5TH MC It
5TH MC It
Theory- 5
5th Semester CSE/IT
Lecture Notes
By
Nishita Kindo, Lecturer (CSE)
Bhubanananda Odisha School of Engineering, Cuttack
Chapter- 1
INTRODUCTION TO WIRELESS NETWORKS & MOBILE
COMPUTING
SYLLABUS
1.1 Networks
1.2 Wireless Networks
1.3 Mobile Computing
1.4 Mobile Computing Characteristics
1.5 Application of Mobile Computing
1.1 Networks
A network is two or more computers (or other electronic devices) that are connected together,
usually by cables or Wi-Fi. Some computer networks will have a server. A server is a powerful
computer that often acts as a central hub for services in a network e.g. e-mails, internet access
and file storage.
An example of networking is sharing and acquiring information between different divisions of the
same company to share information and solve business problems. An example of networking is
linking the entire network of computers to a print server to allow each workstation to have the
ability to print documents.
A Controller Area Network (CAN bus) is a robust vehicle bus standard designed to allow
microcontrollers and devices to communicate with each other's applications without a host
computer.
Types of Networks
A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four types:
A wireless network is a computer network that uses wireless data connections between network
nodes.
Examples of wireless networks include cell phone networks, wireless local area networks
(WLANs), wireless sensor networks, satellite communication networks, and terrestrial microwave
networks.
Table 7.5. 802.11 Wireless Standards
Mobile Computing is an umbrella term used to describe technologies that enable people to
access network services anyplace, anytime, and anywhere.
Mobile Computing
• A technology that is capable of providing an environment which enables users to
transmit data from one device to other device without the use of any physical
link/cables is known as Mobile Computing.
• It means, data transmission is done wireless-ly with the help of wireless devices
such as mobiles, laptops etc.
• Whenever any device is connected to a network without being connected physically
over a link or cable, data transmission such as messages, voice recording, videos
etc. can be done be done by using the concept of mobile computing.
• Mobile Computing technology helps users to access and transmit data from any
remote locations without being present there physically.
• Thus, having such a big coverage diameter, it is one of the fastest and most reliable
sectors of computing technology field.
Mobile computing is used in different contexts with different names. The most common names
are:
▪ Mobile Computing
▪ Nomadic Computing
▪ Ubiquitous Computing
▪ Pervasive Computing
▪ Invisible Computing
–Mobile Computing:
• The computing environment is mobile and moves along with the user.
• This is similar to the telephone number of a GSM (Global System for Mobile communication)
phone, which moves with the phone.
• The offline (local) and real-time (remote) computing environment will move with the user.
• In real-time mode user will be able to use all his remote data and services online.
– Ubiquitous Computing:
This is the generic definition of ubiquity, where the information is available anywhere, all the time.
– Virtual Home Environment:
(VHE) is defined as an environment in a foreign network such that the mobile users can
experience the same computing experience as they have in their home or corporate computing
environment.
• For example, one would like to put one’s room heater on when one is about 15 minutes away
from home.
– Nomadic Computing:
The computing environment is nomadic and moves along with the mobile user.
• This is true for both local and remote services.
– Pervasive Computing:
A computing environment, which is pervasive in nature and can be made available in any
environment.
– Invisible Computing:
A disappearing (nobody will notice its presence) everyplace computing environment. User will be
able to use both local and remote services.
Mobile Communication
• Mobile Communication is the framework that is responsible behind the working of
mobile computing technology.
• It ensures the consistency and reliability of communication process through this
framework.
• Mobile communication framework includes communication devices such as
mobiles, laptops, as rules of conduct, fitness etc. They are responsible for
delivering of smooth communication process.
• Mobile communication can be of one of the following forms as mentioned below.
1.4 Characteristics of Mobile Computing
A communication device can exhibit any one of the following characteristics:
➢ Fixed and wired: This configuration describes the typical desktop computer in an office.
Neither weight nor power consumption of the devices allow for mobile usage. The devices
use fixed networks for performance reasons.
➢ Mobile and wired: Many of today’s laptops fall into this category; users carry the laptop
from one hotel to the next, reconnecting to the company’s network via the telephone
network and a modem.
➢ Fixed and wireless: This mode is used for installing networks, e.g., in historical buildings
to avoid damage by installing wires, or at trade shows to ensure fast network setup.
➢ Mobile and wireless: This is the most interesting case. No cable restricts the user, who
can roam between different wireless networks. Most technologies discussed in this book
deal with this type of device and the networks supporting them. Today’s most successful
example for this category is GSM with more than 800 million users.
Or
Ubiquity - Ability of a user to perform computations from anywhere and at any time.
Location Awareness- Can provide information about the current location of a user to a tracking
station.
Adaptation- GPS Implies the ability of a system to adjust bandwidth fluctuation without
inconveniencing the user.
Broadcast- Efficient delivery of data can be made simultaneously to hand reads of mobile users.
Personalization- Services in a mobile environment can be easily personalized according to a
user’s profile.
▪ Bandwidth: Although they are continuously increasing, transmission rates are still very
low for wireless devices compared to desktop systems. Researchers look for more
efficient communication protocols with low overhead.
▪ Security constraints: Not only can portable devices be stolen more easily, but the radio
interface is also prone to the dangers of eavesdropping. Wireless access must always
include encryption, authentication, and other security mechanisms that must be efficient
and simple to use.
Assignment Questions:
1. What is WLAN? Explain briefly.
2. Elaborate the applications of mobile computing.