MC Unit 1
MC Unit 1
Mobile communication
The mobile communication in this case, refers to the infrastructure put in
place to ensure that seamless and reliable communication goes on. These
would include devices such as protocols, services, bandwidth, and portals
necessary to facilitate and support the stated services. The data format is
also defined at this stage. This ensures that there is no collision with
other existing systems which offer the same service.
Mobile Hardware
Mobile hardware includes mobile devices or device components that
receive or access the service of mobility. They would range from portable
laptops, smartphones, tablet Pc's, Personal Digital Assistants.
These devices will have a receptor medium that is capable of sensing and
receiving signals. These devices are configured to operate in full- duplex,
whereby they are capable of sending and receiving signals at the same
time. They don't have to wait until one device has finished communicating
for the other device to initiate communications.
Mobile software
Mobile software is the actual program that runs on the mobile hardware.
It deals with the characteristics and requirements of mobile applications.
This is the engine of the mobile device. In other terms, it is the operating
system of the appliance. It's the essential component that operates the
mobile device.
Since portability is the main factor, this type of computing ensures that
users are not tied or pinned to a single physical location, but are able to
operate from anywhere. It incorporates all aspects of wireless
communications.
● Personal Communication:
People can make calls and send messages through GSM (Global
System for Mobile Communication) while traveling.
● Position Tracking:
Vehicles use GPS to find their location and help with navigation.
● Vehicle-to-Vehicle Communication:
Nearby vehicles form small local networks to prevent accidents and
share traffic updates.
● Maintenance Data:
Vehicles like buses and trains can send data ahead of time for quick
maintenance.
🚑 2️⃣ Emergencies
● Faster Medical Data Transmission:
Patient data can be sent to hospitals even before arrival for early
treatment.
● Mobile Office:
Sales teams use Tablet PCs and smartphones for presentations
and sharing information between the office, hotel, and client
meetings.
● Consistent Databases:
All sales agents can access the same updated information no
matter where they are.
● Trade Shows:
Temporary wireless networks can be set up for fast internet at
events and exhibitions.
● Historic Buildings:
Wireless LANs can be used where installing cables is difficult or
prohibited.
🎮📚 5️⃣ Entertainment & Education
● Outdoor Internet Access:
Connect to the internet while traveling or sitting in a park.
● Follow-On Services:
Calls and workspace data move along with the user wherever they
go.
● Information Services:
● Support Services:
Mobile devices carry saved data like cache, temporary results, or
session states while moving through different networks.
#2. Fixed Assignment MAC Protocols
In TDMA, the available frequency is divided into time frames, and each
frame is further divided into multiple time slots. Each user is allotted a
particular slot in each frame. This means that during their assigned time
slot, users have exclusive access to the channel to send or receive data.
After their time slot ends, the system switches to the next user’s slot. This
process continues cyclically, repeating for each frame.
ALOHA Scheme:
The simple ALOHA scheme works acceptably, when the chances of
contention are small (i.e., when a small number of senders send data
infrequently). However, the collisions can become unacceptably high if the
number of contenders for transmission is high.
In fig there are four stations that contend with one another for access to a
shared channel. All these stations are transmitting frames. Some of these
frames collide because multiple frames are in contention for the shared
channel. Only two frames, frame 1.1 and frame 2.2 survive. All other
frames are destroyed.
Slotted ALOHA:
In slotted ALOHA, if any station is not able to place the frame onto the
channel at the beginning of the slot i.e. it misses the time slot then the
station has to wait until the beginning of the next time slot.
Vulnerable time is the short period when there’s a chance that two
devices on a network might send data at the same time and cause a
collision.
In networks like Wi-Fi or Ethernet, devices first listen to see if the
network is clear before sending their data. However, after a device checks
and finds the network free, there’s a small delay before it starts sending
data. During this time, another device might also try to send data, which
can lead to both data packets crashing into each other (a collision). This
period, where a collision might happen, is called the vulnerable time.
Think of MAC as a traffic controller that tells each device when it can
talk and when it must wait, so the network runs smoothly.
1. Fairness: All devices get a chance to send data, not just one
hogging the channel.
2. Efficiency: Uses the channel fully, avoiding wasted time or clashes.
3. Fast Access: Sends data quickly, important for calls or videos.
4. Scalability: Works even with many devices.
5. Energy Saving: Saves battery for phones or sensors.
6. Reliability: Works despite noise or moving devices.
7. Simplicity: Easy to set up and use.
8. Flexibility: Adapts to different data needs (e.g., small texts or big
videos).
TYPES:
In this type, each device gets a fixed share of the channel. It’s like
everyone in a group getting a specific time or space to talk.
a. ALOHA
b. Slotted ALOHA
(i) How does the MAC Protocol for Wireless Networks differ
from Wired Networks?
🧠 Conclusion:
MAC protocols in wireless networks are more complex because they must
handle an unreliable medium, avoid collisions instead of detecting them,
deal with hidden/exposed nodes, and save power. In contrast, wired MAC
protocols are simpler and more efficient due to the predictable nature of
cables and easier collision handling.