0% found this document useful (0 votes)
48 views41 pages

Mobile Computing Architecture

Uploaded by

evelynearbogusti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views41 pages

Mobile Computing Architecture

Uploaded by

evelynearbogusti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 41

Mobile Computing Architecture.

WAP
• Wireless Application Protocol
(WAP) is a technology that
enables mobile devices, such as
phones and PDAs, to access the
internet. It provides a
standardized way for users to
interact with internet services
instantly using wireless
connections. Let’s delve into the
key aspects of WAP:

This Photo by Unknown author is licensed under CC BY-SA.


Definition: WAP is an open, global specification.
WAP Purpose: Empowers mobile users with wireless devices to
access and interact with internet information and services.
Overview Components: WAP architecture includes various
components for seamless communication.
Main Wireless Access: Allows internet access via mobile phones
and PDAs.
Features of Global Standard: Widely adopted across the world.
WAP: Interoperability: Ensures compatibility with different devices
and networ
World-Wide Web Model: Traditional web model with HTML
content.
WAP Model: Optimized for mobile devices, using Wireless
Architecture: Markup Language (WML) for content presentation.
Components: Consists of gateways, servers, and clients.
• Mobile Browsing: Accessing websites on mobile devices.

Usage of • Messaging: Sending and receiving messages.


• Mobile Banking: Conducting financial transactions.
WAP • Location-Based Services: Utilizing location information.
Advantages • Portability: Access the internet from anywhere.
• Cost-Effective: Uses wireless networks.
of WAP • User-Friendly: Simplified interface for mobile screens.
• Limited Functionality: Due to small screens and reduced
processing power.
Disadvantage • Slower Speeds: Compared to wired connections.

s of WAP • Security Concerns: Vulnerabilities in early


implementations.
Wireless
Application
Protocol • The Wireless Application Protocol (WAP) is an open, global
specification that empowers mobile users with wireless
(WAP) devices to easily access and interact with information and
services instantly
Wireless
Application • WAP is a global standard and is not controlled by any
single company. Ericsson, Nokia, Motorola, and Unwired
Protocol Planet founded the WAP Forum in the summer of 1997
with the initial purpose of defining an industry-wide
(WAP) Cont'd specification for developing applications over wireless
communications networks. The WAP specifications define
a set of protocols in application, session, transaction,
security, and transport layers, which enable operators,
manufacturers, and applications providers to meet the
challenges in advanced wireless service differentiation and
fast/flexible service creation.
• In the past, wireless Internet access has been limited by
the capabilities of handheld devices and wireless networks.
WAP utilizes Internet standards such as XML, user
Why Choose datagram protocol (UDP), and Internet protocol (IP). Many
of the protocols are based on Internet standards such as
WAP? hypertext transfer protocol (HTTP) and TLS but have been
optimized for the unique constraints of the wireless
environment: low bandwidth, high latency, and less
connection stability.
Why Choose • Internet standards such as hypertext markup language
WAP? (HTML), HTTP, TLS and transmission control protocol (TCP)
are inefficient over mobile networks, requiring large
amounts of mainly text-based data to be sent. Standard
HTML content cannot be effectively displayed on the small-
size screens of pocket-sized mobile phones and pagers
• WAP utilizes binary transmission for greater compression
Why Choose of data and is optimized for long latency and low
bandwidth. WAP sessions cope with intermittent coverage
WAP? and can operate over a wide variety of wireless transports.
WML and wireless markup language script (WML Script)
are used to produce WAP content. They make optimum
use of small displays, and navigation may be performed
with one hand. WAP content is scalable from a two-line
text display on a basic device to a full graphic screen on the
latest smart phones and communicators.
The • The lightweight WAP protocol stack is designed to
lightweight minimize the required bandwidth and maximize the
number of wireless network types that can deliver WAP
WAP content. Multiple networks will be targeted, with the
additional aim of targeting multiple networks. These
protocol include global system for mobile communications (GSM)
900, 1,800, and 1,900 MHz; interim standard (IS)–136;
stack digital European cordless communication (DECT); time-
division multiple access (TDMA), personal communications
service (PCS), FLEX, and code division multiple access
(CDMA). All network technologies and bearers will also be
supported, including short message service (SMS), USSD,
circuit-switched cellular data (CSD), cellular digital packet
data (CDPD), and general packet radio service (GPRS)
The
lightweight
WAP • As WAP is based on a scalable layered architecture, each
layer can develop independently of the others. This makes
protocol it possible to introduce new bearers or to use new
transport protocols without major changes in the other
stack layers. 242 WAP will provide multiple applications, for
business and customer markets such as banking, corporate
database access, and a messaging interface.
• The following figure gives an overview of the WAP
architecture, its protocols and components, and compares
this architecture with the typical internet architecture
when using the World Wide Web. The basis for
WAP transmission of data is formed by different bearer services.
WAP does not specify bearer services, but uses existing
Architecture data services and will integrate further services. Examples
are message services, such as short message service (SMS)
of GSM, circuit-switched data, such as high-speed circuit
switched data (HSCSD) in GSM, or packet switched data,
such as general packet radio service (GPRS) in GSM. Many
other bearers are supported, such as CDPD, IS-136, PHS
WAP
• The WAP datagram protocol (WDP) and the additional
Architecture Wireless control message protocol (WCMP) is the transport
layer that sends and receives messages via any available
bearer network, including SMS, USSD, CSD, CDPD, IS–136
packet data, and GPRS. The transport laye
• service access point (T-SAP) is the common interface to be
used by higher layers independent of the underlying
network.
• The next higher layer, the security layer with its wireless
transport layer security protocol WTLS offers its service at
the security SAP (SEC-SAP). WTLS is based on transport
layer security (TLS, formerly SSL, secure sockets layer).
WTLS: WTLS has been optimized for use in wireless networks with
narrow-band channels. It can offer data integrity, privacy,
authentication, and (some) denial-of-service protection
• The WAP transaction protocol (WTP) layer provides
transaction support, adding reliability to the datagram
WTP service provided by WDP at the transaction SAP (TR-SAP).
• The session layer with the wireless session protocol (WSP)
currently offers two services at the session-SAP (S-SAP),
one connection-oriented and one connectionless if used
directly on top of WDP. A special service for browsing the
WSP: web (WSP/B) has been defined that offers HTTP/1.1
functionality, long-lived session state, session suspend and
resume, session migration and other features needed for
wireless mobile access to the web
• The application layer with the wireless application
environment (WAE) offers a framework for the integration
WAE: of different www and mobile telephony applications.
• WAP does not always force all applications to use the
whole protocol architecture. Applications can use only a
part of the architecture. For example, if an application
does not require security but needs the reliable transport
of data, it can directly use a service of the transaction
layer. Simple applications can directly use WDP
Working of • Different scenarios are possible for the integration of WAP
components into existing wireless and fixed networks. On
WAP the left side, different fixed networks, such as the
traditional internet and the public switched telephone
network (PSTN), are shown. One cannot change protocols
and services of these existing networks so several new
elements will be implemented between these networks
and the WAP-enabled wireless, mobile devices in a
wireless network on the right-hand side
• Wireless Datagram Protocol defines the movement of
Wireless information from receiver to the sender and resembles the
User Datagram Protocol in the Internet protocol suite.
Datagram • WDP offers a consistent service at the Transport Service
Protocol Access Point to the upper layer protocol of WAP. This
consistency of service allows for applications to operate
(WDP) transparently over different available bearer services. WDP
can be mapped onto different bearers, with different
characteristics. In order to optimise the protocol with
respect to memory usage and radio transmission
efficiency, the protocol performance over each bearer may
vary
• Ericsson, the Swedish manufacturer of mobile telephones,
had been developing for several years a technology that
What is was aimed at freeing computers, phones, and other
devices from the wires required to transfer data between
Bluetooth? them. In 1998 Ericsson assembled a consortium of
computer and electronics companies, known as the
Bluetooth SIG (Special Interest Group), to bring the
technology to the consumer market.
• Ericsson, the Swedish manufacturer of mobile
Who telephones, had been developing for several years a
technology that was aimed at freeing computers,
developed phones, and other devices from the wires required to
transfer data between them. In 1998 Ericsson
Bluetooth? assembled a consortium of computer and electronics
companies, known as the Bluetooth SIG (Special
Interest Group), to bring the technology to the
consumer market.
When did
Bluetooth
first become • Bluetooth 1.0 specifications were released in 1999. The
technology first appeared in mobile phones and
available? desktop computers in 2000 and spread to printers and
mobile computers (laptops) the following year
Bluetooth is named for Harald I Bluetooth, the 10th-century Danish
king who unified Denmark and Norway.
Bluetooth, technology standard used to enable short-range
wireless communication between electronic devices. Bluetooth was
developed in the late 1990s and soon achieved massive popularity in
consumer devices.
Why is it •In 1998 Ericsson, the Swedish manufacturer of mobile telephones,
assembled a consortium of computer and electronics companies to
called bring to the consumer market a technology they had been
developing for several years that was aimed at freeing computers,
Bluetooth? phones, personal digital assistants (PDAs), and other devices from
the wires required to transfer data between them. Because
the protocol would operate on radio frequencies, rather than
the infrared spectrum used by traditional remote controls, such
devices would not have to maintain a line of sight to communicate.
Bluetooth, named for Harald I Bluetooth, the 10th-century Danish
king who unified Denmark and Norway, was developed to enable a
wide range of devices to work together. Its other key features were
low power usage—enabling simple battery operation—and relatively
low cost.
• A Cellular Network is formed of some cells. The cell covers a
geographical region and has a base station analogous to 802.11 AP
which helps mobile users attach to the network and there is an air
interface of physical and data link layer protocol between mobile and
base station. All these base stations are connected to the Mobile
Switching Center which connects cells to a wide-area net, manages
call setup, and handles mobility.
Cellular • There is a certain radio spectrum that is allocated to the base station
and to a particular region and that now needs to be shared. There
Networks are two techniques for sharing mobile-to-base station radio spectrum
• Combined FDMA/TDMA: It divides the spectrum into frequency
channels and divides each channel into time slots.
• Code Division Multiple Access (CDMA): It allows the reuse of the
same spectrum over all cells. Net capacity improvement. Two
frequency bands are used one of which is for the forwarding channel
(cell-site to subscriber) and one for the reverse channel (sub to cell-
site).


Cellular • There is a certain radio spectrum that is allocated to the
base station and to a particular region and that now needs
Networks to be shared. There are two techniques for sharing mobile-
to-base station radio spectrum
Cell In practice, cells are of arbitrary shape(close to a circle)
because it has the same power on all sides and has same
Fundamentals sensitivity on all sides, but putting up two-three circles
together may result in interleaving gaps or may intersect each
other so order to solve this problem we can use equilateral
triangle, square or a regular hexagon in which hexagonal cell
is close to a circle used for a system design. Co-channel
reuse ratio is given by:
• DL/RL = Square root of (3N)
The number of cells in cluster N determines the amount of
Cell co-channel interference and also the number of
frequency channels available per cell.
Fundamental • Where,
s • DL = Distance between co-channel cells
• RL = Cell Radius
• N = Cluster Size
• When the number of
subscribers in a given
area increases
allocation of more
channels covered by
Cell Splitting that channel is
necessary, which is
done by cell splitting. A
single small cell
midway between two
co-channel cells is
introduced.

Need for
Cellular
Extending the coverage to the areas that are difficult to cover
Hierarchy by a large cell. Increasing the capacity of the network for
those areas that have a higher density of users. An increasing
number of wireless devices and the communication between
them.
• Femtocells: The smallest unit of the hierarchy, these cells
need to cover only a few meters where all devices are in
the physical range of the uses.

Cellular • Picocells: The size of these networks is in the range of a


few tens of meters, e.g., WLANs.
Hierarchy • Microcells: Cover a range of hundreds of meters e.g. in
urban areas to support PCS which is another kind of mobile
technology.
• Macrocells: Cover areas in the order of several kilometers,
e.g., cover metropolitan areas.
• Mega cells: Cover nationwide areas with ranges of
hundreds of kilometers, e.g., used with satellites.
• or a particular channel, the frequency band which is
associated is fixed. The total number of channels is given
by
• Nc = W/B

Fixed Channel • Adjacent radio frequency bands are assigned to different


cells. In analog, each channel corresponds to one user
Allocation while in digital each RF channel carries several time slots
or codes (TDMA/CDMA). Simple to implement as traffic is
uniform
• Where,
• W = Bandwidth of the available spectrum,
• B = Bandwidth needed by each channels
per cell,
• Cc = Nc/N where N is the cluster size
• GSM uses 124 frequency channels, each of which uses an
8-slot Time Division Multiplexing (TDM) system. There is a
• Global System frequency band that is also fixed. Transmitting and
for Mobile (GSM) receiving do not happen in the same time slot because the
GSM radios cannot transmit and receive at the same time
Communications and it takes time to switch from one to the other. A data
frame is transmitted in 547 microseconds, but a
transmitter is only allowed to send one data frame every
4.615 microseconds since it is sharing the channel with
seven other stations. The gross rate of each channel is 270,
833 bps divided among eight users, which gives 33.854
kbps gross.
• Apart from user channels, there are some control channels
which is used to manage the system.

Control • The broadcast control channel (BCC): It is a continuous


stream of output from the base station’s identity and the
Channel (CC) channel status. All mobile stations monitor their signal
strength to see when they move into a new cell.
• The dedicated control channel (DCC): It is used for location
updating, registration, and call setup. In particular, each
base station maintains a database of mobile stations.
Information needed to maintain this database is sent to
the dedicated control channel.
Common • Three logical sub-channels are:
• Is the paging channel, that the base station uses to
Control announce incoming calls. Each mobile station monitors it
continuously to watch for calls it should answer.
Channel • Is the random access channel that allows the users to
request a slot on the dedicated control channel. If two
requests collide, they are garbled and have to be retried
later.
• Is the access grant channel which is the announced
assigned slot.
• Mobile and fixed users can connect using it. Voice and data
Advantages services also provided.
• Has increased capacity & easy to maintain.
of Cellular • Easy to upgrade the equipment & has consumes less
Networks power.
• It is used in place where cables can not be laid out because
of its wireless existence.
• To use the features & functions of mainly all private and
public networks.
• Can be distributed to the larger coverage of areas.
• It provides a lower data rate than wired networks like fiber
Disadvantages optics and DSL. The data rate changes depending on
wireless technologies like GSM, CDMA, LTE, etc.
of Cellular • Macrophage cells are impacted by multipath signal loss.

Networks • To service customers, there is a limited capacity that


depends on the channels and different access techniques.
• Due to the wireless nature of the connection, security
issues exist.
• For the construction of antennas for cellular networks, a
foundation tower and space are required. It takes a lot of
time and labor to do this.

You might also like