0% found this document useful (0 votes)
22 views

mobilecomputingmidsem

The document covers the Mobile Physical Layer and Mobile Computing Architecture, detailing GSM technology, air-interface, channel structures, and the hierarchical organization of cellular networks. It also discusses mobile computing architecture, addressing issues like bandwidth, power consumption, and security, along with design considerations for optimizing mobile applications. Additionally, it provides insights into Wireless LAN and Bluetooth technologies, including their standards, MAC and PHY layers, and user scenarios.

Uploaded by

shubham jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

mobilecomputingmidsem

The document covers the Mobile Physical Layer and Mobile Computing Architecture, detailing GSM technology, air-interface, channel structures, and the hierarchical organization of cellular networks. It also discusses mobile computing architecture, addressing issues like bandwidth, power consumption, and security, along with design considerations for optimizing mobile applications. Additionally, it provides insights into Wireless LAN and Bluetooth technologies, including their standards, MAC and PHY layers, and user scenarios.

Uploaded by

shubham jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Unit-I: Mobile Physical Layer and Mobile Computing Architecture

Mobile Physical Layer (Remember: "GAP-CH")


GSM, air-interface, channel structure, location management: HLR-VLR, hierarchical,
handoffs:

GSM (G):
Global System for Mobile Communications (GSM) is a second-generation (2G) cellular standard
widely adopted for voice, data, and Short Message Service (SMS). It uses Time Division
Multiple Access (TDMA) to divide each frequency band into time slots, allowing multiple users to
share the same frequency, and Frequency Division Duplexing (FDD) to separate uplink and
downlink communications. Operates in frequency bands like 900 MHz and 1800 MHz,
supporting data rates up to 9.6 kbps for circuit-switched data. Key features include encryption
(A5/1, A5/2 algorithms) for security, roaming capabilities across networks, and efficient resource
allocation for voice and SMS, making it a foundational mobile technology.
Mnemonic: "GSM = Global Speak & Message."

Air-Interface (A):
The air-interface is the radio communication link between the mobile station (MS, e.g., a
cellphone) and the base transceiver station (BTS). It operates over the physical layer, handling
signal transmission, reception, and modulation/demodulation to ensure reliable wireless
connectivity. GSM uses Gaussian Minimum Shift Keying (GMSK) modulation, a form of
frequency shift keying that minimizes power consumption and reduces interference, ideal for
mobile environments with varying signal conditions.
Mnemonic: "Air = Always Interconnect Radio."

Physical Channels (P):


GSM’s channel structure divides the frequency spectrum into 200 kHz-wide channels, each
managed by TDMA to support multiple users.
Traffic Channels (TCH): Dedicated channels carrying user data, such as voice (encoded at 13
kbps using Regular Pulse Excitation–Long Term Prediction, RPE-LTP) or low-speed
circuit-switched data (up to 9.6 kbps). TCHs ensure efficient resource use for real-time
communication.
Control Channels (CCH):
Manage signaling and control functions critical for network operation, including:
Broadcast Control Channel (BCCH): Broadcasts system information (e.g., frequency, cell
identity, power levels) to all mobiles in a cell, enabling synchronization and network access.
Common Control Channel (CCCH): Handles paging (alerting mobiles of incoming calls), access
requests (via Random Access Channel, RACH), and other common signaling tasks, ensuring
efficient network coordination.
Dedicated Control Channel (DCCH): Manages device-specific signaling, such as handover
commands, authentication, and location updates, tailored to individual mobile devices.
Mnemonic: "TCC = Talk, Control, Command."

Channel Hierarchy & Location (CH):


HLR-VLR:
Home Location Register (HLR): A central database in the network storing permanent subscriber
data, including the International Mobile Subscriber Identity (IMSI), Mobile Station International
Subscriber Directory Number (MSISDN or phone number), service profile (e.g., call forwarding,
SMS settings), and current location area. It tracks the mobile device’s home network and
roaming status, critical for call routing and service provisioning.
Visitor Location Register (VLR): A temporary database associated with the Mobile Switching
Center (MSC) in a visited network, storing data for roaming users, such as temporary location,
authentication details, and service restrictions. It updates dynamically as users move, reducing
latency in call setups and handoffs by coordinating with the HLR.

Hierarchical Structure:
Cellular networks are organized into layers of cells—macrocells (large coverage areas, typically
rural or suburban), microcells (smaller, urban areas with higher density), and picocells (indoor or
small areas, e.g., offices, malls)—to optimize coverage, capacity, and handoff efficiency. This
hierarchy ensures seamless connectivity across diverse environments.

Handoffs:
The process of transferring an ongoing call or data session from one cell to another as a mobile
device moves, ensuring uninterrupted connectivity. In GSM:
Hard Handoffs: Break-before-make, where the connection to the old cell is dropped before
connecting to the new cell, potentially causing brief interruptions but common in GSM for
simplicity.
Soft Handoffs: Make-before-break, used in CDMA systems (noted for comparison), maintaining
connections with multiple cells simultaneously to reduce dropped calls, though GSM primarily
uses hard handoffs.
Managed by the MSC and base station controllers (BSCs), handoffs use signal strength
measurements (from the MS) and location data from HLR/VLR, ensuring smooth transitions in
hierarchical cell structures.
Mnemonic: "HLV = Home Lives Visibly (roaming)."

Mobile Computing Architecture (Remember: "CMD-Issues")


Issues in mobile computing, three-tier architecture for mobile computing, design
considerations:

Three-Tier Structure (C):


Client Tier: Comprises mobile devices such as smartphones, tablets, and personal digital
assistants (PDAs), responsible for user interfaces, limited local processing (e.g., UI rendering,
basic computations), and wireless connectivity (e.g., GSM, Wi-Fi, Bluetooth). These devices
operate on operating systems like Android, Symbian, or Windows CE, managing resource
constraints like memory and battery.
Middle Tier: Consists of application servers or middleware that manage business logic, security
protocols, and data processing. It acts as an intermediary between the client and data tiers,
handling tasks such as authentication (e.g., user login), session management (maintaining state
across disconnections), and data transformation (converting data for mobile formats), often
using web services or APIs.
Data Tier: Includes databases and backend servers storing and managing data, ensuring
scalability, reliability, and synchronization for mobile applications. It supports operations like SQL
queries, updates, and caching, critical for maintaining data consistency across mobile and fixed
networks.
Mnemonic: "CMD = Client-Middle-Data Layers."

Issues in Mobile Computing (Issues):


Limited Bandwidth:
Wireless networks typically offer lower capacity (e.g., GSM’s 9.6 kbps data rate) compared to
wired networks (e.g., Ethernet’s 100 Mbps+), leading to latency, congestion, and slower data
transfers. Requires optimization techniques like data compression, caching, and lightweight
protocols.
High Latency: Delays in data transmission due to signal propagation over wireless links,
frequent handoffs, and network switching, impacting real-time applications like voice calls or
video streaming. Mitigated by minimizing packet overhead and using efficient routing.
Power Consumption: Mobile devices rely on batteries with limited capacity, necessitating
energy-efficient designs. Challenges include high power use in wireless communication,
processing, and display, addressed by sleep modes, adaptive radio management, and
low-power hardware.
Security Risks: Wireless links are susceptible to eavesdropping, man-in-the-middle attacks,
and unauthorized access, requiring robust security measures. Solutions include encryption
(e.g., SSL/TLS, AES), secure authentication (e.g., OAuth, SIM-based), and secure protocols
(e.g., HTTPS, WAP security).
Mobility Management: Handling device movement across cells, ensuring seamless handoffs,
roaming, and location updates to maintain connectivity. Challenges include frequent
disconnections, location tracking accuracy, and session persistence, addressed by protocols like
Mobile IP and location registers (HLR/VLR).
Mnemonic: "B-P-S-S-M = Bandwidth-Power-Security-Scalability-Mobility."

Design Considerations:
Bandwidth Optimization:
Use data compression (e.g., gzip), caching (storing frequently accessed data locally), and
lightweight protocols (e.g., WAP, HTTP/2) to minimize data usage and latency over wireless
networks.
Power Efficiency: Implement low-power modes (e.g., device sleep states), efficient algorithms
(e.g., minimizing CPU usage), and hardware optimizations (e.g., power-efficient radios, OLED
displays) to extend battery life.
Security: Employ strong encryption (e.g., AES-256 for data, A5/1 for GSM), secure
authentication mechanisms (e.g., SIM-based or OAuth), and secure communication protocols
(e.g., HTTPS, WAP security) to protect data over wireless links.
Scalability: Design architectures to handle increasing numbers of mobile users and data
volumes, using load balancing (e.g., across servers), distributed databases, and cloud-based
solutions to ensure performance under growth.
Mobility Support: Ensure seamless handoffs, location tracking, and session persistence using
Mobile IP, HLR/VLR, and hierarchical cell structures, minimizing disruptions as devices roam
across networks.
Mnemonic: "B-P-S-S-M = Big Power Saves Scalability Mobility."

Unit-II: Mobile Data Link Layer – Wireless LAN, Bluetooth


Wireless LAN (Remember: "WiFi-MAC-PHY-C")
IEEE 802.11, collision avoidance, polling, inhibit sense, spread spectrum, CDMA, LAN
system architecture:

IEEE 802.11 (WiFi)


IEEE 802.11, commonly known as Wi-Fi, is a standard for Wireless Local Area Networks
(WLANs), enabling high-speed wireless connectivity. It operates in the 2.4 GHz or 5 GHz
frequency bands, using Direct Sequence Spread Spectrum (DSSS), Orthogonal Frequency
Division Multiplexing (OFDM), or Frequency Hopping Spread Spectrum (FHSS) to mitigate
interference, enhance reliability, and support multiple users. Supports data rates ranging from 1
Mbps (802.11b) to over 1 Gbps (802.11ac/ax), depending on the version, widely used in homes,
offices, and public hotspots for devices like laptops, smartphones, and IoT devices.
Mnemonic: "WiFi = Wide Fast Internet."

MAC Layer (MAC):


The Medium Access Control (MAC) layer manages access to the shared wireless medium,
using Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) instead of Collision
Detection (CSMA/CD) used in wired Ethernet, due to the inability to detect collisions after
transmission in wireless environments.
CSMA/CA Mechanism: Devices listen to the medium before transmitting (carrier sensing). If the
medium is busy, they wait a random backoff time (Distributed Coordination Function, DCF) to
avoid collisions. Uses Request to Send (RTS) and Clear to Send (CTS) frames to reserve the
medium, preventing hidden node problems and collisions. Point Coordination Function (PCF)
allows polling for prioritized access in controlled environments (e.g., enterprise networks),
ensuring low-latency communication for time-sensitive traffic.
Collision Avoidance: Employs inhibit sense (preventing simultaneous transmissions by
sensing the medium), adaptive backoff algorithms (randomized delays to reduce contention),
and spread spectrum techniques to minimize interference and collisions, critical for shared
wireless environments.
Supports additional features like power-saving modes (devices enter sleep states to conserve
battery), fragmentation (breaking large packets into smaller ones to reduce errors), and Quality
of Service (QoS) mechanisms (via 802.11e) for multimedia traffic (e.g., voice, video).
Mnemonic: "MAC = Manage Access Carefully."

Physical Layer (PHY):


Uses various modulation schemes to achieve different data rates, including Binary Phase Shift
Keying (BPSK), Quadrature Phase Shift Keying (QPSK), and Quadrature Amplitude Modulation
(QAM), depending on signal quality and version (e.g., 802.11a/b/g/n/ac).
Spread spectrum techniques, such as DSSS (spreading data over a wider band using a
chipping code) and OFDM (dividing data across multiple subcarriers), reduce interference,
improve reliability, and enable multiple users to share the same frequency band efficiently in
noisy environments.
Supports multiple channels (e.g., 14 overlapping channels in the 2.4 GHz band,
non-overlapping in 5 GHz) to avoid interference, and advanced features like Multiple Input
Multiple Output (MIMO) in 802.11n/ac for higher throughput and reliability by using multiple
antennas.
Mnemonic: "PHY = Physical High Yield."

CDMA & LAN System Architecture (C):

Code Division Multiple Access (CDMA): A spread spectrum technique where multiple users
share the same frequency band simultaneously, each using a unique code to distinguish their
signals. In WLAN, CDMA can be integrated to enhance multiple access, reducing interference
and improving capacity, though less common than TDMA or OFDM in 802.11 standards.
LAN System Architecture: Comprises access points (APs) as central hubs connecting wireless
stations (e.g., laptops, smartphones) to a wired network via a distribution system (e.g., Ethernet
backbone). Supports two modes:
Infrastructure Mode: Devices connect through APs, forming a structured network for broad
coverage.
Ad Hoc Mode: Peer-to-peer communication between stations without APs, suitable for
temporary, decentralized networks.
Mnemonic: "CDMA = Code Divides Many Access."
Bluetooth (Remember: "Blue-PM-L")

IEEE 802.15.1, user scenarios, physical, MAC layer and link management:

IEEE 802.15.1 (Blue):


Bluetooth, based on IEEE 802.15.1, is a short-range (up to 10 meters), low-power wireless
technology operating in the 2.4 GHz Industrial, Scientific, and Medical (ISM) band. It uses
Frequency Hopping Spread Spectrum (FHSS) with 1600 hops per second across 79 channels
(1 MHz each) to minimize interference from other devices like Wi-Fi or microwave ovens.
Supports data rates up to 3 Mbps (Bluetooth 4.0 and later), designed for personal-area
networking (PAN) with low power consumption, ideal for battery-operated devices like headsets,
wearables, and IoT devices.
Mnemonic: "Blue = Brief Link, Ultra Efficient."

Physical & MAC Layers (PM):


Physical Layer: Operates in the unlicensed 2.4 GHz band, using Gaussian Frequency Shift
Keying (GFSK) modulation for efficient, low-power transmission. Supports three power classes
for different ranges:
Class 1: 100 mW, up to 100 meters (rare, high power).
Class 2: 2.5 mW, up to 10 meters (most common, balanced range/power).
Class 3: 1 mW, up to 1 meter (very low power, short range).
Low power consumption is achieved through sleep modes, adaptive frequency hopping
(avoiding interference), and efficient modulation, making it suitable for portable devices.

MAC Layer: Employs a master-slave architecture where one device (master) controls up to
seven active slave devices in a piconet, and multiple piconets can interconnect to form a
scatternet for broader connectivity.
Manages:
Device pairing (via PIN or secure simple pairing for security).
Packet framing, using Synchronous Connection-Oriented (SCO) links for time-sensitive voice
data (e.g., 64 kbps for headsets) and Asynchronous Connectionless (ACL) links for data (e.g.,
file transfers, up to 3 Mbps).
Link management, including connection establishment, maintenance (e.g., frequency hopping
synchronization), and termination, ensuring reliable short-range communication.
Uses time-division duplexing (TDD) for bidirectional communication, allocating time slots to
master and slaves for efficient channel access and low latency.
Mnemonic: "PM = Power-Master Magic."

Link Management & User Scenarios (L):


Link Management: Handles the establishment, maintenance, and termination of connections in
piconets and scatternets. Includes device pairing (ensuring secure, unique connections), packet
framing (structuring data for SCO/ACL), and maintaining link stability through frequency hopping
and error correction, critical for reliable short-range communication in noisy environments.

User Scenarios:
File Sharing: Transferring files (e.g., photos, documents) between devices like smartphones
and laptops, leveraging ACL links for data efficiency.
Wireless Headsets: Connecting headsets to mobile phones or computers for audio streaming
(e.g., calls, music), using SCO links for low-latency, real-time voice.
IoT Applications: Connecting smartwatches, fitness trackers, and smart home devices (e.g.,
sensors, hubs) for data exchange, benefiting from low power and ease of pairing.
These scenarios highlight Bluetooth’s strengths: low power consumption, short-range
convenience, and interoperability, though limited by range (10m) and data rate (3 Mbps)
compared to Wi-Fi.
Mnemonic: "Link = Link & Use Simply."

Local Area Wireless Systems (Remember: "WILR")

WAP, IrDA, ZigBee, RFID, WiMAX:


WAP (W):
Wireless Application Protocol enables mobile internet access on devices with limited bandwidth
and processing power, such as early mobile phones. Uses Wireless Markup Language (WML),
a lightweight, text-based markup language optimized for wireless networks (e.g., GSM, CDMA),
supporting microbrowsers for simple web browsing and WAP push for notifications, critical for
pre-smartphone mobile data.
Mnemonic: "WAP = Web Access Portable."

IrDA (I):
Infrared Data Association uses infrared light for short-range (1-2 meters), line-of-sight wireless
communication between devices, such as personal digital assistants (PDAs), printers, and
laptops. Operates at speeds up to 16 Mbps, with low power consumption, but requires direct
alignment and no interference (e.g., obstacles or sunlight), limiting its use compared to
radio-frequency technologies like Bluetooth or Wi-Fi.
Mnemonic: "IrDA = Infrared Direct Access."

ZigBee (L):
Based on IEEE 802.15.4, ZigBee is a low-power, low-data-rate wireless protocol designed for
Internet of Things (IoT) and sensor network applications, such as home automation (e.g.,
lighting, temperature control) and health monitoring. Operates in the 2.4 GHz, 915 MHz, or 868
MHz bands, with data rates up to 250 kbps, long battery life (months to years), and mesh
networking for extended range and reliability, ideal for resource-constrained devices.
Mnemonic: "ZigBee = Zippy, Intelligent, Green."

RFID (R): Radio Frequency Identification uses radio waves to identify and track objects via tags
(passive, powered by reader signals, or active, with batteries) attached to items, read by RFID
readers. Applications include inventory management (e.g., retail, warehouses), logistics
(tracking shipments), and access control (e.g., key cards), with ranges from centimeters
(near-field, passive tags) to meters (far-field, active tags), depending on tag type and frequency
(e.g., 13.56 MHz, 900 MHz).
Mnemonic: "RFID = Radio Finds Items."

WiMAX (R):
Worldwide Interoperability for Microwave Access, based on IEEE 802.16, is a long-range
broadband wireless technology for metropolitan area networks (MANs). Operates in licensed or
unlicensed bands (e.g., 2.5 GHz, 3.5 GHz), supporting data rates up to 70 Mbps over several
kilometers, providing high-speed internet access to complement Wi-Fi in urban and rural areas,
with fixed and mobile versions for stationary or roaming users.
Mnemonic: "WiMAX = Wide Metro Access."
Memory-Friendly Strategies (Strictly Syllabus-Focused)
Mnemonics: Use acronyms like "GAP-CH" (GSM, Air, Physical, Channel, Hierarchy) and
"WiFi-MAC-PHY-C" (Wi-Fi, MAC, Physical, CDMA) to structure and recall key points
quickly.

Bullet Points: Short, detailed points with keywords and examples (e.g., “CSMA/CA = listen
before talk, RTS/CTS, DCF backoff”) for rapid review and depth.
Chunking: Group related concepts (e.g., HLR-VLR under location management, CSMA/CA
under WLAN MAC) for easier memorization and understanding.
Repetition: Repeat key terms (e.g., TDMA, FHSS, piconets) aloud or write them to reinforce
memory and retention.
Visual Cues: Imagine GSM towers for physical layer, Wi-Fi signals for WLAN, Bluetooth icons
for devices—link concepts to mental visuals for better recall.

You might also like