0% found this document useful (0 votes)
7 views119 pages

Mobile Computing

The document outlines various features and technologies of mobile communication, including scalability, network management, and access control. It discusses multiplexing techniques such as Frequency Division Multiplexing (FDM), Time Division Multiplexing (TDM), and Wavelength Division Multiplexing (WDM), along with their advantages, disadvantages, and applications. Additionally, it covers the evolution of mobile communication from GSM to 4G and LTE, highlighting their features, benefits, and challenges.

Uploaded by

Ritam Chatterjee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views119 pages

Mobile Computing

The document outlines various features and technologies of mobile communication, including scalability, network management, and access control. It discusses multiplexing techniques such as Frequency Division Multiplexing (FDM), Time Division Multiplexing (TDM), and Wavelength Division Multiplexing (WDM), along with their advantages, disadvantages, and applications. Additionally, it covers the evolution of mobile communication from GSM to 4G and LTE, highlighting their features, benefits, and challenges.

Uploaded by

Ritam Chatterjee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 119

FEATURES OF MOBILE

COMMUNICATION
• When one access point is overloaded, the system will automatically
choose a different access point based on the available capacity.
• 1.3.1 Scalability: Wireless devices continue to grow without having to rework
or re-create the entire network.
• 1.3.2 Network management system: There variety of different components in
wireless networks, such as access points, firewalls, switches, and managed
power. Wireless networks offer a better way to manage the entire network.
• 1.3.3 Role based access control: Using role-based access control (RBAC), you
are able to assign roles based on what, who, where, when and how a user or
device is trying to access your network. Access control rules or policies can then
be enforced based on the ends or roles of the device.
• 1.3.4 Provide outdoor and indoor coverage options: Your wireless system
should provide outdoor and indoor coverage.
• 1.3.5.1 Roaming: As you move throughout your office or even from one building
to another, you won't experience dropped connections, slower speeds or any
interruptions in service.
• 1.3.5.2 Redundancy: Depending on your specific needs and environment, your
wireless system may require varying levels of redundancy.
Firewall
• Having the right firewall in place will help you in many ways:
(a) Apps and users can be viewed and controlled.
(b) Reduce complexity by Antivirus protection. Deep Packet Inspection
(DPI) Filtering applications.
(c) Ensure your network and users are protected against known and
unknown threads including: zero-day, encrypted malware, ransomware,
malicious botnets.
MULTIPLEXING
• Multiplexing is a method of combining multiple analog or digital
signals into one over a shared medium. In mobile computing,
communications, and computer networks, multiplexing can be used
to combine analog or digital signals.
Types of Multiplexing

• 1. Frequency Division Multiplexing (FDM)


• 2. Time Division Multiplexing(TDM)
• 3. Code Division Multiplexing(CDM)
Frequency Division Multiplexing
(FDM)
• There are several signals being transmitted simultaneously, and each
source transmits its signals within the allotted frequency range. The
two adjacent signals are separated by a suitable frequency gap to
avoid overlapping.
Advantages of FDM:

1. Easy to implement.
2. Efficient even when traffic is constant.
3. No equalization required.
4. It can be possible to increase capacity by reducing the knowledge bit rate and using
efficient digital codes.
5. It is not difficult to implement technological advances. For instance, systems are
often designed so that improvement in terms of speech coders can be incorporated
easily.
6. Since FDMA systems use low bit rates (large symbol time) in comparison to average
delay spread, they are less expensive and exhibit low Inter Symbol Interference (ISI).
Disadvantages of FDM:

1. Guard Bands, although necessary, can also be seen as a wastage of capacity.


2. Network planning is time critical.
3. Low capacity of traffic.
4. Requires expensive multi-channel receivers.
5. The system may be more expensive if RF (Radio Frequency) filters must
meet stringent specifications for adjacent channel rejection.

• 6. Due to the fact that channels are assigned for a single user, there are idle
channels in a general system.
Applications of FDM:
FDM is used in:
1. Telephone system.
2. FM & AM Radio broadcasting.
3. Cable TV.
4. Walkie talkies.
5. Mobile network for a closed user group. e.g. Wi-Fi.
6. Total access communication systems (TACS)
7. 2G mobile communication.
Time Division Multiplexing(TDM)
• Time Division Multiplexing (TDM) is a multiplexing technique that
enables multiple data signals to be carried in different time slots over
a common communication channel.
• One frame is said to be transmitted when its entire signal gets
transmitted across the channel. Time slots are used to divide the
overall time domain into multiple fixed length time slots.
Synchronous TDM
• In Synchronous TDM, each time slot is pre-assigned to a constant
source.
• It is based on the assumption that data will be present at the source
regardless of how the slots are allocated in advance.
• This results in wastage of channel capacity since time slots are
completely wasted in the absence of data.
Asynchronous TDM
• Asynchronous TDM, also known as statistical division multiplexing, is a
method in which time slots are allocated only to machines that have
the required information to send data.
Advantages of TDM:

1. TDM is very flexible.


2. The circuitry is not as complex,
3. Cross talk problem is not so severe.
4. The channel bandwidth can be completely utilised for each channel.
Disadvantages of TDM:

1. Synchronization is required.
2. The implementation is complex.
3. Slow narrowband fading may wipe out all TDM channels.
Applications of TDM:

1. It is used in SONET (Synchronous Optical Networking).


2. It is deployed in a public switched telephone network.
3. It's found in telephone wired lines.
4. It is used in digital audio mixing systems.
5. It is used in a half duplex communication system.
6. It is used in GSM.
Wavelength Division
Multiplexing
• Wavelength Division Multiplexing (WDM) is a networking technique
that allows multiple data signals to be simultaneously transmitted
over a common frequency band.
• The technology of WDM is used when multiple users are permitted to
share one communication channel.
Advantages of WDM:

1. The WDM channel is not effectively decodable, thus it provides enhanced


protection for cell communication.
2. Due to the greater number of clients per MHz of data transmission, it has multiple
times the limit of GSM so it provides better inclusion and requires fewer reception
devices. It also burns-through less force to expand client limits.
3. The voice quality is just as good as the sign quality.
4. There is flexibility in the asset designation.
5. It is incredibly efficient.
6. There is no need for synchronization with WDM.
7. It can transmit data to a large number of clients simultaneously.
Disadvantages of WDM:

1. It requires time synchronization.


2. As the number of clients increases, WDM framework execution
degrades.
3. As a WDM user, choosing the code length can be a laborious process,
since it can cause delays.
4. The quality of administration diminishes when the amount of clients
expands.
5. When we use WDM strategies, we encounter the close-far issue, Self-
sticking issue.
Applications of WDM:

1. It is used for military and commercial applications.


2. It is implemented in mobile communications.
3. It is also used in radar and navigation systems.
GSM(GLOBAL SYSTEM FOR MOBILE
COMMUNICATION)

• A mobile phone uses GSM technology, which is an open and digital


cellular protocol. There are four different frequency bands used by this
technology, including 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz. It
combines FDMA and TDMA.
• During the early 1970s, Bell Laboratories developed a cell-based mobile
radio system that formed the basis for GSM.
• Four separate components make up GSM networks:
• The mobile phone
• The base station system (BSS)
• The network switching system (NSS)
• The operation and support system (OSS)
Advantages of GSM:

1. GSM provides worldwide roaming for its customers.


2. Due to its unique devices and facilities, GSM is extremely secure.
3. Spectrum efficiency and clear voice calls.
4. You can send short messages, view your caller's ID, place a call on
hold, and forward your calls.
5. AD is available on Integrated Services Digital Network (ISDN) and
other telephone company services.
Disadvantages of GSM:

1. As multiple users share the same bandwidth, bandwidth lag can


occur.
2. Due to the interference that is caused by pulse transmission
technology, some electronics, such as hearing aids, cannot be used in
certain places, such as hospitals, airports, and petrol pumps.
3. Repeaters are needed to increase coverage.
4. The maximum call range of GSM is 35 km.
5. The data of users is not encrypted end-to-end.
GPRS AND 2.5G
• General Packet Radio Service (GPRS) is a packet-oriented mobile data
standard.
• European Telecommunications Standards Institute (ETSI) developed GPRS .
• The technology allows mobile data to be transmitted and received more
efficiently, more quickly, and more cheaply.
• Mobile devices using GPRS are always connected to the internet, making
them always online and liable for data usage charges.
• There is a maximum speed range of 7 KB/s to 14 KB/S on GPRS. It is called
2.5G, which is the state of wireless technology between the second and
third generations of wireless technology: before and after General Packet
Radio Services (GPRS).
• It is called so because it is in the middle of 2G and 3G.
Features of GPRS

1. It is a packet-based data network that is well suited for non-real-time Internet


applications, such as retrieving email, fax messages, and asymmetric web browsing, where
users download more data than they upload.
2. Multi-user GPRS networks share individual radio channels and time slots among users.
3. In contrast to HSCSD, GPRS can support many more users, but in a burst manner.
4. An IS-136 or GSM-based packet network is provided by the GPRS standard. For better
packet data access, GPRS retains the original modulation formats of 2G TDMA while using
a completely redesigned air interface.
5. A user can achieve as much as 171.2 kbps using all 8 Time-slots of an individual GSM
radio channel.
6. Data payloads carried in GPRS must be error corrected by the applications.
Services offered by GPRS

1. SMS messaging and broadcasting


2. Multimedia messaging service (MMS)
3. Push-to-talk over cellular (PoC)
4. Instant messaging and presence—wireless village
5. Point-to-point (P2P) service
6. Through wireless application protocol (WAP), smart devices can access the Internet
7. Point-to-multipoint (P2M) service
8. If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per
minute may be achieved. This is much faster than using the ordinary SMS over GSM,
whose SMS transmission speed is about 6 to 10 SMS messages per minute.
THIRD GENERATION (3G)
• In the early 1980s, the International Telecommunication Union (ITU)
carried out research and development on 3G technology.
• This new generation of wireless technology allows handheld devices
to access high-speed data and voice services.
• 3G networks will provide multimedia services combining voice and
data.
3G WiFi
• A device that includes cellular data service of the third generation
(3G) as well as Wi-Fi is a 3G Wifi.
• In recent years, Apple's iPad and Amazon's Kindle readers have been
among the first to offer 3G and Wi-Fi connectivity.
• When a mobile phone is equipped with both 3G and Wi-Fi, it is
possible to access the Internet regardless of where the user is located.
• When the mobile phone is equipped with only Wi-Fi, the user is
required to be near a Wi-Fi hotspot at home, work, or a café or hotel.
Advantages of 3G

1. Overcrowding in existing systems can be relieved by adding new radio spectrum.


2. The capacity, security, and reliability of the network is increased.
3. A device that is always online, 3G uses IP connectivity, which is packet-based (not circuit based).
4. As the third generation of data communication and mobile phone standards, 3G offers higher
bandwidth for video and web-based applications. It offers faster data transfer and better voice quality
than 2G, 2.5G, GPRS, and 2.75G EDGE networks.
5. Wireless voice, video, and data services are included in 3G Services.
6. The 3G network supports services with at least 144 kbit/s of information transfer rate. As a result of
further 3G releases, known as 3.5G and 3.7G, smartphones as well as mobile modems in laptop
computers can also access mobile broadband of several Mbit/s. As a result, it can be used for wireless
voice calls, mobile Internet access, fixed wireless Internet access, video calls and mobile TV services.
7. There are several 3G systems, including the Universal Mobile Telecommunications System (UMTS),
Wideband CDMA (W-CDMA), and Code Division Multiple Access 2000 (CDMA2000).
Disadvantages of 3G

1. Requires different handsets.


2. Insufficient bandwidth.
3. High power consumption.
4. It is very expensive to upgrade base stations and cellular
infrastructure to 3G.
5. Closer base stations are required making it more costly.
6. Costly spectrum-licence, expensive network deployments, and
subsidies for handsets.
3G is being phased out for what
reason?
• It is expected that AT&T will terminate its "third generation"
telecommunications network to devote more bandwidth to
developing much more advanced 5G networks.
• People who use 3G or some 4G devices without VOLTE (Voice over
LTE) won't be able to access the Internet.
FOURTH GENERATION (4G)

• 4G connections connect mobile devices to mobile networks via an


antenna that transmits radio waves.
• MIMO (Multiple Input Multiple Output) and OFDM (Orthogonal
Frequency Division Multiplexing) are used for 4G transmission and
reception.
• Compared to 3G, MIMO and OFDM provide more capacity and
bandwidth.
• TDMA (Time Division Multiple Access) and CDMA (Code Division
Multiple Access) are the primary technologies that powered 3G.
OFDM provides higher speed than those technologies.
Features of 4G Network:

• 1. The network provides voice, data, signals, and multimedia


transmission over IP packet switches.
• 2. High-mobility stations such as trains, cars, and residences should
have peak data rates of 100Mbps, while low-mobility stations such as
residences should have peak data rates of 1Gbps.
• 3. 4G networks must also be capable of 1 Gbps downlink over 67 MHz
bandwidth or less.
• 4. It provides uninterrupted high quality services 24 hours a day, 7
days a week, regardless of location or time.
LONG-TERM EVOLUTION (LTE)

• Long-term evolution (LTE) technology is an enhancement to 3G.


• In comparison to third-generation (3G) wireless technology, LTE
(Long-Term Evolution) offers increased network capacity and speed
for cellphones and other cellular devices.
• Compared to 3G, LTE is capable of higher peak data transfer rates,
initially up to 100 Mbps downlink and 30 Mbps uplink.
• LTE is often referred to as 4G LTE and is the next step in the evolution
of mobile technology.
Features of LTE

• 1. In 2021, LTE's global average download speed was 17 Mbps, and its
average upload speed was 12 Mbps.
• 2. The voice over LTE (VOLTE) technology allows users to talk without
jitter or lag.
• 3. Compared to standard LTE, LTE-Advanced devices offer two to three
times faster download and upload speeds.
• 4. By combining frequencies from multiple component carriers, LTE-
Advanced handsets improve signal, speed, and reliability, adding
bandwidth of up to 100 MHz across five component carriers (bands).
WORLDWIDE INTEROPERABILITY FOR
MICROWAVE ACCESS (WIMAX)

• In some cases, WiMAX is referred to as 4G because it is a standard for


mobile wireless broadband access (MWBA).
• With 20 MHz wide channels, peak downlink data rates are 128 Mbps
and uplink data rates are 56 Mbps.
• It is based on the IEEE 802.16 standard and is a wireless microwave
technology. WiMAX forum first published it in 2001, the version that is
now known as fixed WiMAX.
Features of WIMAX:

• 1. Broadband wireless access (BWA) networks will be advanced by this


initiative.
• 2. In the initial version of WiMAX, data rates were 30-40 Mbps, but in 2011,
the updated version offered 1 Gbps data rates.
• 3. A few similarities exist between WIMAX technology and Wi-Fi technology,
hence its nickname of "Wi-Fi on steroids." However, WiMAX provides much
higher data rates, is used for outdoor networks, and uses IEEE 802.16
standards rather than IEEE 802.11 standards.
• 4. As per user requirements, bandwidth is dynamically allocated from 2 GHz
to 11 GHz.
UNIT 2 INTRODUCTION TO MOBILE
COMPUTING ARCHITECTURE

2 2.1 OBJECTIVES

1. Understand various types of mobile computing networks that exist.


2. Understand the development of novel applications, the use of smart phones and the
Internet, enterprise solutions, mobile personal cloud, mobile payments, and mobile wallets.
3. Understand Three-tier architecture and N-tier architecture for mobile computing.
4. Understand design considerations in mobile computing including operating systems,
languages, protocols, software layers, and data synchronization and dissemination.
5. Understand how to incorporate mobile computing into existing applications through the
Internet.
6. Understand various limitations of Mobile devices.
7. Understand Mobile computing security.
Cellular Network

• There is a base station for each cell.


• Mobile devices use base stations as access points.
• A base station's coverage area defines a cell.
• Every mobile service region consists of a number of cells.
• Based on the technology and frequency bands used within a cell, the
size of a cell varies. As an example, the cell radius in CDMA 950 MHz
networks is 27 km, while it is 14 km in CDMA 1800 MHz networks.
• Assuming the cells are hexagonal in shape; cell A0 is surrounded by
the boundaries of 6 cells: A1, A2, A3, A4, A5 and A6.
Frequency Reuse and Adjacent
Channel Network
• GSM communication technology uses different frequency bands for neighboring cells. Cells adjacent
to the immediate neighboring cell can reuse the frequencies.
• Throughout a cellular network, cells surround each other.
• Interference is caused when the same frequency band
is used at the same time and at the same point.
A cell's frequency differs from that of its neighbor.
In FDMA, cells that reuse the same frequency channel
must have at least one gap between them.
It is necessary to use different frequencies for cells
A1, A2, A3, A4, A5 and A6 if cell A0 uses frequency f0.
By doing so, different cell signals will not interfere with each other.
Whenever two frequencies are equal or integral multiples of one another,
interference occurs.
Frequency reuse factor
• It is possible to have a frequency reuse factor (u) of 1/3, 1/4, 1/7, 1/9,
or 1/12.
• Using more frequencies in the cells can also reduce cell sizes.
• Frequency reuse formula: distance d = r √(3 x n)
• In this equation,
r refers to the distance between the center of the cell and the
boundary, and
n refers to the number of cells surrounding the cell.
Frequency reuse factor from the
base station perspective
• From the perspective of the base station (BS), each cell can be divided into sectors.
• Suppose that a BS uses m antennae per sector.
• Different antennas can use the same frequency and point in different directions.
• During space division multiplexing, the cell divides its space. As a result, the frequency reuse factor will be
m/u.
• Reuse patterns of 3/4 are used in GSM mobile networks.
• Consider a GSM service with a total bandwidth of b.
• Therefore, b/u is the number of frequency channels available.
• In space division multiple access (SDMA), each sector can use bandwidth b, which is equal to b/m x u.
Capacity Enhancement in
Networks
• Frequency reuse enhances capacity. Additionally, multiplexing increases capacity. It
is possible to share data transmission space, time, frequency, or code between
different channels, users, or sources. In terms of space, time, and frequency,
multiplexing (SDMA, TDMA, and FDMA) determines how these resources can be
shared.
• Enhancement of capacity caused by frequency reuse is given by k x m x u. In this
equation, k is the enhancement due to multiplexing, m is the number of sectors
within a cell, and u is the number of adjacent cells.
• The beams transmitted by a sector antenna can be divided into micro sectors.
Signals radiated from the antenna are referred to as beams. Further capacity can
be enhanced by using switched beam smart antennae. There are p different
directions in which an antenna can radiate a beam. Frequency reuse increases
capacity by p x k x m x u.
Co-Channel and Adjacent
Channel Interference
Co-channel interference (CCI) and adjacent channel interference (ACI) are two
types of interference that can occur in wireless communication systems.
Co-channel interference occurs when two or more radio signals transmitted
on the same frequency interfere with each other, making it difficult for the
receiving device to distinguish between them.
This type of interference is most common in cellular networks where multiple
cells use the same frequency band.
On the other hand, adjacent channel interference occurs when the frequency
of one radio signal overlaps with the frequency of another, causing
interference.
This can happen when two adjacent frequency bands are used by two
different radio signals.
• Both types of interference can result in degraded signal quality and
reduced range in wireless communication systems.
• They can also cause errors and dropped calls, which can lead to poor
user experience.
• Therefore, it's important for wireless communication systems to use
effective interference mitigation techniques to minimize the impact of
co-channel and adjacent channel interference.
Cellular Broadband
• Cellular broadband refers to the use of cellular networks to provide high-speed
internet access to mobile devices such as smartphones, tablets, and laptops.
Cellular broadband is commonly known as 3G, 4G, or 5G mobile broadband,
which are different generations of cellular technology that offer varying levels
of speed, coverage, and reliability.

• In cellular broadband, data is transmitted wirelessly over the airwaves using


radio frequencies. This data is transmitted between the mobile device and the
cellular tower, which is connected to the internet through a wired network. The
cellular tower provides a wireless link between the mobile device and the
internet, enabling the user to access various online services, such as email,
social media, streaming video, and music.
• Cellular broadband is widely available in urban areas and is becoming
increasingly popular in rural areas where traditional broadband options are
limited or unavailable. The widespread availability of cellular broadband has
also led to the development of new technologies such as the Internet of Things
(IoT), which allows for the connection of various devices to the internet, such as
smart homes, smart cities, and smart cars.

• However, cellular broadband is subject to various limitations, including data


caps, network congestion, and signal strength issues, which can affect the
speed and reliability of the internet connection. As a result, cellular broadband
is best suited for users who require internet access on the go or in areas where
traditional broadband options are not available.
Mobility Management
• Mobility management is the process of maintaining connectivity and managing
the movement of mobile devices in a wireless network.
• It involves ensuring that mobile devices are seamlessly handed off between
different network cells as they move from one location to another, while
maintaining the continuity of the network connection and ensuring the quality of
service.

• 1. Management of the infrastructure for setting up and maintaining the links


between networks Ni and N1 or cells Ci and C1.
• 2. When a mobile device's connection with the ith cell is transferred (on handoff
from the ith cell) and registered at the new (jth) cell, location and registration
management by handoff for cell transfer is used.
WLAN Wi-Fi IEEE 802.11x
Networks
• Wireless Local Area Networks (WLANs) are wireless networks that
enable devices to connect to the internet or a network without the
need for cables or wires. WLANs are typically based on the IEEE
802.11x standard, also known as Wi-Fi. The standard specifies a set of
protocols and technologies that enable wireless communication
between devices over short distances.
• IEEE 802.11x defines several versions of the Wi-Fi standard, including
802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax. Each
version of the standard supports different data transfer rates,
frequency bands, and modulation schemes.
• Wi-Fi networks typically consist of two main components: access
points (APs) and client devices. An access point is a wireless device
that connects to a wired network and provides wireless connectivity
to client devices. Client devices, such as smartphones, laptops, and
tablets, connect to an access point to access the network and the
internet.

• Wi-Fi networks use radio waves to transmit data between the access
point and client devices. The access point broadcasts a wireless signal
that client devices can detect and use to establish a connection. The
data is transmitted over the airwaves using a modulation scheme such
as frequency-shift keying (FSK) or quadrature amplitude modulation
(QAM).
WLAN and Internet Access
• Wireless Local Area Networks (WLANs) provide wireless connectivity
between devices within a local area, typically within a home, office, or
campus environment.
• In order to access the internet through a WLAN, the WLAN must be
connected to a wired broadband internet connection, such as a cable
or DSL modem.
1. An iPad, tablet, or other mobile device connects to the Internet by way
of an Internet service provider using Wi-Fi. A mobile device, such as a
tablet, iPad, or laptop, connects to a hotspot-style access point. A router
connects the host LAN, which is connected to the Internet by the access
point, to the Internet. As a result, connectivity develops throughout the
Internet. Computers, mobile devices, and two LANs.
2. Web content is sent to mobile phones' small-area display devices using
the wireless application protocol (WAP). The WAP format is used by the
service providers to format material.
3. The screens of modern mobile devices, tablets, and iPads are larger.
Additionally, the majority of modern devices can connect to the Internet
via HTTP using either a mobile data service provider or an Internet service
provider. Many modern devices support both HTTP and WAP. For instance,
NTT DoCoMo in Japan developed Internet in Mobile Mode (i-Mode),
which was a hugely well-liked wireless Internet service for mobile phones.
AD HOC NETWORKS

• Ad hoc networks are wireless networks that are formed on the fly
without the need for a pre-existing infrastructure or centralized
control.
• Ad hoc networks are also known as peer-to-peer networks because all
nodes in the network have equal status and can communicate directly
with each other without the need for a central access point.
• Ad hoc networks are commonly used in situations where a wired or
wireless infrastructure is not available or practical.
• For example, ad hoc networks can be used in disaster response
scenarios, military operations, and outdoor events where access to
infrastructure-based networks may be limited or unavailable.
• In an ad hoc network, devices can communicate with each other
directly or through other devices in the network.
• Each device in the network acts as a router, forwarding data to other
devices as needed.
• As a result, ad hoc networks are highly resilient and can adapt to
changes in the network topology or device availability.
• One of the main challenges of ad hoc networks is ensuring that
devices can discover and communicate with each other.
• This requires efficient routing algorithms and protocols that can adapt
to changing network conditions and avoid congestion and
interference.
• Ad hoc networks can use a variety of wireless communication
technologies, including Wi-Fi, Bluetooth, and Zigbee.
• They can also support various applications, such as file sharing, real-
time video streaming, and messaging.
MOBILE COMPUTING OPERATING
SYSTEM
• Mobile computing operating systems are specialized software
platforms designed to run on mobile devices such as smartphones
and tablets.
• These operating systems are optimized for low-power consumption,
touch-based interfaces, and wireless communication, and are typically
designed to provide a seamless and intuitive user experience.
Some of the most widely used mobile computing operating systems include:
• Android: Developed by Google, Android is an open-source operating system
based on the Linux kernel. It is used by a wide range of manufacturers and
powers a large percentage of smartphones and tablets worldwide.
• iOS: Developed by Apple, iOS is a proprietary operating system used
exclusively on Apple devices such as the iPhone and iPad. iOS is known for
its user-friendly interface and tight integration with Apple's hardware and
software ecosystem.
• Windows Phone: Developed by Microsoft, Windows Phone is a mobile
operating system designed for smartphones and small tablets. It features a
tile-based interface and is designed to integrate with other Microsoft
products and services.
• BlackBerry OS: Developed by BlackBerry Limited, BlackBerry OS is a
proprietary operating system used on BlackBerry devices. It is known for its
strong security features and support for enterprise-level applications.
• Mobile computing operating systems provide a variety of features and
services, including app stores, web browsers, multimedia capabilities,
and wireless communication protocols.
• They also provide a platform for developers to create and distribute
mobile applications, which can be downloaded and installed directly
on the device.
CLIENT SERVER COMPUTING
USING MOBILE
• Client-server computing using mobile devices refers to the use of
mobile devices, such as smartphones and tablets, to access and
interact with server-based applications and data.
• This approach allows mobile users to leverage the processing power
and storage capabilities of servers to perform complex tasks and
access large amounts of data without taxing the limited resources of
their mobile devices.
• In a client-server architecture, the mobile device acts as the client and
communicates with the server over a network connection.
• The server provides the necessary computing resources and services,
including data storage, application processing, and network
connectivity.
• This allows the mobile device to perform tasks such as accessing
email, browsing the web, and running enterprise applications.
Client-server computing using mobile devices can provide several
benefits, including:
• Improved performance: By offloading complex computing tasks to
servers, mobile devices can perform more efficiently and avoid
draining their battery life.
• Access to large amounts of data: Servers can store and manage large
amounts of data, which can be accessed by mobile devices on
demand.
• Enhanced security: Servers can provide advanced security features
such as data encryption, authentication, and access control, which
can help protect sensitive data and prevent unauthorized access.
• Scalability: Server-based applications and services can be scaled up or
down to meet changing demands, which can help ensure optimal
performance and minimize downtime.
Some examples of client-server computing using mobile devices
include:

• Cloud-based storage and file sharing services, such as Dropbox and


Google Drive, which allow mobile users to access and share files
stored on remote servers.
• Mobile email clients, such as Microsoft Outlook and Gmail, which
enable users to access their email accounts and manage their
messages on remote servers.
• Enterprise applications, such as customer relationship management
(CRM) and enterprise resource planning (ERP) software, which can be
accessed by mobile users on remote servers.
• A distributed computing architecture known as client-server
computing uses servers and clients as its two types of nodes.
• The server can be asked by a client for information or responses,
which the client can subsequently employ in calculations.
• The client can cache these records on the client device or access them
directly from the server.
• The data may be accessible at the client's request, via broadcasts, or
by server distribution.
• Due to their limited resource availability, mobile devices operate as client nodes.
Several devices are connected to a server.
• Both the client and the server may be running on the same computer system or
on distinct ones.
• An N-tier design for client-server computing (N = 1, 2) is possible.
• The number of tiers,
N = 1, when the client and server are on the same computing system (not on a
network).
N=2 is the case when the client and the server are on different computing
platforms connected to the network.
N > 2: if the server is connected to or connected through networks to other
computing systems that supplies the server with additional resources for the client.
N> 1 denotes a connection between a client device at tier 1 and a server at tier 2,
which may then connect to tiers 3, 4, and so forth.
Client-Server Two-tier Architecture
• Client-Server Two-tier Architecture is a software
architecture in which the client and server applications
are hosted on two different machines and communicate
with each other over a network.
• This architecture consists of two layers, the client layer
and the server layer.
• In this architecture, the client sends a request to the
server, and the server processes the request and sends
the response back to the client.
• The client is responsible for presenting the data to the
user and handling the user input, while the server is
responsible for processing the request and providing the
necessary data to the client.
The following are some of the
characteristics of a client-server
two-tier architecture:
1.Client and server are two separate applications.
2.The client is responsible for the presentation layer and
user interaction.
3.The server is responsible for the application logic and
data storage.
4.Communication between client and server is usually
over a network, such as the Internet or a local area
network (LAN).
5. The architecture is relatively simple and easy to
implement.
6. The system can be easily scaled up by adding more
servers to handle increased traffic.
7. The system can be easily maintained and updated as
changes to the client or server applications can be made
independently of each other.

Some examples of applications that use client-server


two-tier architecture are email clients, online banking,
and e-commerce websites.
Three-tier Architecture for Mobile
Computing
• Three-tier architecture is a software architecture that
divides an application into three logical layers or tiers:
--presentation tier,
--application logic tier,
-- and data storage tier.
In the context of mobile computing, this architecture is
used to build mobile applications that can work on
different platforms such as Android and iOS.
Presentation Tier:
• The presentation tier is the topmost layer, which is
responsible for the user interface and user interaction.
• This tier includes the mobile application, which is
responsible for displaying data and collecting user
input.
• The presentation tier communicates with the application
logic tier to retrieve data from the data storage tier.
Application Logic Tier:
• The application logic tier is the middle layer, which is
responsible for the application logic and business rules.

• This tier includes the server-side application, which


processes the user requests and provides the necessary
data to the presentation tier.

• This tier communicates with the data storage tier to


retrieve and store data.
Data Storage Tier:
• The data storage tier is the bottom layer, which is
responsible for storing data.
• This tier includes the database server, which stores the
data in a structured manner.
• The data storage tier communicates with the
application logic tier to retrieve and store data.
Some of the benefits of using a
Three-tier Architecture for Mobile
Computing are:
1.Scalability: The architecture allows for scalability by adding more
servers to handle increased traffic.
2.Security: The architecture provides better security by separating the
application logic and data storage tiers.
3.Reusability: The architecture promotes code reusability by separating
the presentation layer from the application logic and data storage
layers.
4.Platform independence: The architecture allows the mobile application
to work on different platforms with minimal changes to the application
logic and data storage layers.
5.Maintainability: The architecture allows for easier maintenance and
updates as changes to one tier can be made without affecting the
other tiers.
MOBILE COMPUTING ARCHITECTURE

The architectural layers of mobile computing


devices, mobile computing on the device
using APIs are all described in this part of the
Unit
Design considerations for Mobile
Computing
Designing mobile applications requires careful consideration of
various factors that are unique to the mobile environment. Some
of the key design considerations for mobile computing are:
1.Limited Screen Size: Mobile devices have smaller screens
compared to desktops or laptops. Therefore, the design of mobile
applications should be optimized for smaller screens. The use of
larger fonts, simple icons, and clear images is recommended.
2.Platform Diversity: Mobile devices run on different platforms,
such as iOS and Android, each with its design guidelines and
specifications. Therefore, it is essential to design mobile
applications that are platform-independent or that can be
adapted to different platforms.
3. Touch Interface: Mobile devices use touch screens for user
input, which requires the design of mobile applications to be
touch-friendly. The interface should be simple and easy to
use, with large buttons and clear labeling.
4. Limited Processing Power: Mobile devices have limited
processing power, memory, and battery life. Therefore, the
design of mobile applications should consider these
limitations, such as avoiding complex animations and
minimizing data usage.
5. Connectivity: Mobile devices can be connected to various
networks, such as Wi-Fi, cellular data, and Bluetooth.
Therefore, mobile applications should be designed to work in
offline mode or with intermittent connectivity.
6. Security: Mobile devices are prone to security threats
such as malware and data theft. Therefore, the design of
mobile applications should consider security measures,
such as data encryption and user authentication.
7. User Context: Mobile devices are used in various
contexts, such as on-the-go, at home, or at work.
Therefore, the design of mobile applications should
consider the user context, such as designing applications
that are easy to use with one hand or designing
notifications that are not disruptive.
• designing mobile applications requires a thoughtful
approach that considers the unique characteristics of
mobile computing devices, such as limited screen size,
platform diversity, touch interface, limited processing
power, connectivity, security, and user context.
Mobile Computing using APIs
• The following are a few examples of mobile computing APIs:
voice recognition,
text-to-speech conversion,
voice-based dialing, camera,
album,
video clip recorder,
and Wi-Fi network access point connectivity.
• Mobile Computing using APIs (Application Programming
Interfaces) is a way to build mobile applications that
interact with external systems, such as web services,
databases, and other applications.
• APIs provide a standard way for mobile applications to
communicate with external systems, exchange data,
and perform various tasks.
Benefits of using APIs for Mobile Computing:
1.Access to external data: Mobile applications can use
APIs to access data from external systems, such as
social media platforms, weather services, and e-
commerce websites.
2.Improved functionality: APIs provide access to
advanced functionality that can enhance the
3. Standardization: APIs provide a standard way for
mobile applications to communicate with external
systems, which simplifies the development process and
improves interoperability.
4. Reduced development time: APIs provide pre-built
functionality that can be integrated into mobile
applications, which can reduce the development time
and cost.
5. Integration with existing systems: APIs can be used to
integrate mobile applications with existing systems, such as
ERP systems, CRMs, and other applications, which can
improve the efficiency and productivity of business processes.
• When designing mobile applications that use APIs, there are
some important considerations to keep in mind, such as:
1.Security: APIs can pose security risks if not properly
secured, therefore, it is essential to use authentication and
encryption mechanisms to protect sensitive data.
2.Performance: APIs can affect the performance of mobile
applications if not optimized, therefore, it is essential to
minimize the number of API calls and optimize data transfer.
3. Compatibility: APIs can have different versions and
specifications, therefore, it is essential to ensure that the
mobile application is compatible with the API version and
specifications.
4. Availability: APIs can be unavailable or may have
downtime, therefore, it is essential to handle errors and
provide appropriate error messages to users.
Considerations for Frameworks and
Programming Languages:
• The mobile computing architecture employs a number of programming
languages. Java is one of the most used languages for mobile computing.
• This is due to Java's most significant feature, platform independence, which
means that Java program codes are independent of the CPU and OS utilized
in a system.
• This results from a typical compilation into bytes. J2SE is the name of Java 2's
standard edition.
• There are two editions with a small memory footprint: Java2 Micro edition
(J2ME) and Java Card (Java for smart card).
• These are the two most popular languages for mobile computing and
creating apps for platforms used by mobile devices.
• Mobile service apps that are Web- and enterprise server-based
employ Java 2 Enterprise Edition (J2EE).
• The other two widely used programming languages are C# and
JavaScript.
• Program compilation for these languages depends on the CPU and
operating system being utilized.
• The benefit of C# is that it makes it possible to build Uls, and
JavaScript makes it possible to create contents on the fly.
• Server communications and client messages are presented using the
markup language XML HTML5
• DotNet offers a platform for creating apps, web applications, and
Internet services. For enterprise applications, it uses Visual Studio and
ASP.NET, while for web pages, it uses JSP.
Operating System Considerations:
• When designing an app, an OS that is compatible with the mobile
device is taken into account.
• The user can launch an application on the iPhones or android phones
• The following are some examples of how an app creator makes
advantage of the OS's functions:
a) Hardware features and specs
b) Supporting the creation, activation, deletion, suspension, and delay
of threads and the scheduling of numerous threads in a system
c) Interfaces for exchanging information between hardware devices,
middleware layers, and application layer software components
d) Facilitating the hardware's ability to run software components
e) Adjusting the device's library settings for the GUI and VUI
components
f) Artistic writing, music composition, and graphic design (for example,
OS X
Middleware functions:
• Middleware is a term used to describe the computer programmes
that connect application components to network-distributed
components.
• Between a user application and an operating system, middleware
functions as additional software.
• Additionally, Mobile OS offers middleware components.
The following uses are made of middleware applications:
a) In order to find adjacent Bluetooth devices
b) To find the hotspot nearby
c) To synchronize a device with a server or an enterprise server
d) To retrieve data from a network database, which may be in Oracle or
DB2 format
e) For transaction processing
f) To use an application server for a stateless Internet session
g) For service discovery
h) For application platform and service availability adaption
Data Synchronization and
Dissemination:
• A mobile phone can be used as a data access device to access the
server of the service provider and retrieve information.
• Smartphones serve as enterprise data access devices in networks
used by businesses. The data is distributed to the enterprise mobile
device, such as the BlackBerry handset, by an enterprise server.
• A data access device for accessing music or videos is something like
an iPod, iPhone, iPad, or tablet.
• Files can be downloaded via a link and saved or played afterward.
• These days, students can record lectures from professors and access
e-learning materials using an iPod, iPhone, iPad, or tablet.
• To communicate, disseminate, or broadcast information, a data
dissemination service is necessary.
• An example of a distribution server for academic lectures, interviews,
and learning materials is https://itunes.standford.edu. The same
service offers a music, iTunes, and video user interface as well.
• The three ways for disseminating data are:
• (i) broadcasting or pushing (such as sending unwanted SMSs to
mobile phones),
• (ii) pulling (such as downloading a ringtone from the mobile service
provider), and
• (iii) a push-pull hybrid.
Data Synchronization Paths
MOBILE COMPUTING AND THE APPS
• The new standard, HTML5, allows for the design of mobile browsers
and the creation of mobile applications on the Internet.
• It also offers additional functionalities. Utilizing Mobile IP or WAP
gateways of direct HTTP applications over 3G data services, users can
access the internet for computing.
• A comprehensive suite called Mobile Enterprise Application Platform
(MEAP) is utilized for mobile computing via the Internet.
• It makes it possible to create mobile applications, which need Web
services, servers, and enterprise servers. A mobile middleware server,
application software, and a mobile client API make up a MEAP system.
Uses for a middleware server
include:
• 1. Administration of back-end servers' or systems' data
• 2. Setting up the app for the mobile device
• 3. System integration
• 4. Scalability
• 5. Communications
• 6. Support across platforms
• 7. Security
NOVEL APPLICATIONS OF MOBILE
COMPUTING
1. Smartphones
A Smartphone is a mobile phone with added processing capabilities that
allow for several applications to be used.
For instance, Research in Motion, Inc.'s BlackBerry 8530 curve includes
additional computing capabilities that make it possible to use the following
applications:
1. Phone, email, address book, MMS (multimedia messaging service), and
SMS (short message service). Web surfing, a calendar, a to-do list, and a
memo pad.
2. Support for well-liked Personal Information Management (PIM)
applications
3. Viewing integrated attachments
4. QWERTY-style keyboard with Sure Type technology (a computer
keyboard has keys in order of Q,W,E,R,T,Y,...)
5. Keyboard controls for Send and End
6. Use a headset, vehicle buds, or car kits with Bluetooth to talk hands-
free.
7. When EV-DO compatibility is enabled, the device can be used as a
wireless modem for a laptop or personal computer.
8. Speaker telephone
9. Polyphonic ringtones allow you to customize your gadget.
10. A vivid, high-resolution display with over 65,000 color options
11. E-Mail
12. 802.11b and 802.11g WiFi
13. Browser
14. GPS tracking
15. Recording and communication through media, including audio,
video, and camera images
16. Live TV
17. Micro SD cards
SmartWatch and iWatch
• These are some of its characteristics: It sports a curved 2-inch display.
• It offers the capacity to make phone calls without using a smartphone at
all.
• It has Bluetooth and Wi-Fi connectivity options. It permits GPS. With its
heart rate and UV sensors, it features the Health app, which alerts the
wearer when it's time to eat, when they've had enough activity, and when
it's time to relax.
• It contains walking navigational features. It allows watch owners to send a
text message from their wrist.
• Apple Watch provides apps for those who want to lead an active lifestyle,
such as Nike+ Running, which allows users to log morning or evening runs.
Music, Video, and e-Books
• Apps that let you download music, film, and books are available for
tablets and other mobile devices.
• Reading one's favorite books whenever and wherever one wants is
now accessible.
• Supports stereo audio in.m4v,.mp3, and .mov file formats at up to 160
kbps and 48 kHz.
• Apps for tablets and other devices provide mobile TV and MPEG-4
video.
• E-books can be read as PDFs or PNGs
Mobile Cheque and Mobile Wallet
• A mobile-based payment method used when making a purchase is called a
"mobile cheque" (mcheque).
• In order to transfer money to the retailer account, the service provider
authenticates the consumer and activates the customer account.
• The method that payments are made for purchases is changing as a result of
these mobile devices.
• Customers are no longer required to have credit cards in their wallets while they
shop.
• A mobile wallet is an application where you may access your money via your
service provider's account.
• A bank is used to link the payment when a mobile device connects to the service.
• Both the client's and the recipient's bank accounts are connected to the provider
Mobile-based Supply Chain
Management
• Apps for managing the supply chain on mobile devices effectively manage
manufacturing, supply, logistics, warehouse, and other tasks while on the go.
• The following example provides the clearest explanation of the supply chain
management issue.
• Chocolates cannot be sold by distributors unless they are manufactured.
• Without a distributor order, the manufacturer cannot produce the chocolates.
• The supply chain management problem is the name given to this producer-
consumer issue.
• Leading IT firms have created supply chain management system software for
mobile devices. S
• Such mobile devices are used by the sales force and the manufacturing facilities
to maintain the supply chain.
MOBILE CLIENT DEVICES AND
PERVASIVE
COMPUTING
• Pervasive computing, also known as ubiquitous
computing, refers to the concept of integrating
computing technologies into everyday objects and
environments, making them accessible and available
everywhere and at all times.
• In pervasive computing, computing devices are
seamlessly integrated into the environment and are
capable of sensing, processing, and communicating
information without human intervention.
• Pervasive computing aims to create a world where
technology is embedded in every aspect of our lives,
making our surroundings smarter, more efficient, and
more responsive.
• This technology can include sensors, embedded
systems, wireless networks, and other smart devices
that can be connected to the internet.
Examples of pervasive computing
include:
1.Smart homes: Homes that are equipped with smart
devices such as thermostats, lighting systems, and
security cameras that can be controlled remotely via a
smartphone or other internet-connected device.
2.Wearable technology: Devices such as smartwatches,
fitness trackers, and health monitors that can collect
and transmit data about the user's health, activity level,
and other biometric information.
3. Smart cities: Cities that are equipped with sensors and
other devices to monitor and manage traffic, public
safety, and other aspects of urban life.
4. Internet of Things (IoT): The interconnection of
physical devices, vehicles, buildings, and other objects
that are embedded with sensors, software, and network
connectivity, allowing them to collect and exchange data.
SMART SENSORS, ACTUATORS, AND
MOBILE ROBOTIC SYSTEMS
• There are a lot of sensor and actuator pairs in industrial plants.
• A control area network bus (CAN bus), for instance, is used to
connect a group of intelligent sensors and actuators in an automotive
or industrial facility.
Smart Sensors
• Electronic devices called sensors sense the outside world; examples
include sensors for temperature, pressure, light, metal, smoke, and
object proximity.
• The controller or computer receives the signals from the sensor. In
order to hear voices, a microphone is used.
• Mobile devices may interact with their surroundings.
Here are a few instances of smart
sensors
• 1. Voice amplification during a call can be managed with the aid of a background noise
sensor.
• 2. The LCD screen's brightness can be managed using a sensor for ambient light. When
ambient light levels are very low, it minimizes power dissipation for displays.
• 3. The amplification of received signals is controlled by a sensor that gauges the
signal's strength.
• 4. Voice is detected by a microphone. A speech processing system receives the voice
signals from it (SPS). The SPS verifies the cellphone owner's identity. The SPS can then
be used to interpret and carry out spoken commands as well as dial a spoken number.
• 5. A gyroscope tracks the direction and speed of angular motion along three axes. For
recording vibration shocks or falls, an accelerometer detects the device's linear
acceleration along three axes. A device's power can be turned on using a proximity
sensor.
Actuators
• An actuator is a component of a system that converts
an input signal into physical action.
• It is a device that produces a mechanical movement or
force in response to an electrical, hydraulic, or
pneumatic signal.
• Actuators are commonly used in a wide range of
applications, from industrial machinery to automotive
systems, robotics, and aerospace technology.
There are several types of actuators, including:

• Electric actuators: These use electric motors to generate motion and are commonly
used in a variety of applications, such as valves, robotics, and automation systems.
• Hydraulic actuators: These use pressurized fluid to generate motion and are
commonly used in heavy machinery, such as cranes, excavators, and bulldozers.
• Pneumatic actuators: These use compressed air to generate motion and are
commonly used in industrial and manufacturing applications, such as assembly lines
and conveyor systems.
• Piezoelectric actuators: These use the piezoelectric effect to generate motion and are
commonly used in precision positioning systems and micro-manipulation applications.
• Thermal actuators: These use thermal expansion to generate motion and are
commonly used in automotive and aerospace applications.
Robotic System Sensors and
Actuators
• The sciences of artificial intelligence and mechanical engineering both
contribute to the development of robotic systems in various ways.
• Robotic systems are essentially programmable machines made up of
mechanical actuators and sensory organs connected to a computer
inside of them.
• In industrial robotics, the mechanical structure might include
manipulators, but in mobility robotics, it might focus on the robot's
movement as a vehicle.
The following are a few instances of
sensors used in robotic systems:
• The left and right foot each have acceleration and force sensors.
• The hands and head both include infrared distance sensors.
• CCD cameras are located in the eyes.
• Angular rate sensor in the centre ears with microphones
• Shoulders, hands, and head having thermo and touch sensors
The following are some examples of
actuators found in robots:
• A robot may have a speaker at its lips so that it can speak spoken commands to other
robots or communicate sensed data.
• Actuators and motors are present at all joints that move, including the hands, wrist,
neck, shoulders, feet, and palms of grippers.
• The sensors send signals to the embedded processors at the main computer chip of
the robot through internal connections.
• When a group of robots needs to act in unison, the robot wirelessly transmits data to
a central server.
• Robots that can move and communicate wirelessly are employed in industrial settings
to access spaces that are difficult for people to reach.
• Robot master-slave systems can serve a number of functions.
• In such a setup, the master robot issues orders to the other (slave) robots.
SMART HOME AND APPLIANCES
• Modern automation technology makes it feasible to control security
systems and household appliances from a computer or mobile device.
• Web-enabled gadgets include smart home and workplace products.
The following are the networked home devices, a set-top box, and a
residential gateway.
Smart Appliances
• Using electricity cables, home appliances can be networked.
• Such wires can induce signals with frequencies as high as 525 kHz.
• A network can be created by these signals being transmitted from one
appliance to another.
• A central server can be used for the devices to communicate as well.
• Very short-range wireless protocols like Bluetooth or ZigBee can also
be used to network home appliances
• A domestic gateway is a device that connects your home's electronics
to the Internet, including your media player, computer, locks, lights,
oven, refrigerator, and air conditioner.
• The process starts with authentication. The gateway enables access
from the outside to the home devices after user authentication.
Set-top boxes

You might also like