Mobile Computing Notes Unit 1
Mobile Computing Notes Unit 1
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Mobile Computing
Unit-1
Mobile Computing is a technology that provides an environment that enables users
to transmit data from one device to another device without the use of any physical
link or cables.
In other words, you can say that mobile computing allows transmission of data,
voice and video via a computer or any other wireless-enabled device without being
connected to a fixed physical link. In this technology, data transmission is done
wirelessly with the help of wireless devices such as mobiles, laptops etc.
o Mobile Communication
o Mobile Hardware
o Mobile Software
Mobile Communication
Mobile Communication specifies a framework that is responsible for the working of
mobile computing technology. In this case, mobile communication refers to an
infrastructure that ensures seamless and reliable communication among wireless
devices. This framework ensures the consistency and reliability of communication
between wireless devices. The mobile communication framework consists of
communication devices such as protocols, services, bandwidth, and portals
necessary to facilitate and support the stated services. These devices are
responsible for delivering a smooth communication process.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
1. Security Concerns
Wireless networks are susceptible to hacking, eavesdropping, phishing
attacks, and unauthorized access.
Data privacy risks arise from cloud storage and third-party access to user
information.
2. Power Consumption
Mobile devices have limited battery life, making energy efficiency a
significant concern.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
4. Bandwidth Limitations
Wireless networks face constraints on speed and capacity due to high data
traffic and multiple users.
5. Data Synchronization
Keeping data consistent and updated across multiple devices and cloud
services is a major challenge.
6. Interoperability Issues
Mobile devices use different operating systems (Android, iOS, Windows)
and hardware configurations, making it difficult to ensure seamless
compatibility.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Main Components
Mobile Devices: Used for voice and data communication.
VoIP (Voice over IP): Uses the internet for voice communication.
Advantages
Supports mobile communication anywhere.
Challenges
Signal interference due to buildings and weather.
Cellular Concept
The cellular concept refers to the way mobile communication networks are
designed and organized. Instead of having the big powerful transmitter covering
the large area the network is divided into the smaller areas called cells. Each cell
has its own small transmitter called a cell site or the base station. This base station
can communicate with mobile devices like phones or tablets within that cell. The
idea behind this cellular setup is to allow the same radio frequencies to be reused
in different cells that are far apart. This way more people can use the network
without the interference.
Cellular Approach
With limited radio frequency resources, the cellular principle can serve many
subscribers at an affordable cost. In a cellular network, the total area is divided into
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
smaller areas called "cells". Each of the cell can cover the limited number of mobile
subscribers within its boundaries. Each cell can have the base station with the
number of radio channels.
Frequencies used in one cell area will be reused at the same time in a different cell
that is far away. For example, the typical seven cell pattern can be used.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Micro: In this size of cell, antenna height is less than the average roof level.
Umbrella: It covers the shadowed (Fills the gaps between cells) regions.
Features of GSM
Supports international roaming
NSS: NSS stands for Network and Switching Subsystem. NSS is the core
network of GSM. That carried out call and mobility management functions for
mobile phone present in network. NSS have different components like VLR,
HLR and EIR.
OSS: OSS stands for Operating Subsystem. OSS is a functional entity which
the network operator monitors and control the system. OMC is the part of
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
OSS. Purpose of OSS is to offer the customer cost-effective support for all
GSM related maintenance services.
1. MS: MS stands for Mobile System. MS comprises user equipment and software
needed for communication with a mobile network. Mobile Station (MS) = Mobile
Equipment (ME) + Subscriber Identity Module (SIM). Now, these mobile stations are
connected to tower and that tower connected with BTS through TRX. TRX is a
transceiver which comprises transmitter and receiver. Transceiver has two
performances of sending and receiving.
2. BTS : BTS stands for Base Transceiver Station which facilitates wireless
communication between user equipment and a network. Every tower has BTS.
3. BSC: BSC stands for Base Station Controller. BSC has multiple BTS. You can
consider the BSC as a local exchange of your area which has multiple towers and
multiple towers have BTS.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
4. MSC: MSC stands for Mobile Switching Center. MSC is associated with
communication switching functions such as call setup, call release and routing. Call
tracing, call forwarding all functions are performed at the MSC level. MSC is having
further components like VLR, HLR, AUC, EIR and PSTN.
5. OMC: OMC stands for Operation Maintenance Center. OMC monitor and
maintain the performance of each MS, BSC and MSC within a GSM system.
Three subsystem BSS, NSS and OSS are connected with each other via some
interfaces. Total three interfaces are there:
Abi’s Interface: It is a BSS internal interface linking with BTS and BSC.
Channel Structure
In mobile computing, channel structure refers to the way information is carried
between a mobile device and a base station. Channels can be physical or logical,
and can be used for user data or signalling.
Physical channels
Carry information over the air interface between the mobile device and the
base station
Logical channels
Map user data and signaling information onto physical channels
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Examples include:
Channel allocation
Deals with the allocation of channels to cells in a cellular network
Once channels are allocated, cells can allow users within the cell to
communicate via the available channels
Mobile users periodically inform the network of their current location, enabling the
network to track their movements.
When the network needs to reach a specific mobile user (e.g., for an incoming call),
it initiates a search or paging process to find the user's current location.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Location Databases:
Networks maintain databases (like Home Location Registers - HLRs and Visitor
Location Registers - VLRs) to store and retrieve location information.
Networks are typically divided into areas or cells, allowing for more efficient location
tracking and paging.
Call Routing:
Location management is crucial for routing calls to the correct mobile station,
ensuring that incoming calls reach the intended user.
Data Delivery:
Knowing the location of mobile users allows the network to efficiently deliver data
and other services to them.
Location-Based Services:
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Hierarchical, Handoffs
Hierarchical architecture is a network design that organizes devices into layers
to improve performance and manage traffic. It's used in mobile computing to
optimize the use of cloud servers and edge computing.
How it works
Data routing
Traffic management
Peak loads are aggregated across different tiers of cloud servers to maximize the
number of mobile workloads that can be served.
Edge computing
Benefits
Cloud server usage: Maximizes the number of mobile workloads that can be
served
Related terms Hierarchical state routing (HSR), Hierarchical network model, and
Hierarchical topology.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Handoff
In cellular communications, the handoff is the process of transferring an active call
or data session from one cell in a cellular network or from one channel to another.
In satellite communications, it is the process of transferring control from one earth
station to another. Handoff is necessary for preventing loss of interruption of service
to a caller or a data session user. Handoff is also called handover.
Types of Handoffs
There are two types of handoffs −
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Soft Handoff − In soft handoff, at least one of the links is kept when radio
links are added and removed to the mobile station. This ensures that during
the handoff, no break occurs. This is generally adopted in co-located sites. It
is a “make before break” policy.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
These are Fixed, Dynamic, Hybrid Channel Allocation and Borrowing Channel
Allocation as explained as following below.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
when a cell experiences high traffic demand and all of its channels are occupied, it
can borrow channels from neighbouring cells that are not being used at that time.
The borrowed channels are assigned to the busy cell and are used to support the
additional traffic demand. Once the demand subsides, the borrowed channels are
released and returned to their home cell. BCA can be implemented manually or
automatically using algorithms or policies but the main disadvantage is that if the
borrowed channel is reclaimed by the original cell the call drop may occur.
CDMA
Code Division Multiple Access system is very different from time and frequency
multiplexing. In this system, a user has access to the whole bandwidth for the entire
duration. The basic principle is that different CDMA codes are used to distinguish
among the different users.
Techniques generally used are direct sequence spread spectrum modulation (DS-
CDMA), frequency hopping or mixed CDMA detection (JDCDMA). Here, a signal is
generated which extends over a wide bandwidth. A code called spreading code is
used to perform this action. Using a group of codes, which are orthogonal to each
other, it is possible to select a signal with a given code in the presence of many other
signals with different orthogonal codes.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
CDMA Capacity
The factors deciding the CDMA capacity are −
Processing Gain
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
History Of GPRS:
GPRS was one of the main advances that empowered a cell system to interface with
Internet Protocol systems, accomplishing across the board reception in the mid-
2000s. The capacity to peruse the web from a telephone whenever through
“dependably on” data networking, while underestimated in a great part of the world
today, was as yet an oddity when it was introduced. Indeed, even now, GPRS keeps
on being utilized in parts of the world where it has been too expensive even to
consider upgrading cell organize framework to move up to newer alternatives.
Goals Of GPRS:
1. Consistent IP services
3. Open Architecture
Services Offered:
Protocols supported:
Benefits Of GPRS:
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Mobility:
The capacity to keep up consistent voice and information interchanges while
moving.
Cost Efficient:
Communication via GPRS is cheaper than through the regular GSM network.
Immediacy:
Allows customers to obtain connectivity when needed, regardless of location
and without a lengthy login session.
Localization:
Enables customers to acquire data applicable to their present area.
Easy Billing:
GPRS packet transmission offers an easier to use billing than that offered by
circuit switched administrations.
What is MAC?
MAC is a protocol layer within the Data Link Layer of the OSI model, responsible for
coordinating access to the shared wireless channel.
Function:
It helps ensure that multiple devices can access the network without collisions and
that data is transmitted reliably and efficiently.
In cellular networks:
The MAC layer in cellular networks (like GSM, UMTS, LTE, and 5G) is crucial for
managing the air interface and optimizing spectrum utilization, maximizing the
throughput of the cellular network.
Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________
Access Scheduling: The base station (BTS) controls access to the air
interface, scheduling downlink and uplink transmissions.
MAC Address:
While the term "MAC" is often associated with the Media Access Control Address,
it's important to differentiate it from the MAC protocols that manage network
access. A MAC address is a unique identifier assigned to each network interface
controller (NIC) in a device.
Faculty Signature