100% found this document useful (1 vote)
158 views26 pages

Mobile Computing Emerging Technologies

The document provides an overview of emerging mobile computing technologies including Bluetooth, RFID, WiMAX, and IPv6. It describes Bluetooth in detail, including its history, specifications, protocols, security features, and application models. It also summarizes RFID technologies, describing RFID tags based on frequency, applications, and power levels as well as RFID system components and coupling methods.

Uploaded by

Shweta Yadav
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
158 views26 pages

Mobile Computing Emerging Technologies

The document provides an overview of emerging mobile computing technologies including Bluetooth, RFID, WiMAX, and IPv6. It describes Bluetooth in detail, including its history, specifications, protocols, security features, and application models. It also summarizes RFID technologies, describing RFID tags based on frequency, applications, and power levels as well as RFID system components and coupling methods.

Uploaded by

Shweta Yadav
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 26

Mobile Computing Chapter 4 Emerging Technologies

Emerging Technologies
Bluetooth Radio Frequency Identification (RFID) WiMAX Mobile IP IPv6 Java Card

Bluetooth
Name comes from nickname of Danish King Harald Blatand Allows users to make ad hoc wireless connections between devices like mobile phones, desktop or notebook computers wirelessly Data transfer at a speed of about 720 Kbps within 50 meters (150 feet) of range or beyond through walls, clothing and even luggage bags Built into a small microchip Operates in a globally available frequency band ensuring worldwide interoperability Managed and maintained by Bluetooth Special Interest Group

Bluetooth Protocol
Uses the unlicensed 2.4 GHz ISM (Industrial Scientific and Medical) frequency band 79 available channels spaced 1 MHz apart from 2.402 GHz to 2.480 GHz Allows power levels starting from 1mW (covering 10 centimeters) to 100mW (covering upto 100 meters) suitable for short device zone to personal area networks within a home Supports both unicast (point-to-point) and multicast (point-tomultipoint) connections Bluetooth protocols are a collection of many inter-related protocols

Bluetooth Protocol
Uses the master and slave relationship Master and slaves together form a Piconet when master allows slaves to talk Up to seven slave devices can be set to communicate with a master in a Piconet Scatternet is formed when several of Piconets are linked together to form a larger network in an ad hoc manner

Bluetooth Protocol
Scatternet is a topology where a device from one Piconet also acts as a member of another Piconet wherein a device being a master in one Piconet can simultaneously be a slave in the other one

Bluetooth Protocol
Bluetooth Core protocols plus Bluetooth radio protocols are required by most of Bluetooth devices Uses spread spectrum technologies at the Physical Layer while using both direct sequence and frequency hopping spread spectrum technologies Uses connectionless (ACL Asynchronous Connectionless Link) and connection-oriented (SCO Synchronous Connection-oriented Link) links Cable Replacement layer, Telephony Control layer and Adopted protocol layer form application-oriented protocols

Bluetooth Protocol Stack

OBEX Object Exchange Protocol TCS BIN Telephony Control Specification Binary WAE Wireless Application Environment SDP Service Discovery Protocol WAP Wireless Application Protocol RFCOMM Radio Frequency Communication LMP Link Manager Protocol L2CAP Logical Link Control and Adaptation Protocol

Bluetooth Protocol Stack


1. 2. 3. 4. Bluetooth Core Protocols Cable Replacement Protocol Telephony Control Protocols Adopted Protocols

Bluetooth Core Protocols


Baseband enables physical RF link Link Manager Protocol (LMP) manages devices in range, power modes, connections, duty cycles, etc. Logical Link Control and Adaptation Protocol (L2CAP) segmentation and re-assembly of fragmented packets with their multiplexing Service Discovery Protocol (SDP) Enables a device to join a Piconet

Cable Replacement Protocol


Radio Frequency Communication (RFCOMM) emulates RS232 control and data signals over Bluetooth baseband protocol

Telephony Control Protocols


Telephony Control Specification Binary (TCS BIN) defines the call control signaling protocol and handles mobility management for groups of Bluetooth TCS devices Attention (AT) Commands defines a set of commands by which a mobile phone can be used and controlled as a modem for fax and data transfers

Adopted Protocols
Point-to-Point Protocol (PPP) means of taking IP packets to/from the PPP layer and placing them onto the LAN Transmission Control Protocol/Internet Protocol (TCP/IP) used for communication across the Internet Object Exchange (OBEX) Protocol session protocol to exchange objects and used to browse the contents of folders on remote devices Content Formats used to exchange messages and notes and synchronize data amongst various devices

Bluetooth Security
Offers security infrastructure starting from authentication, key exchange to encryption Uses the publicly available cipher algorithm known as SAFER + to authenticate a devices identity

Bluetooth Application Models


Each application model in Bluetooth is realized through a Profile, Profiles define the protocols and protocol features supporting a particular usage model. Some common profiles are: File Transfer Internet Bridge LAN Access Synchronization Headset

RFID
Radio Frequency Identification Radio transponder (known as RFID tags) carrying an ID (Identification) can be read through radio frequency (RF) interfaces Tag is attached to the object and data within the tag provides identification for the object Object could be an entity in a manufacturing shop, goods in transit, item in a retail store, a vehicle in a parking lot, a pet, or a book in a library

RFID System
Comprises of different functional areas like: Means of reading or interrogating Mechanism to filter some of the data Means to communicate the data in the tag with a host computer Means for updating or entering customized data into the tag

RFID Tags
Three basic criteria for categorisation: Frequency Application Power levels

RFID tags based on frequency


Works on six frequencies of 132.4 KHz, 13.56 MHz, 433 MHz, 918 MHz, 2.4 GHz and 5.8 GHz Low frequency range tags are slow in data transfer and suitable for slow moving objects, security access, asset tracking and animal identification applications High frequency range tags offer long reading ranges and high data transfer speed and are used for fast moving objects like railway wagon tracking and identification of vehicles on freeways for automated toll collection Higher the frequency, higher the data transfer rates

RFID tags based on applications


Speed of the object and distance to be read determines the type of tag to be used RFID systems follow contact-less and non line-of-sight nature of the technology Tags can be read at high speeds RFID tag contains two segments of memory one segment is a factory set and used to uniquely identify a tag while the other one is used by the application Read/write capability of a RFID system is an advantage in interactive applications such as work-in-process or maintenance tracking

RFID tags based on power levels


Two types Active and Passive tags Passive tags are generally in low frequency range Tags at higher frequency range can be either active or passive

Active Tags
Powered by an internal battery and are typically read/write Memory can vary from a few bytes to 1 MB Battery supplied power of an active tag generally gives it a longer read range Greater the size, greater the cost and a limited operational life

Passive Tags
Operate without own power source Obtains operating power from the readers antenna Data within a passive tag is read only and generally cannot be changed during operation Lighter, less expensive and offer a virtually unlimited operational life Have shorter read ranges than active tags and require a high powered reader Data is usually 32 to 128 bits long

Components of an RFID system


A transponder programmed with unique information (RFID tag) A transceiver with decoder (a reader) An antenna or coil Close proximity passive tags rely on electromagnetic or inductive coupling techniques whereas active tags are based upon propagating electromagnetic waves techniques

Coupling in Passive and Active RFID tags

(a) Passive RFID tags

(b) Active RFID tags

Application areas for RFID


Transportation and Logistics Manufacturing and Processing Security Animal tagging Retail store and enterprise stores Community library Time and attendance Postal tracking Airline baggage reconciliation Road toll management

You might also like