0% found this document useful (0 votes)
15 views19 pages

MCWN Lecture notes

The document outlines the course on Mobile Computing and Wireless Networks, covering the history, differences, benefits, and applications of wireless networks. It details mobile communication systems including GSM, GPS, GPRS, EDGE, and the evolution from 2G to 5G technologies. Additionally, it discusses network communication models like TCP/IP and OSI, as well as medium access control methods such as FDMA and TDMA.

Uploaded by

ashish1707shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views19 pages

MCWN Lecture notes

The document outlines the course on Mobile Computing and Wireless Networks, covering the history, differences, benefits, and applications of wireless networks. It details mobile communication systems including GSM, GPS, GPRS, EDGE, and the evolution from 2G to 5G technologies. Additionally, it discusses network communication models like TCP/IP and OSI, as well as medium access control methods such as FDMA and TDMA.

Uploaded by

ashish1707shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Course Code: 1010043461

Course Name: Mobile Computing


and Wireless Networks
SEMESTER: 7

UNIT 1
Introduction to Mobile computing and Wireless Networking

1. History of Wireless Networks and Mobile Computing

 Early Developments:
o Late 19th Century: Invention of wireless telegraphy by Guglielmo Marconi,
enabling communication over radio waves without wires.
o 20th Century: Advancements in radio technology leading to the development
of wireless communication.
 Mobile Computing Evolution:
o 1980s: Introduction of early laptops and portable computers, marking the
beginning of mobile computing.
o 1990s: Emergence of digital cellular networks and wireless data technologies
(e.g., GSM, CDMA, early versions of Wi-Fi).
o 2000s: Rapid adoption of smartphones, integrating mobile computing
capabilities with wireless internet access (3G, 4G technologies).
o 2010s: Expansion of mobile computing with the rise of 4G LTE, enabling faster
data speeds and widespread adoption of mobile apps and services.
o 2020s: Continuation of 5G deployment, promising even faster speeds, lower
latency, and expanded capabilities for mobile computing and IoT.

2. Difference between Wireless and Fixed Networks

 Nature of Connectivity:
o Wireless Networks: Transmit data over the air using radio waves, providing
mobility and flexibility but susceptible to signal interference and coverage
limitations.
o Fixed Networks: Utilize physical cables (fiber optics, copper wires) to transmit
data, offering more stable and often faster connections but less flexible in terms
of mobility.
 Deployment and Infrastructure:
o Wireless Networks: Easier and quicker to deploy, suitable for areas where
laying cables is impractical or costly (e.g., remote locations, temporary setups).
o Fixed Networks: Require extensive physical infrastructure (cables, routers,
switches), making initial deployment more expensive but providing robust and
reliable connections.
 Speed and Reliability:
o Wireless Networks: Speed and reliability can vary based on factors like signal
strength, interference, and distance from the access point.
o Fixed Networks: Generally offer higher and more consistent speeds with lower
latency, ideal for applications requiring real-time data transmission (e.g., video
conferencing, online gaming).

Page | 1
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

3. Benefits of Wireless Networks

 Mobility and Flexibility:


o Enable users to access the internet and data services from anywhere within the
coverage area, supporting mobile devices and IoT applications.
 Scalability and Ease of Deployment:
o Simplify network expansion and scaling without the need for extensive physical
infrastructure, accommodating increasing numbers of users and devices.
 Cost-Effectiveness:
o Reduce costs associated with infrastructure installation and maintenance,
especially in dynamic or remote environments where wired connections are
impractical.
 Enhanced Connectivity:
o Facilitate seamless connectivity across various devices (e.g., smartphones,
tablets, wearables) and support emerging technologies like smart homes and
connected vehicles.

4. Applications of Wireless Networking and Mobile Computing

 Consumer Electronics:
o Enable mobile devices such as smartphones, tablets, and wearable tech to access
data and services on-the-go.
 Business and Enterprise Solutions:
o Support mobile workforce with remote access to corporate networks, enhancing
productivity and flexibility.
 Healthcare:
o Facilitate telemedicine services, remote patient monitoring, and healthcare IoT
devices for improved patient care and efficiency.
 Transportation and Logistics:
o Track vehicles and shipments in real-time, optimize routes, and manage fleet
operations using wireless networks.
 Education:
o Provide mobile learning opportunities, virtual classrooms, and educational apps
accessible via wireless devices.
 Entertainment and Media:
o Enable streaming services, online gaming, and social media interactions on
mobile devices connected through wireless networks.

Page | 2
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

UNIT 2
Mobile communication system

1. GSM (Global System for Mobile Communications)

 Architecture:
o Components: GSM network consists of Mobile Stations (MS), Base
Transceiver Stations (BTS), Base Station Controllers (BSC), Mobile Switching
Center (MSC), and Home Location Register (HLR).
o Frequency Bands: Operates in various frequency bands allocated globally
(e.g., 850 MHz, 900 MHz, 1800 MHz, 1900 MHz).
o Multiple Access: Uses Time Division Multiple Access (TDMA) for dividing a
radio channel into time slots, allowing multiple users to share the same
frequency channel.
 Applications:
o Voice Communication: Provides basic voice services over digital cellular
networks.
o Short Message Service (SMS): Enables text messaging between GSM users.
o Roaming: Supports seamless international roaming through interoperability
agreements between network operators.

2. GPS (Global Positioning System)

 Architecture:
o Satellite Constellation: GPS consists of a constellation of 24 satellites orbiting
Earth.
o Ground Control Segment: Monitors and manages the satellites.
o User Segment: Receives signals from satellites via GPS receivers to determine
precise location, velocity, and time.
 Applications:
o Navigation: Provides accurate positioning information for navigation in various
applications (e.g., automotive navigation systems, smartphones).
o Timing: Synchronizes timekeeping in telecommunications networks, financial
transactions, and scientific research.
o Tracking: Enables tracking of vehicles, assets, and individuals for security and
logistics purposes.

3. GPRS (General Packet Radio Service)

 Architecture:
o Enhancement to GSM: Adds packet-switched data transmission capability to
GSM networks.
o Packet Core Network: Includes Serving GPRS Support Node (SGSN) and
Gateway GPRS Support Node (GGSN).

Page | 3
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

o Radio Access Network: Utilizes existing GSM infrastructure with added


support for packet data services.
 Applications:
o Internet Access: Provides mobile internet access with higher data transfer rates
compared to GSM.
o Email and Messaging: Supports email synchronization, instant messaging, and
multimedia messaging (MMS).
o Remote Monitoring: Enables remote monitoring and control of devices and
systems (e.g., IoT applications).

4. EDGE (Enhanced Data rates for GSM Evolution)

 Architecture:
o Enhancement to GSM: Upgrades GSM networks to achieve higher data
transmission rates.
o Modulation Technique: Utilizes Enhanced GPRS (EGPRS) modulation
schemes (e.g., 8-PSK) for increased efficiency.
o Backward Compatibility: Coexists with existing GSM networks, providing
seamless transition for users.
 Applications:
o Faster Internet Access: Offers faster data speeds than GPRS, suitable for
browsing, downloading, and multimedia streaming.
o Business Applications: Supports enterprise applications such as VPN access,
remote data access, and online collaboration.
o Multimedia Services: Enables richer multimedia content delivery, including
video streaming and online gaming.

5. 2G (Second Generation)

 Architecture:
o Digital Technology: Replaces analog cellular networks with digital
transmission (e.g., GSM).
o Voice and Data: Supports digital voice calls and basic data services (e.g.,
SMS).
o Frequency Bands: Operates in various frequency bands, typically in the 800
MHz and 1900 MHz ranges.
 Applications:
o Voice Communication: Provides digital voice calls with improved sound
quality and security compared to analog systems.
o SMS Messaging: Introduces SMS as a popular form of text communication.
o Basic Data Services: Enables basic internet access and data transmission
capabilities.

Page | 4
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

6. 3G (Third Generation)

 Architecture:
o High-Speed Data: Introduces high-speed data transmission for mobile
networks.
o WCDMA and CDMA2000: Two main technologies (Wideband Code Division
Multiple Access and Code Division Multiple Access 2000) used for 3G
networks.
o Increased Capacity: Supports higher data rates, multimedia services, and
enhanced mobile broadband.
 Applications:
o Mobile Internet: Enables faster internet access, web browsing, and email
services.
o Video Calling: Introduces video calling and conferencing capabilities over
mobile networks.
o Streaming: Facilitates streaming of audio and video content, including mobile
TV services.

7. 4G (Fourth Generation)

 Architecture:
o LTE (Long Term Evolution): Dominant technology for 4G networks, offering
significant improvements over 3G.
o IP-Based Network: Fully IP-based architecture for seamless integration with
the internet and other IP-based services.
o Advanced Antenna Technologies: MIMO (Multiple Input Multiple Output)
and OFDM (Orthogonal Frequency Division Multiplexing) for improved
efficiency and performance.
 Applications:
o High-Speed Data: Provides ultra-fast mobile broadband speeds suitable for HD
video streaming, online gaming, and cloud services.
o VoIP (Voice over IP): Supports high-quality voice calls over IP networks,
replacing traditional circuit-switched voice services.
o Internet of Things (IoT): Facilitates connectivity for a wide range of IoT
devices and applications.

8. 5G (Fifth Generation)

 Architecture:
o Next-Gen Network: Designed to support massive connectivity, ultra-low
latency, and high data rates.
o New Radio (NR): Key technology for 5G, utilizing higher frequency bands
(mmWave) and advanced antenna technologies.
o Network Slicing: Allows the creation of multiple virtual networks to cater to
diverse applications and services.

Page | 5
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

 Applications:
o Enhanced Mobile Broadband (eMBB): Provides even faster speeds and
higher capacity for data-intensive applications.
o Ultra-Reliable Low Latency Communication (URLLC): Supports mission-
critical applications requiring real-time responsiveness (e.g., autonomous
vehicles, industrial automation).
o Massive Machine Type Communication (mMTC): Enables connectivity for a
vast number of IoT devices and sensors, paving the way for smart cities and
infrastructure.

Page | 6
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

UNIT 3
The reference model for network communication

1. TCP/IP Model

 Layers of TCP/IP Model:


1. Application Layer: Provides high-level services for applications (e.g., HTTP,
FTP, DNS).
2. Transport Layer: Ensures end-to-end communication between hosts (e.g.,
TCP, UDP).
3. Internet Layer: Facilitates packet forwarding and routing (e.g., IP).
4. Link Layer: Handles data link protocols within the local network (e.g.,
Ethernet, Wi-Fi).
 Key Features:
o Connectionless Communication: IP provides connectionless communication,
where each packet is treated independently.
o Best Effort Delivery: TCP provides reliable, connection-oriented data delivery,
while UDP offers unreliable, connectionless data transmission.
o Scalability: Designed to support a wide range of network sizes and
configurations.

2. OSI Model

 Layers of OSI Model:


1. Physical Layer: Deals with physical connections and transmission of raw data
bits over a physical medium (e.g., cables, fibers).
2. Data Link Layer: Manages data frames between adjacent network nodes (e.g.,
Ethernet, PPP).
3. Network Layer: Handles routing and forwarding of data packets (e.g., IP,
ICMP).
4. Transport Layer: Provides end-to-end communication services (e.g., TCP,
UDP).
5. Session Layer: Establishes, manages, and terminates sessions between
applications (e.g., NetBIOS, RPC).
6. Presentation Layer: Translates, encrypts, or compresses data for presentation
to the application layer (e.g., SSL/TLS).
7. Application Layer: Provides network services directly to end-user applications
(e.g., HTTP, FTP, DNS).
 Function of Each Layer:
o Each layer provides specific services and interacts with adjacent layers for data
exchange and communication across networks.

Page | 7
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

3. Comparison of OSI and TCP/IP Model

 OSI Model:
o Advantages: Provides a clear separation of functions, making it easier to
understand and troubleshoot networks.
o Disadvantages: Complex and not directly implemented in practical network
architectures.
 TCP/IP Model:
o Advantages: Widely used and directly implemented in internet protocols and
applications.
o Disadvantages: Less structured compared to OSI, lacks clear separation of
services.
 Key Differences:
o OSI has 7 layers, while TCP/IP has 4 layers.
o OSI is a conceptual model, whereas TCP/IP is a practical implementation used
in the internet.

4. IP Protocols and Network Applications

 IP Protocols:
o IPv4: Uses 32-bit addresses (e.g., 192.168.1.1) and is widely deployed but
facing address exhaustion issues.
o IPv6: Introduces 128-bit addresses (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334) to solve IPv4 address depletion
and offer scalability.
 Network Applications:
o DNS (Domain Name System): Translates domain names (e.g.,
www.example.com) into IP addresses.
o Email (SMTP, POP3, IMAP): SMTP (Simple Mail Transfer Protocol) sends
emails, while POP3 (Post Office Protocol version 3) and IMAP (Internet
Message Access Protocol) retrieve emails from servers.
o FTP (File Transfer Protocol): Transfers files between hosts on a TCP/IP
network.
o HTTP (Hypertext Transfer Protocol): Used for accessing and retrieving
resources on the World Wide Web.

5. IPv4 and IPv6 Architecture, Addressing Scheme, Subnetting and Masking

 IPv4:
o Architecture: Uses 32-bit addresses divided into network and host portions.
o Addressing Scheme: Written in dot-decimal notation (e.g., 192.168.1.1).
o Subnetting and Masking: Divides a large network into smaller subnetworks
(subnets) using subnet masks (e.g., 255.255.255.0).
 IPv6:

Page | 8
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

o Architecture: Uses 128-bit addresses represented in hexadecimal format (e.g.,


2001:0db8:85a3:0000:0000:8a2e:0370:7334).
o Addressing Scheme: Simplifies address allocation and supports a larger
number of devices and addresses.
o Subnetting and Masking: Similar subnetting concepts as IPv4 but with
different notation and capabilities.

Page | 9
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

UNIT 4
Medium Access Control

1. FDMA (Frequency Division Multiple Access)

 Concept:
o Divides the frequency spectrum into multiple channels.
o Each user or communication stream is assigned a unique frequency channel.
o Used in analog systems like AM and FM radio, and also in early digital cellular
systems.
 Key Points:
o Bandwidth Allocation: Each user/channel has exclusive use of a specific
frequency band.
o Efficiency: Suitable for environments where users require continuous access to
the allocated frequency band.
o Implementation: Found in systems like traditional analog voice
communication and some early digital cellular networks.

2. TDMA (Time Division Multiple Access)

 Concept:
o Divides a radio frequency into time slots.
o Different users share the same frequency but transmit in different time slots.
o Each user gets a unique time slot within a predefined time frame.
 Key Points:
o Time Slot Allocation: Users share the same frequency band by taking turns
transmitting in their designated time slots.
o Efficiency: Enhances spectrum efficiency by allowing multiple users to use the
same frequency channel.
o Implementation: Commonly used in 2G GSM cellular networks for voice and
data transmission.

3. CDMA (Code Division Multiple Access)

 Concept:
o Allows multiple users to transmit simultaneously over the same frequency band.
o Each user is assigned a unique code (spreading code) to encode their signal.
o Signals are decoded at the receiver using the same spreading code.
 Key Points:
o Code Assignment: Users share the same frequency spectrum but with different
codes.
o Interference Management: CDMA systems can handle interference better than
FDMA or TDMA systems.

Page | 10
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

o Implementation: Widely used in 3G and 4G cellular networks (e.g.,


CDMA2000, WCDMA) for both voice and data transmission.

4. CSMA (Carrier Sense Multiple Access)

 Concept:
o A protocol used in shared media networks (like Ethernet).
o Before transmitting, nodes check if the medium is idle (carrier sense).
o If idle, they can transmit; if not, they wait for a random period before retrying.
 Key Points:
o Collision Avoidance: Helps to avoid collisions in shared media environments.
o Efficiency: Ensures fair access to the network among multiple users.
o Implementation: Found in Ethernet LANs (e.g., Ethernet networks using
CSMA/CD).

5. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

 Concept:
o Used in wireless networks (like Wi-Fi).
o Before transmitting, nodes sense the channel to check if it's idle.
o Unlike CSMA/CD, there's no collision detection; instead, nodes wait for an
ACK (Acknowledgment) from the receiver after transmission.
 Key Points:
o Collision Avoidance: Helps to avoid collisions in wireless environments where
collision detection is impractical.
o Acknowledgment: Uses ACKs to confirm successful transmissions.
o Implementation: Standard for Wi-Fi (IEEE 802.11) networks.

6. CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

 Concept:
o Used in Ethernet LANs (like older versions of Ethernet).
o Before transmitting, nodes sense the channel to check if it's idle.
o If two nodes transmit simultaneously and detect a collision, they stop
transmission, wait for a random backoff period, and then retry.
 Key Points:
o Collision Detection: Nodes can detect collisions and take appropriate actions to
retry transmissions.
o Efficiency: Ensures fair access to the network by managing collisions
effectively.
o Implementation: Historically used in Ethernet LANs, though modern Ethernet
typically uses full-duplex operation without CSMA/CD.

Page | 11
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

UNIT 5
Mobile Transport and Application Layer

1. Mobile TCP (Transmission Control Protocol)

 Purpose:
o Adaptation of TCP for mobile networks to handle issues like high latency,
packet loss, and intermittent connectivity.
 Key Features:
o Optimized Retransmission: Adjusts retransmission timers to accommodate
varying network conditions.
o Header Compression: Reduces overhead to improve efficiency over
bandwidth-constrained mobile networks.
 Applications:
o Used in mobile devices and networks to ensure reliable data transmission,
particularly in environments with fluctuating network conditions.

2. WAP (Wireless Application Protocol) Architecture

 Purpose:
o Enables access to internet-based services and applications on mobile devices.
 Components:
o WAP Gateway: Translates WAP content to standard internet protocols (HTTP,
HTTPS).
o WAP Stack: Includes layers such as WDP, WTLS, WTP, and WSP for
communication between mobile devices and servers.
 Protocols in WAP Stack:
o WDP (Wireless Datagram Protocol): Transports data between mobile devices
and WAP gateway.
o WTLS (Wireless Transport Layer Security): Provides security for data
transmitted over wireless networks.
o WTP (Wireless Transaction Protocol): Manages transactions and ensures
reliable data transfer.
o WSP (Wireless Session Protocol): Supports session management and content
negotiation.

3. WAE (Wireless Application Environment)

 Purpose:
o Defines the environment in which WAP applications operate.
 Components:
o Browser: Executes WAP applications and interprets content received from
servers.

Page | 12
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

o Microbrowser: Optimized browser for mobile devices with limited processing


power and display capabilities.
o APIs: Provide access to device-specific features like SMS, phone book, and
location services.
 Applications:
o Supports a wide range of mobile applications such as mobile banking, email,
and information retrieval.

4. WTA (Wireless Telephony Application) Architecture

 Purpose:
o Provides enhanced telephony features and services on mobile devices.
 Components:
o WTA Browser: Executes WTA applications for enhanced telephony services.
o Telephony API: Allows access to telephony functions such as call management
and messaging.
o Service Management: Coordinates between applications and telephony
services.
 Applications:
o Enables features like call waiting, call forwarding, and enhanced caller ID on
mobile devices.

5. WMA (Wireless Messaging API)

 Purpose:
o Facilitates messaging services on mobile devices.
 Components:
o API Functions: Provide interfaces for sending and receiving messages.
o Integration: Works with SMS, MMS, and email services.
o Notification: Supports message notifications and handling.
 Applications:
o Used for implementing messaging applications, notifications, and alerts on
mobile devices.

Page | 13
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

UNIT 6
Recent trends

1. Bluetooth

 Purpose:
o Wireless technology for short-range communication between devices (typically
up to 10 meters).
 Key Features:
o Frequency Band: Operates in the 2.4 GHz ISM band.
o Ad Hoc Networking: Supports spontaneous connections between devices
without requiring a centralized infrastructure.
o Profiles: Defines specific functionalities for different types of applications (e.g.,
HFP for hands-free calling, A2DP for stereo audio streaming).
 Security Issues:
o Pairing Security: Vulnerabilities during pairing process if not properly
authenticated.
o Encryption: Weak encryption in older Bluetooth versions (Bluetooth 4.2 and
earlier).
o BlueBorne Vulnerability: Potential for remote code execution due to
Bluetooth implementation flaws.

2. Wi-Fi (Wireless Fidelity)

 Purpose:
o Provides wireless internet access over a local area network (LAN) using radio
waves.
 Key Features:
o Frequency Bands: Operates in 2.4 GHz and 5 GHz bands.
o Standards: IEEE 802.11 standards (e.g., 802.11b/g/n/ac/ax).
o Modes: Infrastructure mode (connecting to a wireless access point) and ad hoc
mode (peer-to-peer connections).
 Security Issues:
o WEP (Wired Equivalent Privacy): Weak encryption susceptible to key
cracking.
o WPA/WPA2 (Wi-Fi Protected Access): Vulnerabilities like KRACK (Key
Reinstallation Attack).
o SSID Broadcasting: Potential for network discovery and unauthorized access.

3. WiMAX (Worldwide Interoperability for Microwave Access)

 Purpose:
o Provides wireless broadband access over longer distances (up to 50 km).
 Key Features:

Page | 14
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

o Frequency Bands: Operates in licensed and unlicensed spectra (2-11 GHz


range).
o Standard: Based on IEEE 802.16 standards.
o Point-to-Multipoint Architecture: Supports multiple users from a single base
station.
 Security Issues:
o Privacy Concerns: Potential for eavesdropping on wireless transmissions.
o Encryption: Vulnerabilities in encryption protocols (e.g., AES).
o Authentication: Risks of unauthorized access to WiMAX networks.

4. Zigbee

 Purpose:
o Low-power, low-data-rate wireless communication protocol for IoT devices.
 Key Features:
o Frequency Bands: Operates in 2.4 GHz, 915 MHz, and 868 MHz bands.
o Mesh Networking: Supports mesh topology for extended coverage and
reliability.
o Applications: Home automation, industrial control, smart meters.
 Security Issues:
o Encryption: Limited security features in early Zigbee specifications.
o Authentication: Risks of unauthorized device access.
o Interference: Vulnerable to interference from other devices operating in the
same frequency bands.

5. Aloha Protocol

 Purpose:
o Simple, decentralized protocol for media access control in wireless networks.
 Key Features:
o Random Access: Nodes transmit data whenever they have data to send.
o Collision Detection: Detects collisions and retransmits data after random
backoff periods.
o Variants: Pure Aloha and Slotted Aloha (slotted time for transmission).
 Security Issues:
o Vulnerability to Collisions: Increased collisions with higher network traffic.
o Efficiency: Low efficiency due to high collision rates in pure Aloha.

6. Security Issues in Wireless Networks

 Common Threats:
o Eavesdropping: Unauthorized interception of wireless transmissions.
o Man-in-the-Middle Attacks: Interception and modification of data between
communicating parties.

Page | 15
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

o Denial of Service (DoS): Disrupting network services by overwhelming the


network with traffic.
o Rogue Access Points: Unauthorized access points posing as legitimate
networks.
 Security Measures:
o Encryption: Implement strong encryption protocols (e.g., WPA3 for Wi-Fi) to
protect data confidentiality.
o Authentication: Use strong authentication mechanisms (e.g., WPA3-SAE) to
verify identities.
o Access Control: Limit access to networks through secure configuration and
monitoring of access points.
o Intrusion Detection/Prevention Systems (IDS/IPS): Monitor and respond to
suspicious activities in real-time.

Page | 16
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

UNIT 7
Introduction to android

1. History of Android and iOS

Android:

 2003: Founded by Andy Rubin, Rich Miner, Nick Sears, and Chris White.
 2005: Acquired by Google.
 2008: First Android OS commercially released with HTC Dream (T-Mobile G1).
 Subsequent Years: Regular updates and expansion, integration with Google services,
development of Android Market (now Google Play).

iOS:

 2007: Introduced by Apple Inc. with the launch of the original iPhone.
 Key Features: Touch-based interface, App Store for third-party applications, iTunes
integration.
 Subsequent Years: Regular updates, introduction of iPad (2010) and iPod Touch,
iCloud services, and expansion of the iOS ecosystem.

2. Difference between iOS and Android

iOS:

 Closed Ecosystem: Developed and maintained exclusively by Apple.


 Hardware Integration: Optimized for Apple devices (iPhone, iPad, iPod Touch).
 User Interface: Uniform design across devices, with strict guidelines for app
development.
 App Store: Only available through the Apple App Store.
 Updates: Centralized updates pushed by Apple.

Android:

 Open Source: Developed by Google and open to customization by manufacturers


(Samsung, LG, etc.) and developers.
 Hardware Diversity: Runs on a wide range of devices from different manufacturers.
 User Interface: Allows for more customization and variety among manufacturers.
 App Distribution: Apps can be distributed through Google Play Store and other
platforms.
 Updates: Fragmented update process due to different manufacturers and carriers.

Page | 17
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

3. Android Architecture

 Linux Kernel: Provides core system services such as memory management, process
management, network stack, and driver model.
 Libraries: Includes libraries written in C/C++ used for various system functionalities
(e.g., SQLite, OpenGL, WebKit).
 Android Runtime (ART/Dalvik): Executes and manages Android applications. ART
is the current runtime used, providing improved performance and memory efficiency
compared to Dalvik.
 Application Framework: Provides high-level services such as Activity Manager,
Content Providers, View System, and Package Manager.
 Applications: Built-in applications (e.g., Browser, Contacts) and third-party
applications developed using Java and Android SDK.

4. iOS Architecture

 Core OS Layer: Includes low-level functionalities such as security, file system


management, and hardware abstraction.
 Core Services Layer: Provides essential services like networking, SQLite database
access, and iCloud integration.
 Media Layer: Manages graphics, audio, and video functionalities.
 Cocoa Touch Layer: Implements UIKit framework for building iOS applications with
pre-built UI components (e.g., buttons, tables).
 Applications: Includes built-in apps like Safari, Messages, and Mail, as well as third-
party apps from the App Store.

5. Activity Lifecycle (Android)

 States:
o Created: Activity object created but not yet visible.
o Started: Activity visible but not in focus (partially obscured).
o Resumed: Activity active and in the foreground (user interaction possible).
o Paused: Another activity partially covers the activity (still visible but not
active).
o Stopped: Activity no longer visible (either covered by another activity or
stopped by the system).
o Destroyed: Activity instance is terminated or destroyed.
 Methods:
o onCreate(): Initializes the activity.
o onStart(): Called when the activity becomes visible to the user.
o onResume(): Called when the activity starts interacting with the user.
o onPause(): Called when the activity is partially obscured.
o onStop(): Called when the activity is no longer visible.
o onDestroy(): Called before the activity is destroyed.

Page | 18
Course Code: 1010043461
Course Name: Mobile Computing
and Wireless Networks
SEMESTER: 7

6. Definitions:

HTML (HyperText Markup Language):

 Purpose: Markup language used for creating web pages and web applications.
 Syntax: Uses tags to structure content, such as headings, paragraphs, links, and images.

XML (eXtensible Markup Language):

 Purpose: Used for storing and transporting data.


 Syntax: Similar to HTML but allows users to define their own tags, making it more
flexible and suitable for structured data representation.

WML (Wireless Markup Language):

 Purpose: Markup language used for displaying web content on mobile devices with
limited resources.
 Usage: Predominantly used in earlier mobile internet browsers.

XHTML (eXtensible HyperText Markup Language):

 Purpose: A reformulation of HTML in XML syntax, combining the strengths of both


HTML and XML.
 Features: Strictly follows XML rules, making it more compatible with XML tools and
ensuring well-formedness.

Page | 19

You might also like