Unit 1
Unit 1
INTRODUCTION
Characteristics and advantages of mobile communication,
types of mobile applications –development approaches, overview of mobile
strategy and designing mobile solutions.
Mobile computing project structure, building and testing.
Evolution of Modern Mobile Wireless communication system.
Mobile computing vs. wireless - MAC Protocols –Wireless
MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes –
Reservation Based Schemes.
1
What is Mobile Computing?
What is computing?
The capability to automatically carry out certain processing related to service
invocations on a remote computer .
What is the mobility ?
The capability to change location while communicating to invoke computing
service at some remote computers.
What is mobile computing?
Ability to compute remotely while on the move. It is possible to access information
from anywhere and at anytime.
2
A simple definition could be:
Mobile Computing is using a computer (of one kind or another) while on the
move
Another definition could be:
Mobile Computing is when a (work) process is moved from a normal fixed
position to a more dynamic position.
A third definition could be:
Mobile Computing is when a work process is carried out somewhere where it
was not previously possible.
Mobile Computing is an umbrella term used to describe technologies that enable
people to access network services anyplace, anytime, and anywhere.
3
Advantages of mobile communication
Emergencies
A mobile communication device can be helpful in case of an
emergency
Sharing Information
With hand-held communications devices, business professionals
can instantly share information with clients
Disadvantages
7
Mobile computing vs Wireless networking
Mobile computing is based on wireless networking and helps to
invoke computing services on remote servers while on the move.
8
Types of mobile applications
Native Apps
Mobile Web Apps
Hybrid Apps
Native Apps
32
20
Presentation tier – The topmost level, concerns the user interface.
It facilitates the users to issue requests and to present the results
meaningfully. It includes web browsers and client programs.
Application tier – It is responsible for making logical decisions and
performing calculations. Implemented using Java, .NET services,
cold fusion etc. Implemented on a fixed server.
Data tier – Responsible for data storage, access and
manipulation. Implemented on a fixed server.
34
Cellular mobile
communication
•Area of coverage split into cells
•Cell shapes are irregular
•Cells do overlap to some extent
•Base station(BS) located at the centre of each cell
•BS receives communication from all mobile handsets in the cell
•BS forwarded data to appropriate handset.
•Hands-off: when mobile handsets moves from one cell to another ,BS
hands-off the call to the BS in the new cell
Generation of cellular
technologies
1G
2G/2.5G
3G
4G
5G
1G TECHNOLOGY
Page 37
DRAWBACKS OF 1G
Page 38
2G TECHNOLOGY
2G technology refers to the 2nd generation which is based on GSM.
It was launched in Finland in the year 1991.
2G network use digital signals.
It’s data speed was upto 64kbps.
Features Includes:
Page 39
LOGO
DRAWBACKS OF 2G
o 2G requires strong digital signals to help mobile
phones work.
o If there is no network coverage in any specific area ,
digital signals would weak.
o These systems are unable to handle complex data
such as Videos
2G Wireless System
Page 40
2.5G TECHNOLOGY
2.5G is a technology between the second (2G) and third (3G)
generation of mobile telephony.
2.5G is sometimes described as 2G Cellular Technology combined
with GPRS.
Features Includes:
Phone Calls
Send/Receive E-mail Messages
Web Browsing
Speed : 64-144 kbps
Camera Phones
Take a time of 6-9 mins. to download a 3 mins. Mp3 song
Page 41
3G TECHNOLOGY
3G technology refer to third generation which was
introduced in year 2000s.
Pa
FEATURES OF 3G TECHNOLOGY
Providing Faster Communication
3D Gaming
Expensive 3G Phones.
Pa
4G TECHNOLOGY
(Anytime ,Anywhere)
started from late 2000s.
Capable of providing 100Mbps – 1Gbps speed.
One of the basic term used to describe 4G is MAGIC.
MAGIC:
Mobile Multimedia
Anytime Anywhere
Global Mobility Support
Integrated Wireless Solution
Customized Personal Services Also known as
Mobile Broadband Everywhere.
Pa
4G (Anytime, Anywhere)
The next generations of wireless technology that promises higher data rates and
expanded multimedia services.
Capable to provide speed 100Mbps-1Gbps. High QOS and High
Security
Provide any kind of service at any time as per user requirements, anywhere.
Features Include:
More Security
High Speed
High Capacity
Low Cost Per-bit etc.
Pa
DRAWBACKS OF 4G
Hard to implement
Pa
5G TECHNOLOGY
which was started from late 2010s have not been deployed.
Pa
BENEFITS OF 5G TECHNOLOGY
High Speed, High Capacity
5G technology providing large broadcasting of data in Gbps .
Multi - Media Newspapers, watch T.V programs with the clarity as to that of
an HD Quality.
Faster data transmission that of the previous
generations.
Large Phone Memory, Dialing Speed, clarity in
Audio/Video.
Support interactive multimedia , voice, streaming video,
Internet and other
5G is More Effective and More Attractive.
Pa
MEDIA ACCESS CONTROL(MAC)
A channel-access scheme is also based on a multiple access protocol and
control mechanism, also known as media access control (MAC). This
protocol deals with issues such as addressing, assigning multiplex
channels to different users, and avoiding collisions.
50
MAC protocol properties
52
Figure 4-26.(a)The hidden station problem. (b) The exposed station problem.
53
The Exposed Station Problem
54
Classification of
wireless MAC
protocols
Wireless MAC protocols
55
Classification of
wireless MAC
protocols
Wireless MAC protocols
56
Frequency Division Multiple Access (FDMA)
57
Frequency Division Multiple
Access
58
FDMA
Frequency
Channel
Tim
e
59
Time Division Multiple Access (TDMA)
In TDMA, a set of N users share the same radio channel, but each
user only uses the channel during predetermined slots.
A frame consists of N slots, one for each user. Frames are repeated
continuously.
Time slots are allocated to users in a round robin manner .
Unused time slots go idle, leading to low channel utilization
60
Time-division multiplexing
61
TDMA
Channel
0 1 2 3 4 5 6 7 Tim
e
62
Code Division Multiple Access
(CDMA)
Multiple users use the same frequency at the same time.
Users are allotted different codes(0 & 1) to access same
channel.
All the senders send signals simultaneously.
The signals can be distinguished from each other by frequency
spreading code known as the m bit pseudo-noise(PN) code
sequence.
Using m bits 2m-1codes obtained
Each user will use only one code. 63
CDMA
Frequency
Code
Tim
e
Code 1
Code 2
Code 3
64
Channel Partitioning MAC protocols
time
FDMA: Frequency Division Multiple Access
Frequency
time
CDMA: Code Division Multiple Access
Same frequency and time but different codes.
65
Classification of
wireless MAC
protocols
Wireless MAC protocols
66
Random access MAC Schemes
Number of random assignment schemes . A few important.
ALOHA
Slotted ALOHA
CSMA
CSMA/CD
CSMA/CA
67
ALOHA
Simplest scheme
If the frame reached destination then next frame sent. Otherwise resend the
frame.
This scheme is used when less number of senders send data.
40
Slotted ALOHA
An improvement over pure ALOHA..
Chances of collision are reduced
Time is divided into equal sized slots in which a packet can be sent.
The size of packet is restricted.
Send packet only at the beginning of a slot.
Employ beacon signals to mark the beginning of a slot.
Does not work well if the number of stations contending to send data
is high.
In such case CSMA scheme works better.
69
Carrier Sense Multiple Access CSMA
70
Extension of CSMA
The extension of CSMA are the collision detection CSMA/CD and the collision avoidance
CSMA/CA techniques.
Why CA and CD?
Difficult to detect collisions in a wireless network – why?
A transmitting station cannot effectively distinguish incoming weak signals from noise and the
effects of its own transmission;
Hidden station problem:
71
CSMA/CD
CSMA/CD multi-access control protocol.
72
CSMA/CA
During the time a node is transmitting on the channel, several nodes might be wanting to
transmit and waiting for it to become free.
The moment the transmitting node completes its transmission and would all starts
transmitting at the same time.
To overcome in the collision avoidance scheme, all nodes are forced to wait for a random
time and then sense the medium again before starting their transmission.
If the medium is sensed to be busy, further random amount of time and so on.
Thus the chance of two nodes starting to transmit at the same time would be greatly
reduced.
73
Classification of
wireless MAC
protocols
Wireless MAC protocols
74
Reservation based schemes
Basic form of the reservation scheme is RTS/CTS scheme.
A sender transmits an RTS (Ready to Send) packet to the receiver before the actual
data transmission.
On receiving this the receiver sends CTS (Clear to Send) packet.
The actual data transfer commences only after that.
The other nodes sharing the medium sense the CTS packet, they stop from
transmitting until the transmission from the sending node is completes.
75
Contention-based
protocol
MACA(Multiple Access Collision Avoidance) Protocol
MACA solves the hidden/ exposed terminal problems
When a node wants to transmit a data packet, it first transmit a RTS (Request To Send) frame.
The receiver node, on receiving the RTS packet, if it is ready to receive the data packet,
transmits a CTS (Clear to Send) packet.
Once the sender receives the CTS packet without any error, it starts transmitting the data packet.
If a packet transmitted by a node is lost, the node uses the binary exponential back-off (BEB)
algorithm to back off a random interval of time before retrying.
The binary exponential back-off mechanism used in MACA might starves flows sometimes. The
problem is solved by MACAW.
76
MACA Protocol
send to B
A sends RTS first RTS
to another terminal
now C does not have RTS RTS