SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
MOBILE COMMUNICATION
INTRODUCTION
Noorbhasha Junnubabu
Table of Contents
1. Introduction
1.1. Applications
1.1.1 Vehicles
1.1.2 Emergencies
1.1.3 Business
1.1.4 Replacement of wired networks
1.1.5 Infotainment and more
1.1.6 Location dependent services
1.1.7 Mobile and wireless devices
1.2. A short history of wireless communication
1.3. A market for mobile communications
1.4. Some open research topics
1.5. A simplified reference model
1.6. Overview
1. Introduction
• What will computers look like in ten years?
– No one can make a wholly accurate prediction, but as a general
feature, most computers will certainly be portable.
• How will users access networks with the help of computers or other
communication devices?
– An ever-increasing number without any wires, i.e., wireless.
• How will people spend much of their time at work, during vacation?
– Many people will be mobile– already one of the key
characteristics of today’s society.
1. Introduction
• There are two different kinds of mobility:
– User mobility
– Device portability.
• User mobility refers to a user who has access to the same or similar
telecommunication services at different places, i.e., the user can be
mobile, and the services will follow him or her.
• Example: simple call-forwarding solutions known from the
telephone or computer desktops supporting roaming.
• With device portability, the communication device moves (with or
without a user). Many mechanisms in the network and inside the
device have to make sure that communication is still possible while
the device is moving.
• A typical example for systems supporting device portability is the
mobile phone system, where the system itself hands the device from
one radio transmitter to the next if the signal becomes too weak.
1. Introduction
• With regard to devices, the term wireless is used. This only
describes the way of accessing a network or other communication
partners, i.e., without a wire.
• A communication device can thus exhibit one of the following
characteristics:
– Fixed and wired: This configuration describes the typical
desktop computer in an office. Neither weight nor power
consumption of the devices allow for mobile usage.
– Mobile and wired: Many of today’s laptops fall into this
category.
– Fixed and wireless: This mode is used for installing networks,
e.g., in historical buildings to avoid damage by installing wires.
– Mobile and wireless: No cable restricts the user, who can roam
between different wireless networks.
1.1. Applications
1.1. Applications
1.1.1 Vehicles :
Today’s cars already comprise some, but tomorrow’s cars will
comprise many wireless communication systems and mobility aware
applications.
– Music, news, road conditions, weather reports, and other
broadcast information are received via digital audio broadcasting
(DAB) with 1.5 Mbit/s.
– For personal communication, a universal mobile
telecommunications system (UMTS) phone might be available
offering voice and data connectivity with 384 kbit/s.
– For remote areas, satellite communication can be used, while the
current position of the car is determined via the global
positioning system (GPS).
1.1. Applications
– Cars driving in the same area build a local ad-hoc network for
the fast exchange of information in emergency situations or to
help each other keep a safe distance.
– In case of an accident, not only will the airbag be triggered, but
the police and ambulance service will be informed via an
emergency call to a service provider.
– In the future, cars will also inform other cars about accidents via
the ad-hoc network to help them slow down in time, even before
a driver can recognize an accident.
– Buses, trucks, and trains are already transmitting maintenance
and logistic information to their home base, which helps to
improve organization (fleet management), and saves time and
money.
1.1. Applications
1.1.2 Emergencies :
Just imagine the possibilities of an ambulance with a high-
quality wireless connection to a hospital. Vital information about
injured persons can be sent to the hospital from the scene of the
accident. All the necessary steps for this particular type of accident
can be prepared and specialists can be consulted for an early
diagnosis.
– Wireless networks are the only means of communication in the
case of natural disasters such as hurricanes or earthquakes.
– In the worst cases, only decentralized, wireless ad-hoc networks
survive.
1.1. Applications
1.1.3 Business :
A travelling salesman today needs instant access to the
company’s database: to ensure that files on his or her laptop reflect
the current situation, to enable the company to keep track of all
activities of their travelling employees, to keep databases consistent
etc. With wireless access, the laptop can be turned into a true mobile
office, but efficient and powerful synchronization mechanisms are
needed to ensure data consistency.
1.1. Applications
1.1.4 Replacement of wired networks :
In some cases, wireless networks can also be used to replace
wired networks, e.g., remote sensors, for tradeshows, or in historic
buildings.
– Due to economic reasons, it is often impossible to wire remote
sensors for weather forecasts, earthquake detection, or to provide
environmental information. Wireless connections, e.g., via
satellite, can help in this situation.
– Tradeshows need a highly dynamic infrastructure, but cabling
takes a long time and frequently proves to be too inflexible.
– Other cases for wireless networks are computers, sensors, or
information displays in historical buildings, where excess
cabling may destroy valuable walls or floors. Wireless access
points in a corner of the room can represent a solution.
1.1. Applications
1.1.5 Infotainment and more :
Internet everywhere? Not without wireless networks! Imagine a
travel guide for a city. Static information might be loaded via CD-
ROM, DVD, or even at home via the Internet.
But wireless networks can provide up-to-date information at
any appropriate location. The travel guide might tell you something
about the history of a building downloading information about a
concert in the building at the same evening via a local wireless
network.
Another growing field of wireless network applications lies in
entertainment and games to enable, e.g., ad-hoc gaming networks as
soon as people meet to play together.
1.1. Applications
1.1.6 Location dependent services :
– Location aware services
• what services, e.g., printer, fax, phone, server etc. exist in the local
environment.
– Follow-on services
• automatic call-forwarding, transmission of the actual workspace to
the current location.
– Information services
• push: e.g., current special offers in the supermarket.
• pull: e.g., where is the Black Forrest Cherry Cake?
– Support services
• caches, intermediate results, state information etc. follow the
mobile device through the fixed network.
– Privacy
• who should gain knowledge about the location
1.1. Applications
1.1.7 Mobile and wireless devices :
1.1. Applications
1.1.7.1 Effects of device portability :
– Power consumption
• limited computing power, low quality displays, small disks
due to limited battery capacity.
– CPU
– Loss of data
• higher probability, has to be included in advance into the
design.
– Limited user interfaces
• compromise between size of fingers and portability.
• integration of character/voice recognition, abstract symbols.
– Limited memory
• limited value of mass memories with moving parts.
• flash-memory.
1.1. Applications
1.1.7.2 Wireless networks in comparison to fixed networks :
– Higher loss-rates due to interference
• emissions of, e.g., engines, lightning.
– Restrictive regulations of frequencies
• frequencies have to be coordinated, useful frequencies are almost
all occupied.
– Low transmission rates
• local some Mbit/s, regional currently 9.6kbit/s with GSM.
– Higher delays, higher jitter
• connection setup time with GSM in the second range, several
hundred milliseconds for other wireless systems.
– Lower security, simpler active attacking
• radio interface accessible for everyone, base station can be
simulated, thus attracting calls from mobile phones
– Always shared medium
• secure access mechanisms important
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.2. A short history of wireless
communication
1.3. A market for mobile
communications
1.3. A market for mobile
communications
1.4. Some open research topics
• Interference :
Radio transmission cannot be protected against interference
using shielding as this is done in coaxial cable or twisted pair.
• Regulations and spectrum :
Frequencies have to be coordinated, and unfortunately, only a
very limited amount of frequencies are available.
• Low bandwidth :
Although they are continuously increasing, transmission rates
are still very low for wireless devices compared to desktop systems.
• High delays, large delay variation :
A serious problem for communication protocols used in today’s
Internet (TCP/IP) is the big variation in link characteristics.
1.4. Some open research topics
• Lower security, simpler to attack :
Not only can portable devices be stolen more easily, but the
radio interface is also prone to the dangers of eavesdropping.
• Shared medium :
Radio access is always realized via a shared medium. As it is
impossible to have a separate wire between a sender and each
receiver, different competitors have to ‘fight’ for the medium.
• Ad-hoc networking :
Wireless and mobile computing allows for spontaneous
networking with prior set-up of an infrastructure. However, this
raises many new questions for research: routing on the networking
and application layer, service discovery, network scalability,
reliability, and stability etc.
1.5. A simplified reference model
1.5. A simplified reference model
• A personal digital assistant (PDA) which provides an example for a
wireless and portable device.
• This PDA communicates with a base station in the middle of the
picture.
• The base station consists of a radio transceiver (sender and receiver)
and an interworking unit connecting the wireless link with the fixed
link.
• The communication partner of the PDA, a conventional computer, is
shown on the right-hand side.
1.5. A simplified reference model
• Underneath each network element, the figure shows the protocol
stack implemented in the system according to the reference model.
• End-systems, such as the PDA and computer in the example, need a
full protocol stack comprising the application layer, transport layer,
network layer, data link layer, and physical layer.
• Applications on the end-systems communicate with each other using
the lower layer services.
• Intermediate systems, such as the interworking unit, do not
necessarily need all of the layers.
1.5. A simplified reference model
• The functions of each layer in more detail in a wireless and mobile
environment as follows,
Physical layer :
This is the lowest layer in a communication system and is
responsible for the conversion of a stream of bits into signals that
can be transmitted on the sender side. The physical layer of the
receiver then transforms the signals back into a bit stream.
For wireless communication, the physical layer is responsible for
 frequency selection
 generation of the carrier frequency
 signal detection
 modulation of data onto a carrier frequency and
 encryption
1.5. A simplified reference model
Data link layer :
The main tasks of this layer include,
 accessing the medium
 multiplexing of different data streams
 correction of transmission errors and
 synchronization.
The data link layer is responsible for a reliable point-to-point
connection between two devices or a point-to-multipoint
connection between one sender and several receivers.
1.5. A simplified reference model
Network layer :
This third layer is responsible for routing packets through a
network or establishing a connection between two entities over
many other intermediate systems. Important topics are
 addressing
 routing
 device location, and
 handover between different networks.
Transport layer :
This layer is used in the reference model to establish an end-to-
end connection. Topics like,
 quality of service
 flow and congestion control are relevant
Especially if the transport protocols known from the Internet,
TCP and UDP, are to be used over a wireless link.
1.5. A simplified reference model
Application layer :
Finally, the applications are situated on top of all transmission
oriented layers. Topics of interest in this context are,
 service location
 support for multimedia applications
 adaptive applications and
 wireless access to the world wide web using a portable device.
Very demanding applications are video (high data rate) and
interactive gaming (low jitter, low latency).
1.6. Overview

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Handoff
HandoffHandoff
Handoff
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Token bus
Token busToken bus
Token bus
 
HDLC
HDLCHDLC
HDLC
 
GSM channels
GSM channelsGSM channels
GSM channels
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Cordless Technology
Cordless TechnologyCordless Technology
Cordless Technology
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
GSM: Handovers
GSM: HandoversGSM: Handovers
GSM: Handovers
 

Andere mochten auch

Final ppt wireless
Final ppt wirelessFinal ppt wireless
Final ppt wirelessPrachi Patki
 
Mobile communication concepts
Mobile communication conceptsMobile communication concepts
Mobile communication conceptsTHANDAIAH PRABU
 
02 37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
02   37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...02   37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
02 37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...Norman Gates
 
новый год 1группа
новый год 1группановый год 1группа
новый год 1группаolesy7
 
Terra Tech Corp. Edible Garden Issue August 14, 2014
Terra Tech Corp. Edible Garden Issue August 14, 2014Terra Tech Corp. Edible Garden Issue August 14, 2014
Terra Tech Corp. Edible Garden Issue August 14, 2014Norman Gates
 
Theo pwp (5)
Theo pwp (5)Theo pwp (5)
Theo pwp (5)Theo Hall
 
FDA Tobacco Industry
FDA Tobacco IndustryFDA Tobacco Industry
FDA Tobacco IndustryNorman Gates
 
5 гр февраль
5 гр февраль5 гр февраль
5 гр февральolesy7
 
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...Camera di Commercio di Verona
 
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investireAndrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investireCamera di Commercio di Verona
 
Урок физика2
Урок физика2Урок физика2
Урок физика2Demon1994
 
Trtc stock scammers
Trtc stock scammersTrtc stock scammers
Trtc stock scammersNorman Gates
 
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investireLurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investireCamera di Commercio di Verona
 
420 Investor, Alan Brochstein CFA
420 Investor, Alan Brochstein CFA420 Investor, Alan Brochstein CFA
420 Investor, Alan Brochstein CFANorman Gates
 

Andere mochten auch (20)

Final ppt wireless
Final ppt wirelessFinal ppt wireless
Final ppt wireless
 
Mobile communication concepts
Mobile communication conceptsMobile communication concepts
Mobile communication concepts
 
Marijuana banking
Marijuana bankingMarijuana banking
Marijuana banking
 
02 37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
02   37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...02   37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
02 37-2013-00058302-cu-bc-ctl roa-33-11-05-13_reply_to_opposition_of_notice...
 
новый год 1группа
новый год 1группановый год 1группа
новый год 1группа
 
Us20120311744
Us20120311744Us20120311744
Us20120311744
 
Terra Tech Corp. Edible Garden Issue August 14, 2014
Terra Tech Corp. Edible Garden Issue August 14, 2014Terra Tech Corp. Edible Garden Issue August 14, 2014
Terra Tech Corp. Edible Garden Issue August 14, 2014
 
CAASA TAXTABLE 3RD EDITION
CAASA TAXTABLE 3RD EDITIONCAASA TAXTABLE 3RD EDITION
CAASA TAXTABLE 3RD EDITION
 
Theo pwp (5)
Theo pwp (5)Theo pwp (5)
Theo pwp (5)
 
FDA Tobacco Industry
FDA Tobacco IndustryFDA Tobacco Industry
FDA Tobacco Industry
 
Compplan
CompplanCompplan
Compplan
 
CAASA Tax Table 2nd Edition
CAASA Tax Table 2nd EditionCAASA Tax Table 2nd Edition
CAASA Tax Table 2nd Edition
 
5 гр февраль
5 гр февраль5 гр февраль
5 гр февраль
 
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
Gianni Tacconi - Cosa manca alla pianta per essere resistente: analisi dei ge...
 
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investireAndrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
Andrea Rosa - Stati Uniti: un mercato in forte ripresa e su cui investire
 
Austism CBD
Austism CBDAustism CBD
Austism CBD
 
Урок физика2
Урок физика2Урок физика2
Урок физика2
 
Trtc stock scammers
Trtc stock scammersTrtc stock scammers
Trtc stock scammers
 
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investireLurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
Lurent sansoucy - Stati Uniti: un mercato in forte ripresa e su cui investire
 
420 Investor, Alan Brochstein CFA
420 Investor, Alan Brochstein CFA420 Investor, Alan Brochstein CFA
420 Investor, Alan Brochstein CFA
 

Ähnlich wie MOBILE COMMUNICATION

Ähnlich wie MOBILE COMMUNICATION (20)

Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Mob ppt
Mob pptMob ppt
Mob ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
MOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptxMOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptx
 
MIS
MISMIS
MIS
 
Chapter1 computer networking
Chapter1 computer networkingChapter1 computer networking
Chapter1 computer networking
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptx
 
901721_ch1.ppt
901721_ch1.ppt901721_ch1.ppt
901721_ch1.ppt
 
901721_ch1.ppt
901721_ch1.ppt901721_ch1.ppt
901721_ch1.ppt
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
3g
3g3g
3g
 
3g
3g3g
3g
 
Manet overview
Manet overviewManet overview
Manet overview
 
Computer Networks for placements. It will help you for placement
Computer Networks for placements. It will help you for placementComputer Networks for placements. It will help you for placement
Computer Networks for placements. It will help you for placement
 
M.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxM.Sc Mobile computing.pptx
M.Sc Mobile computing.pptx
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 

Mehr von junnubabu

Priority queue in DSA
Priority queue in DSAPriority queue in DSA
Priority queue in DSAjunnubabu
 
Data struchers and algorithms
Data struchers and algorithmsData struchers and algorithms
Data struchers and algorithmsjunnubabu
 
Multithreading in java
Multithreading in javaMultithreading in java
Multithreading in javajunnubabu
 
Exceptions handling in java
Exceptions handling in javaExceptions handling in java
Exceptions handling in javajunnubabu
 
Error and exception in python
Error and exception in pythonError and exception in python
Error and exception in pythonjunnubabu
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
Data pre processing
Data pre processingData pre processing
Data pre processingjunnubabu
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Location based reminder
Location based reminderLocation based reminder
Location based reminderjunnubabu
 

Mehr von junnubabu (10)

Priority queue in DSA
Priority queue in DSAPriority queue in DSA
Priority queue in DSA
 
Data struchers and algorithms
Data struchers and algorithmsData struchers and algorithms
Data struchers and algorithms
 
Multithreading in java
Multithreading in javaMultithreading in java
Multithreading in java
 
Exceptions handling in java
Exceptions handling in javaExceptions handling in java
Exceptions handling in java
 
Error and exception in python
Error and exception in pythonError and exception in python
Error and exception in python
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Data pre processing
Data pre processingData pre processing
Data pre processing
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Location based reminder
Location based reminderLocation based reminder
Location based reminder
 

Kürzlich hochgeladen

MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfChristalin Nelson
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfChristalin Nelson
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 

Kürzlich hochgeladen (20)

MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdf
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 

MOBILE COMMUNICATION

  • 2. Table of Contents 1. Introduction 1.1. Applications 1.1.1 Vehicles 1.1.2 Emergencies 1.1.3 Business 1.1.4 Replacement of wired networks 1.1.5 Infotainment and more 1.1.6 Location dependent services 1.1.7 Mobile and wireless devices 1.2. A short history of wireless communication 1.3. A market for mobile communications 1.4. Some open research topics 1.5. A simplified reference model 1.6. Overview
  • 3. 1. Introduction • What will computers look like in ten years? – No one can make a wholly accurate prediction, but as a general feature, most computers will certainly be portable. • How will users access networks with the help of computers or other communication devices? – An ever-increasing number without any wires, i.e., wireless. • How will people spend much of their time at work, during vacation? – Many people will be mobile– already one of the key characteristics of today’s society.
  • 4. 1. Introduction • There are two different kinds of mobility: – User mobility – Device portability. • User mobility refers to a user who has access to the same or similar telecommunication services at different places, i.e., the user can be mobile, and the services will follow him or her. • Example: simple call-forwarding solutions known from the telephone or computer desktops supporting roaming. • With device portability, the communication device moves (with or without a user). Many mechanisms in the network and inside the device have to make sure that communication is still possible while the device is moving. • A typical example for systems supporting device portability is the mobile phone system, where the system itself hands the device from one radio transmitter to the next if the signal becomes too weak.
  • 5. 1. Introduction • With regard to devices, the term wireless is used. This only describes the way of accessing a network or other communication partners, i.e., without a wire. • A communication device can thus exhibit one of the following characteristics: – Fixed and wired: This configuration describes the typical desktop computer in an office. Neither weight nor power consumption of the devices allow for mobile usage. – Mobile and wired: Many of today’s laptops fall into this category. – Fixed and wireless: This mode is used for installing networks, e.g., in historical buildings to avoid damage by installing wires. – Mobile and wireless: No cable restricts the user, who can roam between different wireless networks.
  • 7. 1.1. Applications 1.1.1 Vehicles : Today’s cars already comprise some, but tomorrow’s cars will comprise many wireless communication systems and mobility aware applications. – Music, news, road conditions, weather reports, and other broadcast information are received via digital audio broadcasting (DAB) with 1.5 Mbit/s. – For personal communication, a universal mobile telecommunications system (UMTS) phone might be available offering voice and data connectivity with 384 kbit/s. – For remote areas, satellite communication can be used, while the current position of the car is determined via the global positioning system (GPS).
  • 8. 1.1. Applications – Cars driving in the same area build a local ad-hoc network for the fast exchange of information in emergency situations or to help each other keep a safe distance. – In case of an accident, not only will the airbag be triggered, but the police and ambulance service will be informed via an emergency call to a service provider. – In the future, cars will also inform other cars about accidents via the ad-hoc network to help them slow down in time, even before a driver can recognize an accident. – Buses, trucks, and trains are already transmitting maintenance and logistic information to their home base, which helps to improve organization (fleet management), and saves time and money.
  • 9. 1.1. Applications 1.1.2 Emergencies : Just imagine the possibilities of an ambulance with a high- quality wireless connection to a hospital. Vital information about injured persons can be sent to the hospital from the scene of the accident. All the necessary steps for this particular type of accident can be prepared and specialists can be consulted for an early diagnosis. – Wireless networks are the only means of communication in the case of natural disasters such as hurricanes or earthquakes. – In the worst cases, only decentralized, wireless ad-hoc networks survive.
  • 10. 1.1. Applications 1.1.3 Business : A travelling salesman today needs instant access to the company’s database: to ensure that files on his or her laptop reflect the current situation, to enable the company to keep track of all activities of their travelling employees, to keep databases consistent etc. With wireless access, the laptop can be turned into a true mobile office, but efficient and powerful synchronization mechanisms are needed to ensure data consistency.
  • 11. 1.1. Applications 1.1.4 Replacement of wired networks : In some cases, wireless networks can also be used to replace wired networks, e.g., remote sensors, for tradeshows, or in historic buildings. – Due to economic reasons, it is often impossible to wire remote sensors for weather forecasts, earthquake detection, or to provide environmental information. Wireless connections, e.g., via satellite, can help in this situation. – Tradeshows need a highly dynamic infrastructure, but cabling takes a long time and frequently proves to be too inflexible. – Other cases for wireless networks are computers, sensors, or information displays in historical buildings, where excess cabling may destroy valuable walls or floors. Wireless access points in a corner of the room can represent a solution.
  • 12. 1.1. Applications 1.1.5 Infotainment and more : Internet everywhere? Not without wireless networks! Imagine a travel guide for a city. Static information might be loaded via CD- ROM, DVD, or even at home via the Internet. But wireless networks can provide up-to-date information at any appropriate location. The travel guide might tell you something about the history of a building downloading information about a concert in the building at the same evening via a local wireless network. Another growing field of wireless network applications lies in entertainment and games to enable, e.g., ad-hoc gaming networks as soon as people meet to play together.
  • 13. 1.1. Applications 1.1.6 Location dependent services : – Location aware services • what services, e.g., printer, fax, phone, server etc. exist in the local environment. – Follow-on services • automatic call-forwarding, transmission of the actual workspace to the current location. – Information services • push: e.g., current special offers in the supermarket. • pull: e.g., where is the Black Forrest Cherry Cake? – Support services • caches, intermediate results, state information etc. follow the mobile device through the fixed network. – Privacy • who should gain knowledge about the location
  • 14. 1.1. Applications 1.1.7 Mobile and wireless devices :
  • 15. 1.1. Applications 1.1.7.1 Effects of device portability : – Power consumption • limited computing power, low quality displays, small disks due to limited battery capacity. – CPU – Loss of data • higher probability, has to be included in advance into the design. – Limited user interfaces • compromise between size of fingers and portability. • integration of character/voice recognition, abstract symbols. – Limited memory • limited value of mass memories with moving parts. • flash-memory.
  • 16. 1.1. Applications 1.1.7.2 Wireless networks in comparison to fixed networks : – Higher loss-rates due to interference • emissions of, e.g., engines, lightning. – Restrictive regulations of frequencies • frequencies have to be coordinated, useful frequencies are almost all occupied. – Low transmission rates • local some Mbit/s, regional currently 9.6kbit/s with GSM. – Higher delays, higher jitter • connection setup time with GSM in the second range, several hundred milliseconds for other wireless systems. – Lower security, simpler active attacking • radio interface accessible for everyone, base station can be simulated, thus attracting calls from mobile phones – Always shared medium • secure access mechanisms important
  • 17. 1.2. A short history of wireless communication
  • 18. 1.2. A short history of wireless communication
  • 19. 1.2. A short history of wireless communication
  • 20. 1.2. A short history of wireless communication
  • 21. 1.2. A short history of wireless communication
  • 22. 1.2. A short history of wireless communication
  • 23. 1.3. A market for mobile communications
  • 24. 1.3. A market for mobile communications
  • 25. 1.4. Some open research topics • Interference : Radio transmission cannot be protected against interference using shielding as this is done in coaxial cable or twisted pair. • Regulations and spectrum : Frequencies have to be coordinated, and unfortunately, only a very limited amount of frequencies are available. • Low bandwidth : Although they are continuously increasing, transmission rates are still very low for wireless devices compared to desktop systems. • High delays, large delay variation : A serious problem for communication protocols used in today’s Internet (TCP/IP) is the big variation in link characteristics.
  • 26. 1.4. Some open research topics • Lower security, simpler to attack : Not only can portable devices be stolen more easily, but the radio interface is also prone to the dangers of eavesdropping. • Shared medium : Radio access is always realized via a shared medium. As it is impossible to have a separate wire between a sender and each receiver, different competitors have to ‘fight’ for the medium. • Ad-hoc networking : Wireless and mobile computing allows for spontaneous networking with prior set-up of an infrastructure. However, this raises many new questions for research: routing on the networking and application layer, service discovery, network scalability, reliability, and stability etc.
  • 27. 1.5. A simplified reference model
  • 28. 1.5. A simplified reference model • A personal digital assistant (PDA) which provides an example for a wireless and portable device. • This PDA communicates with a base station in the middle of the picture. • The base station consists of a radio transceiver (sender and receiver) and an interworking unit connecting the wireless link with the fixed link. • The communication partner of the PDA, a conventional computer, is shown on the right-hand side.
  • 29. 1.5. A simplified reference model • Underneath each network element, the figure shows the protocol stack implemented in the system according to the reference model. • End-systems, such as the PDA and computer in the example, need a full protocol stack comprising the application layer, transport layer, network layer, data link layer, and physical layer. • Applications on the end-systems communicate with each other using the lower layer services. • Intermediate systems, such as the interworking unit, do not necessarily need all of the layers.
  • 30. 1.5. A simplified reference model • The functions of each layer in more detail in a wireless and mobile environment as follows, Physical layer : This is the lowest layer in a communication system and is responsible for the conversion of a stream of bits into signals that can be transmitted on the sender side. The physical layer of the receiver then transforms the signals back into a bit stream. For wireless communication, the physical layer is responsible for  frequency selection  generation of the carrier frequency  signal detection  modulation of data onto a carrier frequency and  encryption
  • 31. 1.5. A simplified reference model Data link layer : The main tasks of this layer include,  accessing the medium  multiplexing of different data streams  correction of transmission errors and  synchronization. The data link layer is responsible for a reliable point-to-point connection between two devices or a point-to-multipoint connection between one sender and several receivers.
  • 32. 1.5. A simplified reference model Network layer : This third layer is responsible for routing packets through a network or establishing a connection between two entities over many other intermediate systems. Important topics are  addressing  routing  device location, and  handover between different networks. Transport layer : This layer is used in the reference model to establish an end-to- end connection. Topics like,  quality of service  flow and congestion control are relevant Especially if the transport protocols known from the Internet, TCP and UDP, are to be used over a wireless link.
  • 33. 1.5. A simplified reference model Application layer : Finally, the applications are situated on top of all transmission oriented layers. Topics of interest in this context are,  service location  support for multimedia applications  adaptive applications and  wireless access to the world wide web using a portable device. Very demanding applications are video (high data rate) and interactive gaming (low jitter, low latency).