0% found this document useful (0 votes)
2 views19 pages

Mobile Computing Notes Unit 1

The document provides an overview of mobile computing, detailing its definition, components, and the challenges it faces such as security concerns, power consumption, and network reliability. It also discusses wireless telephony, cellular concepts, and the architecture of GSM, including its components and channel structures. Additionally, it covers location management techniques and the concept of handoffs in cellular communications.

Uploaded by

unknownks12345
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views19 pages

Mobile Computing Notes Unit 1

The document provides an overview of mobile computing, detailing its definition, components, and the challenges it faces such as security concerns, power consumption, and network reliability. It also discusses wireless telephony, cellular concepts, and the architecture of GSM, including its components and channel structures. Additionally, it covers location management techniques and the concept of handoffs in cellular communications.

Uploaded by

unknownks12345
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,

GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

Mobile Computing
Unit-1
Mobile Computing is a technology that provides an environment that enables users
to transmit data from one device to another device without the use of any physical
link or cables.

In other words, you can say that mobile computing allows transmission of data,
voice and video via a computer or any other wireless-enabled device without being
connected to a fixed physical link. In this technology, data transmission is done
wirelessly with the help of wireless devices such as mobiles, laptops etc.

The concept of Mobile Computing can be divided into three parts:

o Mobile Communication

o Mobile Hardware

o Mobile Software

Mobile Communication
Mobile Communication specifies a framework that is responsible for the working of
mobile computing technology. In this case, mobile communication refers to an
infrastructure that ensures seamless and reliable communication among wireless
devices. This framework ensures the consistency and reliability of communication
between wireless devices. The mobile communication framework consists of
communication devices such as protocols, services, bandwidth, and portals
necessary to facilitate and support the stated services. These devices are
responsible for delivering a smooth communication process.

Mobile communication can be divided in the following four types:

1. Fixed and Wired

2. Fixed and Wireless

3. Mobile and Wired

4. Mobile and Wireless

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

Issues in Mobile Computing


Mobile computing, despite its advantages, faces several challenges that impact its
efficiency and security. Some of the key issues include:

1. Security Concerns
 Wireless networks are susceptible to hacking, eavesdropping, phishing
attacks, and unauthorized access.

 Encryption techniques such as WPA2, VPNs, and biometric


authentication are essential to secure data.

 Data privacy risks arise from cloud storage and third-party access to user
information.

2. Power Consumption
 Mobile devices have limited battery life, making energy efficiency a
significant concern.

 Power-saving techniques, optimized processors, and fast-charging


methods are developed to improve battery performance.

3. Network Reliability and Connectivity Issues


 Signal loss, network congestion, and poor coverage in remote areas
affect mobile computing performance.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

 The development of 5G networks and satellite internet aims to address


these issues by improving speed and coverage.

4. Bandwidth Limitations
 Wireless networks face constraints on speed and capacity due to high data
traffic and multiple users.

 Solutions like adaptive data compression, load balancing, and network


optimization help manage bandwidth efficiently.

5. Data Synchronization
 Keeping data consistent and updated across multiple devices and cloud
services is a major challenge.

 Solutions like real-time synchronization protocols and cloud-based


backup systems help mitigate this issue.

6. Interoperability Issues
 Mobile devices use different operating systems (Android, iOS, Windows)
and hardware configurations, making it difficult to ensure seamless
compatibility.

 Standardized platforms and cross-platform development frameworks help


address interoperability challenges.

7. Security in Public Networks


 Public Wi-Fi networks are highly vulnerable to cyber threats.

 Using VPNs, HTTPS connections, and disabling automatic Wi-Fi


connections can help enhance security in public networks.

Overview of Wireless Telephony


Wireless telephony enables voice and data communication without physical cables,
using radio waves and network infrastructure. It has evolved from 1G (analog
communication) to 5G (high-speed digital networks), improving call quality, data
speed, and connectivity.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

Main Components
 Mobile Devices: Used for voice and data communication.

 Cellular Towers: Transmit and receive signals to connect users.

 Satellites: Provide coverage in remote areas.

 VoIP (Voice over IP): Uses the internet for voice communication.

Advantages
 Supports mobile communication anywhere.

 Provides fast internet and multimedia services.

 Eliminates the need for wired connections.

Challenges
 Signal interference due to buildings and weather.

 Network congestion with too many users.

 Security risks like hacking and data breaches.

Cellular Concept
The cellular concept refers to the way mobile communication networks are
designed and organized. Instead of having the big powerful transmitter covering
the large area the network is divided into the smaller areas called cells. Each cell
has its own small transmitter called a cell site or the base station. This base station
can communicate with mobile devices like phones or tablets within that cell. The
idea behind this cellular setup is to allow the same radio frequencies to be reused
in different cells that are far apart. This way more people can use the network
without the interference.

Cellular Approach
With limited radio frequency resources, the cellular principle can serve many
subscribers at an affordable cost. In a cellular network, the total area is divided into

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

smaller areas called "cells". Each of the cell can cover the limited number of mobile
subscribers within its boundaries. Each cell can have the base station with the
number of radio channels.

Frequencies used in one cell area will be reused at the same time in a different cell
that is far away. For example, the typical seven cell pattern can be used.

The cellular principle enables the following:


1. More efficient use of limited radio frequency resources.

2. Manufacturing of all subscriber devices in a region with the same set of


channels, so any mobile can be used anywhere within that region.

GSM- air interface


GSM stands for Global System for Mobile Communication. It is a digital mobile
network commonly utilized by mobile phone users around the world. It is the most
popular of the three digital wireless telephony systems (TDMA, GSM, and CDMA)
and uses the combination of FDMA and TDMA. It uses 4 different frequency bands
850 MHz, 900 MHz, 1800 MHz, and 1900 MHz. GSM converts and compresses data
before sending it along a channel with two other streams of user data, each with its
time slot.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

GSM have 4 different sizes of cells


 Macro: In this size of the cell, a Base Station antenna is installed.

 Micro: In this size of cell, antenna height is less than the average roof level.

 Pico: Small cells’ diameter of a few meters.

 Umbrella: It covers the shadowed (Fills the gaps between cells) regions.

Features of GSM
 Supports international roaming

 Clear voice clarity

 Ability to support multiple handheld devices.

 Spectral / frequency efficiency

 Low powered handheld devices.

 Ease of accessing network

 International ISDN compatibility.

 Low service cost.

 New features and services.

The Architecture of GSM


 BSS: BSS stands for Base Station Subsystem. BSS handles traffic and
signalling between a mobile phone and the network switching subsystem.
BSS having two components BTS and BSC.

 NSS: NSS stands for Network and Switching Subsystem. NSS is the core
network of GSM. That carried out call and mobility management functions for
mobile phone present in network. NSS have different components like VLR,
HLR and EIR.

 OSS: OSS stands for Operating Subsystem. OSS is a functional entity which
the network operator monitors and control the system. OMC is the part of

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

OSS. Purpose of OSS is to offer the customer cost-effective support for all
GSM related maintenance services.

1. MS: MS stands for Mobile System. MS comprises user equipment and software
needed for communication with a mobile network. Mobile Station (MS) = Mobile
Equipment (ME) + Subscriber Identity Module (SIM). Now, these mobile stations are
connected to tower and that tower connected with BTS through TRX. TRX is a
transceiver which comprises transmitter and receiver. Transceiver has two
performances of sending and receiving.

2. BTS : BTS stands for Base Transceiver Station which facilitates wireless
communication between user equipment and a network. Every tower has BTS.

3. BSC: BSC stands for Base Station Controller. BSC has multiple BTS. You can
consider the BSC as a local exchange of your area which has multiple towers and
multiple towers have BTS.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

4. MSC: MSC stands for Mobile Switching Center. MSC is associated with
communication switching functions such as call setup, call release and routing. Call
tracing, call forwarding all functions are performed at the MSC level. MSC is having
further components like VLR, HLR, AUC, EIR and PSTN.

5. OMC: OMC stands for Operation Maintenance Center. OMC monitor and
maintain the performance of each MS, BSC and MSC within a GSM system.

Three subsystem BSS, NSS and OSS are connected with each other via some
interfaces. Total three interfaces are there:

 Air Interface: Air interface is also known as UM interface. Interface between


MS and BTS is called as UM interface because it is mobile analogy to the U
interface of ISDN.

 Abi’s Interface: It is a BSS internal interface linking with BTS and BSC.

 An interface: It provides communication between BSS and MSC.

Channel Structure
In mobile computing, channel structure refers to the way information is carried
between a mobile device and a base station. Channels can be physical or logical,
and can be used for user data or signalling.

Physical channels
 Carry information over the air interface between the mobile device and the
base station

Logical channels
 Map user data and signaling information onto physical channels

 There are three main types of logical channels:

o Traffic channels: Carry call data

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

o Control channels: Communicate service information

o Cell broadcast channel: Transmits messages to be broadcast to all


mobile devices within a cell

Common control channels


 Transfer control information between all mobile devices and the base station

 Examples include:

o Random Access Channel (RACH)

o Paging Channel (PCH)

o Access Grant Control Channel (AGCH)

Channel allocation
 Deals with the allocation of channels to cells in a cellular network

 Once channels are allocated, cells can allow users within the cell to
communicate via the available channels

Location management- HLR-VLR


Location management involves efficiently tracking the location of mobile users
within a network to enable services like incoming calls, data delivery, and location-
based applications. This includes techniques like location registration (updates),
and finding or paging (searches) for a mobile user's current location.

Here's a more detailed explanation:

Key Concepts in Location Management:

 Location Registration (Update):

Mobile users periodically inform the network of their current location, enabling the
network to track their movements.

 Location Finding (Paging):

When the network needs to reach a specific mobile user (e.g., for an incoming call),
it initiates a search or paging process to find the user's current location.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

 Location Databases:

Networks maintain databases (like Home Location Registers - HLRs and Visitor
Location Registers - VLRs) to store and retrieve location information.

 Location Areas (Cells):

Networks are typically divided into areas or cells, allowing for more efficient location
tracking and paging.

Why is Location Management Important?

 Call Routing:

Location management is crucial for routing calls to the correct mobile station,
ensuring that incoming calls reach the intended user.

 Data Delivery:

Knowing the location of mobile users allows the network to efficiently deliver data
and other services to them.

 Location-Based Services:

Location management enables location-based services, where applications can


provide information and services based on the user's real-time location.

Different Location Management Schemes:

 Time-based updates: Mobile users update their location at predefined


intervals.

 Distance-based updates: Mobile users update their location when they


travel a certain distance from their last known location.

 Movement-based updates: Mobile users update their location only when


they change their activity state (e.g., moving or stationary).

 Replication techniques: The location information of mobile user is


replicated across multiple network nodes.

 Caching techniques: The location information of a mobile user is cached at


nearby nodes to reduce the lookup cost.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

 Selective paging techniques: Only a subset of nodes in the network are


paged to find a mobile user.

Hierarchical, Handoffs
Hierarchical architecture is a network design that organizes devices into layers
to improve performance and manage traffic. It's used in mobile computing to
optimize the use of cloud servers and edge computing.

How it works

 Data routing

Data is routed through high-performance switches instead of lower-


performance switches.

 Traffic management

The network is divided into manageable blocks to limit local traffic.

 Cloud server usage

Peak loads are aggregated across different tiers of cloud servers to maximize the
number of mobile workloads that can be served.

 Edge computing

The hierarchical level of edge computing is configured based on its computing


ability.

Benefits

 Improved performance: Higher speeds and fewer network bandwidth


issues

 Traffic management: Local traffic is limited to remain local

 Cloud server usage: Maximizes the number of mobile workloads that can be
served

 Edge computing: Provides layer-specific services to users with lower


latency

Related terms Hierarchical state routing (HSR), Hierarchical network model, and
Hierarchical topology.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

Handoff
In cellular communications, the handoff is the process of transferring an active call
or data session from one cell in a cellular network or from one channel to another.
In satellite communications, it is the process of transferring control from one earth
station to another. Handoff is necessary for preventing loss of interruption of service
to a caller or a data session user. Handoff is also called handover.

Types of Handoffs
There are two types of handoffs −

 Hard Handoff − In a hard handoff, an actual break in the connection occurs


while switching from one cell to another. The radio links from the mobile
station to the existing cell is broken before establishing a link with the next
cell. It is generally an inter-frequency handoff. It is a “break before make”
policy.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

 Soft Handoff − In soft handoff, at least one of the links is kept when radio
links are added and removed to the mobile station. This ensures that during
the handoff, no break occurs. This is generally adopted in co-located sites. It
is a “make before break” policy.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

Channel allocation in cellular systems


Channel Allocation means to allocate the available channels to the cells in a cellular
system. When a user wants to make a call request then by using channel allocation
strategies their requests are fulfilled. Channel Allocation Strategies are designed in
such a way that there is efficient use of frequencies, time slots and bandwidth.

Types of Channel Allocation Strategies:

These are Fixed, Dynamic, Hybrid Channel Allocation and Borrowing Channel
Allocation as explained as following below.

Fixed Channel Allocation (FCA):

Fixed Channel Allocation is a strategy in which fixed number of channels or voice


channels are allocated to the cells. Once the channels are allocated to the specific
cells then they cannot be changed. In FCA channels are allocated in a manner that
maximize Frequency reuse.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

Dynamic Channel Allocation (DCA):

Dynamic Channel allocation is a strategy in which channels are not permanently


allocated to the cells. When a User makes a call request then Base Station (BS) send
that request to the Mobile Station Center (MSC) for the allocation of channels or
voice channels. This way the likelihood of blocking calls is reduced. As traffic
increases more channels are assigned and vice-versa.

Hybrid Channel Allocation (HCA):

Hybrid Channel Allocation is a combination of both Fixed Channel Allocation (FCA)


and Dynamic Channel Allocation (DCA). The total number of channels or voice
channels are divided into fixed and dynamic set. When a user makes a call then first
fixed set of channels are utilized but if all the fixed sets are busy then dynamic sets
are used. The main purpose of HCA is to work efficiently under heavy traffic and to
maintain a minimum S/I.

Borrowing Channel Allocation (BCA):

when a cell experiences high traffic demand and all of its channels are occupied, it
can borrow channels from neighbouring cells that are not being used at that time.
The borrowed channels are assigned to the busy cell and are used to support the
additional traffic demand. Once the demand subsides, the borrowed channels are
released and returned to their home cell. BCA can be implemented manually or
automatically using algorithms or policies but the main disadvantage is that if the
borrowed channel is reclaimed by the original cell the call drop may occur.

CDMA
Code Division Multiple Access system is very different from time and frequency
multiplexing. In this system, a user has access to the whole bandwidth for the entire
duration. The basic principle is that different CDMA codes are used to distinguish
among the different users.

Techniques generally used are direct sequence spread spectrum modulation (DS-
CDMA), frequency hopping or mixed CDMA detection (JDCDMA). Here, a signal is
generated which extends over a wide bandwidth. A code called spreading code is
used to perform this action. Using a group of codes, which are orthogonal to each
other, it is possible to select a signal with a given code in the presence of many other
signals with different orthogonal codes.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

CDMA Capacity
The factors deciding the CDMA capacity are −

 Processing Gain

 Signal to Noise Ratio

 Voice Activity Factor

 Frequency Reuse Efficiency

General Packet Radio Service (GPRS)


GPRS is an expansion Global System for Mobile Communication. It is basically a
packet-oriented mobile data standard on the 2G and 3G cellular communication
network’s global system for mobile communication. GPRS was built up by European
Telecommunications Standards Institute (ETSI) because of the prior CDPD, and I-
mode packet switched cell advances.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

History Of GPRS:

GPRS was one of the main advances that empowered a cell system to interface with
Internet Protocol systems, accomplishing across the board reception in the mid-
2000s. The capacity to peruse the web from a telephone whenever through
“dependably on” data networking, while underestimated in a great part of the world
today, was as yet an oddity when it was introduced. Indeed, even now, GPRS keeps
on being utilized in parts of the world where it has been too expensive even to
consider upgrading cell organize framework to move up to newer alternatives.

Goals Of GPRS:

1. Consistent IP services

2. Leverage industry investment in IP

3. Open Architecture

4. Service innovation independent of infrastructure

Services Offered:

1. SMS messaging and broadcasting

2. Push-to-talk over cellular

3. Instant messaging and presence

4. Multimedia messaging service

5. Point-to-Point and Point-to-Multipoint services

Protocols supported:

1. Internet Protocol (IP)

2. Point-To-Point Protocol (PPP)

Benefits Of GPRS:

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

 Mobility:
The capacity to keep up consistent voice and information interchanges while
moving.

 Cost Efficient:
Communication via GPRS is cheaper than through the regular GSM network.

 Immediacy:
Allows customers to obtain connectivity when needed, regardless of location
and without a lengthy login session.

 Localization:
Enables customers to acquire data applicable to their present area.

 Easy Billing:
GPRS packet transmission offers an easier to use billing than that offered by
circuit switched administrations.

MAC for cellular system


In the context of mobile computing and cellular systems, MAC (Media Access
Control) refers to protocols and methods used to control access to a shared
communication medium, ensuring efficient and reliable transmission of data
between devices and the cellular network.

Here's a more detailed explanation:

 What is MAC?

MAC is a protocol layer within the Data Link Layer of the OSI model, responsible for
coordinating access to the shared wireless channel.

 Function:

It helps ensure that multiple devices can access the network without collisions and
that data is transmitted reliably and efficiently.

 In cellular networks:

The MAC layer in cellular networks (like GSM, UMTS, LTE, and 5G) is crucial for
managing the air interface and optimizing spectrum utilization, maximizing the
throughput of the cellular network.

Faculty Signature
SUNDER DEEP COLLEGE OF MANAGEMENT & TECHNOLOGY,
GHAZIABAD
(Affiliated with CCSU, MEERUT)
Topic Covered_____________________________________________________
Lecture No. __________ Date & Time of Delivering______________________

 Key aspects of MAC in Cellular Networks:

 Resource Allocation: MAC protocols determine how resources (e.g.,


bandwidth, time slots) are allocated to different mobile devices.

 Access Scheduling: The base station (BTS) controls access to the air
interface, scheduling downlink and uplink transmissions.

 Protocol Examples: In UMTS and LTE, the MAC protocol is specified


by 3GPP standards.

 MAC Address:

While the term "MAC" is often associated with the Media Access Control Address,
it's important to differentiate it from the MAC protocols that manage network
access. A MAC address is a unique identifier assigned to each network interface
controller (NIC) in a device.

Faculty Signature

You might also like