SlideShare ist ein Scribd-Unternehmen logo
1 von 52
1
2
What is mobile computing?
3
 Mobile computing is to describe technologies that
 enable people to access network services anyplace, anytime, and anywhere,
 with portable and wireless computing and communication devices.
 Aspects of mobility
 User mobility
 Between different geographical locations
 Between different networks
 Between different communication devices
 Between different applications
 Device portability
 Between different geographical locations
 Between different networks
Mobile Computing vs.
Ubiquitous Computing/Pervasive Computing
4
 Mobile Computing is a generic term describing the application of small, portable, and wireless
computing and communication devices. This includes devices like laptops with wireless LAN
technology, mobile phones, wearable computers and Personal Digital Assistants (PDAs) with
Bluetooth or IRDA interfaces, and USB flash drives.
 Ubiquitous computing (ubicomp, or sometimes ubiqcomp) integrates computation into the
environment, rather than having computers which are distinct objects.
 Pervasive computing. Promoters of this idea hope that embedding computation into the
environment would enable people to move around and interact with computers more naturally than
they currently do.
5
Challenges
Disconnection
Low bandwidth
High bandwidth variability
Low power and resources
Security risks
Wide variety terminals and devices with different capabilities
Device attributes
Fit more functionality into single, smaller device
6
Future of Mobile Computing
Use of Artificial Intelligence
Integrated Circuitry -> Compact Size
Increases in Computer Processor speeds
7
8
UNIT I
INTRODUCTION
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile
Computing Applications – Characteristics of Mobile computing – Structure of
Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed
Assignment Schemes – Random Assignment Schemes – Reservation Based
Schemes.
9
What is Mobile Computing?
 What is computing?
The capability to automatically carry out certain processing related to service
invocations on a remote computer .
 What is the mobility ?
The capability to change location while communicating to invoke computing service
at some remote computers.
 What is mobile computing?
Ability to compute remotely while on the move. It is possible to access information
from anywhere and at anytime.
10
A simple definition could be:
Mobile Computing is using a computer (of one kind or another) while on the
move
Another definition could be:
Mobile Computing is when a (work) process is moved from a normal fixed
position to a more dynamic position.
A third definition could be:
Mobile Computing is when a work process is carried out somewhere where it
was not previously possible.
Mobile Computing is an umbrella term used to describe technologies that enable
people to access network services anyplace, anytime, and anywhere.
Mobile computing vs Wireless networking
Mobile computing is based on wireless networking and helps to invoke
computing services on remote servers while on the move.
So Wireless networking is an important and necessary ingredient of
mobile computing.
Mobile computing also requires the applications themselves – their
design and development, the hardware at the client and server sides
11
Classification of Wireless networks
Wireless networks can be classified into basic types
Infrastructure network -One is extension of wired networks. It uses fixed
infrastructure such as base station to provide single hop wireless
communication with wired network as shown in figure 2.1.
Two-hop cellular communication as shown in figure 3.
12
13
Figure 3- Two-hop cellular communication
Ad Hoc network It does not use any fixed infrastructure and is based on
multi-hop wireless communication as shown in figure 2.2
14
15
Applications of Mobile Computing
 Stock Information Collection/Control
 Emergency services
 For Estate Agents
 In courts
 In companies
 Credit Card Verification
 Taxi/Truck Dispatch
 Electronic Mail/Paging
16
Applications Conti…
Vehicles
 transmission of news, road condition, weather, music via DAB
 personal communication using GSM
 position via GPS
 local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy
 vehicle data (e.g., from busses, high-speed trains) can be transmitted in advance for maintenance
Medical
 Nurses/Doctors in Medical offices are now using Wireless Tablet PCs/WLAN to collect and share patient
information.
Sales
 Sales representatives are using Tablet PCs with Smart phones for presentation, transmitting/access information
among office, hotel, and customer location.
Emergencies
 Early transmission of patient data to the hospital, current status, first diagnosis
 Provide mobile infrastructure in dealing with Natural Disaster (earthquake, hurricane, fire), terrorist attacks, war, ...
16
Characteristics of Mobile Computing
Ubiquity – The ability of a user to perform computation from anywhere
and at anytime.
Location awareness – Many applications requires or value additions by
location based services.
Adaptation- Ability to adjust to bandwidth fluctuations without
inconveniencing the user.
17
Broadcast- Efficient delivery of data can be made simultaneously to
hundreds of mobile users
Personalization – Services in a mobile environment can be easily
personalized according to a user’s profile.
18
Structure of Mobile Computing Application
19
 A mobile computing application is usually structured In terms of the
functionalities implemented .
 As shown in the figures 2.3 and 2.4 the three tiers are named presentation
tier, application tier and data tier.
20
Presentation tier – The topmost level, concerns the user interface. It
facilitates the users to issue requests and to present the results
meaningfully. It includes web browsers and client programs.
Application tier – It is responsible for making logical decisions and
performing calculations. Implemented using Java, .NET services, cold
fusion etc. Implemented on a fixed server.
Data tier – Responsible for data storage, access and manipulation.
Implemented on a fixed server.
21
MEDIA ACCESS CONTROL(MAC)
A channel-access scheme is also based on a multiple access protocol and
control mechanism, also known as media access control (MAC). This
protocol deals with issues such as addressing, assigning multiplex channels
to different users, and avoiding collisions.
22
Responsibility and objective of MAC Protocol
Responsibility :Enforce discipline in the access of a shared channel when
multiple nodes contend to access that channel.
Objective: Maximization of the utilization of the channel and minimization
of average latency of transmission .
23
24
The Hidden Terminal Problem
Wireless stations have transmission ranges and not all stations are
within radio range of each other.
Simple CSMA will not work!
C transmits to B.
If A “senses” the channel, it will not hear C’s transmission and
falsely conclude that A can begin a transmission to B.
Create a very difficult and important arbitration problem that a MAC
protocol needs to resolve.
25
Figure 4-26.(a)The hidden station problem. (b) The exposed station problem.
26
The Exposed Station Problem
The inverse problem.
B wants to send to C and listens to the channel.
When B hears A’s transmission, B falsely assumes that it cannot send
to C.
It leads to inefficient spectrum usage as well as unnecessary
transmission delays.
Classification of
wireless MAC protocols
Wireless MAC protocols
Fixed-assignment
schemes
Random-access schemes Reservation - based
schemes
Circuit-switched CL packet-switched
CO packet-switched
CL – Connection Less. CO – Connection Oriented
27
Channel Partitioning MAC protocols
TDMA: Time Division Multiple Access
Frequency
time
Frequency
time
FDMA: Frequency Division Multiple Access
CDMA: Code Division Multiple Access
 Same frequency and time but different codes.
4 users
Example:
28
Classification of
wireless MAC protocols
Wireless MAC protocols
Fixed-assignment
schemes
Random-access schemes Reservation - based
schemes
Circuit-switched CL packet-switched
CO packet-switched
CL – Connection Less. CO – Connection Oriented
29
Frequency Division Multiple Access (FDMA)
In an FDMA system, each user has its own frequency channel. This
implies that relatively narrow filters are needed in each receiver and
transmitter.
Most duplex FDMA systems must transmit and receive simultaneously.
(Frequency Division Duplex, FDD).
It does not achieve a high channel utilization.
30
31
Frequency Division Multiple Access
FDMA
Time
Frequency
Channel
32
Time Division Multiple Access (TDMA)
 In TDMA, a set of N users share the same radio channel, but each user
only uses the channel during predetermined slots.
 A frame consists of N slots, one for each user. Frames are repeated
continuously.
 Time slots are allocated to users in a round robin manner .
 Un used time slots go idle, leading to low channel utilization
33
Time-division multiplexing
34
TDMA
Time
Frequency
0 1 2 3 4 5 6 7
Channel
Time Slot
35
Code Division Multiple Access
(CDMA)
Multiple users use the same frequency at the same time.
All the senders send signals simultaneously.
The signals can be distinguished from each other by frequency
spreading code known as the m bit pseudo-noise(PN) sequence.
Using m bits 2m-1codes obtained
Each user will use only one code.
36
CDMA
Frequency
Time
Code
Code 1
Code 2
Code 3
37
Classification of
wireless MAC protocols
Wireless MAC protocols
Fixed-assignment
schemes
Random-access schemes Reservation - based
schemes
Circuit-switched CL packet-switched
CO packet-switched
CL – Connection Less. CO – Connection Oriented
38
Random access MAC Schemes
 Number of random assignment schemes . A few important.
 ALOHA
 Slotted ALOHA
 CSMA
 CSMA/CD
 CSMA/CA
39
ALOHA
 Simplest scheme
 True free-for-all. When a node needs to send, it does so.
 It listens for an amount of time equal to the maximum round trip delay plus a fixed
increment.
 If it hears an acknowledgment, fine; otherwise it resends after waiting a random
amount of time.
 After several attempts, it gives up.
 Low delay if light load
 Max. utilization: 18% 40
Slotted ALOHA
An improvement over pure ALOHA.
Time is divided into equal sized slots in which a packet can be sent. The
size of pocket is restricted.
Send packet only at the beginning of a slot.
Employ beacon signals to mark the beginning of a slot.
Does not work well if the number of stations contending to send data is
high.
In such case CSMA scheme works better.
41
Carrier Sense Multiple Access CSMA
 Carrier Sense Multiple Access
 sense carrier
 if idle, send
 wait for ack
If there isn’t one, assume there was a collision, retransmit
 Vulnerable period: one tprop
42
Extension of CSMA
 The extension of CSMA are the collision detection CSMA/CD and the collision avoidance
CSMA/CA techniques.
 Why CA and CD?
 Difficult to detect collisions in a radio environment – why?
 A transmitting station cannot effectively distinguish incoming weak signals from noise and the
effects of its own transmission; need a full duplex radio to listen and transmit on same frequency
(not true in FDD systems)
 Hidden station problem:
 Two mutually far away stations A and C want to send to B.
 At A and C, channel appears idle
 But collision occurs at B
43
CSMA/CD multi-access control protocol.
1. Each station listens before it transmits.
2. If the channel is busy, it waits until the channel goes idle, and then it
transmits.
3. If the channel is idle it transmits immediately. Continue sensing.
4. If collision is detected, transmit a brief jamming signal, then cease
transmission, wait for a random time, and retransmit.
• collision detection is not by waiting for an ACK
44
CSMA/CD
CSMA/CA
 Prevent collision at the moment they are most likely occur, when bus is released after a
packet transmission.
 During the time a node is transmitting on the channel, several nodes might be wanting to
transmit and waiting for it to become free.
 The moment the transmitting node completes its transmission and would all starts
transmitting at the same time.
 To overcome in the collision avoidance scheme, all nodes are forced to wait for a random
time and then sense the medium again before starting their transmission.
 If the medium is sensed to be busy, further random amount of time and so on.
 Thus the chance of two nodes starting to transmit at the same time would be greatly
reduced.
45
Classification of
wireless MAC protocols
Wireless MAC protocols
Fixed-assignment
schemes
Random-access schemes Reservation - based
schemes
Circuit-switched CL packet-switched
CO packet-switched
CL – Connection Less. CO – Connection Oriented
46
Reservation based schemes
Basic form of the reservation scheme is RTS/CTS scheme.
A sender transmits an RTS (Ready to Send) packet to the receiver before the actual
data transmission.
On receiving this the receiver sends CTS (Clear to Send) packet.
The actual data transfer commences only after that.
The other nodes sharing the medium sense the CTS packet, they refrain from
transmitting until the transmission from the sending node is completes.
47
Contention-based protocol
MACA(Multiple Access Collision Avoidance) Protocol
MACA solves the hidden/ exposed terminal problems
 When a node wants to transmit a data packet, it first transmit a RTS (Request To Send) frame.
 The receiver node, on receiving the RTS packet, if it is ready to receive the data packet, transmits
a CTS (Clear to Send) packet.
 Once the sender receives the CTS packet without any error, it starts transmitting the data packet.
 If a packet transmitted by a node is lost, the node uses the binary exponential back-off (BEB)
algorithm to back off a random interval of time before retrying.
The binary exponential back-off mechanism used in MACA might starves flows sometimes. The
problem is solved by MACAW.
48
MACA Protocol
The MACA protocol.
 A sending an RTS to B.
 B responding with a CTS to A.
49
50
MACA avoids the problem of hidden terminals
A and C want to
send to B
A sends RTS first
C waits after receiving
CTS from B
MACA avoids the problem of exposed terminals
B wants to send to A, C
to another terminal
now C does not have
to wait for it cannot
receive CTS from A
MACA examples
A B C
RTS
CTSCTS
A B C
RTS
CTS
RTS
References
Book: Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI
Learning Pvt. Ltd, New Delhi – 2012.
Web:http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/vk5/report.html
PPT:
http://www.slideshare.net/tapeshchalisgaonkar1/mobile-computing-25723678
https://cs.uccs.edu/~chow/pub/master/ycai/mobile_computing_mtu.ppt
http://www.slideshare.net/SukumarNayak/snsecurity-architecture-for-mobile-
computing-and-iot
51
52
Thank You
Questions and Comments?

Weitere ähnliche Inhalte

Was ist angesagt?

ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ZillayHuma Mehmood
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computingMadhuri Badgujar
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communicationMaulik Togadiya
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ippriya Nithya
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIRamesh Babu
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 

Was ist angesagt? (20)

ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Ch7
Ch7Ch7
Ch7
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Ch1
Ch1Ch1
Ch1
 
Unit 4
Unit 4Unit 4
Unit 4
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 

Andere mochten auch

Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile ComputingMadhuri Badgujar
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introductionnicole_wang
 
Gamifying Enterprise e-Commerce Applications
Gamifying Enterprise  e-Commerce ApplicationsGamifying Enterprise  e-Commerce Applications
Gamifying Enterprise e-Commerce ApplicationsVishal Bisht
 
OE Application Server Administratoion
OE Application Server AdministratoionOE Application Server Administratoion
OE Application Server Administratoiontawatchai.psp
 
Component based Progress Programming
Component based Progress ProgrammingComponent based Progress Programming
Component based Progress ProgrammingValentin Duricu
 
Progress Openedge performance management
Progress Openedge performance managementProgress Openedge performance management
Progress Openedge performance managementYassine MOALLA
 
Cs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer keyCs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer keyappasami
 
M4D m-Learning MOOC video4: Social networking and mobile learning A-Palalas
M4D m-Learning MOOC video4: Social networking and mobile learning A-PalalasM4D m-Learning MOOC video4: Social networking and mobile learning A-Palalas
M4D m-Learning MOOC video4: Social networking and mobile learning A-PalalasAgnieszka (Aga) Palalas, Ed.D.
 

Andere mochten auch (20)

It6601 mobile computing unit 5
It6601 mobile computing unit 5It6601 mobile computing unit 5
It6601 mobile computing unit 5
 
It6601 mobile computing unit 3
It6601 mobile computing unit 3It6601 mobile computing unit 3
It6601 mobile computing unit 3
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
It6601 mc
It6601 mcIt6601 mc
It6601 mc
 
Gamifying Enterprise e-Commerce Applications
Gamifying Enterprise  e-Commerce ApplicationsGamifying Enterprise  e-Commerce Applications
Gamifying Enterprise e-Commerce Applications
 
OE Application Server Administratoion
OE Application Server AdministratoionOE Application Server Administratoion
OE Application Server Administratoion
 
Component based Progress Programming
Component based Progress ProgrammingComponent based Progress Programming
Component based Progress Programming
 
Progress Openedge performance management
Progress Openedge performance managementProgress Openedge performance management
Progress Openedge performance management
 
Cs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer keyCs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer key
 
M4D m-Learning MOOC video4: Social networking and mobile learning A-Palalas
M4D m-Learning MOOC video4: Social networking and mobile learning A-PalalasM4D m-Learning MOOC video4: Social networking and mobile learning A-Palalas
M4D m-Learning MOOC video4: Social networking and mobile learning A-Palalas
 

Ähnlich wie IT6601 MOBILE COMPUTING UNIT1

Mobile computing
Mobile computingMobile computing
Mobile computingSaranyaK68
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computingBhupesh Rawat
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPTssuser2cc0d4
 
IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit Ipkaviya
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMPallepati Vasavi
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM Mathivanan Vk
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 

Ähnlich wie IT6601 MOBILE COMPUTING UNIT1 (20)

unit-1 notes
unit-1 notesunit-1 notes
unit-1 notes
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
CS8601 Unit-1.pptx
CS8601 Unit-1.pptxCS8601 Unit-1.pptx
CS8601 Unit-1.pptx
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit I
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
CS8601 1 MC NOTES.pdf
CS8601 1 MC NOTES.pdfCS8601 1 MC NOTES.pdf
CS8601 1 MC NOTES.pdf
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 

Mehr von RMK ENGINEERING COLLEGE, CHENNAI

Big picture of electronics and instrumentation engineering
Big picture of electronics and instrumentation engineeringBig picture of electronics and instrumentation engineering
Big picture of electronics and instrumentation engineeringRMK ENGINEERING COLLEGE, CHENNAI
 

Mehr von RMK ENGINEERING COLLEGE, CHENNAI (20)

EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 3
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 3EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 3
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 3
 
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 2
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 2EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 2
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 2
 
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 1
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 1EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 1
EC8353 ELECTRONIC DEVICES AND CIRCUITS Unit 1
 
EC6651 COMMUNICATION ENGINEERING UNIT 5
EC6651 COMMUNICATION ENGINEERING UNIT 5EC6651 COMMUNICATION ENGINEERING UNIT 5
EC6651 COMMUNICATION ENGINEERING UNIT 5
 
EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4
 
EC6651 COMMUNICATION ENGINEERING UNIT 2
EC6651 COMMUNICATION ENGINEERING UNIT 2EC6651 COMMUNICATION ENGINEERING UNIT 2
EC6651 COMMUNICATION ENGINEERING UNIT 2
 
EC6651 COMMUNICATION ENGINEERING UNIT 1
EC6651 COMMUNICATION ENGINEERING UNIT 1EC6651 COMMUNICATION ENGINEERING UNIT 1
EC6651 COMMUNICATION ENGINEERING UNIT 1
 
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 2
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 2EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 2
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 2
 
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 1
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 1EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 1
EC6202 ELECTRONIC DEVICES AND CIRCUITS Unit 1
 
EC6202 ELECTRONIC DEVICES AND CIRCUITS NOTES
EC6202 ELECTRONIC DEVICES AND CIRCUITS NOTESEC6202 ELECTRONIC DEVICES AND CIRCUITS NOTES
EC6202 ELECTRONIC DEVICES AND CIRCUITS NOTES
 
Big picture of electronics and instrumentation engineering
Big picture of electronics and instrumentation engineeringBig picture of electronics and instrumentation engineering
Big picture of electronics and instrumentation engineering
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 5
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 5GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 5
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 5
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 3
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
 
Cs6703 grid and cloud computing unit 5 questions
Cs6703 grid and cloud computing  unit 5 questionsCs6703 grid and cloud computing  unit 5 questions
Cs6703 grid and cloud computing unit 5 questions
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 1
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 1GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 1
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 1
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Cs6703 grid and cloud computing unit 4 questions
Cs6703 grid and cloud computing  unit 4 questionsCs6703 grid and cloud computing  unit 4 questions
Cs6703 grid and cloud computing unit 4 questions
 
Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4
 

IT6601 MOBILE COMPUTING UNIT1

  • 1. 1
  • 2. 2
  • 3. What is mobile computing? 3  Mobile computing is to describe technologies that  enable people to access network services anyplace, anytime, and anywhere,  with portable and wireless computing and communication devices.  Aspects of mobility  User mobility  Between different geographical locations  Between different networks  Between different communication devices  Between different applications  Device portability  Between different geographical locations  Between different networks
  • 4. Mobile Computing vs. Ubiquitous Computing/Pervasive Computing 4  Mobile Computing is a generic term describing the application of small, portable, and wireless computing and communication devices. This includes devices like laptops with wireless LAN technology, mobile phones, wearable computers and Personal Digital Assistants (PDAs) with Bluetooth or IRDA interfaces, and USB flash drives.  Ubiquitous computing (ubicomp, or sometimes ubiqcomp) integrates computation into the environment, rather than having computers which are distinct objects.  Pervasive computing. Promoters of this idea hope that embedding computation into the environment would enable people to move around and interact with computers more naturally than they currently do.
  • 5. 5 Challenges Disconnection Low bandwidth High bandwidth variability Low power and resources Security risks Wide variety terminals and devices with different capabilities Device attributes Fit more functionality into single, smaller device
  • 6. 6 Future of Mobile Computing Use of Artificial Intelligence Integrated Circuitry -> Compact Size Increases in Computer Processor speeds
  • 7. 7
  • 8. 8 UNIT I INTRODUCTION Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
  • 9. 9 What is Mobile Computing?  What is computing? The capability to automatically carry out certain processing related to service invocations on a remote computer .  What is the mobility ? The capability to change location while communicating to invoke computing service at some remote computers.  What is mobile computing? Ability to compute remotely while on the move. It is possible to access information from anywhere and at anytime.
  • 10. 10 A simple definition could be: Mobile Computing is using a computer (of one kind or another) while on the move Another definition could be: Mobile Computing is when a (work) process is moved from a normal fixed position to a more dynamic position. A third definition could be: Mobile Computing is when a work process is carried out somewhere where it was not previously possible. Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere.
  • 11. Mobile computing vs Wireless networking Mobile computing is based on wireless networking and helps to invoke computing services on remote servers while on the move. So Wireless networking is an important and necessary ingredient of mobile computing. Mobile computing also requires the applications themselves – their design and development, the hardware at the client and server sides 11
  • 12. Classification of Wireless networks Wireless networks can be classified into basic types Infrastructure network -One is extension of wired networks. It uses fixed infrastructure such as base station to provide single hop wireless communication with wired network as shown in figure 2.1. Two-hop cellular communication as shown in figure 3. 12
  • 13. 13 Figure 3- Two-hop cellular communication
  • 14. Ad Hoc network It does not use any fixed infrastructure and is based on multi-hop wireless communication as shown in figure 2.2 14
  • 15. 15 Applications of Mobile Computing  Stock Information Collection/Control  Emergency services  For Estate Agents  In courts  In companies  Credit Card Verification  Taxi/Truck Dispatch  Electronic Mail/Paging
  • 16. 16 Applications Conti… Vehicles  transmission of news, road condition, weather, music via DAB  personal communication using GSM  position via GPS  local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy  vehicle data (e.g., from busses, high-speed trains) can be transmitted in advance for maintenance Medical  Nurses/Doctors in Medical offices are now using Wireless Tablet PCs/WLAN to collect and share patient information. Sales  Sales representatives are using Tablet PCs with Smart phones for presentation, transmitting/access information among office, hotel, and customer location. Emergencies  Early transmission of patient data to the hospital, current status, first diagnosis  Provide mobile infrastructure in dealing with Natural Disaster (earthquake, hurricane, fire), terrorist attacks, war, ... 16
  • 17. Characteristics of Mobile Computing Ubiquity – The ability of a user to perform computation from anywhere and at anytime. Location awareness – Many applications requires or value additions by location based services. Adaptation- Ability to adjust to bandwidth fluctuations without inconveniencing the user. 17
  • 18. Broadcast- Efficient delivery of data can be made simultaneously to hundreds of mobile users Personalization – Services in a mobile environment can be easily personalized according to a user’s profile. 18
  • 19. Structure of Mobile Computing Application 19  A mobile computing application is usually structured In terms of the functionalities implemented .  As shown in the figures 2.3 and 2.4 the three tiers are named presentation tier, application tier and data tier.
  • 20. 20
  • 21. Presentation tier – The topmost level, concerns the user interface. It facilitates the users to issue requests and to present the results meaningfully. It includes web browsers and client programs. Application tier – It is responsible for making logical decisions and performing calculations. Implemented using Java, .NET services, cold fusion etc. Implemented on a fixed server. Data tier – Responsible for data storage, access and manipulation. Implemented on a fixed server. 21
  • 22. MEDIA ACCESS CONTROL(MAC) A channel-access scheme is also based on a multiple access protocol and control mechanism, also known as media access control (MAC). This protocol deals with issues such as addressing, assigning multiplex channels to different users, and avoiding collisions. 22
  • 23. Responsibility and objective of MAC Protocol Responsibility :Enforce discipline in the access of a shared channel when multiple nodes contend to access that channel. Objective: Maximization of the utilization of the channel and minimization of average latency of transmission . 23
  • 24. 24 The Hidden Terminal Problem Wireless stations have transmission ranges and not all stations are within radio range of each other. Simple CSMA will not work! C transmits to B. If A “senses” the channel, it will not hear C’s transmission and falsely conclude that A can begin a transmission to B. Create a very difficult and important arbitration problem that a MAC protocol needs to resolve.
  • 25. 25 Figure 4-26.(a)The hidden station problem. (b) The exposed station problem.
  • 26. 26 The Exposed Station Problem The inverse problem. B wants to send to C and listens to the channel. When B hears A’s transmission, B falsely assumes that it cannot send to C. It leads to inefficient spectrum usage as well as unnecessary transmission delays.
  • 27. Classification of wireless MAC protocols Wireless MAC protocols Fixed-assignment schemes Random-access schemes Reservation - based schemes Circuit-switched CL packet-switched CO packet-switched CL – Connection Less. CO – Connection Oriented 27
  • 28. Channel Partitioning MAC protocols TDMA: Time Division Multiple Access Frequency time Frequency time FDMA: Frequency Division Multiple Access CDMA: Code Division Multiple Access  Same frequency and time but different codes. 4 users Example: 28
  • 29. Classification of wireless MAC protocols Wireless MAC protocols Fixed-assignment schemes Random-access schemes Reservation - based schemes Circuit-switched CL packet-switched CO packet-switched CL – Connection Less. CO – Connection Oriented 29
  • 30. Frequency Division Multiple Access (FDMA) In an FDMA system, each user has its own frequency channel. This implies that relatively narrow filters are needed in each receiver and transmitter. Most duplex FDMA systems must transmit and receive simultaneously. (Frequency Division Duplex, FDD). It does not achieve a high channel utilization. 30
  • 33. Time Division Multiple Access (TDMA)  In TDMA, a set of N users share the same radio channel, but each user only uses the channel during predetermined slots.  A frame consists of N slots, one for each user. Frames are repeated continuously.  Time slots are allocated to users in a round robin manner .  Un used time slots go idle, leading to low channel utilization 33
  • 35. TDMA Time Frequency 0 1 2 3 4 5 6 7 Channel Time Slot 35
  • 36. Code Division Multiple Access (CDMA) Multiple users use the same frequency at the same time. All the senders send signals simultaneously. The signals can be distinguished from each other by frequency spreading code known as the m bit pseudo-noise(PN) sequence. Using m bits 2m-1codes obtained Each user will use only one code. 36
  • 38. Classification of wireless MAC protocols Wireless MAC protocols Fixed-assignment schemes Random-access schemes Reservation - based schemes Circuit-switched CL packet-switched CO packet-switched CL – Connection Less. CO – Connection Oriented 38
  • 39. Random access MAC Schemes  Number of random assignment schemes . A few important.  ALOHA  Slotted ALOHA  CSMA  CSMA/CD  CSMA/CA 39
  • 40. ALOHA  Simplest scheme  True free-for-all. When a node needs to send, it does so.  It listens for an amount of time equal to the maximum round trip delay plus a fixed increment.  If it hears an acknowledgment, fine; otherwise it resends after waiting a random amount of time.  After several attempts, it gives up.  Low delay if light load  Max. utilization: 18% 40
  • 41. Slotted ALOHA An improvement over pure ALOHA. Time is divided into equal sized slots in which a packet can be sent. The size of pocket is restricted. Send packet only at the beginning of a slot. Employ beacon signals to mark the beginning of a slot. Does not work well if the number of stations contending to send data is high. In such case CSMA scheme works better. 41
  • 42. Carrier Sense Multiple Access CSMA  Carrier Sense Multiple Access  sense carrier  if idle, send  wait for ack If there isn’t one, assume there was a collision, retransmit  Vulnerable period: one tprop 42
  • 43. Extension of CSMA  The extension of CSMA are the collision detection CSMA/CD and the collision avoidance CSMA/CA techniques.  Why CA and CD?  Difficult to detect collisions in a radio environment – why?  A transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission; need a full duplex radio to listen and transmit on same frequency (not true in FDD systems)  Hidden station problem:  Two mutually far away stations A and C want to send to B.  At A and C, channel appears idle  But collision occurs at B 43
  • 44. CSMA/CD multi-access control protocol. 1. Each station listens before it transmits. 2. If the channel is busy, it waits until the channel goes idle, and then it transmits. 3. If the channel is idle it transmits immediately. Continue sensing. 4. If collision is detected, transmit a brief jamming signal, then cease transmission, wait for a random time, and retransmit. • collision detection is not by waiting for an ACK 44 CSMA/CD
  • 45. CSMA/CA  Prevent collision at the moment they are most likely occur, when bus is released after a packet transmission.  During the time a node is transmitting on the channel, several nodes might be wanting to transmit and waiting for it to become free.  The moment the transmitting node completes its transmission and would all starts transmitting at the same time.  To overcome in the collision avoidance scheme, all nodes are forced to wait for a random time and then sense the medium again before starting their transmission.  If the medium is sensed to be busy, further random amount of time and so on.  Thus the chance of two nodes starting to transmit at the same time would be greatly reduced. 45
  • 46. Classification of wireless MAC protocols Wireless MAC protocols Fixed-assignment schemes Random-access schemes Reservation - based schemes Circuit-switched CL packet-switched CO packet-switched CL – Connection Less. CO – Connection Oriented 46
  • 47. Reservation based schemes Basic form of the reservation scheme is RTS/CTS scheme. A sender transmits an RTS (Ready to Send) packet to the receiver before the actual data transmission. On receiving this the receiver sends CTS (Clear to Send) packet. The actual data transfer commences only after that. The other nodes sharing the medium sense the CTS packet, they refrain from transmitting until the transmission from the sending node is completes. 47
  • 48. Contention-based protocol MACA(Multiple Access Collision Avoidance) Protocol MACA solves the hidden/ exposed terminal problems  When a node wants to transmit a data packet, it first transmit a RTS (Request To Send) frame.  The receiver node, on receiving the RTS packet, if it is ready to receive the data packet, transmits a CTS (Clear to Send) packet.  Once the sender receives the CTS packet without any error, it starts transmitting the data packet.  If a packet transmitted by a node is lost, the node uses the binary exponential back-off (BEB) algorithm to back off a random interval of time before retrying. The binary exponential back-off mechanism used in MACA might starves flows sometimes. The problem is solved by MACAW. 48
  • 49. MACA Protocol The MACA protocol.  A sending an RTS to B.  B responding with a CTS to A. 49
  • 50. 50 MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B MACA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A MACA examples A B C RTS CTSCTS A B C RTS CTS RTS
  • 51. References Book: Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning Pvt. Ltd, New Delhi – 2012. Web:http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/vk5/report.html PPT: http://www.slideshare.net/tapeshchalisgaonkar1/mobile-computing-25723678 https://cs.uccs.edu/~chow/pub/master/ycai/mobile_computing_mtu.ppt http://www.slideshare.net/SukumarNayak/snsecurity-architecture-for-mobile- computing-and-iot 51