0% found this document useful (0 votes)
3 views11 pages

Mobile Computing PDDD

The document discusses key concepts in mobile computing, including user mobility and device portability, highlighting their importance in enabling communication across various locations and networks. It also outlines the advantages and disadvantages of wireless local area networks (WLAN) and General Packet Radio Service (GPRS), emphasizing issues such as connectivity quality, security, and power consumption. Additionally, it explains the Transmission Control Protocol (TCP) as a reliable communication protocol that ensures data integrity and efficient delivery over networks.

Uploaded by

Gourav Kotnala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views11 pages

Mobile Computing PDDD

The document discusses key concepts in mobile computing, including user mobility and device portability, highlighting their importance in enabling communication across various locations and networks. It also outlines the advantages and disadvantages of wireless local area networks (WLAN) and General Packet Radio Service (GPRS), emphasizing issues such as connectivity quality, security, and power consumption. Additionally, it explains the Transmission Control Protocol (TCP) as a reliable communication protocol that ensures data integrity and efficient delivery over networks.

Uploaded by

Gourav Kotnala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Answer 1

Mobility is the ability to move freely. In Mobile Computing,


users and devices both have to move on different
geographical locations and different networks. Mobility is an
essential aspect of Mobile computing.
There are two types of mobility used in Mobile Computing:
User Mobility: It is used to specify a user who has access to
the same or similar telecommunication services at different
places. In User Mobility, a user can move between:
• Different geographical locations.
• Different networks.
• Different communication devices.
• And different applications.
Device Portability: It specifies the mobility of the device.
There are many mechanisms in the network and inside the
device that ensure that communication is still possible while
the device is moving.
In Device Portability, the device can move between:
• Different geographical locations.
• Different networks.
Answer 2
Disadvantages of Mobile Computing
• Quality of Connectivity: The quality of connectivity is
one of the biggest disadvantages of Mobile Computing.
Mobile devices require either Wi-Fi connectivity or
mobile network connectivity such as GPRS, 3G or 4G
connectivity. In this case, if you are not near any of these
connections, your internet access will be slow, very
limited or disconnected sometimes.
• Security Issues and Threats: Mobile connections are
always vulnerable to security issues or threats. Mobile
VPNs are not supposed to always be safe, and syncing
devices might also lead to security concerns. If you are
accessing a Wi-Fi network connection, it can also be
risky because hackers may easily hack or bypass WPA
and WEP security.
• Power Consumption and Battery Issues: Mobile devices
use detachable and rechargeable batteries as a power
source during communication. These batteries do not
tend to last long. In emergencies, if you don't have a
source of power for charging, then it will undoubtedly
be a communication or data transmission failure.
Answer 6
Wireless Local Area Network (WLAN) :
WLAN includes an access point (AP) which is employed to
attach to the web . AP sends and receives frequency signal to
the connected devices. In 1990 WLAN installation was
expensive and was only deployed where the wired
connection wasn’t possible. within the late 1990s, cost
decreases to implement WLAN due to using IEEE 802.11
standard.
It works with a bandwidth of two .4 GHz (802.11b) or 5 GHZ
(802.11 a). The devices to which WLAN connects also are
called clients. The Wi-Fi Alliance may be a global, non-profit
organization that helps to make sure standards and
interoperability for wireless networks, and wireless networks
are often mentioned as Wi-Fi.
WLAN gives a high data transfer rate. It uses a star during
which all nodes send/receive data through access points. It
works better in homes and offices. Especially in offices no
extra cables are required and arranging a gathering is
additionally easy. it’s a knowledge transfer rate of 1-10 Mbps.
Wireless LAN uses security which incorporates WEP or WPZ.
It also uses infrared technology if required.
Advantages of wireless local area network (WLAN) :
• It’s a reliable sort of communication.
• As WLAN reduces physical wires so it’s a versatile way of
communication.
• WLAN also reduces the value of ownership.
• It’s easier to feature or remove workstation.
• It provides high rate thanks to small area coverage.
• You’ll also move workstation while maintaining the
connectivity.
• For propagation, the sunshine of sight isn’t required.
• The direction of connectivity are often anywhere i.e.
you’ll connect devices in any direction unless it’s within
the range of access point.
• Easy installation and you would like don’t need extra
cables for installation.
• WLAN are often useful in disasters situation e.g.
earthquake and fire. A wireless network can connect
people in any disaster
• It’s economical due to the tiny area access.
• The amount of power it requires is more as it uses
transmitter; therefore, the battery life of laptops can be
affected.
Disadvantages of wireless local area network (WLAN) :
• WLAN requires license.
• It’s a limited area to hide.
• The Government agencies can control the flow of signals
of WLAN and can also limit it if required. this will affect
data transfer from connected devices to the web.
• If the amount of connected devices increases then data
transfer rate decreases.
• WLAN uses frequency which may interfere with other
devices which use frequency.
• If there’s rain or thunder then communication may
interfere.
• Due to Low security as attackers can get access to the
transmitted data.
• Signals could also be suffering from the environment as
compared to using fiber optics.
• The radiation of WLAN are often harmful to the
environment.
• WLAN is more expensive than wires and hubs as it
access points.
• Signals can get from nearest signals by access points.
• It’s required to vary the network card and access point
when standard changes.
• LAN cable remains required which acts because the
backbone of the WLAN.
• Low data transfer rate than wired connection because
WLAN uses frequency.
• Chances of errors are high.
Answer 9
What is GPRS? Features, Function and Advantages
GPRS Full Form: General Packet Radio Service is the full form
of GPRS. GPRS is a new form of wireless communication used
by mobile phones and other unique mobile devices to
transport data over a mobile network. It is a packet-switched
technology that allows information to be transmitted in small
packets, allowing for a more environmentally friendly use of
network resources.
As an improvement to the current GSM (Global System for
Mobile Communications) community, which was primarily
created for voice communication, GPRS was initially
presented in 2000. With the advent of GPRS, mobile phones
and other unique mobile devices should be able to send data
over the same network, ushering in a completely new era of
mobile communication.
Features of GPRS
• GPRS is a wireless communication service that allows
data to be transmitted over a cellular network.
• GPRS uses packet-switching technology to transmit data,
which means that data is divided into small packets and
sent over the network in a more efficient way.
• GPRS offers always-on connectivity, which means that a
user can stay connected to the network at all times,
without having to establish a connection every time they
want to send or receive data.
• GPRS provides faster data transfer rates compared to the
earlier generation of cellular networks, such as GSM.
• GPRS enables new applications and services to be
developed, such as mobile internet browsing and email.
• GPRS is a precursor to modern cellular data
technologies, such as 3G and 4G.
• Function of GPRS
• A mobile generation called GPRS is used to talk
information via mobile networks.
• It allows clients to access the internet and different data
services on their cell gadgets.
• Due to its low prices and environmental friendliness,
GPRS is a famous option for consumers.
Advantages of GPRS
• A high-speed data transfer cost is offered to mobile
devices through General Packet Radio Service or GPRS.
• Web browsing, email sending and receiving, and online
shopping are just a few of the online services that GPRS
users can access while they are on the move.
• Because GPRS is always operational, customers can
access the internet quickly and without any problems
without utilizing dial-up.
• GPRS offers a cost-effective approach to transmitting
statistics because it only charges for the volume of data
transferred, not for the amount of time spent online.
• GPRS offers users a flexible option because it functions
well with a variety of mobile devices.
• GPRS was a groundbreaking technology that
revolutionized mobile data connectivity and played a
crucial role in shaping today’s mobile communication
landscape. As the first step towards high-speed mobile
internet, GPRS provided faster data speeds, “always-on”
connectivity, and cost-effective data usage. Its impact on
mobile applications, e-commerce, and information
accessibility has been monumental, contributing to the
mobile-driven digital age we live in today. While newer
generations of mobile data technologies have since
emerged, GPRS will always be remembered as a
significant milestone in the ongoing evolution of mobile
communication.
Answer 5
What is Transmission Control Protocol (TCP)?
TCP (Transmission Control Protocol) is one of the main
protocols of the Internet protocol suite. It lies between the
Application and Network Layers which are used in providing
reliable delivery services. It is a connection-oriented protocol
for communications that helps in the exchange of messages
between different devices over a network. The Internet
Protocol (IP), which establishes the technique for sending
data packets between computers, works with TCP.
Working of TCP
To make sure that each message reaches its target location
intact, the TCP/IP model breaks down the data into small
bundles and afterward reassembles the bundles into the
original message on the opposite end. Sending the
information in little bundles of information makes it simpler
to maintain efficiency as opposed to sending everything in
one go.
After a particular message is broken down into bundles, these
bundles may travel along multiple routes if one route is
jammed but the destination remains the same.
Features of TCP/IP
Some of the most prominent features of Transmission
control protocol are
1. Segment Numbering System
TCP keeps track of the segments being transmitted or
received by assigning numbers to each and every single one
of them.
A specific Byte Number is assigned to data bytes that are to
be transferred while segments are assigned sequence
numbers.
Acknowledgment Numbers are assigned to received
segments.
2. Connection Oriented
It means sender and receiver are connected to each other till
the completion of the process.
The order of the data is maintained i.e. order remains same
before and after transmission.
3. Full Duplex
In TCP data can be transmitted from receiver to the sender or
vice – versa at the same time.
It increases efficiency of data flow between sender and
receiver.
4. Flow Control
Flow control limits the rate at which a sender transfers data.
This is done to ensure reliable delivery.
The receiver continually hints to the sender on how much
data can be received (using a sliding window)
5. Error Control
TCP implements an error control mechanism for reliable data
transfer
Error control is byte-oriented
Segments are checked for error detection
Error Control includes – Corrupted Segment & Lost Segment
Management, Out-of-order segments, Duplicate segments,
etc.
6. Congestion Control
TCP takes into account the level of congestion in the network.
Congestion level is determined by the amount of data sent by
a sender.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy