Mobile Computing
Mobile Computing
DISCLAIMER
3
4 CONTENTS
1.13 Internetworking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.3.1 Dipoles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
2.12.2 Checksum . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5 Bluetooth 189
Introduction, Transmission
Fundamentals, Communication,
Protocol and TCP/IP Suite
9
10CHAPTER 1. INTRODUCTION, TRANSMISSION FUNDAMENTALS, COMMUNICATION, PRO
1 User Mobility
2 Network Mobility
3 Bearer Mobility
4 Device Mobility
(a) User should be able to move from one device to another
and use the same service.
(b) Example: User is using a PC to do his work. During the
day, while he is on the street he would like to use his
mobile to access the corporate application.
5 Session Mobility
(a) A user session should be able to move from one user -
agent environment to another.
(b) Example: An unfinished session moving from a mobile
device to a desktop computer is a good example.
6 Service Mobility
(a) User should be able to move from one service to another.
(b) Example: User is writing a mail. Suddenly, he needs to
refer to something else. In a PC, user simply opens
another service and moves between them. User should
be able to do the same in small wireless devices.
7 Host Mobility
(a) User should be able to move while the device is a host
computer.
(b) Example: The laptop computer of a user is a host for
grid computing network. It is connected to a LAN port.
Suddenly, the user realizes that he needs to leave for an
offsite meeting. He disconnects from the LAN and
should get connected to wireless LAN while his laptop
being the host for grid computing network.
1.3. LIMITATION OF MOBILE COMPUTING 13
1 GPS Units
2 Wireless keyboard-mouse
3 Headsets
4 Radio Receivers
5 Satellite Television
6 Broadcast Television
(c) Networking
(d) Electronic devices
Figure 1.7: Analog and Digital Signaling of Analog and Digital Data
Figure 1.8: Analog and Digital Signaling of Analog and Digital Data
2 There are four concepts here that we are trying to relate to one
another:
1.7. CHANNEL CAPACITY 21
3 Data rate: This is the rate, in bits per second (bps), at which
data can be communicated.
C = B log2 (1 + SNR)
Where:
B is the bandwidth of the channel SNR is the signal-to-noise
ratio C is the capacity of the channel in bits per second
Power of signal
SNR =
power of noise
• Magnetic media
• Twisted pair
• Coaxial cable
• Fiber optics
Magnetic Media
Twisted Pair
4 When the wires are twisted, the waves from different twists
cancel out, so the wire radiates less effectively.
(a) STP cable has a metal foil or braided mesh covering that
encases each pair of insulated conductors.
(b) Metal casing improves the quality of cable by preventing
the penetration of noise or crosstalk.
(c) It is bulkier and more expensive.
(d) Applications:
1.8. TRANSMISSION MEDIA 27
Coaxial Cable
2 Two kinds of coaxial cable are widely used. One kind, 50-
ohm cable, is commonly used when it is intended for digital
transmission from the start.
Fiber Optics
• Radio Transmission
• Microwave Transmission
• Infrared
• Light wave Transmission
Radio Transmission
Figure 1.16:
1.8. TRANSMISSION MEDIA 31
Microwave Transmission
3 Above 100 MHz, the waves travel in straight lines and can
therefore be narrowly focused. Concentrating all the energy
into a small beam using a parabolic antenna gives a much
higher signal to noise ratio.
4 Advantages:
5 Disadvantages:
Infrared
Circuit Switching
Packet Switching
(a) Datagram
i. Each packet treated independently
ii. Packets can take any practical route
iii. Packets may arrive out of order
iv. Packets may go missing
v. Up to receiver to re-order packets and recover from
missing packets
(b) Virtual Circuit
i. Preplanned route established before any packets sent.
ii. Once route is established, all the packets between the
two communicating parties follow the same route
through the network
iii. Call request and call accept packets establish
connection (handshake)
iv. Each packet contains a Virtual Circuit Identifier (VCI)
instead of destination address
v. No routing decisions required for each packet
vi. Clear request to drop circuit
vii. Not a dedicated path
4 Advantage:
5 Disadvantage:
Client/Server network
4 Advantage:
5 Disadvantage:
Physical Layer
Network Layer
Transport Layer
Session Layer
4 Dialog control
5 Synchronization
48CHAPTER 1. INTRODUCTION, TRANSMISSION FUNDAMENTALS, COMMUNICATION, PRO
Presentation Layer
Application Layer
Application Layer
Transport Layer
Internetwork Layer
1 The network interface layer, also called the link layer or the
data-link layer or Host to Network Layer.
1.13 Internetworking
Internetworking Terms
3 Intranet:
(a) An internet used by single organization that provides the
key Internet application, especially the World Wide Web.
(b) An intranet operates within the organization for internal
purpose and can exist as an isolated, self-contained
internet, or may have links to the internet.
6 Bridge:
(a) A bridge is a type of computer network device that
provides interconnection with other bridge networks
that use the same protocol.
(b) Bridge devices work at the data link layer of the Open
System Interconnect (OSI) model, connecting two
different networks together and providing
communication between them.
(c) Bridges are similar to repeaters and hubs in that they
broadcast data to every node.
(d) However, bridges maintain the media access control
(MAC) address table as soon as they discover new
segments, so subsequent transmissions are sent to only
to the desired recipient.
(e) Bridges are also known as Layer 2 switches.
7 Router:
(a) A router is a device that analyzes the contents of data
packets transmitted within a network or to another
network.
(b) Routers determine whether the source and destination
are on the same network or whether data must be
transferred from one network type to another, which
requires encapsulating the data packet with routing
protocol header information.
(c) Router operates at layer 3 of the OSI model.
54CHAPTER 1. INTRODUCTION, TRANSMISSION FUNDAMENTALS, COMMUNICATION, PRO
Chapter 2
2.1 Introduction
Figure 2.1:
55
56 CHAPTER 2. ANTENNAS AND PROPAGATION
2.3.1 Dipoles
3 The fixed point is called the focus and the fixed line is called
the directrix (Figure 2.5).
Antenna Gain
4π Ae 4π f 2 Ae
G= =
λ2 c2
Where:
G = antenna gain
Ae = effective area
f = carrier frequency
c = speed of light (3 × 108 m/s) λ = carrier wavelength
2.4. PROPAGATION MODES IN WIRELESS COMMUNICATION 61
5 Ground waves travel between two limits, the earth and the
ionosphere, which acts like a channel. Since the channel
curves with the earth, the ground wave will follow.
Therefore very long range propagation is possible using
ground waves.
Where:
d = distance between antenna and horizon (km)
h = antenna height (m)
K = adjustment factor to account for refraction, rule of thumb
K = 4/3
Where:
h1 = height of antenna one
h2 = height of antenna two
Line-Of-Sight Transmission
Where:
Pt = signal power at transmitting antenna
Pr = signal power at receiving antenna
λ = carrier wavelength
d = propagation distance between antennas
c = speed of light (3 × 108 m/s)
Where d and λ are in the same units (e.g., meters)
v. Free space loss equation can be recast:
Pt 4πd
LdB = 10 log = 20 log
Pr λ
= −20 log(λ) + 20 log(d) + 21.98dB
4π f d
= 20 log
c
= 20 log( f ) + 20 log(d) − 147.56 dB
vi. Free space loss accounting for gain of other antennas
Pt (4π )2 (d)2 (πd)2 (cd)2
= = =
Pr Gr Gt λ2 Ar A t f 2 Ar A t
Where,
Gt = gain of transmitting antenna
Gr = gain of receiving antenna
At = effective area of transmitting antenna
Ar = effective area of receiving antenna
vii. Free space loss accounting for gain of other antennas
can be recast as:
LdB = 20 log(λ) + 20 log(d) − 10 log( At Ar )
= −20 log( f ) + 20 log(d) − 10 log( At Ar ) + 169.54 dB
(c) Noise
i. Thermal Noise
• Thermal noise due to agitation of electrons.
• It is present in all electronic devices and
transmission media and is a function of
temperature.
2.4. PROPAGATION MODES IN WIRELESS COMMUNICATION 67
Where:
N0 = noise power density in watts per 1 Hz of
bandwidth
k = Boltzmann’s constant =1.38 × 10−23 J/K
T = temperature, in kelvins (absolute
temperature)
• Noise is assumed to be independent of frequency.
• Thermal noise present in a bandwidth of B Hertz
(in watts):
N = kTB
Or, in decibel-watts
Fading
1 Multipath Propagation:
Multipath is the propagation phenomenon that results in
radio signals reaching the receiving antenna by two or more
paths. The effects of multipath include constructive and
destructive interference, and phase shifting of the signal.
1 Flat Fading:
BS BC
TS στ
BS BC and TS στ
1 Fast Fading:
(a) In a fast fading channel, the channel impulse response
changes rapidly within the symbol duration of the
signal. Due to Doppler spreading, signal undergoes
frequency dispersion leading to distortion. Therefore a
signal undergoes fast fading if
TS TC
Where TC is the coherence time and
BS BD
Where BD is the Doppler spread. Transmission involving
very low data rates suffers from fast fading.
2 Slow Fading:
(a) In such a channel, the rate of the change of the channel
impulse response is much less than the transmitted
signal.
(b) We can consider a slow faded channel a channel in
which channel is almost constant over at least one
symbol duration. Hence
TS TC and BS BD
Digital-to-analog
Analog-to-analog
Analog-to-digital
3 Types of modulation
Frequency Modulation(FM)
Phase Modulation(PM)
Figure 2.17:
Figure 2.18:
11 Example:
2.10. SPREAD SPECTRUM TECHNIQUES 91
92 CHAPTER 2. ANTENNAS AND PROPAGATION
Figure 2.21:
Types of Errors
Figure 2.22:
1 Single bit:
In a frame, there is only one bit, anywhere though, which is
corrupt.
Figure 2.23:
2 Multiple bit:
Frame is received with more than one bits in corrupted state.
Figure 2.24:
3 Burst:
Frame contains more than 1 consecutive bits corrupted.
94 CHAPTER 2. ANTENNAS AND PROPAGATION
Figure 2.25:
3 Detection Methods :
4 This scheme makes the total number of 1’s even, that is why
it is called even parity checking.
Performance
1 A receiver can detect all single bit errors in each code word.
3 Parity check bits are also calculated for all columns then both
are sent along with the data.
4 At the receiving end these are compared with the parity bits
calculated on the received data.
2.12. ERROR DETECTION METHOD 97
Performance
4 If two bits in one data unit are damaged and two bits in
exactly same position in another data unit are also damaged,
the 2-D Parity check checker will not detect an error.
2.12.2 Checksum
Performance
Performance
6 CRC can detect all burst errors of less than the degree of the
polynomial.
100 CHAPTER 2. ANTENNAS AND PROPAGATION
Figure 2.31:
2.13. BLOCK ERROR CORRECTION CODE 101
Figure 2.32:
2r > m + r + 1
24 > 7 + 4 + 1
5 Step-1 :
Figure 2.33:
6 Step-2 :
Figure 2.34:
7 Step-3 :
2.13. BLOCK ERROR CORRECTION CODE 103
Figure 2.35:
8 Example :
Figure 2.36:
9 Error in transmission
104 CHAPTER 2. ANTENNAS AND PROPAGATION
Figure 2.37:
Figure 2.38:
2.14 What is 3G ?
Applications on 3G
Functions 3G Wi-Fi
Radio Uses spread spectrum Uses spread spectrum
Interface as the modulation as the modulation
technique. technique.
Genesis Evolved from voice Evolved from data
network where QoS network where QoS is
is a critical success not a critical success
factor. factor.
Bandwidth It supports broadband Wi-Fi supports
data service of up to broadband data
2Mbps. service of up to
54Mbps.
Status of For 3G, there is a It is one of the families
standards relatively small family of continuously
of internationally evolving 802.11X
sanctioned standards, wireless standards
collectively referred to that are under
as IMT-2000. development.
108 CHAPTER 2. ANTENNAS AND PROPAGATION
109
110 CHAPTER 3. GSM AND GPRS
9 For each LA, there will be at least one BSC while cells in one
BSC can belong to different LA.
3.4. GSM ARCHITECTURE 119
Mobile Station(MS)
6 BTS holds the radio transmitter and the receivers that define
a cell and handles the radio-link protocols with the Mobile
Station.
9 BSC handles:
7 The EIR allows the MSC to forbid calls from this stolen or
unauthorized terminals.
Within the GSM system there are four types of handover that can
be performed for GSM only systems:
4 This is not the case because during the slots in which it is not
communicating with the BTS, it scans the other radio
channels looking for beacon frequencies that may be
stronger or more suitable.
6 The mobile scans these and reports back the quality of the
link to the BTS. In this way the mobile assists in the handover
decision and as a result this form of GSM handover is known
as Mobile Assisted Hand over (MAHO).
7 The network knows the quality of the link between the mobile
and the BTS as well as the strength of local BTSs as reported
back by the mobile.
3.6.3 Roaming
3.6.4 Handoff
gross bit rate after channel coding is 22.8 kbps (or 456 bits
every 20 ms).
6 These 456 bits are divided into eight 57-bit blocks and the
result is interleaved amongst eight successive time slot
bursts for protection against burst transmission errors.
Example
4 The call first goes to the local PSTN exchange where PSTN
exchange looks at the routing table and determines that it is a
call to a mobile network.
5 PSTN forwards the call to the Gateway MSC (GMSC) of the
mobile network.
6 MSC enquires the HLR to determine the status of the
subscriber. It will decide whether the call is to be routed or
not. If MSC finds that the call can be processed, it will find
out the address of the VLR where the mobile is expected to
be present.
8 Within the LA, it will page and locate the phone and connect
the call.
2 Layer 2 is the data link layer and across the Um interface, the
data link layer is a modified version of the LAPD protocol
used in ISDN or X.25, called LAPDm.
There are three types of services offered through GSM which are:
3 Supplementary Services
Supplementary Services
with customer, but does not wish to lose potential sales leads
while he is unavailable.
5 Call Barring: The concept of barring certain type of calls
might seem to be a supplementary disservice rather than
service. However, there are times when the subscriber is not
the actual user of the Mobile Station, and as a consequence
may wish to limit its functionality, so as to limit charges
incurred. If the subscriber and users and one and same, the
call barring may be useful to stop calls being routed to
international destinations when they are route. The reasons
for this are because it is expected that are roaming subscriber
will pay the charges incurred for international re-routing of
calls. So, GSM devised some flexible services that enable the
subscriber to conditionally bar calls.
3.7 GPRS
3.7.1 Introduction
3 It converts the GPRS packets coming from the SGSN into the
appropriate packet data protocol (PDP) format for the data
networks like internet or X.25, PDP sends these packets out
on the corresponding packet data network.
SMS Nodes
Air Interface
The air interface is located between the MS and the BSS. The
protocols used on the air interface are as follows:
Gb Interface
SGSN.
3 A relay function is implemented in the SGSN to relay the
packet data protocol (PDP) PDUs between the Gb and Gn
interfaces.
Gn/Gp Interface
12 HLR stores the user profile, the current SGSN address and the
PDP addresses for every GPRS user in the PLMN.
13 When the MS registers with a new SGSN, HLR will send the
user profile to the new SGSN.
1 Any user is likely to use either of the two modes of the GPRS
network:
(a) Application mode
3.12. BILLING AND CHARGING IN GPRS 153
3 Transit Delays
3.14 Mobile IP
Let’s take the case of mobile node (A) and another host
(server X). The following steps take place:
(a) Unlike HTTP, WSP has been designed by the WAP Forum
to provide fast connection suspension and reconnection.
(b) WSP provides a consistent interface between two session
services like client and server.
(c) WSP offers both connection-oriented and connectionless
service.
Wireless LAN
165
166 CHAPTER 4. WIRELESS LAN
1 802.11
2 HyperLAN
3 HomeRF
4 Bluetooth
5 MANET
9 Each access point forms a radio cell, also called a basic service
set (BSS), which enables wireless users located within the cell
to connect to the access point.
4.6. IEEE 802 ARCHITECTURE 169
2 Working from the bottom up, the lowest layer of the IEEE 802
reference model corresponds to the physical layer of the OSI
model and includes such functions as:
7 When all the stations in the BSS are mobile stations, with no
connection to other BSSs, the BSS is called an independent
BSS (IBSS).
(b) Three of the services are used to control IEEE 802.11 LAN
access and confidentiality.
i. Six of the services are used to support delivery of
MAC service data units (MSDUs) between stations.
ii. The MSDU is the block of data passed down from the
MAC user to the MAC layer; typically this is a LLC
PDU If the MSDU is too large to be transmitted in a
single MAC frame, it may be fragmented and
transmitted in a series of MAC frames.
(a) Authentication:
i. Used to establish the identity of stations to each other.
In a wired LAN, it is generally assumed that access to
a physical connection conveys authority to connect to
the LAN.
178 CHAPTER 4. WIRELESS LAN
The IEEE 802.11 MAC layer covers three functional areas: reliable
data delivery, medium access control, and security.
considerable unreliability.
13 The RTS alerts all stations that are within reception range of
the source that an exchange is under way; these stations
refrain from transmission in order to avoid a collision
between two frames transmitted at the same time.
14 Similarly, the CTS alert all stations that are within reception
range of the destination that an exchange is under way.
1 The physical layer for IEEE 802.11 has been issued in four
stages.
2 The first part, simply called IEEE 802.11, includes the MAC
layer and three physical layer specifications, two in the 2.4-
GHz band (ISM) and one in the infrared, all operating at 1
and 2 Mbps. IEEE 802.11a operates in the 5-GHz band at data
rates up to 54 Mbps.
Figure 4.5:
Figure 4.6:
(a) Confidentiality
(b) Data Integrity
(c) Access Control
(a) Authentication
(b) Association
(c) Encryption
4.11. WIRELESS LAN SECURITY ISSUES 187
11 That means the data from both parties A and C will be lose
during the collision.
Bluetooth
189
190 CHAPTER 5. BLUETOOTH
Figure 5.1:
Protocol.
(c) Telephony Control Protocol
i. It comprises of two protocol stacks, viz., Telephony
Control Specification Binary (TCS BIN), and the AT-
commands.
ii. Telephony Control Specification Binary (TCS BIN): It
is a bit-oriented protocol. It defines all the call control
signaling protocol for set up of speech and data calls
between Bluetooth devices.
iii. It also defines mobility management procedures for
handling groups of Bluetooth TCS devices. It is based
on the ITU-T Recommendation Q.931.
iv. AT-Commands: It defines a set of AT-commands by
which a mobile phone can be used and controlled as
a modem for fax and data transfers.
v. AT commands are used from a computer or DTE to
control a modem or DC. They are based on ITU-T
Recommendation V.250 and GSM 07.07.
(d) Adopted Protocols
i. This has many protocols stacks like Point-to-Point
Protocol (PPP), TCP/IP Protocol, OBEX (Object
Exchange Protocol), Wireless Application Protocol
(WAP), vCard, vCalender, Infrared Mobile
Communication (IrMC), etc.
ii. PPP Bluetooth: This offers PPP over RFCOMM to
accomplish point-to-point connections.
Point-to-Point Protocol is the means of taking IP
packets to/from the PPP layer and placing them onto
the LAN.
iii. TCP/IP: This protocol is used for communication
across the Internet. TCP/IP stacks are used in
numerous devices including printers, handheld
computers, and mobile handsets.
5.4. BLUETOOTH SECURITY 195
Model Description
File Transfer Refers to object transfer or transfer of files
between devices.
Internet In this model, a cordless modem acts as
Bridge a modem to a PC and provides dial-up
networking and faxing facilities.
LAN Access Multiple data terminals use a LAN access
point (LAP) as a wireless connection to an
Ethernet LAN.
SynchronizationThe synchronization model enables a device-
to-device synchronization of data.
Headset It is wirelessly connected and can act as
an audio input-output interface of remote
devices.