0% found this document useful (0 votes)
11 views

MC Unit - 1

The document discusses mobile computing including defining it, applications, challenges, advantages and limitations. It also discusses wireless networking standards, differentiating mobile computing from wireless networking, and random assignment schemes. MAC protocols, ad-hoc networks, and the structure of mobile computing applications are also examined.

Uploaded by

Akshaya Akshaya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

MC Unit - 1

The document discusses mobile computing including defining it, applications, challenges, advantages and limitations. It also discusses wireless networking standards, differentiating mobile computing from wireless networking, and random assignment schemes. MAC protocols, ad-hoc networks, and the structure of mobile computing applications are also examined.

Uploaded by

Akshaya Akshaya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

MOBILE COMPUTING

UNIT – 1
PART – A

1.Define Mobile Computing


Mobile computing is the process of computation on a mobile
device. In such computing, a set of distributed computing systems or
service provider servers participate, connect, and synchronize
through mobile communication protocols

2. Tabulate the wireless networking standards used in Mobile


Computing.
3. Differentiate Mobile Computing and Wireless Networking.

4. List the applications of Mobile Computing?


 Vehicles
 Emergencies
 Business
 Replacement of wired networks
 Infotainment
 Location dependent services
 Mobile and wireless devices

5. Point out the challenges faced by Wireless Communication


 Lower Bandwidth
 Bandwidth Fluctuations
 Host mobility
 Intermittent disconnections
 High bit error rate
 Poor link reliability
 Higher delay
 Power consumption

6. Give the advantages of mobile computing?


 Location Flexibility
 User Mobility
 Device Portability
 Saves Time
 Enhanced Productivity
 Entertainment
7. What are the limitations of mobile computing?
 Resource constraints.
 Interface
 Bandwidth
 Dynamic changes in communication environment.
 Network issues.
 Interoperability issues.
 Security Constraints.

8. List the random assignment schemes?


Random Assignment Schemes are:
 ALOHA
 Slotted ALOHA
 CSMA
 CSMA/CD
 CSMA/CA

9. Point out the issues of Wireless MAC Protocol?


The issues associated with the design of a MAC protocol for wireless
ad hoc networks are:
 node mobility
 an error- prone
 broadcast and shared channel
 time-synchronization
 bandwidth efficiency
 QoS support.

10. Define Ad-Hoc networks.


The term implies spontaneous or impromptu construction. An
ad hoc network is a network that is composed of individual devices
communicating with each other directly. Instead of relying on a base
station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from
each other.

11. Illustrate the structure of mobile computing applications

Programming languages are used for mobile system software.


Operating system functions to run the software components onto the
hardware. Middleware components deployment. Layered structure
arrangement of mobile computing components is used. Protocols
and layers are used for transmission and reception.

12. Classify the MAC Protocols

13. Distinguish between infrastructure-based network and


infrastructure-less Network.
14. Give the characteristics of mobile computing?
 Ubiquity
 Location Awareness
 Adaptation
 Broadcast
 Personalization

15. Show the schematic operation of CDMA scheme?

16. Classify Hidden Terminal and Exposed Terminal Problem with


the help of a diagram.
Hidden Terminal Problem:
The Hidden Terminal Problem arises when at least three nodes
(A, B and C) communicating.
B is in the radio range of A, and B is also with the radio range of
C. The nodes A and C are not in the radio range of each other. If both
A and C start to transmit to B at the same time, the data received at
B would get garbled. This situation arises because A and C are
“hidden” from each other, because they are outside each other’s
transmission range.

17. Compose a role which is played by Radio/Infrared signals play in


Mobile Computing?
Infrared technology allows computing devices to communicate
via short range wireless signals. With infrared transmission,
computers can transfer files and other digital data bidirectional.

18. Assess why is the MAC protocol designed for infrastructure-


based wireless network may not work satisfactory in infrastructure-
less environment. Justify your answer (any 5 points is enough)
 Bandwidth Efficiency
– BW available is very limited
– MAC should be designed such that the scarce
bandwidth is utilized in an efficient manner
 Hidden and Exposed Node Problem
 Collision-prone shared channel
– Multiple nodes may contend for the medium leading to
collision
– MAC should make sure that collision is minimized
 Mobility of Nodes
 Control information exchanged may become useless due to
mobility
 MAC performance should be satisfactory when nodes are
mobile
 Power consumption
 QoS support
 Critical for real time applications

19. Develop a MACA Protocol? In which environment is it suitable?


Justify your answer
MACA:
MACA stands for Multiple Access Collision Avoidance. MACA
solves the hidden/exposed terminal problems by regulating the
transmitter power. A node running MACA requests to use the
medium by sending an RTS to the receiver. Since radio signals
propagate omni-directionally, every terminal within the sender’s radio
range will hear this and then refrain from transmitting. As soon as the
receiver is ready to receive data, it responds with a CTS
SUITABLE ENVIRONMENT:
Unsourced material may be challenged and removed. Multiple
Access with Collision Avoidance (MACA) is a slotted media access
control protocol used in wireless LAN data transmission to avoid
collisions caused by the hidden station problem and to simplify
exposed station problem

20. Formulate a reason why Collision Detection based protocol is


not suitable for wireless networks?
Because, in a wireless network, it is very difficult for a
transmitting node to detect a collision since any received signal from
other nodes would be too weak compared to its original signal and
can easily be masked by noise. As a result, the transmitting node
would continue to transmit the frame which leads to corrupted frame.
In wired network, when a node detects a collision, it immediately
stops transmitting, thereby minimizing channel wastage.

PART – B
1.Analyze the various applications of mobile computing in the real-
world scenario
In many fields of work, the ability to keep on the move is vital to
utilize time efficiently. The importance of Mobile Computers has been
highlighted in many fields of which a few are described below:
1. Vehicles:
 Music, news, road conditions, weather reports, and other
broadcast information are received via digital audio
broadcasting (DAB) with 1.5 Mbit/s.
 For personal communication, GSM, universal mobile tele-
communications system (UMTS) phone might be available
offering voice and data connectivity with 384 kbit/s.
 The current position of the car is determined via the
global positioning system (GPS). Cars driving in the same
area build a local ad-hoc network for the fast exchange of
information in emergency situations or to help each other
keep a safe distance. In case of an accident, not only will
the airbag be triggered, but the police and ambulance
service will be informed via an emergency call to a service
provider.
 Buses, trucks, and trains are already transmitting
maintenance and logistic information to their home base,
which helps to improve organization (fleet management),
and saves time and money.
2. Emergencies:
 An ambulance with a high-quality wireless connection to a
hospital can carry vital information about injured persons to
the hospital from the scene of the accident.
 All the necessary steps for this particular type of accident
can be prepared and specialists can be consulted for an
early diagnosis.
 Wireless networks are the only means of communication in
the case of natural disasters such as hurricanes or
earthquakes. In the worst cases, only decentralized, wireless
ad-hoc networks survive.
3. Business:
 Managers can use mobile computers say, critical
presentations to major customers. They can access the
latest market share information. At a small recess, they can
revise the presentation to take advantage of this information.
 They can communicate with the office about possible new
offers and call meetings for discussing responds to the new
proposals. Therefore, mobile computers can leverage
competitive advantages.
 A travelling salesman today needs instant access to the
company’s database:
to ensure that files on his or her laptop reflect the current
situation, to enable the company to keep track of all
activities of their travelling employees, to keep databases
consistent etc.
 With wireless access, the laptop can be turned into a true
mobile office, but efficient and powerful synchronization
mechanisms are needed to ensure data consistency.
4. Credit Card Verification:
 At Point of Sale (POS) terminals in shops and supermarkets,
when customers use credit cards for transactions, the
intercommunication required between the bank central
computer and the POS terminal, in order to effect
verification of the card usage, can take place quickly and
securely over cellular channels using a mobile computer unit.
 This can speed up the transaction process and relieve
congestion at the POS terminals.
5. Replacement of Wired Networks:
 wireless networks can also be used to replace wired
networks, e.g., remote sensors, for tradeshows, or in
historic buildings.
 Due to economic reasons, it is often impossible to wire
remote sensors for weather forecasts, earthquake
detection, or to provide environmental information.
 Wireless connections, e.g., via satellite, can help in this
situation. Other examples for wireless networks are
computers, sensors, or information displays in historical
buildings, where excess cabling may destroy valuable walls
or floors.
6. Infotainment:
 Wireless networks can provide up-to-date information at
any appropriate location.
 The travel guide might tell you something about the
history of a building (knowing via GPS, contact to a local
base station, or triangulation where you are) downloading
information about a concert in the building at the same
evening via a local wireless network.
 Another growing field of wireless network applications lies
in entertainment and games to enable, e.g., ad-hoc gaming
networks as soon as people meet to play together.
7. Location dependent services
 It is important for an application to ‘know’ something about
the location or the user might need location information
for further activities
1. Location aware services
- what services, e.g., printer, fax, phone, server etc.
exist in the local environment
2. Follow-on services
- automatic call-forwarding, transmission of the
actual workspace to the current location
3. Information services
- “push”: e.g., current special offers in the
supermarket
- “pull”: e.g., where is the Black Forrest Cheese
Cake?
4. Support services
- caches, intermediate results, state information
etc. “follow” the mobile device through the fixed
network
5. Privacy
- who should gain knowledge about the location

(ii) Explain in detail about Mobile Computing.


The rapidly expanding technology of cellular communication,
wireless LANs, and satellite services will make information accessible
anywhere and at any time. Regardless of size, most mobile
computers will be equipped with a wireless connection to the fixed
part of the network, and, perhaps, to other mobile computers. The
resulting computing environment, which is often referred to as mobile
or nomadic computing, no longer requires users to maintain a fixed
and universally known position in the network and enables almost
unrestricted mobility. Mobility and portability will create an entire new
class of applications and, possibly, new massive markets combining
personal computing and consumer electronics.
Mobile Computing is an umbrella term used to describe
technologies that enable people to access network services
anyplace, anytime, and anywhere. A communication device can
exhibit any one of the following characteristics:
1. Fixed and wired: This configuration describes the typical
desktop computer in an office. Neither weight nor power
consumption of the devices allow for mobile usage. The devices use
fixed networks for performance reasons.
2. Mobile and wired: Many of today’s laptops fall into this
category; users carry the laptop from one hotel to the next,
reconnecting to the company’s network via the telephone network
and a modem.
3. Fixed and wireless: This mode is used for installing networks,
e.g., in historical buildings to avoid damage by installing wires, or at
trade shows to ensure fast network setup.
4. Mobile and wireless: This is the most interesting case. No
cable restricts the user, who can roam between different wireless
networks. Most technologies discussed in this book deal with this
type of device and the networks supporting them. Today’s most
successful example for this category is GSM with more than 800
million users.

2. Describe in detail about the random assignment schemes that are


used In CDMA protocol

3. Compare and contrast mobile computing and wireless networking.

MOBILE COMPUTING WIRELESS NETWORKING


Mobile is a word that is Wireless, on the other hand,
commonly used to describe does not mean mobile.
portable devices Traditional computers or other
non-mobile devices can access
wireless networks.
A mobile device is one that is One very common example is
made to be taken anywhere. the use of a localized browser
product in a local area network
(LAN), where the router takes
what used to be a cabled
interaction and makes it
wireless.
Therefore, it needs an internal Other kinds of wireless
battery for power, and must be networks called wide area
connected to a modern mobile networks (WAN) can even
network that can help it to send use components of 3G or
and receive data without 4G wireless systems made
attaching to a hardware specifically for mobile devices,
infrastructure. but that doesn‘t mean that the
devices on these networks are
mobile.
a mobile system offers all of the a wireless system provides a
resources of that distributed fixed or portable endpoint with
network to something that can access to a distributed network
go anywhere, barring any issues
with local reception or technical
area coverage.
Where as in mobile In communication engineering,
communication, communicating wireless communication(both
nodes moves within specified static and dynamic) is
area and method of communication between
communication is wireless Nodes/system without use of
communication suitably..e.g.- direct physical connection rather
Mobile Ad-hoc networks it is through a non conducting or
(MANETs). dielectric media.
Mobile computing essentially Wireless communication is
refers to a device that is not simply data communication
always connected to a central without the use of a landline.
network. This group of devices This may involve a cellular
includes laptops, newly created telephone, a two way radio, a
smart phones and also PDA's. fixed wireless connection, a
laser, or satellite
communications.
These products may Here the computing device is
communicate with a base continuously connected to the
location, with or without, a base network.
wireless connection
(ii) Analyze the properties required for MAC Protocols
4. (i) Demonstrate the working principle of CDMA scheme
(ii) Demonstrate the working principle of FDMA scheme
5.(i) How does MAC protocol for Wireless networks differ from
wired
network? Justify your Statement

5.(ii) Identify the use of MAC Protocols.


6.Explain the fixed assignment MAC protocols with neat diagram
Note : don’t include that box 3.4 and 3.5

7.Differentiate between TDMA,FDMA and CDMA


8.(i) Classify the MAC protocols for ad-hoc networks.
(ii) Examine how the contention free protocols overcome the short
comings of contention based protocols
9. Generalize the role of pseudo random generator in the working of
CDMA Protocol

10.(i) Examine the characteristics of mobile computing


(ii) Describe the 3-tier structure of mobile computing application
11. Explain the different categories of MAC protocols in detail
Note : don’t include that box 3.4 and 3.5
12. Discuss:
(i)Hidden terminal problem.

Example:
Consider the scenario with three mobile phones as shown
below. The transmission range of A reaches B, but not C (the
detection range does not reach C either). The transmission range of
C reaches B, but not A. Finally, the transmission range of B reaches A
and C, i.e., A cannot detect C and vice versa.
Hidden terminals
a) A sends to B, C cannot hear A
b) C wants to send to B, C senses a “free” medium (CS fails)
and starts transmitting
c) Collision at B occurs, A cannot detect this collision (CD fails)
and continues with its transmission to B
d) A is “hidden” from C and vice versa
(ii) Exposed terminal problem.
Example:
Consider the scenario with three mobile phones as shown
below. The transmission range of A reaches B, but not C (the
detection range does not reach C either). The transmission range of
C reaches B, but not A. Finally, the transmission range of B reaches A
and C, i.e., A cannot detect C and vice versa.

Exposed terminals
a) B sends to A, C wants to send to another terminal (not A or B)
outside the range
b) C senses the carrier and detects that the carrier is busy.
c) C postpones its transmission until it detects the medium as
being idle again but A is outside radio range of C, waiting is not
necessary
d) C is “exposed” to B
Hidden terminals cause collisions, where as Exposed terminals
causes unnecessary delay.
13. (i)Describe the role of MAC protocol. In which layer of OSI model
the MAC protocols operated?
The medium access control (MAC) is a sublayer of the data link
layer of the open system interconnections (OSI) reference model for
data transmission. It is responsible for flow control and multiplexing
for transmission medium. It controls the transmission of data packets
via remotely shared channels. It sends data over the network
interface card.
MAC Layer in the OSI Model:
The Open System Interconnections (OSI) model is a layered
networking framework that conceptualizes how communications
should be done between heterogeneous systems. The data link layer
is the second lowest layer. It is divided into two sublayers −
• The logical link control (LLC) sublayer
• The medium access control (MAC) sublayer
The following diagram depicts the position of the MAC layer −

Functions of MAC Layer


 It provides an abstraction of the physical layer to the LLC and
upper layers of the OSI network.
 It is responsible for encapsulating frames so that they are
suitable for transmission via the physical medium.
 It resolves the addressing of source station as well as the
destination station, or groups of destination stations.
 It performs multiple access resolutions when more than one
data frame is to be transmitted. It determines the channel
access methods for transmission.
 It also performs collision resolution and initiating
retransmission in case of collisions.
 It generates the frame check sequences and thus contributes
to protection against transmission errors.
(ii) Identify the role of CSMA /CA in wireless network
14. Summarize the issues of Wireless MAC Protocols

Hidden Terminal Problem:


Example:
Consider the scenario with three mobile phones as shown
below. The transmission range of A reaches B, but not C (the
detection range does not reach C either). The transmission range of
C reaches B, but not A. Finally, the transmission range of B reaches A
and C, i.e., A cannot detect C and vice versa.

Hidden terminals
a) A sends to B, C cannot hear A
b) C wants to send to B, C senses a “free” medium (CS fails)
and starts transmitting
c) Collision at B occurs, A cannot detect this collision (CD fails)
and continues with its transmission to B
d) A is “hidden” from C and vice versa

Exposed terminal problem:


Example:
Consider the scenario with three mobile phones as shown
below. The transmission range of A reaches B, but not C (the
detection range does not reach C either). The transmission range of
C reaches B, but not A. Finally, the transmission range of B reaches A
and C, i.e., A cannot detect C and vice versa.

Exposed terminals
a) B sends to A, C wants to send to another terminal (not A or B)
outside the range
b) C senses the carrier and detects that the carrier is busy.
c) C postpones its transmission until it detects the medium as
being idle again but A is outside radio range of C, waiting is not
necessary
d) C is “exposed” to B
Hidden terminals cause collisions, where as Exposed terminals
causes unnecessary delay.
PART – C
1.Do you agree with the following statement: “In CSMA/CD protocol,
when two nodes transmit on a shared medium, a collision can occur
only when two nodes start transmitting exactly at the same instant?”
Explain your answer

2. What is MACA protocol? In which environment is it suitable?


Briefly explain its working. Compose a solution to solve the hidden
and exposed terminal problem using MACA protocol.
3. Classify the different categories of MAC protocols. Identify the
situations under which protocols from one category would be
preferable over the other categories. Explain the working of a
reservation-based MAC protocols.

Refer question no.11

4. Differentiate infrastructure-based networks and infrastructure-


less networks with the help of suitable schematic diagrams

You might also like