HD video, play real-time games, and conduct video conferences.
● Fifth Generation (5G): Provides ultra-fast internet speeds (up to 10 Gbps), low latency
(less than 1 ms), and the ability to support massive numbers of devices, which is
essential for the future of IoT, autonomous vehicles, and smart cities.
With the introduction of 5G and future developments in mobile computing, we are likely to see
more sophisticated applications, including augmented reality (AR), virtual reality (VR), and
AI-driven apps that rely on the fast, low-latency characteristics of 5G networks.
Wireless networks have evolved over several generations, with each generation offering
advancements in data speed, connectivity, and capabilities. These generations are categorized
based on the technologies they use and the improvements they bring over previous
generations.
1G (First Generation)
● Technology: 1G networks were based on analog technology. The network architecture
supported voice communication only and was primarily used for mobile phone services.
● Transmission: It used analog frequency modulation (FM) to transmit signals over the
air.
● Applications: Primarily used for voice calls, without the ability to send text messages or
support data services.
● Limitations:
○ Poor voice quality and interference.
○ Limited coverage and handoff between towers.
○ No support for data or mobile internet services.
2G (Second Generation)
Limitations:
● Limited data speeds, suitable only for light internet browsing and email.
● Still lacked high-speed mobile internet and multimedia capabilities compared to modern
technologies.
3G (Third Generation)
Limitations:
● Still had limitations in terms of bandwidth and data speeds when compared to future
generations.
● Could not handle high-definition video streaming or large data consumption efficiently.
4G (Fourth Generation)
Advantages:
● Faster, more reliable internet experience with lower latency (delays in data
transmission).
● Support for advanced applications such as augmented reality (AR) and virtual reality
(VR).
Limitations:
● Deployment and coverage were still not as ubiquitous, especially in rural and less
developed areas.
5G (Fifth Generation)
Benefits:
Technologies
Bluetooth
Advantages:
● Low Power Consumption: BLE is optimized for devices that need to run on batteries
for long periods.
● Range: Typically effective within a 10-100 meter range, depending on the Bluetooth
version.
Limitations:
● Data Transfer Speed: Limited speed and range compared to other wireless
technologies like Wi-Fi and 4G/5G.
Applications:
● Inventory Management: Used in warehouses and stores to track goods and manage
inventory automatically.
● Access Control: RFID cards are used in security systems to control access to buildings
or restricted areas.
● Contactless Payments: RFID is used in credit cards and mobile wallets for secure,
tap-based payments.
Advantages:
● No Line of Sight Required: Unlike barcodes, RFID tags don’t need to be directly visible
to be read.
● Real-Time Tracking: Enables real-time inventory tracking and management.
Wireless Broadband
● Technology: Wireless broadband provides internet access via wireless signals instead
of physical wired connections.
● Types of Wireless Broadband:
○ Wi-Fi: A wireless local area network (WLAN) technology that allows devices to
connect to the internet over short distances within a local area.
○ Cellular Networks (4G/5G): Provide wireless broadband over wide areas using
cellular towers to connect users to the internet.
○ Satellite Internet: Uses satellite technology to provide broadband connectivity in
remote or rural areas where other forms of broadband may be unavailable.
Advantages:
● Mobility: Allows users to stay connected while on the move.
● Convenience: Enables easy internet access in areas without wired infrastructure.
Mobile IP
● Technology: Mobile IP allows users to retain their IP address when moving between
different networks (e.g., switching between Wi-Fi and cellular data), enabling seamless
communication without needing to re-establish connections.
● Key Concepts:
○ Advertisement and Registration: When a device moves to a new network, it
advertises its new location (care-of address) to the home network, ensuring that
data can still be routed to the correct destination.
○ Two-Level Addressing:
■ Home Address: The permanent IP address assigned to the device.
■ Care-of Address: The temporary IP address assigned by the new
network the device connects to.
Challenges:
● Packet Loss: When a device moves between networks, packets may be delayed or lost,
causing disruptions.
● Handover: The process of transferring communication between networks can lead to
delays or dropped connections, affecting real-time applications like video calls.
5G Networking Philosophy
Overview:
● DSDV is a proactive routing protocol for mobile ad-hoc networks (MANETs), designed
to maintain consistent and up-to-date routing information at all times. It relies on periodic
updates and uses distance-vector routing principles to maintain and advertise routes.
● Key Concept: Each node in the network maintains a routing table with the best path to
all known destinations. These tables are periodically updated and advertised to the other
nodes in the network.
Route Advertisement:
● Route Table: Every node in DSDV periodically sends out route advertisements that
contain its routing table. The table includes information about the destination nodes and
the next hop for reaching those nodes.
● Sequence Numbers: Each route in the table is tagged with a sequence number to
differentiate between outdated and newer routes. The sequence numbers help to avoid
routing loops and ensure that only the most recent and valid routes are considered.
● Periodic Updates: Periodic updates are sent to all nodes, ensuring that the network's
routing information remains current and synchronized. This helps nodes to always know
the best path to reach a destination.
Properties:
● Low Mobility Efficiency: DSDV is efficient in scenarios where nodes move infrequently
or at low speeds, as the routing tables are less likely to become outdated quickly.
● High Overhead in Large Networks: The periodic updates generate overhead,
especially in large-scale networks where the number of nodes is substantial. Every node
must send updates periodically, leading to increased control message traffic.
● Latency: While DSDV reduces the time to find routes, the need for periodic updates can
introduce some delay, especially in high-mobility environments.
Overview:
● DSR is an on-demand routing protocol, which means routes are discovered only when
needed, as opposed to proactive protocols like DSDV. It provides dynamic route
discovery and maintenance for MANETs.
● Key Concept: Instead of maintaining a complete routing table, nodes discover routes
only when they need to send data to another node. Once a route is found, it is used for
the duration of the session.
● When a source node needs to communicate with a destination node and doesn't have
an existing route, it initiates Route Discovery.
● Route Request (RREQ): The source node broadcasts a Route Request message that
contains the destination's address. This message is forwarded by intermediate nodes
until it reaches the destination or an intermediate node that already knows a route to the
destination.
● Route Reply (RREP): Once the destination node or a node with a valid route receives
the RREQ, it sends back a Route Reply message containing the complete route. This
reply is forwarded back to the source node.
Route Maintenance:
● Once a route is discovered, it is used until the destination becomes unreachable or the
link fails.
● If a link fails, Route Maintenance messages are sent to inform nodes along the route,
and the source node can initiate a new Route Discovery process if needed.
Multicast Routing:
Properties:
3. MANET Challenges
Scalability:
● Scalability Issues: As the network size increases, the routing overhead of protocols like
DSDV becomes problematic. The number of nodes increases, which in turn increases
the number of route advertisements or route discovery processes, leading to network
congestion and resource depletion.
● Routing Overhead: Large-scale MANETs may require more frequent updates or route
discoveries, which increases the control packet overhead and reduces the efficiency of
the network.
Security:
● Lack of Centralized Control: Since MANETs do not have centralized control (e.g., no
base station or authority), they are more vulnerable to various types of attacks.
○ Sybil Attack: A malicious node can create multiple fake identities (nodes), which
can confuse routing protocols and cause the network to function incorrectly.
○ Black Hole Attack: In this type of attack, a malicious node advertises itself as
having the shortest route to a destination and then drops all data packets,
effectively disrupting communication.
○ Wormhole Attack: A malicious node may record packets from one part of the
network and forward them to another part of the network, which may mislead
routing protocols into thinking there is a valid route when in fact it is
compromised.
Routing Overhead:
● Route Discovery Overhead: In protocols like DSR, where routes are discovered
on-demand, the need to broadcast Route Request messages across the network can
create substantial overhead. In networks with high mobility, the overhead can increase
due to the need for frequent route discoveries.
● Frequent Updates: In proactive protocols like DSDV, the need for periodic updates can
also increase overhead, especially in large networks.
● Overview: FANETs are a subclass of MANETs where the nodes are flying entities such
as drones. These networks have special characteristics compared to traditional MANETs
due to the unique mobility patterns of aerial nodes.
● Challenges: FANETs face challenges like high mobility, communication link instability,
and limited energy resources for flying nodes. These factors make routing and network
management in FANETs more complex.
● Applications: FANETs are used in applications such as surveillance, search and rescue
missions, and environmental monitoring, where drones are used to collect and transmit
data over wide areas.
1. Security Techniques
Authentication Protocols:
● Multi-Factor Authentication (MFA): Requires the user to provide two or more forms of
authentication before granting access to the device or applications. These factors may
include:
1. Something the user knows (password or PIN).
2. Something the user has (a mobile device or smart card).
3. Something the user is (biometric data like fingerprints, face recognition, or iris
scans).
● Biometric Authentication: Uses physical characteristics such as fingerprints, facial
recognition, or iris scans to authenticate the user, offering a higher level of security than
passwords alone.
● Password Security: Strong passwords that adhere to best practices, such as a
combination of letters, numbers, and special characters, are used as the first line of
defense against unauthorized access.
Overview:
App Whitelisting:
● App Whitelisting: Only approved applications can be installed and run on the mobile
device, preventing unauthorized apps, especially potentially harmful ones, from being
installed.
○ Managed App Store: A company-controlled app store can be used to distribute
approved apps, ensuring that all applications comply with the organization's
security policies.
○ Blacklist/Whitelist Systems: In addition to whitelisting, MAM solutions may use
blacklisting to prevent the use of specific applications known to be harmful or
unnecessary.