Chapter 1
Chapter 1
College of Science
Department of Computer Science
Fourth Class
Second Term
Lecture 1
Introduction
MOBILE COMPUTING Dr. Khalid Mohammed
Department of Computer Science
Chapter 1. Introduction College of Science / University of Diyala
Mobile and wired: Many of today’s laptops fall into this category; users carry the
laptop from one hotel to the next, reconnecting to the company’s network via the
telephone network and a modem.
Fixed and wireless: This mode is used for installing networks, e.g., in historical
buildings to avoid damage by installing wires, or at trade shows to ensure fast
network setup.
Mobile and wireless: This is the most interesting case. No cable restricts the user,
who can roam between different wireless networks. Most technologies discussed in
this course deal with this type of device and the networks supporting them. Today’s
most successful example for this category is GSM with more than 800 million users.
1
MOBILE COMPUTING Dr. Khalid Mohammed
Department of Computer Science
Chapter 1. Introduction College of Science / University of Diyala
In many fields of work, the ability to keep on the move is vital in order to utilize time
efficiently. The importance of Mobile Computers has been highlighted in many fields of
which a few are described below:
a. Vehicles: Music, news, road conditions, weather reports, and other broadcast
information are received via digital audio broadcasting (DAB) with 1.5 Mbit/s. For
personal communication, a universal mobile telecommunications system (UMTS)
phone might be available offering voice and data connectivity with 384 kbit/s. The
current position of the car is determined via the global positioning system (GPS).
Cars driving in the same area build a local ad-hoc network for the fast exchange of
information in emergency situations or to help each other keep a safe distance. In
case of an accident, not only will the airbag be triggered, but the police and
ambulance service will be informed via an emergency call to a service provider.
Buses, trucks, and trains are already transmitting maintenance and logistic
information to their home base, which helps to improve organization (fleet
management), and saves time and money.
c. Business: Managers can use mobile computers say, critical presentations to major
customers. They can access the latest market share information. At a small recess,
they can revise the presentation to take advantage of this information. They can
communicate with the office about possible new offers and call meetings for
discussing responds to the new proposals. Therefore, mobile computers can leverage
competitive advantages. A travelling salesman today needs instant access to the
company’s database: to ensure that files on his or her laptop reflect the current
situation, to enable the company to keep track of all activities of their travelling
employees, to keep databases consistent etc. With wireless access, the laptop can be
turned into a true mobile office, but efficient and powerful synchronization
mechanisms are needed to ensure data consistency.
2
MOBILE COMPUTING Dr. Khalid Mohammed
Department of Computer Science
Chapter 1. Introduction College of Science / University of Diyala
Bandwidth: Although they are continuously increasing, transmission rates are still
very low for wireless devices compared to desktop systems. Researchers look for
more efficient communication protocols with low overhead.
3
MOBILE COMPUTING Dr. Khalid Mohammed
Department of Computer Science
Chapter 1. Introduction College of Science / University of Diyala
Security constraints: Not only can portable devices be stolen more easily, but the
radio interface is also prone to the dangers of eavesdropping. Wireless access must
always include encryption, authentication, and other security mechanisms that must
be efficient and simple to use.
The figure shows the protocol stack implemented in the system according to the
reference model. End-systems, such as the PDA and computer in the example, need a full
protocol stack comprising the application layer, transport layer, network layer, data link
layer, and physical layer. Applications on the end-systems communicate with each other
using the lower layer services. Intermediate systems, such as the interworking unit, do
not necessarily need all of the layers.
4
MOBILE COMPUTING Dr. Khalid Mohammed
Department of Computer Science
Chapter 1. Introduction College of Science / University of Diyala
● Physical layer: This is the lowest layer in a communication system and is responsible
for the conversion of a stream of bits into signals that can be transmitted on the sender side.
The physical layer of the receiver then transforms the signals back into a bit stream. For
wireless communication, the physical layer is responsible for frequency selection,
generation of the carrier frequency, signal detection (although heavy interference may
disturb the signal), modulation of data onto a carrier frequency and (depending on the
transmission scheme) encryption.
● Data link layer: The main tasks of this layer include accessing the medium, multiplexing
of different data streams, correction of transmission errors, and synchronization (i.e.,
detection of a data frame). Altogether, the data link layer is responsible for a reliable point-
to-point connection between two devices or a point-to-multipoint connection between one
sender and several receivers.
● Network layer: This third layer is responsible for routing packets through a network or
establishing a connection between two entities over many other intermediate systems.
Important functions are addressing, routing, device location, and handover between
different networks.
● Transport layer: This layer is used in the reference model to establish an end-to-end
connection
● Application layer: Finally, the applications (complemented by additional layers that can
support applications) are situated on top of all transmission oriented layers. Functions are
service location, support for multimedia applications, adaptive applications that can handle
the large variations in transmission characteristics, and wireless access to the world-wide
web using a portable device.