Mobile Computing
Mobile Computing
COMMUNICATION
• When one access point is overloaded, the system will automatically
choose a different access point based on the available capacity.
• 1.3.1 Scalability: Wireless devices continue to grow without having to rework
or re-create the entire network.
• 1.3.2 Network management system: There variety of different components in
wireless networks, such as access points, firewalls, switches, and managed
power. Wireless networks offer a better way to manage the entire network.
• 1.3.3 Role based access control: Using role-based access control (RBAC), you
are able to assign roles based on what, who, where, when and how a user or
device is trying to access your network. Access control rules or policies can then
be enforced based on the ends or roles of the device.
• 1.3.4 Provide outdoor and indoor coverage options: Your wireless system
should provide outdoor and indoor coverage.
• 1.3.5.1 Roaming: As you move throughout your office or even from one building
to another, you won't experience dropped connections, slower speeds or any
interruptions in service.
• 1.3.5.2 Redundancy: Depending on your specific needs and environment, your
wireless system may require varying levels of redundancy.
Firewall
• Having the right firewall in place will help you in many ways:
(a) Apps and users can be viewed and controlled.
(b) Reduce complexity by Antivirus protection. Deep Packet Inspection
(DPI) Filtering applications.
(c) Ensure your network and users are protected against known and
unknown threads including: zero-day, encrypted malware, ransomware,
malicious botnets.
MULTIPLEXING
• Multiplexing is a method of combining multiple analog or digital
signals into one over a shared medium. In mobile computing,
communications, and computer networks, multiplexing can be used
to combine analog or digital signals.
Types of Multiplexing
1. Easy to implement.
2. Efficient even when traffic is constant.
3. No equalization required.
4. It can be possible to increase capacity by reducing the knowledge bit rate and using
efficient digital codes.
5. It is not difficult to implement technological advances. For instance, systems are
often designed so that improvement in terms of speech coders can be incorporated
easily.
6. Since FDMA systems use low bit rates (large symbol time) in comparison to average
delay spread, they are less expensive and exhibit low Inter Symbol Interference (ISI).
Disadvantages of FDM:
• 6. Due to the fact that channels are assigned for a single user, there are idle
channels in a general system.
Applications of FDM:
FDM is used in:
1. Telephone system.
2. FM & AM Radio broadcasting.
3. Cable TV.
4. Walkie talkies.
5. Mobile network for a closed user group. e.g. Wi-Fi.
6. Total access communication systems (TACS)
7. 2G mobile communication.
Time Division Multiplexing(TDM)
• Time Division Multiplexing (TDM) is a multiplexing technique that
enables multiple data signals to be carried in different time slots over
a common communication channel.
• One frame is said to be transmitted when its entire signal gets
transmitted across the channel. Time slots are used to divide the
overall time domain into multiple fixed length time slots.
Synchronous TDM
• In Synchronous TDM, each time slot is pre-assigned to a constant
source.
• It is based on the assumption that data will be present at the source
regardless of how the slots are allocated in advance.
• This results in wastage of channel capacity since time slots are
completely wasted in the absence of data.
Asynchronous TDM
• Asynchronous TDM, also known as statistical division multiplexing, is a
method in which time slots are allocated only to machines that have
the required information to send data.
Advantages of TDM:
1. Synchronization is required.
2. The implementation is complex.
3. Slow narrowband fading may wipe out all TDM channels.
Applications of TDM:
• 1. In 2021, LTE's global average download speed was 17 Mbps, and its
average upload speed was 12 Mbps.
• 2. The voice over LTE (VOLTE) technology allows users to talk without
jitter or lag.
• 3. Compared to standard LTE, LTE-Advanced devices offer two to three
times faster download and upload speeds.
• 4. By combining frequencies from multiple component carriers, LTE-
Advanced handsets improve signal, speed, and reliability, adding
bandwidth of up to 100 MHz across five component carriers (bands).
WORLDWIDE INTEROPERABILITY FOR
MICROWAVE ACCESS (WIMAX)
2 2.1 OBJECTIVES
• Wi-Fi networks use radio waves to transmit data between the access
point and client devices. The access point broadcasts a wireless signal
that client devices can detect and use to establish a connection. The
data is transmitted over the airwaves using a modulation scheme such
as frequency-shift keying (FSK) or quadrature amplitude modulation
(QAM).
WLAN and Internet Access
• Wireless Local Area Networks (WLANs) provide wireless connectivity
between devices within a local area, typically within a home, office, or
campus environment.
• In order to access the internet through a WLAN, the WLAN must be
connected to a wired broadband internet connection, such as a cable
or DSL modem.
1. An iPad, tablet, or other mobile device connects to the Internet by way
of an Internet service provider using Wi-Fi. A mobile device, such as a
tablet, iPad, or laptop, connects to a hotspot-style access point. A router
connects the host LAN, which is connected to the Internet by the access
point, to the Internet. As a result, connectivity develops throughout the
Internet. Computers, mobile devices, and two LANs.
2. Web content is sent to mobile phones' small-area display devices using
the wireless application protocol (WAP). The WAP format is used by the
service providers to format material.
3. The screens of modern mobile devices, tablets, and iPads are larger.
Additionally, the majority of modern devices can connect to the Internet
via HTTP using either a mobile data service provider or an Internet service
provider. Many modern devices support both HTTP and WAP. For instance,
NTT DoCoMo in Japan developed Internet in Mobile Mode (i-Mode),
which was a hugely well-liked wireless Internet service for mobile phones.
AD HOC NETWORKS
• Ad hoc networks are wireless networks that are formed on the fly
without the need for a pre-existing infrastructure or centralized
control.
• Ad hoc networks are also known as peer-to-peer networks because all
nodes in the network have equal status and can communicate directly
with each other without the need for a central access point.
• Ad hoc networks are commonly used in situations where a wired or
wireless infrastructure is not available or practical.
• For example, ad hoc networks can be used in disaster response
scenarios, military operations, and outdoor events where access to
infrastructure-based networks may be limited or unavailable.
• In an ad hoc network, devices can communicate with each other
directly or through other devices in the network.
• Each device in the network acts as a router, forwarding data to other
devices as needed.
• As a result, ad hoc networks are highly resilient and can adapt to
changes in the network topology or device availability.
• One of the main challenges of ad hoc networks is ensuring that
devices can discover and communicate with each other.
• This requires efficient routing algorithms and protocols that can adapt
to changing network conditions and avoid congestion and
interference.
• Ad hoc networks can use a variety of wireless communication
technologies, including Wi-Fi, Bluetooth, and Zigbee.
• They can also support various applications, such as file sharing, real-
time video streaming, and messaging.
MOBILE COMPUTING OPERATING
SYSTEM
• Mobile computing operating systems are specialized software
platforms designed to run on mobile devices such as smartphones
and tablets.
• These operating systems are optimized for low-power consumption,
touch-based interfaces, and wireless communication, and are typically
designed to provide a seamless and intuitive user experience.
Some of the most widely used mobile computing operating systems include:
• Android: Developed by Google, Android is an open-source operating system
based on the Linux kernel. It is used by a wide range of manufacturers and
powers a large percentage of smartphones and tablets worldwide.
• iOS: Developed by Apple, iOS is a proprietary operating system used
exclusively on Apple devices such as the iPhone and iPad. iOS is known for
its user-friendly interface and tight integration with Apple's hardware and
software ecosystem.
• Windows Phone: Developed by Microsoft, Windows Phone is a mobile
operating system designed for smartphones and small tablets. It features a
tile-based interface and is designed to integrate with other Microsoft
products and services.
• BlackBerry OS: Developed by BlackBerry Limited, BlackBerry OS is a
proprietary operating system used on BlackBerry devices. It is known for its
strong security features and support for enterprise-level applications.
• Mobile computing operating systems provide a variety of features and
services, including app stores, web browsers, multimedia capabilities,
and wireless communication protocols.
• They also provide a platform for developers to create and distribute
mobile applications, which can be downloaded and installed directly
on the device.
CLIENT SERVER COMPUTING
USING MOBILE
• Client-server computing using mobile devices refers to the use of
mobile devices, such as smartphones and tablets, to access and
interact with server-based applications and data.
• This approach allows mobile users to leverage the processing power
and storage capabilities of servers to perform complex tasks and
access large amounts of data without taxing the limited resources of
their mobile devices.
• In a client-server architecture, the mobile device acts as the client and
communicates with the server over a network connection.
• The server provides the necessary computing resources and services,
including data storage, application processing, and network
connectivity.
• This allows the mobile device to perform tasks such as accessing
email, browsing the web, and running enterprise applications.
Client-server computing using mobile devices can provide several
benefits, including:
• Improved performance: By offloading complex computing tasks to
servers, mobile devices can perform more efficiently and avoid
draining their battery life.
• Access to large amounts of data: Servers can store and manage large
amounts of data, which can be accessed by mobile devices on
demand.
• Enhanced security: Servers can provide advanced security features
such as data encryption, authentication, and access control, which
can help protect sensitive data and prevent unauthorized access.
• Scalability: Server-based applications and services can be scaled up or
down to meet changing demands, which can help ensure optimal
performance and minimize downtime.
Some examples of client-server computing using mobile devices
include:
• Electric actuators: These use electric motors to generate motion and are commonly
used in a variety of applications, such as valves, robotics, and automation systems.
• Hydraulic actuators: These use pressurized fluid to generate motion and are
commonly used in heavy machinery, such as cranes, excavators, and bulldozers.
• Pneumatic actuators: These use compressed air to generate motion and are
commonly used in industrial and manufacturing applications, such as assembly lines
and conveyor systems.
• Piezoelectric actuators: These use the piezoelectric effect to generate motion and are
commonly used in precision positioning systems and micro-manipulation applications.
• Thermal actuators: These use thermal expansion to generate motion and are
commonly used in automotive and aerospace applications.
Robotic System Sensors and
Actuators
• The sciences of artificial intelligence and mechanical engineering both
contribute to the development of robotic systems in various ways.
• Robotic systems are essentially programmable machines made up of
mechanical actuators and sensory organs connected to a computer
inside of them.
• In industrial robotics, the mechanical structure might include
manipulators, but in mobility robotics, it might focus on the robot's
movement as a vehicle.
The following are a few instances of
sensors used in robotic systems:
• The left and right foot each have acceleration and force sensors.
• The hands and head both include infrared distance sensors.
• CCD cameras are located in the eyes.
• Angular rate sensor in the centre ears with microphones
• Shoulders, hands, and head having thermo and touch sensors
The following are some examples of
actuators found in robots:
• A robot may have a speaker at its lips so that it can speak spoken commands to other
robots or communicate sensed data.
• Actuators and motors are present at all joints that move, including the hands, wrist,
neck, shoulders, feet, and palms of grippers.
• The sensors send signals to the embedded processors at the main computer chip of
the robot through internal connections.
• When a group of robots needs to act in unison, the robot wirelessly transmits data to
a central server.
• Robots that can move and communicate wirelessly are employed in industrial settings
to access spaces that are difficult for people to reach.
• Robot master-slave systems can serve a number of functions.
• In such a setup, the master robot issues orders to the other (slave) robots.
SMART HOME AND APPLIANCES
• Modern automation technology makes it feasible to control security
systems and household appliances from a computer or mobile device.
• Web-enabled gadgets include smart home and workplace products.
The following are the networked home devices, a set-top box, and a
residential gateway.
Smart Appliances
• Using electricity cables, home appliances can be networked.
• Such wires can induce signals with frequencies as high as 525 kHz.
• A network can be created by these signals being transmitted from one
appliance to another.
• A central server can be used for the devices to communicate as well.
• Very short-range wireless protocols like Bluetooth or ZigBee can also
be used to network home appliances
• A domestic gateway is a device that connects your home's electronics
to the Internet, including your media player, computer, locks, lights,
oven, refrigerator, and air conditioner.
• The process starts with authentication. The gateway enables access
from the outside to the home devices after user authentication.
Set-top boxes