Wireless Com and MC
Wireless Com and MC
Wireless
Communications
And mobile computing
By H.K
Introduction
• Mobile computing = doing operation using mobile computing
system.
• Mobile computing systems – systems that can be easily moved
physically and can perform operations while they are being moved.
• Examples are laptops, personal digital assistants (PDAs), and mobile
phones.
• Wireless communication involves the process of sending/receiving
information through invisible waves in the air.
Introduction…
• Wireless communications is one of the biggest
engineering success
• market size dominating the whole economy
• e.g + 4 billion GSM subscribers of the world
• Working habits, have been changed “anywhere,
anytime.”
• mobility of workers have increased
Introduction …
• large number of applications have been developed,
• Wireless sensor networks monitor factories,
• wireless links replace the cables between computers and keyboards, mouse
and other peripheral devices
• wireless positioning systems monitor the location of trucks
History : How it all started
• Marconi invented the wireless telegraph in 1896.
• By encoding alphanumeric characters in analog signals, he sent telegraphic
signals across the Atlantic Ocean.
• This led to a great many developments in wireless communication networks
that support radio, television, mobile telephone, and satellite systems that
have changed our lives.
History : The First Systems
• Unidirectional information transmission
• was done for entertainment broadcasting. By the late 1930s,
• the need for bidirectional mobile communications emerged.
• Military ,police departments ,fire station….
• Many sophisticated military radio systems were
developed during and after WW2
History :The First Systems…
• 1946, the first mobile telephone system
History :The First Systems…
• To this day, this principle forms the basis for the majority of wireless
communications
• In 1957, the Soviet Union launched the first satellite (Sputnik) and the
U.S.A. soon followed.
Cellular principle
• The cellular principle, where the geographical area is divided into
cells;
BASE
STATION
>>>
• When you call to some one, your voice goes to your phone
microphone in the form of analog signal. The microphone converts
analog signal to digital signal (0 and 1). The antenna inside the phone
receives the digital signal (0s and 1s)and convert to electromagnetic
wave and sent it to the receiver.
• The electromagnetic wave is incapable of traveling long distances. The
electromagnetic signal gets weak in short distance. The
electromagnetic waves can be affected by obstacles. In nature the
globe is curved structure.
>>>
To overcome this problem:
1. The entire geographical area should be divided int to cell in
symmetric shape.
• in terms of including all users into cells, hexagonal
Shape is preferable.
Satellite Systems
>>>
Andriod
The iphone
Mobile Computing
•
• performing computations/operations.
OR
• the activity of using computer hardware and software for some
purpose.
24
Computing Paradigms…
Personal computing system
– refers to the use of personal computers
for Computation.
Characterized by
• Local software installation,
• Local system maintenance
• Customizable to user needs
• Very low utilization
25
Computing Paradigms…
Distributed computing :
• refers to the use of distributed systems to solve computational problems.
Distributed system
• consists of multiple autonomous computers that communicate through
a computer network.
• it appears to its users as a single coherent system.
• Google has more than 1.5 million servers across the globe
Distributed systems are characterized by:
remote information access (Message passing )
High availability (replication , ...)
fault tolerance
26
Mobile Computing
• Using small size portable (hand-held) computers, and other small
wearable devices, to run stand-alone applications (or access
remote applications) via wireless networks.
Three basic components
Networks:
Devices and
software/applications
Mobile Devices
28
Mobile devices
• A mobile device (a.k.a. handheld device, handheld computer) is a
pocket-sized computing device, typically having a display screen with
touch input or a miniature keyboard.
29
What are the Functionalities of
Smart phones?
30
Mobile devices…
Tablet PC
• portable personal computer equipped with a touch
screen as a primary input device and designed to
be operated and owned by an individual.
• use virtual keyboards and handwriting
recognition for text input through the touchscreen.
• Tablet PCs also can be connected to a full-size
keyboard and monitor
31
>>>
• Two main types of tablet PCs:
• Convertible -look a lot like normal laptops except the screen
can be rotated all the way around and laid down flat across the
Keyboard.
• Slate- looks like a flat screen without a keyboard
32
Tablet PC…
• advantage
• Great mobility
• digital ink
• record your handwriting and drawings
33
Mobile devices…
• E-book reader
• portable electronic device that
is designed primarily for the purpose
of reading digital books and publication.
Support
- Text to Speech
- Internet Capabilities( Wi-Fi ,3G)
34
Types of Mobile OS
35
Device limitation
• Device limitation
• Power
• Storage
• CPU
• user interface
36
Mobile Software Development
• Challenges
• Different Operating Systems.
• Different Screen Size.
• are a challenge even on the same OS
• Different Input methods.
• Keyboard (Keypad – Keyboard – Soft Keyboard),
• TrackBall/Joystick, Pen (Handwriting), Touch,
• Microphone (Voice Command), Camera (Image
Recognition), etc
37
>>>
• Different Hardware Architectures.
• Language support
• Security
38
a s i c W i re l e s s N e t wo r k
B
Principles
Wireless Transmission
1. Circular orbit :
54
MANET
• MANET stands for .Mobile Adhoc NETwork
• No centralized control
55
X-STICS OF MANET
• A single node acts as both router and host
• Distributed nature
• Dynamic nature
• Less memory, power and light weight nodes
56
Sensor
• Ambient Light Sensor:
• adjusts the display brightness
• Proximity Sensor
• detects how close screen of the phone is to your body .display turns off in
order to save battery
• Accelerometer, Gyroscope
• detect the orientation of the device and adapts the content to suit the
new orientation
57
Proximity Sensor
58
Sensor Network
• Sensor
• Sensor node
• Sensor network
60
Application of SNW
• Industrial automation
• Automated and smart homes
• Monitoring of weather conditions
• …..etc
61
Challenges of SNW
• Life time
• Dynamic
• Prone to failure
• Limited capacity
62
Types of Sensor Network
1.Terrestrial WSNs
2.Underground WSNs
3.Underwater WSNs
4.Multimedia WSNs
5.Mobile WSNs
63
Cont……
1.Terrestrial WSNs
Capable of communicating base stations efficiently.
deployment,
maintenance,
careful planning.
Additional sink nodes are located above the ground to relay information from the sensor nodes to the base station
Difficult to recharge;
65
Cont……
3. Under Water WSNs
contains autonomous underwater vehicles + many sensor nodes.
autonomous underwater vehicles used for gathering data from the sensor nodes.
Challenges
66
Cont……
.
5. Mobile WSNs
Movable WSNs (Versatile)=>better coverage .
67
Node clustering
Node clustering is a process of organizing wireless sensor nodes in manageable
format.
• Sensor Node: A sensor node is the core component of a WSN. Sensor
nodes can take on multiple roles in a network, such as simple sensing; data
storage; routing;
and data processing.
• Clusters: Clusters are the organizational unit for WSNs. The dense nature
of these networks require the need for them to be broken down into
clusters to simplify tasks
such a communication.
• Clusterheads: Clusterheads are the organization leader of a cluster. They
often are required to organize activities in the cluster. These tasks include
but are not limited
to data-aggregation and organizating the communication schedule 68of a
Node clustering
69
Data aggregation
What is aggregation ?
70
Limitation of WSNs
71
Remote sensing
Remote Sensing
• collection and interpretation of information about an object, area,
or event without being in contact with the object.
Aircraft and satellites are the common platforms for remote
sensing of the earth and its natural resources.
72
Classification of Remote sensing
Active Remote sensor
These sensors send out a signal and measure the amount reflected
back.
Active sensors are more controlled because they do not depend upon
Passive sensors
79
>>>>
80
Subscriber identity module (SIM)
81
Subscriber identity module (SIM)
Mini-SIM cards have the same thickness as full-size cards, but their length
and width are reduced to 25 mm × 15 mm.
A SIM card contains two passwords: a personal identification number
(PIN) for ordinary use and a personal unblocking code (PUK) for PIN
unlocking.
82
Subscriber identity module (SIM)
83
Subscriber identity module (SIM)
84
Radar(Radio Detection And Ranging )
• radar, electromagnetic sensor used for detecting,
locating, tracking, and recognizing objects of various
kinds at considerable distances.
• It operates by transmitting electromagnetic energy
toward objects, commonly referred to as targets, and
observing the echoes returned from them.
• The targets may be aircraft, ships, spacecraft,
automotive vehicles, and astronomical bodies, or even
birds, insects, and rain.
85
Wireless network security(WNS)
WNS
• A set of practices and tools used to protect network infrastructure
and the traffic that traverses it.
86
Why authentication ?
Requiring users to provide and prove their identity.
adds a layer of security between adversaries and sensitive data.
With authentication, it is possible to employ least privilege access
to limit what employees can see.
87
Authentication type
1. Password-based authentication
Also known as knowledge-based authentication,
88
…..
2. Two-factor/multifactor authentication
• Requires users provide at least one additional authentication
factor beyond a password.
• Requires two or more factors.
• Additional factors can be any of the user authentication types in
this article or a one-time password sent to the user via text or
email.
• This authentication type strengthens the security of accounts
because attackers need more than just credentials for access.
89
….
3. Biometric authentication
The process of authenticating the user by his/her biological
character.
Biometric identifiers are unique, making it more difficult to hack
accounts.
smoother and quicker because it doesn't require a user to recall a
secret or password.
harder for attackers to spoof.
90
….
Common types of biometric authentications:
• Fingerprint scanning verifies authentication based on a user's
fingerprints.
• Facial recognition uses the person's facial characteristics for
verification.
• Iris recognition scans the user's eye with infrared to compare
patterns against a saved profile.
• Behavioral biometrics uses how a person walks, types or
handles a device.
91
How does wireless security work?
Encryption is one of the most important tools used to create a
secure network
It works by using formulas known as algorithms to scramble
messages as they travel between wireless devices.
Even if intercepted, these messages are incomprehensible to
unauthorized users without a decryption key.
92
Firewall
A means of keeping security attack from outside LAN.
There are 2 types of firewalls:
Software firewall – usually found in windows os for a particular
computer/server.
Hardware firewall – a computer/dedicated equipment
- used by routers.
93