0% found this document useful (0 votes)
11 views

Chapter 2&3 Notes

Uploaded by

ezedinawol130
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Chapter 2&3 Notes

Uploaded by

ezedinawol130
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Chapter 2: Mobile Computing

2.1 Fundamentals of Mobile Computing

Mobile computing is an umbrella term that refers to the ability to use computing devices while on
the move. These devices are often wireless, portable, and equipped with the technology to access
data remotely. Mobile computing has become an integral part of everyday life, transforming
industries, communication, and how people interact with the digital world.

2.1.1 Definition and Concepts of Mobile Computing

Mobile Computing Overview

Mobile computing involves using portable computing devices like smartphones, tablets, laptops,
and wearables that can access the internet or communicate with other devices via networks such
as Wi-Fi, 4G/5G, and Bluetooth. The hallmark of mobile computing is its ability to provide
seamless communication and data access anywhere and at any time.

Key concepts:

 Ubiquitous computing: The integration of computers into everyday objects.


 Cloud computing: Centralized services that are accessible remotely, often supporting
mobile computing.
 Wireless communication: Using wireless networks such as Wi-Fi, LTE, or Bluetooth for
data transmission.

History and Evolution of Mobile Computing

 Early Stages (1970s - 1980s): The idea of mobile computing started with the development
of portable devices such as laptops. The first mobile phone call was made in 1973 by
Motorola.
 1990s: The evolution of Personal Digital Assistants (PDAs), like the Palm Pilot, marked
the beginning of practical mobile computing. Early mobile phones also gained the ability
to send text messages.
 2000s: Smartphones, pioneered by companies like Apple (iPhone) and Google (Android),
brought together computing power, internet access, and mobile telephony into a single
device.
 2010s-Present: The growth of 4G/5G networks, mobile apps, and wearable devices (like
smartwatches) has driven exponential growth in mobile computing. Today, cloud
integration, AI, and IoT are enhancing mobile computing further.

COMPILED BY: HUSSIEN M (MSC),


1
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

2.1.2 Characteristics of Mobile Computing

Portability and Mobility

 Portability refers to the physical characteristics of devices that can be easily carried
around, such as smartphones, tablets, laptops, and wearables.
 Mobility refers to the ability to access services and data while moving, without being
tethered to a specific location. Devices like smartphones are connected to the internet via
mobile networks, allowing continuous connectivity.

Connectivity and Communication

 Mobile computing depends heavily on wireless connectivity to access networks and


communicate with other devices.
 Mobile communication protocols like LTE, 5G, and Wi-Fi enable data transmission
between devices.
 Cloud-based services ensure continuous data synchronization and storage, even if a device
is temporarily offline. Once reconnected, the device syncs with the cloud, ensuring up-to-
date information.

2.1.3 Components of Mobile Computing

Mobile computing comprises three major components: mobile hardware, mobile software, and
mobile communication systems.

Mobile Hardware

 Devices: Smartphones, tablets, laptops, wearables, and other portable gadgets that perform
computing tasks.

Sensors: Devices often include a variety of sensors like GPS, accelerometers, gyroscopes,
proximity sensors, and biometric scanners (fingerprint or facial recognition), which enhance
interactivity and data gathering.

Mobile Software

 Mobile Apps: Applications designed for mobile platforms, ranging from simple utilities
to complex software like gaming, navigation, social media, and office productivity tools.
 Operating Systems (OS): Mobile OSs such as Android, iOS, Windows, and Linux-based
systems manage hardware resources, offer user interfaces, and provide app support.

COMPILED BY: HUSSIEN M (MSC),


2
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Mobile Communication

 Networks: Cellular networks (3G, 4G, and 5G), Wi-Fi, and Bluetooth facilitate mobile
computing communication.
 Protocols: Mobile devices use standard communication protocols like TCP/IP, HTTP, and
WAP (Wireless Application Protocol) to exchange data with remote servers and devices.

2.1.4 Benefits and Limitations of Mobile Computing

Benefits

 Convenience: Mobile devices allow users to perform tasks such as sending emails,
shopping, and banking anywhere and at any time.
 Efficiency: Mobile computing improves productivity by enabling remote work, quick
communication, and real-time access to information. Features like cloud integration make
it easier to collaborate and share data across platforms.
 Flexibility: Mobile computing offers a wide range of functionalities, from simple
communications to running complex applications, making it adaptable to various industries
(e.g., healthcare, education, business).
 Entertainment: Mobile computing devices serve as personal entertainment centers,
offering video streaming, gaming, social media, and music services.

Limitations

 Battery Life: Limited battery capacity is one of the most common constraints in mobile
computing. Running applications, especially resource-intensive ones, can drain battery
quickly.
 Security Concerns: Mobile devices are prone to hacking, data breaches, and malware
attacks. Mobile security measures such as encryption, VPNs, and two-factor authentication
are essential but often not sufficient to prevent all threats.
 Limited Processing Power: Although modern mobile devices are powerful, they are still
constrained by hardware limitations compared to desktop computers, making some tasks
slower or less efficient.
 Connectivity Issues: Continuous reliance on network availability means that mobile
computing can be disrupted by weak signals, network outages, or location-based
restrictions.

2.2 Mobile Devices and Mobile OS

COMPILED BY: HUSSIEN M (MSC),


3
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Mobile devices and their operating systems (OS) form the backbone of mobile computing. These
devices, equipped with versatile mobile OS platforms, empower users to access data,
communicate, and perform tasks on the go. This section delves into the types of mobile devices,
mobile operating systems, their features, and the role of mobile device management.

2.2.1 Types of Mobile Devices

Mobile devices are portable gadgets that enable users to perform computing tasks, connect to the
internet, and interact with digital content. The key types include smartphones, tablets, wearables,
and Internet of Things (IoT) devices.

Smartphones, Tablets, Laptops

 Smartphones: Handheld devices equipped with a touchscreen interface, high-speed


internet access (4G/5G), and powerful processors. They combine computing capabilities,
mobile telephony, and a wide range of apps.
 Tablets: Larger than smartphones, tablets have bigger screens and are often used for tasks
like reading, watching videos, or drawing. They offer similar functionality to smartphones
but with greater screen real estate.
 Laptops: Portable computers with a full operating system, keyboards, and larger displays.
They offer more computing power compared to smartphones and tablets, but are generally
less portable.

Wearable Devices (Smartwatches, Fitness Trackers)

 Smartwatches: Wearable devices that act as extensions of smartphones, offering features


like notifications, fitness tracking, and voice commands.
 Fitness Trackers: Devices focused on tracking physical activities such as steps, heart rate,
sleep, and exercise. They often sync with smartphones for data analysis.

IoT Devices (Smart Home, Smart Cars)

 Smart Home Devices: Gadgets like smart speakers (e.g., Amazon Echo), smart
thermostats (e.g., Nest), and smart lights (e.g., Philips Hue) connected via the Internet,
allowing users to control them remotely through mobile devices.
 Smart Cars: Vehicles with embedded computing systems for navigation, entertainment,
and safety. These cars often sync with smartphones and can be managed through apps for
remote access to functions such as locking/unlocking and diagnostics.

2.2.2 Mobile Operating Systems (OS) Overview

COMPILED BY: HUSSIEN M (MSC),


4
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Mobile operating systems manage hardware and software resources, offer user interfaces, and
control the execution of apps. The three most popular mobile operating systems are Android, iOS,
and a few other alternatives.

Android OS

 Android is an open-source OS developed by Google. It is the most widely used mobile


operating system globally, powering devices from various manufacturers like Samsung,
Xiaomi, and Huawei.
 Features: Customizability, multi-tasking, wide range of apps from Google Play, and
support for different hardware configurations.
 Architecture: Android has a layered architecture that includes the Linux kernel, libraries,
Android Runtime, Application Framework, and system apps. The architecture allows for
flexibility in hardware integration and custom modifications.

iOS

 iOS is a proprietary OS developed by Apple, used exclusively on Apple devices like


iPhones and iPads.
 Features: Known for its security, smooth user experience, and integration with Apple’s
ecosystem (MacBooks, Apple Watch, AirPods).
 Architecture: iOS follows a layered approach, consisting of Core OS, Core Services,
Media, and Cocoa Touch layers. It emphasizes performance, security, and seamless
multitasking.

Other Mobile OS (Windows Mobile, KaiOS)

 Windows Mobile: Developed by Microsoft, it was once a popular mobile OS but has since
been discontinued. It offered integration with Windows PCs and enterprise apps.
 KaiOS: A lightweight OS designed for feature phones (non-smartphones). It is widely used
in emerging markets and offers basic apps like WhatsApp and YouTube on low-cost
hardware.

2.2.3 Features and Architecture of Mobile OS

Mobile operating systems are designed to optimize performance, security, and power efficiency
on mobile devices. Some of the key features include:

Multitasking

COMPILED BY: HUSSIEN M (MSC),


5
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 Mobile OSs support multitasking, allowing multiple apps to run simultaneously in the
background while ensuring minimal resource consumption. Android and iOS manage
multitasking through efficient memory management and app lifecycle handling.

Power Management

 Mobile devices rely on battery power, and efficient power management is a critical feature
of mobile OS. The OS monitors app usage, background processes, and network
connectivity to reduce power consumption. Techniques like battery-saving modes, app
hibernation, and adaptive brightness help extend battery life.

Security and Privacy Features

 Encryption: Both iOS and Android use encryption to protect user data, with iOS offering
hardware-based encryption for additional security.
 App Sandboxing: Each app runs in a secure environment (sandbox) isolated from other
apps, preventing unauthorized access to the system or user data.
 Permissions Control: Users can control app permissions, deciding what data and hardware
(camera, microphone) apps can access.
 Two-Factor Authentication (2FA): Many mobile OSs provide built-in support for 2FA,
adding an extra layer of security for logins.

2.2.4 Mobile Device Management (MDM)

Mobile Device Management (MDM) refers to the administrative tools and policies used to
manage, secure, and monitor mobile devices in enterprise environments. MDM is crucial for
maintaining security and ensuring compliance in organizations where employees use mobile
devices for work.

Device Provisioning and Control

 Provisioning: This involves setting up devices with the necessary configurations, apps,
and policies before they are issued to users. IT administrators can pre-configure settings
like email, Wi-Fi, and VPN access to streamline deployment.
 Control: Administrators can control devices remotely, applying updates, configurations,
or restrictions to ensure compliance with organizational policies.

COMPILED BY: HUSSIEN M (MSC),


6
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Remote Management and Security Policies

 Remote Management: MDM allows administrators to remotely monitor device usage,


deploy updates, and resolve technical issues. If a device is lost or stolen, remote wipe
functionality can erase sensitive data to prevent unauthorized access.
 Security Policies: Organizations enforce security policies through MDM solutions, such
as mandatory password requirements, encryption, app whitelisting/blacklisting, and
automated software updates.

2.3 Mobile Computing Issues and Challenges

Mobile computing, while highly transformative, faces several challenges related to security, power
management, network connectivity, and user experience. This section outlines the key issues and
the strategies used to address them.

2.3.1 Security Issues

Data Privacy

 Data privacy is a major concern for mobile computing users, as personal and sensitive
data are frequently stored and transmitted via mobile devices. Many apps and services
collect data such as location, browsing habits, and personal information.
 Unauthorized data collection, misuse by third-party apps, or vulnerabilities in the device's
operating system can expose this data to hackers. Privacy regulations like GDPR aim to
protect user data, but enforcement and compliance vary.

Malware and Vulnerabilities

 Mobile malware targets mobile devices through apps, browsers, and operating system
vulnerabilities. Common types of mobile malware include spyware, adware, and
ransomware.
 Vulnerabilities in mobile OSs or apps provide entry points for attacks. Attack vectors like
phishing emails or infected apps downloaded from unofficial sources can lead to data theft
or device control.

Encryption and Authentication Challenges

 Encryption: Data encryption is critical for securing information stored on or transmitted


by mobile devices. However, encryption can introduce performance overhead, particularly
on devices with limited processing power.

COMPILED BY: HUSSIEN M (MSC),


7
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 Authentication: Mobile devices often use fingerprint, facial recognition, or


PIN/password-based authentication. Weak or poorly implemented authentication
mechanisms are prone to attacks. Two-factor authentication (2FA) helps mitigate this
risk but isn't universally adopted.

2.3.2 Battery Life and Power Management

Power Consumption Challenges

 Mobile devices are constrained by limited battery life due to their size and portability.
High-performance processors, large displays, and constant network access drain the battery
quickly.
 Power-hungry apps, especially those using GPS, background data synchronization, or
multimedia processing, significantly reduce battery life.

Optimization Techniques

 Adaptive displays: Many mobile devices use adaptive display technology that
automatically adjusts brightness based on ambient light, helping to conserve energy.
 Low-power modes: Mobile operating systems offer power-saving modes that reduce
performance, limit background processes, and disable certain features (like location
services) to extend battery life.
 Efficient app design: Developers optimize apps to reduce power consumption by using
less frequent data polling, offloading heavy computation to the cloud, and minimizing
unnecessary background activities.

2.3.3 Network Connectivity Issues

Coverage and Bandwidth Limitations

 Network coverage varies depending on location, especially in rural or remote areas where
cellular towers and Wi-Fi networks may not reach. Connectivity is crucial for many mobile
apps and services, but it is not always reliable.
 Bandwidth limitations occur when a large number of users connect to the same network,
such as in densely populated areas. In such cases, network speeds slow down, leading to
poor user experiences, particularly with data-intensive applications like video streaming or
video calls.

COMPILED BY: HUSSIEN M (MSC),


8
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Roaming and Latency Issues

 Roaming refers to using a mobile device outside the coverage area of the user's primary
carrier. Roaming charges and service limitations can make data access expensive or slow
in some regions.
 Latency refers to the delay between sending a request and receiving a response over a
network. High latency can occur when using mobile services in areas with poor
infrastructure or when roaming internationally. This can significantly impact real-time
applications like gaming or VoIP services.

2.3.4 Device Fragmentation

Compatibility across Different Devices and OS Versions

 Device fragmentation refers to the challenge of developing apps or services that work
seamlessly across various types of devices with different screen sizes, hardware
configurations, and operating system versions.
 The Android ecosystem is particularly fragmented, with numerous manufacturers
producing devices with different specs, running various versions of the OS. This
complicates app development, requiring extensive testing to ensure compatibility across
devices.
 Operating system updates are not uniform, especially on Android, where device
manufacturers and carriers control when updates are released, leading to many devices
running outdated OS versions.

2.3.5 User Interface (UI) and User Experience (UX)

Designing for Small Screens

 Mobile devices have limited screen real estate compared to desktops and laptops, making
it essential to prioritize the most important information and minimize clutter.
 Responsive design: Interfaces must adapt to different screen sizes and orientations. The
challenge is ensuring functionality and readability without overwhelming the user.
 Gestures: Touchscreen devices rely on gestures like swiping, pinching, and tapping, which
are intuitive but must be carefully designed to avoid accidental input.

Touchscreen Interface Limitations

 Input limitations: Touchscreens are less precise than a mouse or keyboard, making tasks
like text entry, fine control, or multi-step interactions more difficult.

COMPILED BY: HUSSIEN M (MSC),


9
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 Accessibility: Users with physical disabilities may find it challenging to use touchscreens.
Developers need to incorporate voice commands, screen readers, and haptic feedback
to make apps accessible to all.
 Fatigue: Repeated interactions with small touch targets can lead to user fatigue and
frustration, particularly for tasks that require extensive scrolling or typing.

2.4 Mobile Computing Technologies

Mobile computing relies on a wide range of technologies to provide services that are convenient,
efficient, and scalable. These include wireless communication, location-based services, cloud
integration, and application development frameworks. This section covers the key technologies
that enable mobile computing and their significance.

2.4.1 Wireless Communication Technologies

Wireless communication is at the core of mobile computing, enabling devices to exchange data
without physical connections. Several wireless technologies, such as Wi-Fi, Bluetooth, NFC, and
mobile networks like 3G, 4G, and 5G, are essential for various applications.

Wi-Fi, Bluetooth, NFC

 Wi-Fi (Wireless Fidelity): Wi-Fi is the most common wireless technology for accessing
the internet in homes, offices, and public spaces. It provides fast data transmission within
a limited range (typically around 100 meters). Wi-Fi is widely used for high-speed internet
browsing, streaming, and file transfer.
 Bluetooth: Bluetooth is a short-range wireless technology used for device-to-device
communication over distances up to 10 meters. It is commonly used for pairing devices
like smartphones, headphones, and smartwatches. Bluetooth Low Energy (BLE) is a more
power-efficient variant used in IoT devices and wearables.
 NFC (Near Field Communication): NFC allows for secure, short-range communication
(a few centimeters). It is mainly used for contactless payments (e.g., Google Pay, Apple
Pay), transferring small amounts of data between devices, or for reading NFC tags (used
in smart cards or promotional materials).

3G, 4G, 5G Technologies

 3G (Third Generation): Introduced in the early 2000s, 3G networks offered mobile


internet speeds fast enough to support multimedia services like video calls and mobile web
browsing. Though now largely replaced by faster networks, 3G was critical in the early
growth of mobile computing.

COMPILED BY: HUSSIEN M (MSC),


10
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 4G (Fourth Generation): 4G networks dramatically increased data speeds, allowing for


smooth streaming of HD videos, faster downloads, and better overall performance for
mobile apps. 4G enabled the rapid growth of app ecosystems and cloud-based services.
 5G (Fifth Generation): 5G is the latest generation of mobile network technology, offering
significantly faster speeds, lower latency, and greater capacity than 4G. It supports
emerging technologies like augmented reality (AR), virtual reality (VR), autonomous
vehicles, and the Internet of Things (IoT), which require real-time data transmission.

2.4.2 Location-Based Services (LBS)

Location-based services (LBS) provide information or functionality based on a user’s geographical


location. These services are widely used for navigation, social networking, targeted advertising,
and emergency response systems.

GPS and Navigation

 GPS (Global Positioning System): GPS is a satellite-based navigation system that


provides real-time location data to mobile devices. GPS is crucial for applications like
navigation (e.g., Google Maps, Apple Maps), ride-sharing (e.g., Uber, Lyft), and fitness
tracking (e.g., Strava).
 GPS enables users to obtain accurate directions, find nearby services, and track
movements. It also powers applications that rely on geolocation, such as weather apps,
augmented reality games (e.g., Pokémon Go), and delivery services.

Geofencing and Proximity Sensing

 Geofencing: Geofencing creates virtual boundaries around a geographical area using GPS
or RFID (Radio-Frequency Identification). When a user enters or exits a geofenced area,
certain actions are triggered, such as sending push notifications or alerts. Geofencing is
commonly used in targeted marketing, location-based services, and security applications.
 Proximity Sensing: Proximity sensing involves detecting nearby objects or users using
technologies like BLE beacons or NFC. For example, retail stores use proximity sensing
to send promotional offers when customers approach specific areas, and museums use it to
provide additional information about exhibits when visitors get close to certain displays.

2.4.3 Mobile Cloud Computing

Mobile cloud computing integrates mobile devices with cloud services to enhance the
functionality, scalability, and efficiency of mobile applications. This model allows mobile apps to
offload heavy processing tasks to cloud servers, reducing the burden on the device.

COMPILED BY: HUSSIEN M (MSC),


11
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Cloud Integration with Mobile Apps

 Cloud integration enables mobile apps to store data and run complex processes on cloud
servers rather than on the mobile device itself. This leads to faster performance, real-time
synchronization, and access to more powerful computational resources.
 Examples of mobile apps leveraging cloud integration include cloud storage apps (e.g.,
Google Drive, Dropbox), cloud gaming (e.g., NVIDIA GeForce Now, Xbox Cloud
Gaming), and productivity suites (e.g., Microsoft Office 365, Google Workspace).

Benefits and Challenges of Mobile Cloud Services

 Benefits:
o Resource Efficiency: Mobile devices can offload intensive processing tasks, such
as data analysis or rendering, to the cloud, which helps conserve battery life and
improve app performance.
o Real-Time Synchronization: Users can access updated data across multiple
devices because information is stored in the cloud, making it accessible anywhere.
o Scalability: Cloud services allow developers to scale resources based on user
demand without relying on the device’s hardware limitations.
 Challenges:
o Connectivity Dependence: Mobile cloud services rely on stable internet
connectivity, which can be an issue in areas with weak or no network coverage.
o Data Privacy and Security: Storing sensitive data in the cloud exposes it to
potential breaches. Encryption and robust security protocols are necessary to
safeguard cloud-stored data.
o Latency: Cloud-based applications might experience delays in processing or
fetching data, particularly in regions with slow network speeds or high traffic.

2.4.4 Mobile Application Development Frameworks

Developers use mobile application development frameworks to build mobile apps. These
frameworks simplify the development process and allow for faster deployment of apps across
various platforms.

Native vs Hybrid Apps

 Native Apps: Native apps are developed specifically for a particular mobile operating
system (e.g., Android, iOS) using platform-specific languages and tools. For example,
Android apps are typically built using Java or Kotlin, while iOS apps use Swift or

COMPILED BY: HUSSIEN M (MSC),


12
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Objective-C. Native apps offer the best performance and can fully leverage the device's
hardware features (e.g., camera, GPS, sensors).
 Hybrid Apps: Hybrid apps are built using web technologies like HTML5, CSS, and
JavaScript and are wrapped in a native container to run on multiple platforms. Hybrid
frameworks allow developers to write a single codebase that can be deployed on both
Android and iOS. While hybrid apps are more cost-effective and faster to develop, they
may not perform as well as native apps.

Popular Frameworks (Flutter, React Native, Swift, Kotlin)

 Flutter: Flutter, developed by Google, is an open-source UI software development


framework used to build native-like apps for Android and iOS from a single codebase. It
uses the Dart programming language and provides a rich set of pre-designed widgets for
creating responsive UIs.
 React Native: React Native, developed by Facebook, is a popular framework for building
mobile apps using JavaScript and React. It allows developers to create native-like apps
for Android and iOS using a shared codebase. React Native is known for its fast
development cycle and large community support.
 Swift: Swift is Apple’s official programming language for building iOS, macOS, and
watchOS apps. It is known for its safety features, modern syntax, and high performance.
Swift allows developers to create efficient and fast native apps for the Apple ecosystem.
 Kotlin: Kotlin is a modern programming language developed by JetBrains, and it has
become the preferred language for Android app development. Kotlin is concise, expressive,
and interoperable with Java, making it a popular choice for building native Android apps.

2.5 Mobile Computing Applications

Mobile computing applications span a wide array of industries and user needs, transforming how
businesses operate, people communicate, and how entertainment and financial services are
delivered. In this section, we explore key types of mobile applications, from enterprise solutions
to social networking, gaming, payments, and the Internet of Things (IoT).

2.5.1 Enterprise Mobile Applications

Enterprise mobile applications are designed to improve business processes, enhance


communication, and optimize resource management within organizations. They allow employees
to access critical business systems on mobile devices, enabling flexibility and on-the-go
productivity.

Mobile CRM, ERP, and Other Business Tools

COMPILED BY: HUSSIEN M (MSC),


13
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 Mobile CRM (Customer Relationship Management): Mobile CRM apps allow sales
teams and customer service agents to manage customer interactions, track leads, update
records, and access client data while on the move. Examples include Salesforce Mobile
and Zoho CRM. Mobile CRM enhances responsiveness and decision-making by ensuring
that data is always accessible.
 Mobile ERP (Enterprise Resource Planning): Mobile ERP applications enable
businesses to manage core operations like inventory, finance, human resources, and supply
chain management from mobile devices. For instance, SAP Business One and Oracle
NetSuite offer mobile versions of their ERP systems. These apps streamline operations,
allow remote access, and improve workflow efficiency.
 Other Business Tools: Mobile apps for project management (e.g., Trello, Asana),
document management (e.g., Google Drive, Microsoft Office 365), and collaboration
(e.g., Slack, Microsoft Teams) are vital for maintaining team productivity, even when
employees are working remotely.

2.5.2 Social Networking and Communication Apps

Social networking and communication apps are integral to modern mobile experiences, allowing
users to connect, share content, and communicate in real-time with others across the globe.

Messaging Apps (WhatsApp, Telegram)

 WhatsApp: WhatsApp is a widely used messaging app that offers text messaging, voice
and video calls, and multimedia sharing. It uses end-to-end encryption to secure messages,
making it a trusted platform for personal and group communication.
 Telegram: Telegram is another popular messaging app known for its focus on privacy and
security. It offers cloud-based messaging, large file sharing, and advanced features like
bots, channels, and secret chats for encrypted communications.

Both apps are instrumental in connecting users across the world, offering free messaging services
over the internet.

Social Media Apps (Facebook, Instagram)

 Facebook: Facebook is the largest social networking platform, allowing users to connect,
share status updates, photos, and videos, join groups, and follow pages. It has become a
global platform for both personal interaction and business marketing.
 Instagram: Instagram focuses on sharing images and videos. Users can follow others,
engage with content through likes and comments, and use features like Stories, Reels, and

COMPILED BY: HUSSIEN M (MSC),


14
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

IGTV for short and long-form video content. It is a popular platform for influencers,
marketers, and businesses to promote brands visually.

Social media apps have redefined communication and content sharing, creating vast networks of
user-generated content and fostering online communities.

2.5.3 Mobile Gaming and Entertainment

The mobile gaming and entertainment sector is one of the fastest-growing industries, driven by
advances in mobile hardware and software, as well as the availability of sophisticated development
platforms.

Gaming Platforms (Unity, Unreal)

 Unity: Unity is a popular cross-platform game development engine used for creating both
2D and 3D mobile games. It offers a robust set of tools for developers, including a physics
engine, animation system, and asset store. Games developed with Unity are compatible
with multiple operating systems, including Android and iOS.
 Unreal Engine: Unreal Engine is another powerful gaming platform known for its high-
fidelity graphics and advanced features like real-time ray tracing. It is widely used for
creating complex, graphically rich games for mobile devices.

Both Unity and Unreal are key enablers in the mobile gaming industry, allowing developers to
build immersive and interactive games.

Media Streaming Apps (Netflix, Spotify)

 Netflix: Netflix is a leading media streaming app that offers on-demand access to a vast
library of TV shows, movies, and documentaries. It uses adaptive streaming technology to
deliver high-quality video content over mobile networks, making it one of the most popular
entertainment platforms worldwide.
 Spotify: Spotify is a widely used music streaming service that allows users to access
millions of songs, podcasts, and playlists. Its mobile app offers personalized
recommendations, offline playback, and social sharing features.

These apps have transformed how users consume entertainment, making it accessible anytime,
anywhere, on their mobile devices.

2.5.4 Mobile Payment Systems

COMPILED BY: HUSSIEN M (MSC),


15
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Mobile payment systems provide users with the convenience of making secure financial
transactions directly from their mobile devices. This includes digital wallets and banking apps that
allow for purchases, transfers, and financial management on the go.

Digital Wallets (Apple Pay, Google Pay)

 Apple Pay: Apple Pay is a mobile payment system that allows iPhone and Apple Watch
users to make contactless payments using NFC technology. It stores digital versions of
debit and credit cards, enabling secure payments at point-of-sale (POS) terminals and
online.
 Google Pay: Google Pay offers similar functionality for Android users, allowing for
contactless payments, peer-to-peer transfers, and online shopping. It integrates with
banking institutions and supports loyalty programs, offering a comprehensive mobile
payment solution.

Both systems use encryption and tokenization to ensure secure transactions, making mobile
payments a convenient and safe alternative to traditional payment methods.

Banking Apps and Fintech Applications

 Banking Apps: Most banks offer mobile apps that allow users to manage their accounts,
transfer money, pay bills, and monitor transactions from their smartphones. Examples
include Chase Mobile, Wells Fargo, and HSBC Mobile. These apps provide convenience
and real-time access to banking services.
 Fintech Apps: Fintech apps like PayPal, Venmo, and Square have revolutionized the
financial industry by offering peer-to-peer payments, invoicing, and mobile point-of-sale
(mPOS) solutions. These apps are key players in the evolving digital economy, allowing
users to manage and move money with ease.

2.5.5 IoT and Mobile Computing

The Internet of Things (IoT) refers to a network of interconnected devices that communicate and
exchange data via the internet. Mobile devices often act as hubs or control centers for IoT devices,
enabling users to manage and monitor their smart home or IoT systems remotely.

Smart Homes and Devices Control via Mobile

 Smart Homes: Mobile apps like Google Home, Amazon Alexa, and Apple HomeKit
allow users to control smart devices in their homes, such as lights, thermostats, cameras,

COMPILED BY: HUSSIEN M (MSC),


16
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

and door locks. These apps provide a centralized interface for monitoring and managing
multiple IoT devices.
 Device Control: Through mobile apps, users can control a variety of IoT-enabled devices,
such as smart refrigerators, smart TVs, and smart security systems. The mobile
interface allows users to automate functions (e.g., turning lights on or off) and receive alerts
or status updates.

IoT and mobile computing are increasingly integrated, making it easier for users to interact with
and manage connected devices in their personal and professional lives.

Chapter 3: Wireless Network Principles

3.1 Wireless Basics

Wireless communication has become an integral part of modern technology, enabling devices to
communicate without the need for physical connections. This section provides an in-depth
overview of wireless networks, their types, components, and the benefits and limitations associated
with wireless communication.

3.1.1 Definition and Overview of Wireless Networks

What Are Wireless Networks?

 Wireless networks are communication systems that use radio waves or other forms of
electromagnetic radiation to transmit and receive data between devices, without the need
for physical cables.
 Wireless networks allow for the exchange of information between mobile devices,
computers, and various IoT devices, making communication more flexible and convenient.

Wireless networks operate over various distances and bandwidths, depending on the type of
technology used (e.g., Wi-Fi, Bluetooth, cellular networks). They play a crucial role in personal,
enterprise, and public communication systems, supporting applications such as internet access,
mobile communication, and IoT.

Historical Evolution of Wireless Communication

 Early Developments: The concept of wireless communication dates back to the late 19th
century with Guglielmo Marconi, who demonstrated the first wireless telegraph in 1895,
transmitting Morse code over radio waves.

COMPILED BY: HUSSIEN M (MSC),


17
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 Radio Communication: By the 1920s, radio communication became a reality,


revolutionizing the way information was shared over long distances. Radio broadcasting
marked the beginning of commercial wireless communication.
 Cellular Networks: The first-generation (1G) cellular networks emerged in the 1980s,
followed by 2G (GSM), 3G, 4G, and now 5G networks, each offering increasing speeds,
data capacity, and connectivity.
 Wi-Fi: Wi-Fi technology, developed in the late 1990s, brought high-speed wireless internet
to homes, businesses, and public spaces, transforming how people access and use the
internet.
 Current Era: Wireless communication continues to evolve with the development of 5G,
IoT, and satellite-based communication, offering high-speed, low-latency data transfer,
and ubiquitous connectivity.

3.1.2 Types of Wireless Communication

Wireless communication can take many forms, depending on the type of technology and medium
used. The following are the key types of wireless communication:

Radio Frequency (RF) Communication

 RF communication uses radio waves to transmit data across the air. It is the most
commonly used form of wireless communication and operates over a wide range of
frequencies (from kilohertz to gigahertz).
 Applications: Cellular networks (e.g., 4G, 5G), Wi-Fi, Bluetooth, satellite communication,
and broadcast radio/television all rely on RF communication.
 Characteristics: RF communication is effective over long distances, supports high-speed
data transmission, and can penetrate walls and other obstacles, though its performance can
be affected by interference from other devices and atmospheric conditions.

Infrared (IR) Communication

 IR communication uses infrared light waves to transmit data over short distances. It
requires a direct line of sight between the transmitting and receiving devices.
 Applications: Remote controls for TVs, air conditioning systems, and certain low-power
communication devices.
 Characteristics: IR communication is limited to short distances (a few meters) and
requires a clear path between devices, making it less versatile than RF communication.

COMPILED BY: HUSSIEN M (MSC),


18
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Microwave Communication

 Microwave communication uses high-frequency radio waves (microwaves) to transmit


data. It is commonly used for point-to-point communication, such as satellite
communication, long-distance telecommunication links, and certain wireless internet
services.
 Applications: Satellite communication, radar systems, and microwave backhaul systems
used by mobile network operators.
 Characteristics: Microwaves can carry large amounts of data over long distances but are
susceptible to weather conditions like rain or snow, which can cause signal attenuation
(weakening).

3.1.3 Basic Components of a Wireless Network

Wireless networks rely on several key components to facilitate communication between devices.
Understanding these components is essential to understanding how data is transmitted wirelessly.

Transmitters and Receivers

 Transmitters: A transmitter converts data into radio signals (or other electromagnetic
waves) and sends them over the air. In wireless networks, transmitters can be found in
devices like smartphones, laptops, and routers. The transmitter modulates the signal to
encode the data.
 Receivers: A receiver captures the transmitted signals and converts them back into data.
Receivers are embedded in devices like smartphones, computers, and IoT devices. They
decode the signal and extract the transmitted information.
 In many cases, devices serve as both transmitters and receivers, enabling two-way
communication (e.g., smartphones and wireless routers).

Access Points and Base Stations

 Access Points (APs): An access point is a device that allows wireless devices to connect
to a wired network. In a Wi-Fi network, access points broadcast a wireless signal that
devices can connect to for internet access. Routers often include access points as part of
their functionality.
 Base Stations: In cellular networks, base stations (e.g., cell towers) act as intermediaries
between mobile devices and the core network. They transmit and receive radio signals
to/from mobile phones and route these signals to the telecom network, enabling voice and
data services.

COMPILED BY: HUSSIEN M (MSC),


19
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 Role in Communication: Access points and base stations serve as central hubs in wireless
networks, managing connections, data transmission, and coordination between multiple
devices.

3.1.4 Benefits and Limitations of Wireless Networks

Wireless networks offer numerous advantages in terms of mobility and convenience, but they also
come with certain drawbacks, particularly concerning security and performance.

Advantages (Mobility, Convenience)

 Mobility: Wireless networks provide the freedom to connect from virtually anywhere
within the network's range, making it easier for users to stay connected while on the move.
This is particularly important in mobile computing, where users require access to
information and services across various locations.
 Convenience: Wireless networks eliminate the need for physical cables, reducing clutter
and enabling faster deployment of new devices. Users can connect to the internet, share
files, and communicate without needing to plug in any cables.
 Scalability: Wireless networks can easily accommodate new devices, making it simple to
expand a network without complex infrastructure changes.
 Cost Savings: In many cases, wireless networks are more cost-effective than wired
alternatives, especially in environments where installing physical cables is impractical or
expensive (e.g., large office buildings or outdoor environments).

Disadvantages (Interference, Security Risks)

 Interference: Wireless networks are susceptible to interference from other wireless


devices, electronic equipment, and environmental factors (e.g., walls, buildings, weather).
Interference can lead to dropped connections, reduced signal quality, and slower data
transmission speeds.
 Security Risks: Wireless networks are inherently less secure than wired networks due to
the nature of data transmission over the air. Wireless signals can be intercepted by
malicious actors, leading to potential eavesdropping, man-in-the-middle attacks, or data
theft.
o Encryption protocols like WPA2 and WPA3 are used to secure wireless networks,
but they may not be foolproof.
 Signal Range Limitations: Wireless networks typically have limited ranges, meaning
devices outside the coverage area cannot connect. This can be an issue in large areas or
places with physical obstructions that block the signal.

COMPILED BY: HUSSIEN M (MSC),


20
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 Performance Fluctuations: Wireless networks may experience fluctuations in speed and


latency, especially in crowded environments where multiple devices are sharing the same
frequency band (e.g., public Wi-Fi hotspots).

3.2 Frequency Allocation and Regulation

Frequency allocation and regulation play a crucial role in ensuring the efficient use of the
electromagnetic spectrum for wireless communication. Different frequencies are used for various
forms of communication, such as radio, cellular, and Wi-Fi, and are governed by regulatory bodies
to prevent interference and manage spectrum scarcity. This section provides a detailed overview
of the electromagnetic spectrum, frequency bands, regulatory bodies, and challenges in spectrum
allocation.

3.2.1 Electromagnetic Spectrum

Overview of the Electromagnetic Spectrum

 The electromagnetic spectrum refers to the range of all electromagnetic radiation, which
includes different types of waves, such as radio waves, microwaves, infrared, visible light,
ultraviolet, X-rays, and gamma rays. These waves vary in frequency and wavelength.
 The electromagnetic spectrum is divided into different regions based on frequency:
o Low frequencies: Radio waves, microwaves.
o Medium frequencies: Infrared, visible light.
o High frequencies: Ultraviolet, X-rays, gamma rays.
 Wireless communication primarily uses radio waves and microwaves, which occupy the
lower frequency part of the spectrum, ranging from 3 kHz to 300 GHz.

Types of Frequencies Used in Wireless Communication

 Low-frequency (LF) and Medium-frequency (MF) bands: Used for AM radio, long-
distance communication, and navigation systems. These frequencies range from 30 kHz to
3 MHz.
 High-frequency (HF) bands: Used for shortwave radio and amateur radio
communication. These frequencies range from 3 MHz to 30 MHz.
 Very high-frequency (VHF) and Ultra high-frequency (UHF) bands: Commonly used
for TV broadcasting, FM radio, and cellular communication. VHF ranges from 30 MHz to
300 MHz, and UHF ranges from 300 MHz to 3 GHz.
 Super high-frequency (SHF) and extremely high-frequency (EHF) bands: Used for
satellite communication, radar systems, and millimeter-wave 5G. SHF ranges from 3 GHz
to 30 GHz, while EHF ranges from 30 GHz to 300 GHz.

COMPILED BY: HUSSIEN M (MSC),


21
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 The allocation of these frequencies is crucial to ensure the smooth operation of wireless
services without interference between different technologies.

3.2.2 Frequency Bands for Wireless Communication

ISM (Industrial, Scientific, and Medical) Bands

 ISM bands are portions of the electromagnetic spectrum reserved internationally for
industrial, scientific, and medical purposes, rather than for communication.
 However, ISM bands have also been adopted for wireless communication technologies like
Wi-Fi and Bluetooth. Common ISM frequency bands include:
o 2.4 GHz band: Widely used for Wi-Fi (802.11b/g/n), Bluetooth, and other low-
power wireless communication.
o 5.8 GHz band: Used for some Wi-Fi (802.11a/n/ac) technologies.
 Advantages: Devices using ISM bands do not require a license, making it easy to develop
and deploy wireless technologies.
 Challenges: Since ISM bands are unlicensed, they are subject to interference from a wide
variety of devices, including microwave ovens and other wireless technologies.

Licensed vs Unlicensed Frequency Bands

 Licensed frequency bands: These are regulated by governments and can only be used by
organizations that acquire a license to operate within these bands. Examples include:
o Cellular networks (2G, 3G, 4G, and 5G).
o Television and radio broadcasting.
o Satellite communication.
 Unlicensed frequency bands: These do not require a license and are open for public use.
They are widely used for Wi-Fi, Bluetooth, and other low-power communication
technologies. Examples include:
o 2.4 GHz band: Commonly used for Wi-Fi, Bluetooth, and other IoT applications.
o 5 GHz band: Used for higher-speed Wi-Fi connections (802.11ac/ax).
 Advantages of licensed bands: Less interference and better control over usage.
 Advantages of unlicensed bands: Easier access and cost savings, but with higher potential
for interference.

2.4 GHz, 5 GHz, and Beyond

 2.4 GHz band: This band offers good range and penetration through obstacles like walls,
making it suitable for Wi-Fi and Bluetooth. However, it is prone to interference due to
heavy usage and crowded frequencies.

COMPILED BY: HUSSIEN M (MSC),


22
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 5 GHz band: This band provides faster data transfer rates and less interference, but its
range is shorter, and it has less penetration through solid objects. It is used for high-speed
Wi-Fi (802.11ac/ax).
 6 GHz and beyond: The introduction of Wi-Fi 6E has opened up the 6 GHz band for even
faster wireless communication with more channels available, reducing congestion and
interference.
 Millimeter-wave (mmWave) frequencies: Used in 5G technologies, mmWave operates
in bands above 24 GHz, offering ultra-fast data speeds but limited range and coverage,
requiring dense network infrastructure (e.g., small cells).

3.2.3 Regulatory Bodies

Frequency allocation and regulation are handled by national and international regulatory bodies to
manage spectrum usage and prevent interference between different services.

International Organizations (e.g., ITU)

 International Telecommunication Union (ITU): The ITU, a specialized agency of the


United Nations, coordinates global spectrum allocation and sets international standards for
telecommunications, including wireless communication.
o The ITU allocates specific frequency bands for different types of communication
(e.g., satellite, cellular, and broadcast) on a global level.
o It also organizes the World Radiocommunication Conference (WRC), where
countries negotiate spectrum allocations and address emerging technologies.
 The ITU's work ensures that wireless technologies can operate across borders without
interference and enables global coordination of communication services like satellite and
cellular networks.

National Regulatory Bodies (e.g., FCC in the US, TRAI in India)

 Federal Communications Commission (FCC): In the United States, the FCC is


responsible for regulating wireless communications, including frequency allocation for
cellular networks, broadcast services, and public safety systems. The FCC issues licenses
for the use of specific frequency bands.
 Telecom Regulatory Authority of India (TRAI): In India, TRAI oversees the
telecommunications industry, including the allocation of wireless spectrum for mobile
operators, internet service providers, and other communication services.
 Other countries have their own regulatory agencies, such as Ofcom in the UK and ACMA
in Australia, which govern spectrum usage within their national boundaries.

COMPILED BY: HUSSIEN M (MSC),


23
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

3.2.4 Spectrum Allocation Challenges

Spectrum Scarcity

 Spectrum scarcity refers to the limited availability of usable radio frequencies for wireless
communication. As demand for wireless services increases (due to the growth of mobile
networks, IoT devices, and other wireless technologies), competition for available
spectrum intensifies.
 The rapid expansion of mobile broadband, 5G, and IoT devices has led to increasing
pressure on regulators to allocate more spectrum. However, many parts of the spectrum are
already occupied by existing services (e.g., TV broadcasting, satellite, and military
communication), making it difficult to free up additional bandwidth.
 Consequences of spectrum scarcity include:
o Congestion: Overcrowding in certain frequency bands can result in slower data
speeds and higher latency.
o Competition: Telecom operators, broadcasters, and other stakeholders often
compete for access to the same limited frequencies.

Spectrum Sharing and Interference Management

 Spectrum sharing: To address scarcity, regulators are exploring spectrum-sharing models


where multiple services can use the same frequency bands without interfering with each
other. For example, dynamic spectrum access allows devices to share spectrum in real
time, depending on availability.
 Interference management: Wireless communication can be disrupted by interference
from other devices operating in the same frequency band. To manage this, regulatory
bodies set rules and protocols (such as power limits, channel spacing, and guard bands) to
minimize interference between different wireless services.
 Cognitive radio: An emerging technology that enables devices to sense their environment
and dynamically adjust their frequency usage to avoid interference. This approach allows
more efficient use of the available spectrum.
 Challenges:
o Coexistence of technologies: Ensuring that new wireless services (e.g., 5G) can
coexist with legacy systems (e.g., 4G or satellite services) without causing harmful
interference.
o International coordination: Since radio waves do not respect national borders,
spectrum management requires international cooperation to avoid cross-border
interference.

COMPILED BY: HUSSIEN M (MSC),


24
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

3.3 Antennas

Antennas are essential components in wireless communication systems. They play a crucial role
in transmitting and receiving electromagnetic signals across the air, making it possible to
communicate without physical connections like wires. This section delves into the fundamentals
of antennas, their types, characteristics, and the criteria for selecting the right antenna in wireless
networks.

3.3.1 Basics of Antennas

What is an Antenna?

 An antenna is a device that converts electrical signals into electromagnetic waves (for
transmission) or vice versa (for reception).
 It operates by radiating energy into the air (or receiving energy from it), which allows
communication over long distances without needing a physical medium like cables.
 Antennas are used in a wide variety of applications such as radio broadcasting, mobile
phones, satellite communication, Wi-Fi, and radar systems.

Role of Antennas in Wireless Communication

 In wireless communication, antennas serve as the interface between the radio frequency
(RF) front-end of a device and the surrounding environment.
 Transmitting antennas convert electrical signals into electromagnetic waves and radiate
them into the air. These waves travel through the atmosphere, carrying information to the
receiver.
 Receiving antennas capture electromagnetic waves and convert them back into electrical
signals that can be processed by the communication system.
 The effectiveness of wireless communication largely depends on the design, placement,
and type of antenna used, as they directly affect the strength and quality of the transmitted
and received signals.

3.3.2 Types of Antennas

Different types of antennas are designed to meet specific needs in wireless communication. Some
provide broad coverage (omnidirectional), while others focus energy in specific directions
(directional).

COMPILED BY: HUSSIEN M (MSC),


25
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Omnidirectional Antennas

 Omnidirectional antennas radiate electromagnetic waves equally in all directions within


a horizontal plane. They provide 360-degree coverage, making them ideal for applications
where wide coverage is necessary.
 Commonly used in:
o Cell towers to provide network coverage to large areas.
o Wi-Fi routers to broadcast signals to devices within a range.
 These antennas are simple in design and typically used in environments where users or
devices are spread over a broad area, such as homes, offices, or urban areas.

Directional Antennas

 Directional antennas focus electromagnetic energy in a specific direction, offering higher


gain and range compared to omnidirectional antennas. They are ideal for point-to-point
communication or for focusing the signal toward a particular area.
 Types of directional antennas:
o Yagi Antennas: These are widely used in long-distance communication, such as
TV and radio broadcasting or point-to-point wireless links. They have multiple
elements that direct radio waves in one direction, improving signal strength.
o Parabolic Antennas: Often referred to as "dish antennas," parabolic antennas are
highly directional and are used for satellite communication, radar, and long-range
wireless links. They have a parabolic reflector that focuses signals into a narrow
beam.
 Benefits of directional antennas include improved range, reduced interference from
unwanted signals, and increased signal strength in a targeted area.

Patch Antennas

 Patch antennas, also known as microstrip antennas, are flat, low-profile antennas that
are often used in mobile devices, GPS systems, and Wi-Fi routers. They consist of a flat
rectangular or square metal patch mounted on a grounded surface.
 They are primarily used in applications where space is limited, and moderate directional
performance is required. Patch antennas typically have a broad beamwidth, making them
suitable for both directional and omnidirectional uses.
 Advantages of patch antennas include their compact size, ease of integration with printed
circuit boards (PCBs), and relatively low cost.

COMPILED BY: HUSSIEN M (MSC),


26
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

3.3.3 Antenna Characteristics

Understanding the key characteristics of antennas is critical to optimizing wireless communication


performance. Important parameters include gain, directivity, radiation pattern, polarization, and
impedance matching.

Gain, Directivity, and Radiation Pattern

 Gain: Antenna gain refers to how well an antenna directs energy in a specific direction
compared to a reference antenna (usually an isotropic antenna, which radiates equally in
all directions). Higher gain indicates stronger signal transmission in a particular direction.
 Directivity: Directivity measures how focused an antenna's radiation is in a particular
direction. Directional antennas have high directivity, while omnidirectional antennas have
low directivity. Directivity is closely related to gain, as high directivity typically results in
higher gain.
 Radiation Pattern: The radiation pattern is a graphical representation of how an antenna
radiates energy into space. It shows the distribution of radiated power as a function of
direction. Antennas can have various radiation patterns, such as:
o Omnidirectional: A donut-shaped pattern, radiating equally in all horizontal
directions.
o Directional: A lobe-shaped pattern, concentrating energy in a particular direction.
 The choice of radiation pattern depends on the application's requirements for coverage and
range.

Polarization and Impedance Matching

 Polarization: Polarization refers to the orientation of the electromagnetic waves radiated


by an antenna. It can be linear (horizontal or vertical) or circular (right-hand or left-hand
circular polarization).
o Matching the polarization of the transmitting and receiving antennas is important
for optimizing signal strength.
o Misalignment of polarization between antennas can lead to signal loss.
 Impedance Matching: For maximum power transfer between an antenna and a
transmission line (e.g., coaxial cable), the impedance of the antenna should match the
impedance of the line, typically 50 ohms in most wireless systems.
o Poor impedance matching results in signal reflections, reducing the efficiency of
the system and causing signal loss.

COMPILED BY: HUSSIEN M (MSC),


27
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

3.3.4 Antenna Selection for Wireless Networks

Selecting the right antenna is critical to achieving optimal wireless network performance. Several
factors influence antenna selection, including the environment, desired range, and coverage area.

Criteria for Choosing the Right Antenna

 Coverage Area: For wide-area coverage, omnidirectional antennas are preferred. They
provide uniform coverage in all directions, making them ideal for environments with
multiple users or devices.
 Range: For long-range point-to-point communication, directional antennas such as Yagi
or parabolic antennas are ideal due to their ability to focus energy in a specific direction,
thereby extending the range.
 Frequency of Operation: Different antennas are designed to operate at specific frequency
bands. The frequency range of the antenna must match the frequency of the wireless
communication system (e.g., 2.4 GHz for Wi-Fi, or 700 MHz for cellular networks).
 Size and Installation: In space-constrained environments, patch antennas or other
compact designs are often used. Additionally, the location and method of installation can
impact antenna performance.
 Cost: High-performance antennas with advanced features (such as parabolic dishes) tend
to be more expensive. Cost considerations should be balanced against performance
requirements.

Impact on Range and Coverage

 The type of antenna chosen directly impacts the range and coverage of a wireless network.
o High-gain directional antennas improve range and signal strength, but only in a
specific direction.
o Low-gain omnidirectional antennas provide wider coverage but may have
limited range and reduced signal strength at the edges of the coverage area.
 For large, outdoor areas, such as citywide Wi-Fi networks or cellular networks, a
combination of omnidirectional and directional antennas is often used to maximize both
coverage and range.

COMPILED BY: HUSSIEN M (MSC),


28
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Summary

Antennas are fundamental components of any wireless communication system, enabling the
transmission and reception of electromagnetic waves. Different types of antennas:
omnidirectional, directional (such as Yagi and parabolic), and patch antennas: offer varying levels
of coverage, gain, and directivity. Understanding antenna characteristics, such as gain, radiation
pattern, polarization, and impedance matching, is crucial for optimizing performance in wireless
networks. The selection of the appropriate antenna depends on factors like the environment,
desired range, frequency of operation, and cost, all of which influence the overall coverage and
network performance.

3.4 Signal Propagation

Signal propagation is a fundamental concept in wireless communication, referring to how


electromagnetic waves travel from a transmitter to a receiver. These waves carry information
across distances, and understanding the mechanisms behind signal propagation helps engineers
design efficient communication systems.

3.4.1 Basic Concepts of Signal Propagation

Wireless signals are typically electromagnetic waves, which propagate through space or the
atmosphere in various ways. Their behavior depends on environmental conditions, the presence of
obstacles, and the frequencies at which they are transmitted. The key forms of propagation are
categorized into line-of-sight (LOS) and non-line-of-sight (NLOS) propagation.

 Line-of-sight (LOS) Propagation:


o In LOS propagation, the signal travels in a direct path from the transmitter to the
receiver with no obstructions. This typically results in stronger, clearer signals as
the path is unhindered.
o LOS is essential for higher-frequency signals like microwaves or millimeter waves,
which are less capable of penetrating obstacles.
o Example: Satellite communication and radar systems rely on LOS propagation.
 Non-line-of-sight (NLOS) Propagation:
o In NLOS propagation, obstacles such as buildings, trees, or terrain features block
the direct path, causing the signal to diffract, reflect, or scatter to reach the receiver.
o NLOS signals tend to be weaker and more prone to interference, leading to signal
degradation.
o Example: Wi-Fi and mobile communications in urban environments often
experience NLOS propagation due to various obstructions.

COMPILED BY: HUSSIEN M (MSC),


29
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

3.4.2 Types of Signal Propagation

There are different types of signal propagation mechanisms, which vary based on how the signal
interacts with the environment:

1. Ground Wave Propagation:


o Ground waves travel along the Earth's surface and are often used for low-frequency
communication (30 kHz to 300 kHz).
o They can cover long distances, especially over conductive surfaces like oceans.
o Example: AM radio broadcasts utilize ground wave propagation.
2. Sky Wave Propagation:
o Sky waves are radio waves that travel upwards, are refracted by the ionosphere, and
are reflected back to Earth.
o This type of propagation is useful for long-distance communication, especially at
night, when the ionosphere is more reflective.
o Example: Shortwave radio broadcasts rely on sky wave propagation to cover large
geographic areas.
3. Space Wave Propagation:
o Space waves are transmitted directly between the transmitter and receiver, typically
via LOS paths.
o Space wave propagation is dominant at higher frequencies (above 30 MHz), where
signals do not rely on ground or ionospheric reflections.
o Example: TV broadcasts, satellite communication, and mobile phones primarily
use space wave propagation.

3.4.3 Factors Affecting Signal Propagation

Several environmental and physical factors influence how signals propagate. These factors
determine the quality, strength, and reliability of wireless communication.

1. Attenuation and Path Loss:


o Attenuation refers to the gradual loss of signal strength as it propagates through a

medium, such as air or space. This occurs due to energy absorption by the
environment.
o Path Loss is the reduction in signal power over distance, often described in decibels
(dB). Path loss is influenced by the frequency of the signal, the distance between
the transmitter and receiver, and environmental obstacles.
o Example: Higher frequencies generally experience greater path loss, making them
more suitable for short-range communication.

COMPILED BY: HUSSIEN M (MSC),


30
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

2. Interference and Noise:


o Interference is the unwanted disturbance caused by overlapping signals from other
communication systems, devices, or natural sources like the sun.
o Noise refers to random signals or fluctuations that degrade the quality of the
transmitted signal, such as thermal noise from electronic components or
atmospheric noise.
o Example: Wi-Fi networks in densely populated areas often experience interference
from multiple sources, reducing data throughput.
3. Diffraction, Reflection, and Refraction:
o Diffraction occurs when a signal bends around obstacles like buildings or hills. It
allows NLOS communication but results in weaker signals.
o Reflection happens when a signal bounces off surfaces such as walls, causing
multipath propagation (the signal takes multiple paths to reach the receiver).
o Refraction is the bending of signals as they pass through mediums with different
densities (like air layers at varying temperatures), potentially changing their
direction.
o Example: In urban environments, signals often reflect off buildings, leading to
multiple versions of the same signal arriving at the receiver at different times
(multipath interference).

3.4.4 Free Space Path Loss Model

The Free Space Path Loss (FSPL) model provides a mathematical way to estimate the reduction
in signal strength over a distance when there are no obstacles between the transmitter and receiver.
It assumes LOS propagation and is widely used in communication system design.

 Basic Formula: The FSPL formula calculates the loss in decibels (dB) based on the
distance between the transmitter and receiver, and the frequency of the signal:

Where:

o d is the distance between the transmitter and receiver.


o f is the frequency of the signal.
o c is the speed of light (approximately 3 * 108 m/s).
 Impact of Distance and Frequency:

COMPILED BY: HUSSIEN M (MSC),


31
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

o Distance: The further the receiver is from the transmitter, the greater the path loss.
The signal strength reduces proportionally to the square of the distance.
o Frequency: Higher frequency signals experience greater path loss because they are
more easily absorbed and scattered by the environment. This makes lower
frequencies more suitable for long-distance communication.
o Example: A 5 GHz Wi-Fi signal will experience more path loss compared to a 2.4
GHz Wi-Fi signal over the same distance.

This model is crucial for designing wireless communication systems, including satellite links,
cellular networks, and Wi-Fi systems, where engineers need to predict signal coverage and
strength.

3.5 Multiplexing

Multiplexing is a critical technique in wireless communication, enabling multiple signals to be


transmitted over a single communication medium. This method improves the efficiency and
capacity of communication systems by sharing resources, such as frequency spectrum or time slots,
among multiple users or devices.

3.5.1 Introduction to Multiplexing

 What is Multiplexing?
o Multiplexing is the process of combining multiple signals or data streams into one
signal over a shared medium. It allows efficient utilization of the available
bandwidth or resources, maximizing the capacity of a communication system.
o In wireless communication, multiplexing is essential for handling multiple data
streams or users simultaneously on the same network, without interference between
them.
o Why is it used?
 The wireless spectrum is limited, and multiplexing allows for better use of
this finite resource.
 It reduces the need for separate transmission channels, increasing overall
network capacity and minimizing infrastructure costs.
 Multiplexing ensures more efficient data transfer in scenarios where many
users need to access the network simultaneously, such as mobile
communications and the internet.
 Types of Multiplexing in Wireless Communication:
o Frequency Division Multiplexing (FDM)
o Time Division Multiplexing (TDM)
o Code Division Multiplexing (CDM)

COMPILED BY: HUSSIEN M (MSC),


32
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

o Orthogonal Frequency Division Multiplexing (OFDM)

Each method of multiplexing operates differently, with distinct advantages and applications in
wireless communication systems.

3.5.2 Frequency Division Multiplexing (FDM)

 Concept of Dividing Spectrum into Multiple Frequency Bands:


o In FDM, the available frequency spectrum is divided into multiple non-overlapping
frequency bands, each carrying a separate signal or data stream.
o Each user or communication channel is assigned a unique frequency band, allowing
simultaneous transmission over the same medium without interference.
o This technique is widely used in radio, television broadcasting, and cellular
networks.
 Use of Guard Bands:
o Guard bands are small frequency ranges placed between adjacent frequencies bands
in FDM to prevent overlap and interference between channels.
o While necessary to ensure signal separation, guard bands reduce the overall spectral
efficiency since they do not carry useful data.
o Example: In analog television broadcasting, FDM is used to assign different
frequency bands to different TV channels.

3.5.3 Time Division Multiplexing (TDM)

 Time Slots for Different Signals in the Same Frequency Band:


o In TDM, multiple signals share the same frequency channel but are transmitted in
different time slots.
o Each signal or user is allocated a specific time slot during which it can transmit,
and this process repeats in a cyclic manner.
o TDM is widely used in digital communication systems where multiple data streams
can be transmitted sequentially over the same medium.
o Example: In telephone systems, TDM allows multiple voice calls to be transmitted
over a single channel by assigning each call a specific time slot.
 Synchronous vs Asynchronous TDM:
o Synchronous TDM:
 In synchronous TDM, the time slots are pre-assigned to users or signals in
a fixed, regular pattern, regardless of whether the user has data to transmit
or not.
 This can lead to inefficiencies since unused time slots remain idle.
 Example: Synchronous Optical Network (SONET) uses synchronous TDM.

COMPILED BY: HUSSIEN M (MSC),


33
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

o Asynchronous TDM (also called Statistical TDM):


 In asynchronous TDM, time slots are dynamically allocated based on
demand. Only users or signals with data to transmit are assigned time slots.
 This method is more efficient, as it reduces the number of idle slots, making
better use of available bandwidth.
 Example: Ethernet networks use statistical TDM, where time slots are
dynamically assigned to devices that have data to send.

3.5.4 Code Division Multiplexing (CDM)

 Use of Unique Codes for Different Users:


o CDM, also known as Code Division Multiple Access (CDMA), allows multiple
users to share the same frequency band simultaneously by assigning each user a
unique code.
o Each user's signal is spread across a wide frequency band using its unique spreading
code, allowing multiple users to transmit at the same time without interfering with
each other.
o CDM is widely used in wireless communication, particularly in cellular networks.
 Concept of Spreading Codes and Orthogonality:
o Spreading Codes: In CDM, each user is assigned a spreading code, which is a
unique sequence of bits used to modulate the user's signal across a wide frequency
range.
 This spreading process increases the signal bandwidth but also makes it
more resistant to interference and noise.
o Orthogonality: The spreading codes used in CDM are designed to be orthogonal,
meaning that they are mathematically independent of one another. This ensures that
the signals can be separated at the receiver, even though they occupy the same
frequency band.
 If the codes are perfectly orthogonal, there is no interference between users.
o Example: CDMA is used in 3G cellular networks, where multiple users share the
same spectrum but are distinguished by their unique codes.

3.5.5 Orthogonal Frequency Division Multiplexing (OFDM)

 Subcarriers and Parallel Data Transmission:


o OFDM is a more advanced form of frequency division multiplexing in which the
frequency spectrum is divided into multiple closely spaced subcarriers.
o Each subcarrier carries a portion of the overall data, and these subcarriers are
modulated using various digital modulation schemes (e.g., QAM).

COMPILED BY: HUSSIEN M (MSC),


34
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

o Unlike traditional FDM, where the carriers are spaced apart to avoid interference,
the subcarriers in OFDM are orthogonal to each other. This allows for more
efficient use of the frequency spectrum, as there is no need for large guard bands
between subcarriers.
o OFDM allows for high data rates and robust communication in environments with
multipath interference (e.g., urban areas with many reflections).
 Application in Modern Wireless Standards (e.g., 4G, 5G):
o OFDM is widely used in modern wireless communication standards, including Wi-
Fi (IEEE 802.11), 4G LTE, and 5G NR.
o It provides high data rates and is highly resilient to interference and signal fading,
making it suitable for broadband wireless applications.
o In 4G and 5G systems, OFDM enables efficient use of the radio spectrum,
supporting high-capacity, low-latency communication.
o Example: In 4G LTE, OFDM is used for downlink data transmission, enabling fast
and reliable mobile internet connections.

3.6 Modulation

3.6.1 Introduction to Modulation

What is Modulation and why is it needed?

Modulation is the process of modifying a carrier signal, usually a high-frequency wave, to encode
information such as voice, data, or video for transmission over a medium (air, cables, or fiber).
The carrier signal allows the information to be transmitted efficiently over long distances,
especially in wireless communications. Without modulation, the range and quality of the
communication would be limited due to signal degradation and interference.

Why is Modulation Necessary?

 Signal Transmission over Long Distances: Information signals typically have low
frequencies, which are not suitable for efficient long-distance transmission due to
attenuation. Modulation boosts the frequency of these signals by encoding them onto high-
frequency carrier waves.
 Multiplexing: Modulation enables multiple signals to be transmitted simultaneously over
the same channel without interference (e.g., radio or TV signals on different frequencies).
 Noise Immunity and Signal Quality: Modulating a signal can improve noise resilience
and help retain quality during transmission.

COMPILED BY: HUSSIEN M (MSC),


35
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 Efficient Antenna Design: Antenna size is inversely proportional to frequency. By


modulating onto higher frequencies, antennas can be smaller and more practical for real-
world use.

Types of Modulation in Wireless Communication. There are two broad categories of


modulation:

1. Analog Modulation: Used for analog signals where the information signal is continuous.
Common types:
o Amplitude Modulation (AM)
o Frequency Modulation (FM)
o Phase Modulation (PM)
2. Digital Modulation: Used to transmit digital signals where information is in binary form
(0s and 1s). Common types:
o Amplitude Shift Keying (ASK)
o Frequency Shift Keying (FSK)
o Phase Shift Keying (PSK)
o Quadrature Amplitude Modulation (QAM)

3.6.2 Amplitude Modulation (AM)

Principles of AM

 In Amplitude Modulation (AM), the amplitude (or strength) of the carrier wave is varied
in direct proportion to the information signal while keeping the frequency and phase
constant.
 The carrier wave is a high-frequency sine wave, and by varying its amplitude according to
the input signal (such as an audio wave), we encode the information onto the carrier.
 AM is mathematically expressed as:

COMPILED BY: HUSSIEN M (MSC),


36
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Applications of AM

 Radio Broadcasting: AM is widely used for broadcasting on medium-wave and short-


wave bands.
 Aviation Communication: AM is used in aviation due to its simplicity and range.

Limitations of AM

 Susceptibility to Noise: AM is highly susceptible to noise because both noise and the
desired signal affect the amplitude.
 Inefficiency in Power Usage: Only a small portion of the power is used to transmit the
actual information, with most power wasted on the carrier.
 Bandwidth Inefficiency: AM requires a large bandwidth, approximately twice the highest
frequency of the modulating signal.

3.6.3 Frequency Modulation (FM)

Principles of FM

 In Frequency Modulation (FM), the frequency of the carrier wave is varied in accordance
with the instantaneous amplitude of the input signal, while the amplitude of the carrier
remains constant.
 The frequency deviation is directly proportional to the amplitude of the input signal.
 FM is mathematically represented as:

Advantages of FM Over AM

 Better Noise Immunity: FM is less affected by noise and interference because noise
generally affects the amplitude, which FM ignores.
 Improved Sound Quality: FM has better fidelity, making it ideal for high-quality audio
transmission.

COMPILED BY: HUSSIEN M (MSC),


37
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 More Efficient Power Usage: The transmitted power is more efficiently used as it remains
constant.

Applications of FM

 FM Radio Broadcasting: FM is extensively used for broadcasting on the VHF band for
high-quality audio transmission.
 Television Sound Transmission: FM is used for sound in analog TV transmissions.
 Two-Way Radio Systems: Used in communication systems like police radios and amateur
radio.

3.6.4 Phase Modulation (PM)

Principles of PM

 In Phase Modulation (PM), the phase of the carrier wave is varied according to the
instantaneous amplitude of the input signal while the amplitude and frequency remain
constant.
 Phase modulation is closely related to frequency modulation, but here, the phase shift is
the primary variable.
 Mathematically, it can be expressed as:

Use in Digital Communication Systems

 Digital Communication: PM is more common in digital modulation techniques like PSK


(Phase Shift Keying) where information is encoded by varying the phase of the carrier in
discrete steps.
 Applications: Widely used in digital systems, particularly in systems like Wi-Fi, satellite
communications, and modern cellular networks.

COMPILED BY: HUSSIEN M (MSC),


38
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

3.6.5 Digital Modulation Techniques

Digital modulation techniques allow digital data to be transmitted over analog communication
channels by altering the carrier signal based on digital input (bits). These techniques are more
efficient and robust than analog modulation for data communication.

1. Amplitude Shift Keying (ASK)

 Principle: ASK modulates the carrier wave by changing its amplitude between different
levels to represent binary data (0s and 1s).
 Applications: Low-frequency radio transmission, RFID systems.
 Limitations: Highly susceptible to noise because both signal and noise affect the
amplitude.

2. Frequency Shift Keying (FSK)

 Principle: FSK varies the frequency of the carrier wave to represent digital data. A high
frequency corresponds to a binary 1, and a lower frequency corresponds to a binary 0.
 Applications: Modems, telemetry systems, and digital communication systems.
 Advantages: More noise-resistant than ASK but uses more bandwidth.

3. Phase Shift Keying (PSK)

 Principle: PSK alters the phase of the carrier signal to represent data. Binary PSK (BPSK)
uses two phases, while higher-order PSKs like Quadrature PSK (QPSK) use multiple
phases (e.g., 4 or 8) to transmit more bits per symbol.
 Applications: Wi-Fi, satellite communication, Bluetooth.
 Advantages: Efficient in bandwidth, robust against noise, but more complex to implement
than FSK.

4. Quadrature Amplitude Modulation (QAM)

 Principle: QAM is a combination of both ASK and PSK. It modulates both the amplitude
and the phase of the carrier, allowing more bits to be transmitted per symbol. It is common
in high-data-rate systems like digital TV and broadband.
 Applications: Cable modems, LTE, digital television.
 Advantages: Very bandwidth-efficient, used for high-data-rate applications.

COMPILED BY: HUSSIEN M (MSC),


39
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Comparison of Digital Modulation Techniques

 Bandwidth Efficiency: QAM is the most bandwidth-efficient technique, followed by PSK,


FSK, and ASK.
 Noise Resilience: PSK and QAM offer better noise resilience compared to ASK and FSK.
 Complexity: ASK is the simplest to implement, while QAM is the most complex due to
its combination of amplitude and phase changes.

3.7 Media Access Control (MAC)

3.7.1 Basics of Media Access Control (MAC)

What is MAC and why is it needed in Wireless Networks?

Media Access Control (MAC) is a crucial layer within the Data Link Layer (Layer 2) of the OSI
model, responsible for controlling how devices in a network gain access to a shared
communication medium (e.g., a wireless channel) to send and receive data. In wireless networks,
multiple devices often share the same communication medium, and without proper coordination,
collisions and data corruption can occur. The MAC layer manages access to this shared medium,
ensuring smooth and efficient communication by preventing conflicts.

Role of MAC in Managing Shared Communication Media

 Preventing Collisions: In wireless networks, many devices transmit data on the same
frequency channel. The MAC layer helps avoid collisions by defining rules for when
devices can transmit data.
 Efficient Utilization of the Channel: The MAC protocol ensures that all devices get fair
access to the channel and that the medium is efficiently utilized without unnecessary
delays.
 Addressing: MAC also provides a method of addressing to distinguish between different
devices on the same network, using MAC addresses (unique identifiers for network
interfaces).
 Packet Framing: The MAC layer organizes data into frames for transmission, ensuring
they are sent and received correctly.

COMPILED BY: HUSSIEN M (MSC),


40
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

MAC is particularly critical in wireless networks where the medium is not easily shared, such as
in Wi-Fi (IEEE 802.11) networks, where radio frequencies are used for communication.

3.7.2 Channel Access Methods

Time Division Multiple Access (TDMA)

 Principle: TDMA divides the communication channel into distinct time slots, with each
user assigned their own time slot for transmission. Multiple users share the same frequency
channel but use it in different time intervals.
 Application: Used in digital cellular systems like GSM (Global System for Mobile
Communications).
 Advantages:
o Efficient use of bandwidth.
o Eliminates interference between users since only one user transmits at any given
time.
 Limitations:
o Time synchronization is crucial.
o Latency may be introduced as users have to wait for their time slot.

Frequency Division Multiple Access (FDMA)

 Principle: FDMA allocates separate frequency bands (channels) to each user, allowing
multiple users to transmit simultaneously over different frequency bands.
 Application: Used in older analog systems and still applied in some satellite
communications.
 Advantages:
o Simple and easy to implement.
o No need for time synchronization.
 Limitations:
o Inefficient use of spectrum, as each user has exclusive access to a frequency band
even when not transmitting.
o Limited number of users, as the frequency spectrum is divided into a fixed number
of channels.

COMPILED BY: HUSSIEN M (MSC),


41
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Code Division Multiple Access (CDMA)

 Principle: CDMA allows multiple users to share the same frequency band simultaneously
by assigning each user a unique code. The signals are spread across the available frequency
spectrum using these unique codes.
 Application: Used in 3G cellular networks (e.g., CDMA2000, WCDMA).
 Advantages:
o Highly efficient use of bandwidth, as all users share the same frequency.
o Resistant to interference and eavesdropping due to the spread spectrum approach.
o Better capacity for supporting more users than TDMA and FDMA.
 Limitations:
o Complex to implement.
o Requires careful management of power levels to avoid the "near-far problem,"
where closer users overpower farther ones.

3.7.3 Carrier Sense Multiple Access (CSMA)

CSMA/CA (Collision Avoidance)

 Principle: CSMA/CA is a method used to avoid collisions on a network by first sensing


the medium to check if it is idle (carrier sense). If the medium is idle, the device can begin
transmission. If the medium is busy, the device waits for a random period before trying
again (this random delay helps avoid repeated collisions).
 Application: Widely used in wireless networks like Wi-Fi (802.11 standards) where
collision detection is not feasible due to the hidden node problem.
 Advantages:
o Helps to avoid collisions in networks where multiple devices share the same
medium.
o Effective in wireless networks where nodes cannot always detect each other.
 Limitations:
o Inefficient under high traffic loads, as the network can become congested with
devices constantly sensing and waiting for the medium to be free.
o Collisions can still occur if two devices sense the channel as idle simultaneously.

CSMA/CD (Collision Detection)

 Principle: CSMA/CD is used in wired Ethernet networks. Devices listen for traffic (carrier
sense) before transmitting and continue to monitor the medium while transmitting. If a
collision is detected (two devices transmitting simultaneously), the transmission is stopped,

COMPILED BY: HUSSIEN M (MSC),


42
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

and a jamming signal is sent to inform all devices of the collision. The devices then wait
for a random backoff time before attempting to transmit again.
 Application: Used in wired Ethernet (IEEE 802.3) networks.
 Advantages:
o Reduces the number of collisions in a network by detecting and recovering from
them.
o Simple and effective in wired environments.
 Limitations:
o Collisions can still occur, especially under heavy traffic conditions.
o Inefficient for high-speed networks as the time spent detecting and handling
collisions grows.

Role of CSMA in Wi-Fi Networks (802.11 Standards)

 Wi-Fi networks use CSMA/CA (not CSMA/CD) because, in wireless environments,


devices often cannot detect each other's signals due to obstacles (known as the "hidden
node problem"). As a result, collision detection (CD) is impractical, and collision
avoidance (CA) is more effective.
 The CSMA/CA protocol in Wi-Fi networks works by:
o First sensing the medium to ensure it is free.
o Introducing random backoff times to avoid simultaneous transmission from
multiple devices.
o Using an ACK (acknowledgment) mechanism where the receiving device sends
an acknowledgment after receiving a frame, ensuring data transmission has been
successful.

3.7.4 MAC in Wireless LAN (802.11)

MAC Frame Structure

 The MAC frame in wireless LANs (802.11) encapsulates data for transmission and
includes several fields to manage communication between devices.
 A typical 802.11 MAC frame consists of:
o Frame Control: Contains information about the type of frame (data, control,
management) and various flags such as whether the frame is encrypted.
o Duration/ID: Specifies how long the medium will be reserved for the frame
transmission, used for collision avoidance.
o Addresses: There are four address fields in the 802.11 frame:
 Source Address: MAC address of the device sending the frame.
 Destination Address: MAC address of the receiving device.

COMPILED BY: HUSSIEN M (MSC),


43
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

 BSSID (Basic Service Set Identifier): MAC address of the access point in
the network.
 Transmitter/Receiver Address: Additional fields used in cases where
frames are being relayed through intermediate devices (e.g., in wireless
mesh networks).
o Sequence Control: Ensures that frames are received in the correct order, important
for reassembling fragmented frames.
o Data Payload: The actual data being transmitted.
o Frame Check Sequence (FCS): Provides error detection by adding a cyclic
redundancy check (CRC) at the end of the frame to verify data integrity.

MAC Layer Functionalities in Wireless LANs

 Access Control: The MAC layer in wireless LANs ensures that multiple devices can share
the same wireless medium through protocols like CSMA/CA, which minimizes collisions.
 Data Framing: It structures the data into frames, encapsulating the data payload and
adding control information necessary for successful delivery.
 Addressing and Identification: Each wireless device has a unique MAC address, and
the MAC layer uses these addresses to ensure that data is delivered to the correct recipient.
 Error Detection and Retransmission: The MAC layer checks for errors using
mechanisms like the Frame Check Sequence (FCS). If errors are detected, the frame can
be retransmitted.
 Power Management: The MAC layer includes power-saving features for devices like
laptops and smartphones to enter low-power modes and wake up only when they need to
transmit or receive data.
 Security: The MAC layer in 802.11 standards includes support for encryption (e.g.,
WPA2, WPA3) to secure data transmission between devices in wireless networks.

3.8 Classifications of Wireless Networks

Wireless networks can be classified based on their range, area of coverage, and use cases.
Understanding the various types of wireless networks helps in designing and deploying
communication systems that meet specific requirements, such as coverage, bandwidth, and
mobility.

3.8.1 Personal Area Networks (PAN)

Personal Area Networks (PAN) are small-scale wireless networks typically used for
communication between devices in close proximity. PANs operate over short ranges, typically

COMPILED BY: HUSSIEN M (MSC),


44
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

within a few meters, and are designed for personal use, such as connecting mobile phones, laptops,
wearables, and other personal devices.

Technologies:

1. Bluetooth:
o Bluetooth is a widely used short-range wireless technology that operates in the 2.4
GHz ISM (Industrial, Scientific, and Medical) band.
o Range: Typically up to 10 meters (for most Bluetooth devices, though newer versions
can extend up to 100 meters).
o Data Rate: Up to 3 Mbps (Bluetooth 2.0 + EDR) and up to 50 Mbps for Bluetooth
5.0 and beyond.
o Applications: Wireless headsets, fitness trackers, file transfers between devices,
connecting peripherals (e.g., keyboards, mice, printers), and audio streaming.
o Limitations: Limited range and bandwidth compared to other technologies; potential
interference in the crowded 2.4 GHz band.
2. Zigbee:
o Zigbee is a low-power, short-range communication technology designed for low-data-
rate applications in PANs.
o Range: Typically 10-100 meters.
o Data Rate: Up to 250 kbps.
o Applications: Home automation, smart lighting, industrial monitoring, and control
systems, wireless sensor networks.
o Limitations: Limited data rate; primarily used for simple control and monitoring
applications.
3. Other Short-Range Technologies:
o Infrared (IR): Older technology used for short-range, line-of-sight communication
(e.g., remote controls).
o Near Field Communication (NFC): Ultra-short-range communication technology (a
few centimeters), often used for contactless payments and data exchange.

Applications and Limitations:

 Applications:
o Connecting personal devices.
o Smart homes (Bluetooth and Zigbee for automation).
o Wearable devices communicating with smartphones.
o Medical monitoring (e.g., heart rate sensors, glucose monitors).
 Limitations:
o Short range and limited data transmission capacity.

COMPILED BY: HUSSIEN M (MSC),


45
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

o Potential interference from other devices operating in the same frequency band
(especially for Bluetooth).

3.8.2 Local Area Networks (LAN)

Local Area Networks (LAN) provide wireless connectivity within a small geographical area,
such as a building, campus, or home. Wireless LANs (WLAN) are often referred to as Wi-Fi
networks and enable devices to connect to the internet or communicate with each other without
the need for wired connections.

Wi-Fi and Wireless LAN (WLAN) Technologies:

 Wi-Fi (Wireless Fidelity): A family of wireless networking technologies based on the


IEEE 802.11 standards. Wi-Fi operates in the 2.4 GHz and 5 GHz frequency bands, though
newer standards include support for the 6 GHz band.
 Key Wi-Fi Standards (802.11):
o 802.11a: Operates in the 5 GHz band, with speeds up to 54 Mbps. Less interference
but shorter range compared to 2.4 GHz.
o 802.11b: Operates in the 2.4 GHz band with speeds up to 11 Mbps. Widely used but
prone to interference due to crowded spectrum.
o 802.11g: Operates in the 2.4 GHz band, with speeds up to 54 Mbps, backward-
compatible with 802.11b.
o 802.11n (Wi-Fi 4): Supports both 2.4 GHz and 5 GHz bands, with speeds up to 600
Mbps using MIMO (Multiple Input, Multiple Output) technology.
o 802.11ac (Wi-Fi 5): Operates in the 5 GHz band with speeds up to 3.5 Gbps using
wider channels and advanced MIMO.
o 802.11ax (Wi-Fi 6): Operates in the 2.4 GHz, 5 GHz, and 6 GHz bands, with speeds
up to 9.6 Gbps. Improved efficiency in high-density environments (e.g., stadiums,
offices).

Applications of WLAN:

 Home Networking: Connecting devices such as laptops, smartphones, smart TVs, and
gaming consoles to the internet.
 Corporate Networks: Wireless access for employees within offices and campus
environments.
 Public Wi-Fi Hotspots: Available in cafes, airports, hotels, and public spaces for internet
access.

COMPILED BY: HUSSIEN M (MSC),


46
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Limitations:

 Limited range (typically 100-300 feet indoors).


 Susceptibility to interference from other devices and obstacles such as walls.

3.8.3 Metropolitan Area Networks (MAN)

Metropolitan Area Networks (MAN) provide wireless coverage across a larger geographic area
than LANs, typically spanning a city or a metropolitan area. MANs are designed to connect
multiple LANs and provide high-speed wireless internet access over long distances.

WiMAX and Other City-Wide Wireless Networks:

 WiMAX (Worldwide Interoperability for Microwave Access):


o WiMAX is based on the IEEE 802.16 standard and provides broadband wireless
access over large areas.
o Range: Up to 50 km (depending on conditions).
o Data Rate: Up to 70 Mbps.
o Frequency Bands: 2.5 GHz, 3.5 GHz, and other licensed or unlicensed bands.
o Applications: City-wide broadband internet access, backhaul for cellular networks,
connecting remote locations, and public Wi-Fi infrastructure.
o Challenges: Line-of-sight (LOS) requirements for optimal performance, interference
from other wireless systems, competition from newer 4G and 5G technologies.

Applications of MAN:

 Providing broadband internet access to urban areas.


 Connecting municipal services (e.g., traffic management, public safety).
 Bridging the digital divide by offering internet access to underserved communities.

Challenges:

 High deployment and maintenance costs.


 Limited coverage in rural or densely populated urban areas due to interference.

3.8.4 Wide Area Networks (WAN)

Wide Area Networks (WAN) cover extensive geographical areas, often connecting multiple
cities, countries, or continents. WANs support long-distance communication, often relying on a
combination of wireless technologies and satellite links.

COMPILED BY: HUSSIEN M (MSC),


47
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Cellular Networks (2G, 3G, 4G, 5G):

 2G (Second Generation): Introduced digital communication, enabling services like SMS


and basic data transfer (GPRS, EDGE). Operates in various frequency bands depending on
the region.
 3G (Third Generation): Provided faster internet access (up to a few Mbps), enabling
mobile internet, video calls, and multimedia services. Technologies include WCDMA and
CDMA2000.
 4G (Fourth Generation, LTE): Delivers high-speed mobile broadband (up to 1 Gbps in
ideal conditions) using LTE (Long-Term Evolution) and LTE-Advanced technologies. Key
enabler of mobile video streaming, online gaming, and high-quality voice services
(VoLTE).
 5G (Fifth Generation): The latest generation of cellular networks, offering significantly
higher speeds (up to 10 Gbps), lower latency (1 ms), and support for massive IoT (Internet
of Things) deployments. 5G operates in both sub-6 GHz and mmWave bands.

Satellite Communication:

 Principle: Satellite communication relies on geostationary or low-Earth orbit (LEO)


satellites to provide global wireless coverage.
 Applications: Global positioning systems (GPS), satellite internet, TV broadcasting, and
emergency communication in remote areas.
 Challenges: High latency, especially for geostationary satellites (due to the long distance
between the satellite and Earth). Expensive infrastructure and limited bandwidth.

3.8.5 Ad-hoc Networks

Ad-hoc networks are decentralized wireless networks where each device (node) participates in
routing and forwarding data without relying on fixed infrastructure like routers or access points.

Mobile Ad-hoc Networks (MANETs):

 Principle: In MANETs, devices (nodes) are free to move and organize themselves
arbitrarily. Nodes communicate directly or through intermediate devices that forward data.
 Applications: Military communication, disaster recovery, vehicular networks (VANETs),
temporary networks in conferences, and sensor networks.
 Features:
o Self-configuring and dynamic topology.
o No fixed infrastructure required.
o Limited range and potential for higher latency due to multi-hop communication.

COMPILED BY: HUSSIEN M (MSC),


48
EMAIL: [email protected]
Wireless Communication & Mobile Computing Chapter 2 & 3 Notes October 7, 2024

Wireless Sensor Networks (WSNs):

 Principle: WSNs consist of spatially distributed autonomous sensors that collect and
transmit data wirelessly to a central node.
 Applications: Environmental monitoring (temperature, humidity, pollution), industrial
automation, smart agriculture, and health monitoring (wearable sensors).
 Features:
o Low power consumption for long-term operation.
o Scalability, as new sensors can be added as needed.
o Limited bandwidth and processing power on each sensor node.

3.8.6 Hybrid Networks

Hybrid Networks combine different types of networks to achieve greater flexibility, scalability,
and performance. These networks may use a combination of wired and wireless technologies, or
multiple wireless standards, to extend coverage, improve reliability, and optimize bandwidth
usage.

Mesh Networks:

 Principle: Mesh networks are a type of hybrid network where each node (device) relays
data for the network, ensuring that the data reaches its destination through multiple possible
paths. If one node fails, the network automatically reroutes data through another node.
 Applications:
o City-wide public Wi-Fi.
o Industrial IoT and smart grids.
o Disaster recovery and emergency response.
o Rural broadband access.

Features of Hybrid Networks:

 Combine different wireless technologies (e.g., cellular, Wi-Fi, satellite) to provide


seamless connectivity.
 Improve network resilience and reliability by using multiple communication paths.
 Optimize network performance by balancing load across different technologies (e.g.,
cellular for mobility, Wi-Fi for high bandwidth in fixed locations).

COMPILED BY: HUSSIEN M (MSC),


49
EMAIL: [email protected]

You might also like