0% found this document useful (0 votes)
384 views

1.introduction To Mobile Computing

The document provides an introduction to mobile computing, describing it as technologies that enable network access anywhere and anytime. It discusses different types of mobile devices and wireless connectivity. Key applications of mobile computing mentioned include use in vehicles, emergencies, business, and replacing wired networks. Limitations discussed are resource constraints, bandwidth issues, dynamic network changes, and security concerns. The document also covers cellular communication principles such as FDMA, TDMA, and CDMA technologies.

Uploaded by

ADITI RAMTEKE
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
384 views

1.introduction To Mobile Computing

The document provides an introduction to mobile computing, describing it as technologies that enable network access anywhere and anytime. It discusses different types of mobile devices and wireless connectivity. Key applications of mobile computing mentioned include use in vehicles, emergencies, business, and replacing wired networks. Limitations discussed are resource constraints, bandwidth issues, dynamic network changes, and security concerns. The document also covers cellular communication principles such as FDMA, TDMA, and CDMA technologies.

Uploaded by

ADITI RAMTEKE
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

MOBILE

COMPUTING
Introduction to Mobile Computing
• Mobile Computing is an umbrella term used to describe technologies
that enable people to access network services anyplace, anytime,
and anywhere.

• The rapidly expanding technology of cellular communication, wireless


LANs, and satellite services will make information accessible
anywhere and at any time.

• Mobility (is the ability to move freely i.e. users and devices both have
to move on different geographical location and different network)

• Portability (generally refers to remote work) will create an entire new


class of applications and, possibly, new massive markets combining
personal computing and consumer electronics.
A communication device can, show any one of the following
characteristics:
• Fixed and wired: This configuration describes the typical desktop
computer in an office. The devices use fixed networks for performance
reasons.
• Mobile and wired: Many of today’s laptops fall into this category;
users carry the laptop from one hotel to the next, reconnecting to the
company’s network via the telephone network and a modem.

• Fixed and wireless: This mode is used for installing networks, e.g., in
historical buildings to avoid damage by installing wires, or at trade
shows to ensure fast network setup.
• Mobile and wireless: This is the most interesting case. No cable
restricts the user, who can roam between different wireless networks.
Today’s most successful example for this category is GSM with
more than 800+ million users.
APPLICATIONS OF MOBILE COMPUTING
The importance of Mobile Computers has been highlighted in many
fields of which a few are described below:

• Vehicles: Music, news, road conditions, weather reports, and other


broadcast information are received via digital audio broadcasting (DAB)
with 1.5 Mbit/s.
• The current position of the car is determined via the global positioning
system (GPS). Cars driving in the same area build a local ad-hoc
network for the fast exchange of information in emergency situations or
to help each other keep a safe distance. In case of an accident, not only
will the airbag be triggered, but the police and ambulance service will be
informed via an emergency call to a service provider.

• Buses, trucks, and trains are already transmitting maintenance and


logistic information to their home base, which helps to improve
organization management, and saves time and money.
• Emergencies: An ambulance with a high-quality wireless connection
to a hospital can carry vital information about injured persons to the
hospital from the scene of the accident. All the necessary steps for
this particular type of accident can be prepared and specialists can
be consulted for an early diagnosis. Wireless networks are the only
means of communication in the case of natural disasters such as
hurricanes or earthquakes. In the worst cases, only broadcast/
circulate wireless ad-hoc networks survive.

• Business: A travelling salesman today needs instant access to the


company’s database: to ensure that files on his or her laptop reflect
the current situation, to enable the company to keep track of all
activities of their travelling employees, to keep databases consistent
etc. With wireless access, the laptop can be turned into a true mobile
office, but efficient and powerful synchronization mechanisms are
needed to ensure data consistency.
• Credit Card Verification: At Point of Sale (POS) terminals in shops
and supermarkets, when customers use credit cards for transactions, the
intercommunication required between the bank central computer and
the POS terminal, in order to effect verification of the card usage, can
take place quickly and securely over cellular channels using a mobile
computer unit. This can speed up the transaction process and relieve
congestion at the POS terminals.

• Replacement of Wired Networks: Wireless networks can also be used


to replace wired networks, e.g., remote sensors, for tradeshows, or in
historic buildings. Due to economic reasons, it is often impossible to
wire remote sensors for weather forecasts, earthquake detection, or
to provide environmental information.

Wireless connections, e.g., via satellite, can help in this situation.


Other examples for wireless networks are computers, sensors, or
information displays in historical buildings, where excess cabling may
destroy valuable walls or floors.
Limitations of Mobile Computing
• Resource constraints: A resource constraints is any limitation or risk related to
resources allocated to the project (Battery, Cost, Time etc).

• Bandwidth: The maximum amount of data transmitted over an internet connection


in a given amount of time. If the bandwidth of a network is 40 Mbps, it implies that
the network cannot transmit data faster than 40 Mbps in any given case.

• Dynamic changes in communication environment: Variations in signal power


within a region, thus link delays and connection losses.

• Network Issues: Discovery of the connection-service to destination and connection


stability.

• Security constraints: Not only can portable devices be stolen more easily, but the
radio interface is also open to the dangers of eavesdropping (i.e. An eavesdropping
sniffing/ snooping attack occurs when a hacker intercepts, deletes or modifies data
that is transmitted between two devices).
Wireless access must always include encryption, authentication, and other security
mechanisms that must be efficient and simple to use.
Mobile Computing
Advantages Disadvantages

• Flexibility Dependence
• Connectivity Battery Life
• Efficiency Security Concerns
• Productivity Cost
Principal of Cellular
Communication
Like a Mobile phones, Every computer has a BIOS/CMOS
battery that keeps the clock running and a few pre-Windows settings
for the computer to set properly.
The A-bis interface consists of the protocols spoken between the
BSC (Base Station Controller) and BTS (Base Transceiver Station).
FDMA :- In this, sharing of bandwidth among different stations takes place.
TDMA :- In this, only the sharing of time of satellite transponder takes place.
CDMA :- In this, there is sharing of both i.e. bandwidth and time among
different stations takes place.
Forward Link :- A Composite/Separate Signal which is transmitted
to all users and differentiated by codes. (Codeword is necessary)
CDMA in which each channel is assigned a unique code.
FDMA is suitable for voice communication, radio broadcasting, telemetry,
and navigation.
FDMA can also support fixed satellite services (FSS), which provide point-
to-point or point-to-multipoint communication between fixed earth
stations.
GSM network phones use SIM cards, which store all of the user's
information, so activating a new phone is often as simple as moving the card
from one handset to another.
CDMA phones that use RUIM cards share this ability to swap information
between phones.

You might also like