MC Unit - 1
MC Unit - 1
UNIT – 1
PART – A
PART – B
1.Analyze the various applications of mobile computing in the real-
world scenario
In many fields of work, the ability to keep on the move is vital to
utilize time efficiently. The importance of Mobile Computers has been
highlighted in many fields of which a few are described below:
1. Vehicles:
Music, news, road conditions, weather reports, and other
broadcast information are received via digital audio
broadcasting (DAB) with 1.5 Mbit/s.
For personal communication, GSM, universal mobile tele-
communications system (UMTS) phone might be available
offering voice and data connectivity with 384 kbit/s.
The current position of the car is determined via the
global positioning system (GPS). Cars driving in the same
area build a local ad-hoc network for the fast exchange of
information in emergency situations or to help each other
keep a safe distance. In case of an accident, not only will
the airbag be triggered, but the police and ambulance
service will be informed via an emergency call to a service
provider.
Buses, trucks, and trains are already transmitting
maintenance and logistic information to their home base,
which helps to improve organization (fleet management),
and saves time and money.
2. Emergencies:
An ambulance with a high-quality wireless connection to a
hospital can carry vital information about injured persons to
the hospital from the scene of the accident.
All the necessary steps for this particular type of accident
can be prepared and specialists can be consulted for an
early diagnosis.
Wireless networks are the only means of communication in
the case of natural disasters such as hurricanes or
earthquakes. In the worst cases, only decentralized, wireless
ad-hoc networks survive.
3. Business:
Managers can use mobile computers say, critical
presentations to major customers. They can access the
latest market share information. At a small recess, they can
revise the presentation to take advantage of this information.
They can communicate with the office about possible new
offers and call meetings for discussing responds to the new
proposals. Therefore, mobile computers can leverage
competitive advantages.
A travelling salesman today needs instant access to the
company’s database:
to ensure that files on his or her laptop reflect the current
situation, to enable the company to keep track of all
activities of their travelling employees, to keep databases
consistent etc.
With wireless access, the laptop can be turned into a true
mobile office, but efficient and powerful synchronization
mechanisms are needed to ensure data consistency.
4. Credit Card Verification:
At Point of Sale (POS) terminals in shops and supermarkets,
when customers use credit cards for transactions, the
intercommunication required between the bank central
computer and the POS terminal, in order to effect
verification of the card usage, can take place quickly and
securely over cellular channels using a mobile computer unit.
This can speed up the transaction process and relieve
congestion at the POS terminals.
5. Replacement of Wired Networks:
wireless networks can also be used to replace wired
networks, e.g., remote sensors, for tradeshows, or in
historic buildings.
Due to economic reasons, it is often impossible to wire
remote sensors for weather forecasts, earthquake
detection, or to provide environmental information.
Wireless connections, e.g., via satellite, can help in this
situation. Other examples for wireless networks are
computers, sensors, or information displays in historical
buildings, where excess cabling may destroy valuable walls
or floors.
6. Infotainment:
Wireless networks can provide up-to-date information at
any appropriate location.
The travel guide might tell you something about the
history of a building (knowing via GPS, contact to a local
base station, or triangulation where you are) downloading
information about a concert in the building at the same
evening via a local wireless network.
Another growing field of wireless network applications lies
in entertainment and games to enable, e.g., ad-hoc gaming
networks as soon as people meet to play together.
7. Location dependent services
It is important for an application to ‘know’ something about
the location or the user might need location information
for further activities
1. Location aware services
- what services, e.g., printer, fax, phone, server etc.
exist in the local environment
2. Follow-on services
- automatic call-forwarding, transmission of the
actual workspace to the current location
3. Information services
- “push”: e.g., current special offers in the
supermarket
- “pull”: e.g., where is the Black Forrest Cheese
Cake?
4. Support services
- caches, intermediate results, state information
etc. “follow” the mobile device through the fixed
network
5. Privacy
- who should gain knowledge about the location
Example:
Consider the scenario with three mobile phones as shown
below. The transmission range of A reaches B, but not C (the
detection range does not reach C either). The transmission range of
C reaches B, but not A. Finally, the transmission range of B reaches A
and C, i.e., A cannot detect C and vice versa.
Hidden terminals
a) A sends to B, C cannot hear A
b) C wants to send to B, C senses a “free” medium (CS fails)
and starts transmitting
c) Collision at B occurs, A cannot detect this collision (CD fails)
and continues with its transmission to B
d) A is “hidden” from C and vice versa
(ii) Exposed terminal problem.
Example:
Consider the scenario with three mobile phones as shown
below. The transmission range of A reaches B, but not C (the
detection range does not reach C either). The transmission range of
C reaches B, but not A. Finally, the transmission range of B reaches A
and C, i.e., A cannot detect C and vice versa.
Exposed terminals
a) B sends to A, C wants to send to another terminal (not A or B)
outside the range
b) C senses the carrier and detects that the carrier is busy.
c) C postpones its transmission until it detects the medium as
being idle again but A is outside radio range of C, waiting is not
necessary
d) C is “exposed” to B
Hidden terminals cause collisions, where as Exposed terminals
causes unnecessary delay.
13. (i)Describe the role of MAC protocol. In which layer of OSI model
the MAC protocols operated?
The medium access control (MAC) is a sublayer of the data link
layer of the open system interconnections (OSI) reference model for
data transmission. It is responsible for flow control and multiplexing
for transmission medium. It controls the transmission of data packets
via remotely shared channels. It sends data over the network
interface card.
MAC Layer in the OSI Model:
The Open System Interconnections (OSI) model is a layered
networking framework that conceptualizes how communications
should be done between heterogeneous systems. The data link layer
is the second lowest layer. It is divided into two sublayers −
• The logical link control (LLC) sublayer
• The medium access control (MAC) sublayer
The following diagram depicts the position of the MAC layer −
Hidden terminals
a) A sends to B, C cannot hear A
b) C wants to send to B, C senses a “free” medium (CS fails)
and starts transmitting
c) Collision at B occurs, A cannot detect this collision (CD fails)
and continues with its transmission to B
d) A is “hidden” from C and vice versa
Exposed terminals
a) B sends to A, C wants to send to another terminal (not A or B)
outside the range
b) C senses the carrier and detects that the carrier is busy.
c) C postpones its transmission until it detects the medium as
being idle again but A is outside radio range of C, waiting is not
necessary
d) C is “exposed” to B
Hidden terminals cause collisions, where as Exposed terminals
causes unnecessary delay.
PART – C
1.Do you agree with the following statement: “In CSMA/CD protocol,
when two nodes transmit on a shared medium, a collision can occur
only when two nodes start transmitting exactly at the same instant?”
Explain your answer