Mobile Computing Emerging Technologies
Mobile Computing Emerging Technologies
Emerging Technologies
Bluetooth Radio Frequency Identification (RFID) WiMAX Mobile IP IPv6 Java Card
Bluetooth
Name comes from nickname of Danish King Harald Blatand Allows users to make ad hoc wireless connections between devices like mobile phones, desktop or notebook computers wirelessly Data transfer at a speed of about 720 Kbps within 50 meters (150 feet) of range or beyond through walls, clothing and even luggage bags Built into a small microchip Operates in a globally available frequency band ensuring worldwide interoperability Managed and maintained by Bluetooth Special Interest Group
Bluetooth Protocol
Uses the unlicensed 2.4 GHz ISM (Industrial Scientific and Medical) frequency band 79 available channels spaced 1 MHz apart from 2.402 GHz to 2.480 GHz Allows power levels starting from 1mW (covering 10 centimeters) to 100mW (covering upto 100 meters) suitable for short device zone to personal area networks within a home Supports both unicast (point-to-point) and multicast (point-tomultipoint) connections Bluetooth protocols are a collection of many inter-related protocols
Bluetooth Protocol
Uses the master and slave relationship Master and slaves together form a Piconet when master allows slaves to talk Up to seven slave devices can be set to communicate with a master in a Piconet Scatternet is formed when several of Piconets are linked together to form a larger network in an ad hoc manner
Bluetooth Protocol
Scatternet is a topology where a device from one Piconet also acts as a member of another Piconet wherein a device being a master in one Piconet can simultaneously be a slave in the other one
Bluetooth Protocol
Bluetooth Core protocols plus Bluetooth radio protocols are required by most of Bluetooth devices Uses spread spectrum technologies at the Physical Layer while using both direct sequence and frequency hopping spread spectrum technologies Uses connectionless (ACL Asynchronous Connectionless Link) and connection-oriented (SCO Synchronous Connection-oriented Link) links Cable Replacement layer, Telephony Control layer and Adopted protocol layer form application-oriented protocols
OBEX Object Exchange Protocol TCS BIN Telephony Control Specification Binary WAE Wireless Application Environment SDP Service Discovery Protocol WAP Wireless Application Protocol RFCOMM Radio Frequency Communication LMP Link Manager Protocol L2CAP Logical Link Control and Adaptation Protocol
Adopted Protocols
Point-to-Point Protocol (PPP) means of taking IP packets to/from the PPP layer and placing them onto the LAN Transmission Control Protocol/Internet Protocol (TCP/IP) used for communication across the Internet Object Exchange (OBEX) Protocol session protocol to exchange objects and used to browse the contents of folders on remote devices Content Formats used to exchange messages and notes and synchronize data amongst various devices
Bluetooth Security
Offers security infrastructure starting from authentication, key exchange to encryption Uses the publicly available cipher algorithm known as SAFER + to authenticate a devices identity
RFID
Radio Frequency Identification Radio transponder (known as RFID tags) carrying an ID (Identification) can be read through radio frequency (RF) interfaces Tag is attached to the object and data within the tag provides identification for the object Object could be an entity in a manufacturing shop, goods in transit, item in a retail store, a vehicle in a parking lot, a pet, or a book in a library
RFID System
Comprises of different functional areas like: Means of reading or interrogating Mechanism to filter some of the data Means to communicate the data in the tag with a host computer Means for updating or entering customized data into the tag
RFID Tags
Three basic criteria for categorisation: Frequency Application Power levels
Active Tags
Powered by an internal battery and are typically read/write Memory can vary from a few bytes to 1 MB Battery supplied power of an active tag generally gives it a longer read range Greater the size, greater the cost and a limited operational life
Passive Tags
Operate without own power source Obtains operating power from the readers antenna Data within a passive tag is read only and generally cannot be changed during operation Lighter, less expensive and offer a virtually unlimited operational life Have shorter read ranges than active tags and require a high powered reader Data is usually 32 to 128 bits long