Mobile Computing Unit 1
Mobile Computing Unit 1
UNIT I INTRODUCTION
Introduction to Mobile Computing - Mobile Computing Vs Wireless networking - Applications
of Mobile Computing - Structure of Mobile Computing Applications - Generations of Mobile
Communication Technologies - MAC Protocols - Wireless MAC Issues – SDMA - TDMA-
FDMA - CDMA.
Mobile Computing
Mobile Computing is a technology that allows transmission of data, voice and
video via a computer or any other wireless enabled device without having to be
connected to a fixed physical link.
Mobile computing Wireless networking
Mobile computing refers to computing Information between a computing device
devices that are not restricted to a Wireless refers to the method of
desktop. A mobile device may be a PDA, transferring, and a data source, such as an
a smart phone or a web phone, a laptop agency database server, without a
computer, or any one of numerous other physical connection
Wireless communication refers to the method of
devices that allow the user to complete transferring information between a computing device
tasks without being tethered, or (such as a smartphone, laptop, or tablet) and a data
source (such as a database server managed by an
connected, to a network. Accessing agency), without the need for a physical connection
information and remote computational like cables or wires. This enables data to be
accessed and transmitted using technologies like
service while on the move.
Wi-Fi, cellular networks, or Bluetooth, ensuring
mobility and convenience.
Mobile computing
Applications
1.Vehicles:
Music, news, road conditions, weather reports, and other broadcast info are
received via digital audio broadcasting (DAB) with 1.5 Mbit/s. For personal
communication, a universal mobile telecommunications system (UMTS) phone
might be available offering voice and data connectivity with 384 kbits/s. The
current position of the car is determined via the global positioning system (GPS).
Cars driving in the same area build a local ad-hoc network for the fast exchange of
information in emergency situations or to help each other keep a safe distance. In
case of an accident, not only will the airbag be triggered, but the police and
ambulance service will be informed via an emergency call to a service provider.
2. Emergencies:
An ambulance with a high-quality wireless connection to a hospital can carry vital
information about injured persons to the hospital from the scene of the accident.
All the necessary steps for this particular type of accident can be prepared and
specialists can be consulted for an early diagnosis. Wireless networks are the only
means of communication in the case of natural disasters such as hurricanes or
earthquakes. In the worst cases, only decentralized, wireless ad-hoc networks
survive.
At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for
transactions, the POS terminal communicates with the bank's central computer to verify the card's validity.
This communication can happen quickly and securely over cellular networks using a mobile computing unit.
By utilizing cellular channels, the verification process is accelerated, ensuring faster transactions and reducing
congestion at the POS terminals.
First Generation, 1G
These phones were the first mobile phones to be used, which was introduced in 1982 and completed
in early 1990. It was used for voice services and was based on technology called as Advanced
Mobile Phone System (AMPS). The AMPS system was frequency modulated and used frequency
division multiple access (FDMA) with a channel capacity of 30 KHz and frequency band of 824-
894MHz. Its basic features are:
Wireless networks enable the delivery of up-to-date information at
Speed-2.4 kbps relevant locations. For example, a travel guide app can use GPS, contact
with a local base station, or triangulation to determine your location and
Allows voice calls in 1 country provide historical details about a building. It can also download real-time
Use analog signal. information, such as details about a concert happening in that building
Poor voice quality later in the evening, through a local wireless network.
Poor battery life
Another expanding area of wireless network applications is in
Large phone size entertainment and gaming. Wireless networks can facilitate ad-hoc
Limited capacity gaming networks, allowing people to connect and play multiplayer games
Poor handoff reliability together instantly when they meet, without requiring any pre-existing
Poor security infrastructure.
Offered very low level of spectrum efficiency
It introduces mobile technologies such as Mobile Telephone System (MTS), Advanced Mobile
Telephone System (AMTS), Improved Mobile Telephone Service (IMTS), and Push to Talk (PTT).
It has low capacity, unreliable handoff, poor voice links, and no security at all since voice calls were
played back in radio towers, making these calls susceptible to unwanted eavesdropping by third
parties
Architecture of AMPS
Spread Spectrum
A collective class of signaling techniques are employed before transmitting a signal to
provide a secure communication, known as the Spread Spectrum Modulation. The main
advantage of spread spectrum communication technique is to prevent “interference” .
These spread spectrum signals transmit at low power density and has a wide spread of
signals.
Pseudo-Noise Sequence
A coded sequence of 1s and 0s with certain auto-correlation properties, called as Pseudo-
Noise coding sequence is used in spread spectrum techniques. It is a maximum-length
sequence, which is a type of cyclic code.
Spread spectrum multiple access techniques uses signals which have a transmission
bandwidth of a magnitude greater than the minimum required RF bandwidth.
Hard to find the user’s frequency at any instant User frequency, once allotted is always
of time the same
Sender need not wait Sender has to wait if the spectrum is busy
Power strength of the signal is high Power strength of the signal is low
It is cheaper It is expensive
This is the commonly used technique This technique is not frequently used
Cross-talk elimination
Better output with data integrity
Reduced effect of multipath fading
Better security
Reduction in noise
Co-existence with other systems
Longer operative distances
Hard to detect
Not easy to demodulate/decode
Difficult to jam the signals
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY)
specifications for implementing wireless local area network (WLAN) computer
communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.
Demand-based schemes
960
935.2 200
20
915
890.2
t
417 µs
1 2 3 11 12 1 2 3 11 12
t
downlink uplink
let the binary sequence be 1001, then the representation sequence is +1-1-1+1
On the receiving end, only the same PN sequence is able to demodulate the signal to
successfully convert the input data
Pseudorandom sequence generator(PRSG)
To generate a series of pseudorandom numbers,
collision
sender A
sender B
sender C
Slotted Aloha
t
collision
sender A
sender B
sender C
t
Slotted ALOHA
CSMA/CD
- sender starts to transmit if it senses the channel to be free
- even if it senses the channel to be free, there can be a collision during transmission
- in wireless network, it is very difficult for a transmitting node to detect a collision,
since any received signal from other nodes would be too feeble compared to its own signal
and can easily be masked by noise.
- As result, a transmitting node would continue to transmit frame, and only the
destination node would notice the corrupted frame after it computes checksum.
This leads to retransmission and severe wastage of channel utilization
In a wired network when a node detects a collision, it immediately stops transmitting ,
thereby minimizing channel wastage
In wireless network, CA scheme works much better than CD.
CA scheme - based on the idea that is necessary to prevent collisions at the moment they
are most likely to occur ie., when the bus is released after a pkt transmission
- During the time a node is transmitting, several nodes might be wanting to transmit
- these nodes would be monitoring the channel and waiting for it to become free
- the moment the transmitting node completes its transmission, these waiting nodes would
sense the channel to be free, and would all start transmitting at the same time
To overcome such collisions, in CD scheme, all nodes are forced to wait for a random time
and then sense the medium again, before starting their transmission
If the medium is sensed to be busy, a node waiting to transmit waits for a further random
amount of time and so on. Thus, the chance of 2 nodes starting to transmit at the same time
would be greatly reduced
III. Reservation-based Schemes
- RTS/CTS Scheme - short, fixed-length (32 byte) signalling packets
– a sender transmits an RTS (Ready To Send) pkt to receiver before the actual data
transmission
- on receiving this, the receiver sends a CTS (Clear To Send) pkt, and the actual data
transfer commences only after that
- when the other node sharing the medium senses the CTS pkt, they refrain from
transmitting until the transmission from the sending node is complete
In contention-based MAC protocol a node wanting to send amsg first reserves the medium
by using an appropriate control msg
Eg. Reservation of the medium can be achieved by transmitting a RTS msg and
corresponding destination node accepting this request answers with a CTS msg
Every node that hears the RTS and CTS msgs defers its transmission during the specified
tome period in order to avoid a collision
Egs of RTS-CTS based MAC protocols are
MACA - Multiple Access Collision Access
The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.
RTS RTS
CTS
A B C
The sender senses the carrier to see and transmits a RTS (Request To Send) frame if
no nearby station transmits a RTS.
The receiver replies with a CTS (Clear To Send) frame.
Neighbors
see CTS, then keep quiet.
see RTS but not CTS, then keep quiet until the CTS is back to the sender.
The receiver sends an ACK when receiving an frame.
Neighbors keep silent until see ACK.
Collisions
There is no collision detection.
The senders know collision when they don’t receive CTS.
They each wait for the exponential backoff time.