unit 1 mobile_computing
unit 1 mobile_computing
UNIT-I
Introduction, Issues in mobile computing, Overview of wireless telephony, Cellular
concept, GSM- air interface, channel structure; Location management- HLR-VLR,
hierarchical, handoffs; Channel allocation in cellular systems, CDMA, GPRS, MAC for
cellular system
INTRODUCTION
The rapidly expanding technology of cellular communication, wireless LANs, and
satellite services will make information accessible anywhere and at any time. In the near
future, tens of millions of people will carry a portable palmtop or laptop computer.
Smaller units, often called personal digital assistants or personal communicators, will
run on a batteries and may have only small memory, larger ones will be powerful laptop
computers will be equipped with a wireless connection to the fixed part of the network
and perhaps, to other mobile computers. The main vision for the emerging mobile and
personal communication services and system is to enable communication with a person,
at any time, at any place and in any form.
1
Mobility-Mobility of the system refers to as physical movement of the both user and
terminal
Two types of Mobility
1. User Mobility or Personal Mobility – users communicate (wireless) “anytime,
anywhere, with anyone”. It means that user can access the same service at
different locations. This is the dynamic association between terminal and user.
Example- Roaming and call forwarding.
2. Device or Terminal Mobility- devices can be connected anytime, anywhere to the
network. It means that the mobile terminal can access telecommunication
services from any location even when it is in motion. This shows a static
relationship between the network and the device. Example – Mobile phones.
The mobile computing is used in different context with different names. Some common
names of mobile computing are-
1. Nomadic Computing- The computing environment is nomadic and moves along
with the mobile users.
2
2. Anywhere, Anytime Information- This is the generic definition of ubiquity, where
information is available anywhere, all the time.
3. Virtual Home Environment (VHE) - It is an environment that a user can
experience in an foreign networks as they have in their home network.
4. Pervasive Computing- A computing environment which is pervasive in nature and
can be made available in any environment.
5. Ubiquitous Computing- In this a user will be able to use both local and remote
services.
6. Global Service Portability- Making a service portable and available in every
environment.
3
Mobile and Wireless devices
The following list of given examples of mobile and wireless devices graded by increasing
performance (CPU, memory, display, input devices, etc.)
Sensor: Wireless device is represented by a sensor transmitting state information.
one example could be a switch, sensing the office door.
Embedded Controller: Many applications already contain a simple or sometimes
more complex controller. Keyboards, mouse, headsets, washing machines, coffee
machines, hair dryers and TV sets are just some examples.
Pager: As a very simple receiver, a pager can only display short text messages, has
a tiny display, and cannot send any messages.
Mobile Phone- Mobile phone can send and receive voice, data message.
Personal Digital Assistant: PDAs typically accompany a user and offer simple
versions of office software (calendar, notepad, mail). Pocket computer: The next
steps towards full computers are pocket computers offering tiny keyboards, color
displays, and simple versions of programs found on desktop computers (text
processing, spreadsheets etc.)
Notebook/laptop: Laptops offer more or less the same performance as standard
desktop computers; they use the same software - the only technical difference
being size, weight, and the ability to run on a battery. If operated mainly via a
sensitive display (touch sensitive or electromagnetic), the device are also known
as notepads or tablet PCs.
1. Mobility The ability to change location while connected to the network increases
the volatility of some information due to this there are certain challenges that it
has to face these are:-
(a) Address Migration As people move, their mobile computers will use different
network addresses. Hence the network has to configure itself to the new
environment each time.
(b) Location Management Due to mobility of mobile user or devices changes
frequently. So the following task are to be done:-
(i) Look up’s (Track user’s call)
(ii)Updates (Update user’s position and data)
(c) Security Risk It is so easy to connect wireless link , the security of wireless
communication can be compromised much more easily than that of wired
communication
(d) Heterogeneity:-As the system keeps moving in a variety of environment,
mobile computers encounter more heterogeneous network connections.
5
3. Portability The availability of mobile devices depends on their power supply. A
mobile phone can live up to five days but a laptop can only for few hours.
(a) Low Power. Batteries are the largest single source of weight in a portable
computer. Minimizing power consumption can improve portability by reducing
battery and lengthening the life of a charge.
(b) Risks to Data Making computers portable increases the risk of physical
damage, unauthorized access, loss and theft.
(c) Small User Interface and storage capacity: - For smaller and more portable
devices current windowing techniques are inadequate. It is impractical to have
several windows open at the same time. Storage space on a portable
computer is limited by physical size and power requirements.
6
Communication- Mobile Hosts connect with mobile support station (MSS)
through wireless network. Wireless network does not have the capacity as fixed
network.
Location Flexibility
A user can work without being in a fixed position. Their mobility ensures that they
are able to carry out numerous tasks at the same time and perform their stated
jobs.
Saves Time
The time consumed or wasted while travelling from different locations or to the
office and back, has been slashed.
Enhanced Productivity
Users can work efficiently and effectively from whichever location they find
comfortable. This in turn enhances their productivity level.
Ease of Research
Research has been made easier, since users earlier were required to go to the
field and search for facts and feed them back into the system. It has also made it
7
easier for field officers and researchers to collect and feed data from wherever
they are without making unnecessary trips to and from the office to the field.
Entertainment
Video and audio recordings can now be streamed on-the-go using mobile
computing. It's easy to access a wide variety of movies, educational and
informative material.
Wireless Services
Cellular telephones and pagers
Global Positioning System(GPS)
Cordless Computer peripherals
8
Cordless Telephone Sets.
Satellite Television.
1G (The First Generation):- The first generation of wireless technology uses the
analog technology it support voice traffic. It uses FDMA (Frequency Division
Multiple Access) technology for modulation. Eg- AMPS (Advance Mobile Phone
Service) in US.
10
Wireless Systems Technologies [IMP LONG QUESTION]
(i) GEO: Geostationary Satellite orbits (GEO) is a term for satellite which is
placed in a geostationary orbital slot. These satellite are placed 22300
(approx.) miles up directly above the equator.
(ii) LEO: Low-Earth Orbit Satellite (LEO) systems uses a large number of
satellites each in a circular orbit at a constant attitude of a few hundred
miles.
(iii) MEO: Middle Earth Orbiting Satellite (MEO) operates much like LEO’s
although in slightly higher orbits. MEO satellites orbit a distance between
18000 km and 11000 km.
(i) FDMA: Frequency Division multiple Access (FDMA) is one of the most
common multiplexing procedures. The available frequency band is divided
into channels of equal bandwidth, so that each communication is carried on
a different frequency. With FDMA, each channels can be assigned to only
one users at a time.
3. Digital Technology: All digital cellular services uses multiplexing to enable devices
to share wireless channels. Digital cellular services are being implemented
differently in the US
(v) CDPD: Cellular Digital packet data (CDPD) is specification for supporting
wireless access to the internet and other packet-switched networks.
(vii) WLL: Wireless Local loop (WLL) is basically the use of radio to provide a
telephone connection to the home. It is sometimes called radio.
(viii) GPS: Global Positioning System(GPS) is a system that allow us to figure out
precisely where we are anywhere on the earth.
local some Mbit/s, regional currently, e.g., 9.6kbit/s with GSM .Higher
delays, higher jitter
12
connection setup time with GSM in the second range, several hundred
milliseconds for other wireless systems
13
Space Division Multiplexing (SDM)
This multiplexing scheme is used in old analog telephone system where each subscriber
given a separate pair of copper wires to the local exchange. Another example is FM
radio station where the transmission ranges is limited to certain region.
14
Advantages
No dynamic coordination is necessary.
It also works for both analog and digital signals.
Disadvantages
There is the wastage of bandwidth is the traffic is distributed unevenly.
Very inflexible and limits the number of senders.
Guard space is required.
15
Advantages
4. Code Division Multiplexing (CDM): In CDM multiple users are allocated different
codes to access the same channel. CDM is first used in military applications due to
its internet security features. Figure Shows how all the channels ki use the same
frequency at the same time for transmission. Separation is now achieved by
assigning each channel its own ‘code’ guard spaces are realized by using codes
with necessary ‘distance’ in code space.
Advantages
Bandwidth Efficient
Secure
No coordination and synchronization necessary
Good protection against interference and tapping.
Disadvantages
16
k1 k k3 k4 k5 k6 C
2
17
Step 2: The sender now spreads the signal i.e conversion from narrowband to
broadband. The energy required for transmission of the signal remains the same but the
frequency range increases.
Step 3: During transmission the narrowband and broadband interference add up to the
signal, sum of user signal and interference is received by the receiver.
Step 4: The receiver knows how to de-spread the signal that is, converting the signal
back to the narrowband signal.
Step 5: Finally the user can reconstruct the original data.
DSS systems take a user bit stream and perform an XOR of the signal with pseudo-
random number (chipping sequence). A user bit stream is taken in which each bit has
duration tb the chipping sequence consist of smaller pluses called chips with duration t c.
This chipping is also called pseudo noise.
The spreading factor determines the bandwidth of the resulting signal. If the original
signal needs a bandwidth w, the resulting signal needs s·w after spreading the resulting
signal where s given by:
s = tb/tc
For example- suppose we have a user data 01 and the chipping sequence selected is
011010101110101,then resulting signals is obtained by XORing both the signals
18
Spreading with DSSS
DSSS transmitter
DSSS Receiver: The DSSS receiver is little more complex than the transmitter it has to
perform the inverse functions of the two transmitter modulation steps. But noise and
multipath propagation require additional effort to reconstruct the original data.
19
DSSS Receiver
Advantages of DSSS
Disadvantages of DSSS
20
Slow and fast Frequency Hopping
FSSS Transmitter
The steps involved at FSSS transmitter are as follows
1. Firstly, the user data is modulated using any of the digital to analog modulation
scheme.
2. From the first step a narrowband signal is received, after that frequency hopping is
performed based on hopping sequence. Then a second modulator is used to
generate a spread spectrum signal that is to be transmitted.
FSSS Receiver
The receiver has to simply perform the reverse operation of the transmitter it takes
the broadband signal and demodulates it for which it is required to know the
hopping sequence and thus, reconstructs the original data.
21
Advantages of FSSS
Simple to implement
frequency selective fading and interference limited to short period
uses only small portion of spectrum at any time
Disadvantages of FSSS
It is not as robust as DSSS
simpler to detect
Cellular Concepts
The cellular concept was developed and introduced by the Bell Laboratories in the early
1970s. One of the most successful initial implementations of the cellular concept was
the advanced mobile phone system (AMPS), which has been available in the United
States since 1983.
A cellular system is a high capacity land mobile system in which available frequency
spectrum is partitioned into discrete channels which are assigned in groups to
geographic cells covering a cellular Geographic Service Area (GSA). The discrete
channels are capable of being reused in different cells within the service area.
22
Local interference only: Having long distances between sender and receiver
results in even more interference problems. With small cells, mobile stations and
base stations only have to deal with ‘local’ interference.
Robustness: Cellular systems are decentralized and so, more robust against the
failure of single components. If one antenna fails, this only influences
communication within a small area.
Cells
Cells are basic geographical units of the cellular network. Cells are a base stations
transmitting over small geographic areas that represented as hexagons.
Clusters
A cluster is a group of cells. All cells within a cluster use disjoint set of frequencies.
No channels are reused with a cluster.
Frequency reuse
The concept of frequency reuse is based on assigning to each cell a group of radio
channels used within a small geographic area. Cells are assigned a group of channels
that is completely different from neighbouring cells. The coverage area of cells is
called the footprint.
23
Cell Splitting
Cell splitting is the process of subdividing a congested cell into smaller cells,
Each with its own base station and a corresponding reduction in antenna
height and transmitter power.
Cell splitting increases the capacity of a cellular system since it increases the
number of times that channels are reused.
The frequencies allocated to the service are reused in regular pattern of areas called
cells. Each cell is covered by a base station. These cells are set-up in hexagonal form.
To ensure that mutual interference between users remains minimal to a harmful
level, adjacent cells use different frequencies. A Set of C different frequencies
{f1,f2…Fc} are used for each cluster of C adjacent cells.
In three cell cluster, three cells combine to form a cluster, here three frequencies
are reused and C= 3, with hexagonal cells. All cells within a cluster use disjoint sets
of frequencies. In the figure one cell in the cluster uses set f1 , another cell f2 and
the third cell f3.
Similarly in sever cell cluster, seven cells combine to form a cluster, here C=7, with
hexagonal cells. In the fig {f1,f2,…..f7} disjoint set of frequencies are shown to form
a Cluster.
By using these schemes the total bandwidth for the system is C times the bandwidth
occupied by a single cell. To reduce interference the sectorized antennas can be
used. Fig. shows three cell clusters with three sectors per cell.
24
Cell breathing
In cellular the wireless networks, the channel allocations schemes are required to
allocate channels to base stations and access point and to avoid co-channel
interference among nearby cells. Channel allocation deals with the allocation of
channels to cells in a cellular network. Once the channels is allocated, cells may then
allow users to communicate via available channels, within the cell. There are three major
categories for assigning these channels to cells (or base stations).
I. Fixed Channel Allocation (FCA): Fixed Channel Allocation (FCA) systems allocate
specific channels to specific cells. This allocation is static and cannot be changed.
For efficient operation, FCA systems typically allocate channels in a manner that
maximizes frequency reuse. Here the number of channels is fixed for a particular cell.
II. Dynamic Channel Allocation (DCA): (DCA) attempts to solve the problem for FCA
systems when offered traffic is non-uniform. In dynamic channel allocation the
frequencies can only be borrowed, the total number of channels are assigned
independent of all architecture. In DCA it is possible to freely assign frequencies
to cells.
III. Hybrid Channel Allocation (DCA): In this scheme both the concepts of FCA and DCA
are used, here in HCA, there is a fixed set of channels for each cell, but channels are
also allocated from a global pool in case of shortage.
25
(1) Public Switched Telephone Network (PSTN)
The PSTN is made up of local networks, the exchange area networks, and other
networks that Interconnects telephone and other communication devices on a
worldwide basis.
(7)Authentication Center
It is generally associated with the HLR, it contains authentication parameters that are
used on initial location registration.
26
GSM (Global system for Mobile Communication) Cellular System
The GSM standard was developed by the Group Special Mobile in 1982.It is a globally
accepted standard for digital cellular communication.
Characteristics OF GSM
Fully Digital system utilizing 900 MHz frequency band
1. Radio Sub System: The RSS contains all the radio specific entities that is the
mobile station (MS) and the base station sub system (BSS). RSS contains three
entities these are:
(i) Base Station Sub System (BSS): A GSM network comprises many BSS each
controlled by a base station controller.
(ii) Base Transceiver Station (BTS): A BTS comprises all radio equipment’s that is
antennas, signal processing amplifiers.
(iii) Base Station Controller (BSC): It takes care of handoff from one BTS to another &
maintains appropriate power levels of the signal.
(iv) Mobile Station (MS): It consists of two components Mobile Equipment (ME) and
Subscriber Identity Module (SIM).
27
2. Network and Switching Sub System (NSS): This is the heart of GSM and
responsible for connecting the wireless network.
i. Mobile Switching Center (MSC): The MSC performs the telephony switching
function of the system.
ii. Home Location Register (HLR): The HLR stores permanent subscriber
information including the service profile, location information, activity status.
iii. Visitor Location Register (VLR): VLR is a database that contains temporary
information’s about subscribers that is needed by MSC in order to service to
visiting subscriber. When a mobile station roams into a new MSC area, the VLR
connected to the MSC.
3. Operations Sub System (OSS): It contains the necessary functions for network
and maintenance.
i. Authentication Centre (AUC): AUC provides authentication and encryption
parameters that verify the user’s identity.
ii. Equipment Identity Register: The EIR is a database that contains all IMEI’s that is
it contains information about the identity of mobile equipment that prevents
from stolen and unauthorized access.
28
iii. Operations and Maintenance (OMC): The OMC is connected to all equipment in
the switching system and to the BSC. OMC functions are traffic monitoring,
status report of network entities, subscriber and security management and
billing.
Abis: This interface connects a BTS to a BSC. It carriers traffic and maintenance data.
GSM Services
Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data. These
services are further transited in the following ways −
29
Voice Calls
The most basic Teleservice supported by GSM is telephony. This includes full-rate
speech at 13 kbps and emergency calls, where the nearest emergency-service provider
is notified by dialing three digits.
Bearer Services
Data services or Bearer Services are used through a GSM phone. to receive and send
data is the essential building block leading to widespread mobile Internet access and
mobile data transfer.
Supplementary Services
30
Call Barring − Call Barring is useful to restrict certain types of outgoing calls such
as ISD or stop incoming calls from undesired numbers. Call barring is a flexible
service that enables the subscriber to conditionally bar calls.
Number Identification − There are following supplementary services related to
number identification −
Location management in GSM is performed with the help of two database Home
location register (HLR) and Visitor location Register (VLR)
1. Home Location Register (HLR): The HLR represents a centralized database that
has semi-permanent mobile subscriber information about the mobile subscribers.
The HLR is kept updated with the current locations of all its mobile subscribers,
including those who have roamed to another network operator within or outside
the country.
2. Visitor Location Register (VLR): The VLR represents a temporary data store,
generally there is one VLR per MSC. This register contains information about the
mobile subscribers who are currently in the service area covered by the MSC of
VLR, but whose HLR is elsewhere.
When the mobile station moves out of range from the area covered by one
cell and entering the area covered by another cell.
When the mobile station moves far away from BTS the received signal
decreases
The wired infrastructure may decide that the traffic in one cell is too high.
(i) Intra-cell Handover: In this when a phone call in progress is redirected from its
current frequency to a new frequency.
(ii) Intra-cell, Intra-BSC Handover: the mobile station moves from one cell to
another, but stays within the control of same BSC.
31
(iii) Inter BSC, Intra-MSC Handover: In this type of handover, the handover
performs between cells controlled by different BSCs, but these BSCs have a
common MSC that controls the handover.
(iv) Inter MSC Handover: A handover occurs between two cells belonging to
different MSCs. Here both MSCs perform the handover.
32
Hard Hand off: It is one in which the channel in the source cell is released and only then
channel in the target cell is engaged.
Soft Hand off: It is one in which the channel in the source is retained and used for a
while in parallel with the channel in the target cell.
GPRS is a packet based communication service for mobile device that allows data to be
sent and received across a mobile telephone network. GPRS is a mobile data service
available to users of GSM and IS-136 mobile phones. GPRS has ability to offer data
speed of 14.4 kbps to 115 kpbs, which allow for comfortable internet access. It allows
for short bursty traffic such as e-mail and web browsing as well as large volume of data.
GPRS architecture
GPRS uses the GSM architecture for voice. In order to offer packet data service through
GPRS, new class of network nodes need to be introduced as an upgrade to existing GSM
network. Those network nodes are called GPRS support nodes (GSN).
There are two types of support nodes SGSN (Service GSN) and GGSN (Gateway GSN).
(i) Serving GPRS Support Node (SGSN): The SGSN task include routing,
handover, IP address assignment, packet switching, mobility management,
local link management, authentication and charging function.
33
(ii) Gateway GPRS Support Node (GGSN): A GGSN acts as an interface between
the GPRS backbone network and the external packet data networks. GGSN
function is similar to that of a router in a LAN.
(iii) Connectivity between GGSN and SSGN: The connection between the two
GPRS support nodes is made with a protocol called GPRS Tunneling Protocol
(GTP).
(iv) Home Location Register (HLR): is a database that contains subscriber
information, when a device connects to the network. It needs enhancement
to register GPRS profile s and respond to queries originating from GSNs
regarding their profiles.
(v) Base Station Sub System (BSS): It needs enhancement to recognize and send
packet data. This includes BTS upgrade to allow transportation of user’s data
to the SGSN.
34