Anna University Thirukuvalai Campus Mobile Networking
Anna University Thirukuvalai Campus Mobile Networking
Anna University Thirukuvalai Campus Mobile Networking
Mobile Networking
CS II Year
2009
By
M. PackiaLakshmi.(01808132028)
P.Sahana.( 01808132037)
Contents
1.
2.
3.
4.
5.
6.
7.
Introduction:
Introduction.
Generations of Mobile Network
Applications Of Mobile Networking
Benefits Of Mobile Networking
Mobile Network Architecture And Its Functions
Latest Technologies Of Mobile Network
Conclusion
M
obile Computing is a technology that allows transmission of data, via computer, without having
to be connected to a fixed physical link. In the past, wireless communications predominantly
used, circuit switching to carry voice over the network; however, more recently both voice and
data are being transmitted over both circuit-switched and packet-switched networks.
Mobile data communication has become a very important and rapidly evolving technology as it
allows users to transmit data from remote locations to other remote or fixed locations. This
proves to be the solution to the biggest problem of business people on the move mobility.
The third generation of mobile systems unifies different mobile technology standards,
and uses higher frequency bands for transmission and CDMA to deliver data rates of up
to 2Mbit/s to support multimedia services. The European standard is UMTS (Universal
Mobile Telecommunication Systems). Mobile systems continue to use digital
transmission with SIM authentication. Data transmission uses a WCDMA (Wideband
Code Division Multiple Access). Technique to achieve data rates between 384kbit/s and
2048kbit/s.
Emergency Services:
Ability to receive information on the move is vital where the emergency services are
involved. Information regarding the address, type and other details of an incident can be
dispatched quickly, via a CDPD system using mobile computers, to one or several
appropriate mobile units which are in the vicinity of the incident. Here the reliability and
security implemented in the CDPD system would be of great advantage.
In court:
Defense counsels can take mobile computers in court. When the opposing counsel
references a case which they are not familiar, they can use the computer to get direct, realtime access to on-line legal database services, where they can gather information on the
case and related precedents. Therefore mobile computers allow immediate access to a
wealth of information, making people better informed and prepared.
In companies:
Managers can use mobile computers in, say, critical presentations to major customers.
They can access the latest market share information. At a small recess, they can revise the
presentation to take advantage of this information. They can communicate with the office
about possible new offers and call meetings for discussing responds to the new proposals.
Therefore, mobile computers can leverage competitive advantages.
Electronic Mail/Paging:
Usage of a mobile unit to send and read emails is a very useful asset for any business
individual, as it allows him/her to keep in touch with any colleagues as well as any urgent
developments that may affect their work. Access to the Internet, using mobile computing
technology, allows the individual to have vast arrays of knowledge at his/her fingertips.
Paging is also achievable here, giving even more intercommunication capability between
individuals, using a single mobile computer device.
Benefits:
Versatile:
Any IP-enabled device can be connected to the mobile router LAN ports and achieve
mobility. Applications that are not specifically designed for mobility can be accessed and
deployed.
these networks to the forwarding table and there is no need to statically define the
networks on the home agent.
Node B
NodeA
The IP address is changes from subnet to subnet. So that some problem's are fixed. To avoid this
problem Two IP addresses are used. These IP addresses are called as Home address and care of
address. Home address is static known to everybody to identify of the host. The care of address is
changes at each new point of the attachment.
At the As home network, the incoming IP datagram is intercepted by the home agent.The
home agent discovers that A is in a foreign network. A care-of-address has been allocated
to A by this foreign network and available with the home agent. The home agent
encapsulates the entire datagram inside a new IP datagram, with the care-of-address in the
new datagram with the care-of-address is retransmitted by the home agent.
At the foreign network, the incoming IP datagram is intercepted by the foreign agent. The
foreign agent is the counterpart of the home agent in the foreign network. The foreign
agent strips off the outer IP header, and delivers the original datagram to A.
A intends to respond to this message and sends traffic to X in this example, X is not
mobile; therefore X has a fixed IP address .For routing As IP datagram to X,each datagram
is sent to some router in the foreign network.Typically,this router is the foreign agent. A
uses Xs IP static address as the destination address in the IP header.
The IP datagram from A to X travels directly across the network, using Xs IP address as
the destination address.
Bluetooth:
Bluetooth is a wireless protocol for exchanging data over short distances from fixed and
mobile devices, creating personal area networks (PANs). It was originally conceived as a
wireless alternative to data cables. It can connect several devices, overcoming problems
of synchronization. Bluetooth uses a radio technology called frequency-hopping spread
spectrum, which chops up the data being sent and transmits chunks of it on up to 79
frequencies. It can achieve a gross data rate of 1 Mb/s. Bluetooth provides a way to
connect and exchange information between devices such as mobile phones, telephones,
laptops, personal computers, printers,
Global Positioning System (GPS) receivers, digital cameras, and video game consoles
through a secure, globally unlicensed Industrial, Scientific, and Medical (ISM) 2.4 GHz
short-range radio frequency bandwidth.
RFID:
RFID stands for Radio-Frequency Identification. The acronym refers to small
electronic devices that consist of a small chip and an antenna. The chip typically is
capable of carrying 2,000 bytes of data or less.
The RFID device serves the same purpose as a bar code or a magnetic strip on the back of
a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar
code or magnetic strip must be scanned to get the information, the RFID device must be
scanned to retrieve the identifying information.
WiMAX:
In the above figure indicates the function of WiMAX that contains the following functions:
A subscriber sends wireless traffic at the speeds ranging from 2M to 155M bit/sec from a
fixed antenna on a building.
The base station receives transmissions from multiple sites and sends traffic over wireless
or wired links to a switching center using 802.16 protocols.
The switching center sends traffic to on ISP or the public switched telephone networks.
Conclusion:
Most of these have to do with the inherent limitations of the technology.
Security:
In such a environment weak security link from a wireless network could become a point
of vulnerability for the entire system.therefore,in a mobile computing environment,it is
necessary to have a robust security and trust infrastructure.
Range:
The typical range of a common 802.11g network with standard equipment is on the order
of tens of meters. While sufficient for a typical home, it will be insufficient in a larger
structure.
Reliability:
We cant expect the packets reach to destination because making interference and
propagation effects all the more disturbing. As a result, important network resources such
as servers are rarely connected wirelessly.
Speed:
The speed on most wireless networks (typically 1-108 Mbit/s) is reasonably
slow compared to the slowest common wired networks (100 Mbit/s up to several Gbit/s).
If the above disadvantages are recovered, the mobile network will grow very well. In future, the
world will captured by mobile networking. The world without mobile networking is impossible.