Mobile Computing Important Qusestion

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

What is Mobile Computing? Issues Of Mobile Computing? Categories of Mobile Computing?

Advantage & Dis-Advantage of Mobile computing?


Mobile computing: Mobile computing is changing into progressively necessary because of the
increase within the variety of moveable computers and also the want to possess continuous network
property to the web regardless of the physical location of the node. Mobile computing has quick
become an important new paradigm in today's world of networked computing systems. Starting since
wireless laptops to mobile and Wi-Fi/Bluetooth- permitted PDAs to wireless sensing element
networks, mobile computing has become present in its impact on our daily lives. The goal of this
paper is to show a number of the restrictions, characteristics, applications and problems with mobile
computing. during this paper introduction to Mobile Computing, Characteristics and few of the
technologies used for communication, Limitations, Applications, the problems regarding Mobile
computing. Keywords— Mobile, Software, Mobile Computing.
Issues of Mobile Computing: -
Security problems: In this paper the author had mentioned varied sorts of security problems and
protocols that are used for securing the information once communication between them.
Privacy: avoiding unauthorized users from fast access to essential data of any explicit customer.
Reliability: Ensures unauthorized modification, damage or creation of knowledge cannot occur.
Availability: making certain approved users obtaining the access they need.
Legitimate: making certain that only approved users have access to services.
Accountability: making certain that the users are command liable for their security connected
activities by composing the user and his/her activities are joined if and once necessary.
Categories of Mobile Computing: -
The name MOBILE comes from the primary letter in every of the six classes that conjure the
framework. The six classes are:
M They would like for mobility
O The necessity to enhance operations
B The got to break business barriers
I The got to improve info quality
L The got to decrease dealings lag
E The got to improve potency
Advantages of Mobile Computing: -
Seamless and reliable communication
Increased Productivity- Mobile devices can be used in the field by a variety of businesses, saving time
and money for both clients and employees.
Entertainment- Mobile devices may be used for entertainment, personal use, and even presentations
to clients and colleagues.
Portability- one of the key benefits of mobile computing is that you are not limited to a single location
in order to complete tasks or access email when on the go.
Cloud Computing- This program allows you to save data on an online server and access them from
any computer with an internet connection. You can also access these files on several mobile devices.
Disadvantages of Mobile Computing: -
In Mobile Computing, there are many drawbacks and challenges.
The obstacle to battery consumption.
The transmission bandwidth is inefficient.
Over the whole network, there are link losses.
Fluctuation in the stability of the network.
Small screen sizes.
The issue of interoperability.
Applications of Mobile Computing: -
Mobile operating infrastructure will deliver real time business advantages, corporations of all sizes
are walking up to the actual fact that they will improve productivity and increase profits by giving
workers remote access to mission essential company IT system. The importance of Mobile Computers
has been highlighted in several fields of that some are represented below:
For Estate Agents: Estate agents will work either reception or call at the sector. With mobile
computers they will be a lot of productive. They will acquire current property data by accessing
multiple listing services, that they will do from home, workplace or automobile once out with
purchasers.
Emergency Services: Ability to receive data on the move is important wherever the emergency services
are concerned. Data concerning the address, kind and different details of an event is sent quickly, via
a Cellular Digital Packet data (CDPD) system using mobile computers, to 1 or many acceptable
mobile units that are within the locality of the incident.
In courts: Defense counsels will take mobile computers in court. Once the opposing counsel
references a case that they are not familiar, they'll use the computer to induce direct, period access to
on-line legal information services, wherever they'll gather data on the case and connected precedents.
Mobile computers enable immediate access to a wealth of data, creating individuals higher knowing
and ready.
In companies: Managers will use mobile computers in, say, and essential shows to major customers.
They will access the most recent market share data. At a tiny low recess, they will revise the
presentation to require advantage of this data. They will communicate with the workplace regarding
doable new offers and decision conferences for discussing responds to the new proposals. Therefore,
mobile computers will leverage competitive blessings.
GSM: - MasterCard Verification: At purpose of Sale (POS) terminals in retailers and supermarkets,
once customers use credit cards for transactions, the communication is needed between the bank
central pc and also the POS terminal, so as to result verification of the cardboard usage, will happen
quickly and firmly over cellular channels using a mobile computer unit. This could speed up the
dealings method and relieve congestion at the POS terminals.

GSM: - GSM stands for global system for mobile communication. It is based on cellular Network. It
operates is 4 difference frequency ranges used a combination of FDMA and TDMA.
Frequency ranges of GSM: - 850 MHz, 900 MHz, 1800 MHz, 1900 MHz
GSM is having four different sizes of cells are used in GSM: -
(a) Macro: - In this size of cell base station antenna is installed.
(b) Micro: - In this size of cell antenna height is less than roof level.
(c) Pico: - small cells diameters of few meters.
(d) Umbrella: - It covers the shadowed file the gap between cell register.
FDMA: The bandwidth is divided into separate frequency bands. In case of burst traffic, the efficiency
can be improved in FDMA by using a dynamic sharing technique to access a particular frequency
band; channels are assigned on demand.
TDMA: The bandwidth is timeshared. Channel allocation is done dynamically.
CDMA: Data from all stations are transmitted simultaneously and are separated based on coding
theory as shown in Fig. 5.9.6. In TDMA and FDMA the transmissions from different stations are
clearly separated in either time or frequency. In case of CDMA, the transmission from different
stations occupies the entire frequency band at the same time. Multiple simultaneous transmissions
are separated by using coding theory. Each bit is assigned a unique m-bit code or chip sequence.
VLR: - VLR stands for visitor locator register. VLR is a database which contains the eject location of
all mobile subscriber currently present in the service area of MSC (Mobile switching controller) If you
are going from one state to another state than your entry is mark into the database VLR.
The additional data stored in the VLR in telecom is listed below:
1. Location Area Identity (LAI).
2. Temporary Mobile Subscriber Identity (TMSI).
3. Mobile Station Roaming Number (MSRN).
4. Mobile status (busy/free/no answer etc.).
HLR: - HLR stands for home locator register. HLR is a database containing perpent data regarding
subscribers authorized to use a GSM network. HLR is a like a home which contains all data like your
ID proof which plan you are taking or which caller tunes you are using Extra…
The Basic Parameters stored in the HLR in telecom are listed below:
1. Subscriber ID (IMSI and MSISDN)
2. Current Subscriber VLR (Current Location)
3. Supplementary Services Subscriber to (Caller Tone, Missed Call Alert, Any Other Services etc.)
4. Subscriber Status (Registered or Deregistered)
5. Authentication Key and AUC Functionality
6. Mobile Subscriber Roaming Number
Handoffs: - In cellular communications, the handoff is the process of transferring an active call or
data session from one cell in a cellular network or from one channel to another. In satellite
communications, it is the process of transferring control from one earth station to another. Handoff is
necessary for preventing loss of interruption of service to a caller or a data session user. Handoff is
also called handover.
Wireless Application Protocol (WAP): -
WAP stands for Wireless Application Protocol. It is a protocol designed for micro-browsers and it
enables the access of internet in the mobile devices. It uses the mark-up language WML (Wireless
Mark-up Language and not HTML), WML is defined as XML 1.0 application. It enables creating web
applications for mobile devices. In 1998, WAP Forum was founded by Ericson, Motorola, Nokia
and Unwired Planet whose aim was to standardize the various wireless technologies via protocols.
WAP protocol was resulted by the joint efforts of the various members of WAP Forum. In 2002, WAP
forum was merged with various other forums of the industry resulting in the formation of Open
Mobile Alliance (OMA).
WAP Protocol Stack: -
Application Layer: This layer contains the Wireless Application Environment (WAE). It contains
mobile device specifications and content development programming languages like WML.
Session Layer: This layer contains Wireless Session Protocol (WSP). It provides fast connection
suspension and reconnection. Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed
by the WAP Forum to provide fast connection suspension and reconnection.
Transaction Layer: This layer contains Wireless Transaction Protocol (WTP). It runs on top of UD(User
Datagram Protocol) and is a part of TCP/IP and offers transaction support. Wireless Transaction
Protocol (WTP). The WTP runs on top of a datagram service, such as User Datagram Protocol (UDP)
and is part of the standard suite of TCP/IP protocols used to provide a simplified protocol suitable for
low bandwidth wireless stations.
Security Layer: This layer contains Wireless Transaction Layer Security (WTLS). It offers data
integrity, privacy and authentication. Wireless Transport Layer Security (WTLS). WTLS incorporates
security features that are based upon the established Transport Layer Security (TLS) protocol
standard. It includes data integrity checks, privacy, service denial, and authentication services.
Transport Layer: This layer contains Wireless Datagram Protocol. It presents consistent data format
to higher layers of WAP protocol stack
Cellular/wireless telephony & its generations: -
Cellular telephony is designed to provide communications between two moving unites, called mobile
stations (MSs), or between one Mobile unit and one stationary unit, often called a land unit. A service
provides must be able to locate and track a caller, assign a channel to the call, and transfer the
channel the base station to base station as the caller moves out of range. To make this tracking
possible, each cellular service area is divided into small regions called cells. Each cell contains an
antenna and controlled by a solar or AC powered network station, called the basic station (BS). Each
base station, in tum, is controlled by a switching office, called a mobile switching center (MSC).
Coordinates communications between all the base station and the telephone central office, It is a
computerized center that is responsible for connecting cells, recoding call information, and billing.
Cell size is not fixed and can be increased or depending on the population of the area.
Generations: -
1G (1st Generation):
(a) First-time calling was introduced in mobile systems.
(b) It used analog signals.
(c) It used an FDD scheme and typically allocated a bandwidth of 25 Mhz.
(d) The coverage area was small.
(e) No roaming support between various operators.
(f) Low sound quality.
(g) Speed: - 2.4 kbps.
2G (2nd Generation):
(a) Shifted from analog to digital.
(b) It supported voice and SMS both.
(c) Supported all 4 sectors of the wireless industry namely Digital cellular, Mobile Data, PCS, WLAN,
Moderate mobile data service.
(d) 2G WLAN provided a high data rate & large area coverage.
(e) Speed: - 64 kbps.
(f) 2.5G came after 2G which used the concept of GPRS. Streaming was also introduced and mail
services too. Then came 2.75G or EDGE which was faster in providing services than 2.5G. It gave
faster internet speed up to 128kbps and also used edge connection.
3G (3rd Generation):
(a) The Internet system was improved.
(b) Better system and capacity.
(c) Offers high-speed wireless internet.
(d) The connection used was UMTS and WCMA.
(e) Speed: - 2mbps.
4G (4th Generation):
(a) IP-based protocols.
(b) LTE (Long term evaluation) was mainly for the internet.
(c) Vo-LTE (Voice over LTE) is for both voice and the internet.
(d) Freedom and flexibility to select any desired service with reasonable QoS.
(e) High usability.
(f) Supports multimedia service at a low transmission cost.
(g) HD Quality Streaming.
(h) Speed: -100mbps.
5G (5th Generation):
(a) It is yet to come in many countries but here are some notable points about 5G.
(b) Higher data rates.
(c) Connectivity will be more fast and more secure,
(d) Data Latency will be reduced to a great level.
(e) Massive network capacity.
(f) It is 30 times faster than 4G.
(g) There would be more flexibility in the network.
MOBILE IP: -
Mobile internet protocol (Mobile IP) is a communication protocol which is designed by Internet
engineering task force (IETF). It is standard communication protocol That is designed to allowed
mobile device users to move from one network and another network without changing their IP.
Termination/Entities of Mobile IP: -
MN: - MN stands for Mobile node. Mobile node is the hand-held communication device. That the
users carry. EX: - Cellphone
Home Network: - It is a network which the Mobile node originally belongs as per its assigned if
Address (Home Address).
Home Agent: - It is a router in home network to which the mobile node was originally connected.
Foreign Network: - Foreign network is the current network to which the mobile node is visiting (Away
from its Home Network).
Foreign Agent: - It is a router in a foreign network to which the mobile node is currently connected.
The packets from the home agent are sent to the foreign agent which delivers them to the mobile
node.
Correspondent Node (CN): - The partners node which are used for communication with mobile nodes
are called corresponding node.
Care of Address (COA): - The care of address is used to define the mobile nodes current position on
user. It is used to deliver data packets the process of tunneling.

IP PACKETS DELIVERY PROCESS & DAIGRAM: -

STEP 1: CN sends the packet as usual to the IP address of MN. With Source address as CN and
Destination address as MN. The internet, which does not have any information of the current location
of MN, routes the packet to the router responsible for the home network of MN. This is done using the
standard routing mechanisms of the internet.
STEP 2: The HA now diverts the packet, knowing that MN is currently not in its home network. The
packet is not forwarded into the subnet as usual, but encapsulated and tunneled to the COA. A new
header is put in front of the old IP header showing the COA as new destination and HA as source of
the encapsulated packet.

STEP 3: The foreign agent (FA) now decapsulates the packet, i.e., removes the additional header
(newly added as COA as destination and HA as source), and forwards the original packet with CN as
source and MN as destination to the MN. Again, for the MN mobility is not visible. Finally, the MN
Receives the packet with the Source address as CN and Destination address as MN.

STEP 4: The MN sends the packet MN as Source Address and CN as Destination Address. The router
with the FA acts as default router and forwards the packet in the same way as it would do for any
other node in the foreign network. Simple mechanism works if CN is Fixed at a location if it has got
mobility then the above
Wireless LAN and Its Advantages & Dis-Advantages: -

Wireless LAN stands for Wireless Local Area Network. It is also called LAWN (Local Area Wireless
Network). WLAN is one in which a mobile user can connect to a Local Area Network (LAN) through a
wireless connection. The IEEE 802.11 group of standards defines the technologies for wireless LANs.
For path sharing, 802.11 standard uses the Ethernet protocol and CSMA/CA (carrier sense multiple
access with collision avoidance). It also uses an encryption method i.e. wired equivalent privacy
algorithm. Wireless LANs provide high speed data communication in small areas such as building or
an office. WLANs allow users to move around in a confined area while they are still connected to the
network. In some instance wireless LAN technology is used to save costs and avoid laying cable, while
in other cases, it is the only option for providing high-speed internet access to the public. Whatever
the reason, wireless solutions are popping up everywhere.
Examples of WLANs that are available today are NCR's wave LAN and Motorola's ALTAIR.

Advantages of WLANs: -
Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio waves
can penetrate walls, senders and receivers can be placed anywhere (also non-visible, e.g., within
devices, in walls etc.).
Planning: Only wireless ad-hoc networks allow for communication without previous planning, any
wired network needs wiring plans.
Design: Wireless networks allow for the design of independent, small devices which can for example
be put into a pocket. Cables not only restrict users but also designers of small notepads, PDAs, etc.
Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc. whereas,
networks requiring a wired infrastructure will usually break down completely in disasters.
Cost: The cost of installing and maintaining a wireless LAN is on average lower than the cost of
installing and maintaining a traditional wired LAN, for two reasons. First, after providing wireless
access to the wireless network via an access point for the first user, adding additional users to a
network will not increase the cost. And second, wireless LAN eliminates the direct costs of cabling
and the labor associated with installing and repairing it.
Ease of Use: Wireless LAN is easy to use and the users need very little new information to take
advantage of WLANs.
Disadvantages of WLANs: -
Quality of Services: Quality of wireless LAN is typically lower than wired networks. The main reason
for this is the lower bandwidth due to limitations is radio transmission, higher error rates due to
interference and higher delay/delay variation due to extensive error correction and detection
mechanisms.
Proprietary Solutions: Due to slow standardization procedures, many companies have come up
with proprietary solutions offering standardization functionality plus many enhanced features. Most
components today adhere to the basic standards IEEE 802.11a or 802.11b.
Restrictions: Several govt. and non-govt. institutions world-wide regulate the operation and restrict
frequencies to minimize interference.
Global operation: Wireless LAN products are sold in all countries so, national and international
frequency regulations have to be considered.
Low Power: Devices communicating via a wireless LAN are typically power consuming, also wireless
devices running on battery power. Whereas the LAN design should take this into account and
implement special power saving modes and power management functions.
License free operation: LAN operators don't want to apply for a special license to be able to use the
product. The equipment must operate in a license free band, such as the 2.4 GHz ISM band.
Bluetooth Work & Advantage & Dis-Advantage of Bluetooth technology: -
Bluetooth technology is a high speed and low powered wireless technology designed to connect
phones or other portable equipment for communication or file transmissions. This is based on mobile
computing technology.
Bluetooth Work: -
• You may have used Bluetooth, for example, to connect a mobile phone to a speaker or to
headphones. In this case the phone is known as the ‘main unit’ and the speaker or
headphones are known as ‘peripheral’. Connecting the devices is called ‘pairing’.
• Devices connected in a Bluetooth network communicate with each other using ultra-high
frequency (UHF) radio waves. These are electromagnetic waves with frequencies around 2.4
gigahertz (2.4 billion waves per second).
• UHF waves of different frequencies are used in microwave ovens, GPS systems and many other
devices.
Advantages of Bluetooth Technology: -
Bluetooth Technology is based on Wireless technology. That's why it is cheap because it doesn't
need any transmission wire that reduces the cost.
It is very simple to form a Piconet in Bluetooth technology.
It removes the problem of radio interference by using the Speed Frequency Hopping technique.
The energy or power consumption is very low, about 0.3mW. It makes it possible for the least
utilization of battery life.
It is robust because it guarantees security at a bit level. The authentication is controlled using a
128bit key.
You can use it for transferring the data, and verbal communication as Bluetooth can support data
channels of up to 3 similar voice channels.
It doesn't require line of sight and one to one communication as used in other modes of wireless
communications such as infrared.
Disadvantages of Bluetooth Technology
In Bluetooth technology, the bandwidth is low.
The data transmission range may also be an issue because it is also less.
Mobile Agents in Mobile Computing: -
In Mobile Computing, Mobile Agents are the composition of computer software and data that can
autonomously move from one computer to another computer and continue its execution on the
destination computer. In other words, you can say that A Mobile Agent is an autonomous program
that is capable of moving from host to host in a network and interact with resources and other
agents. In this process, the chance of data loss is scarce because the state of the running program is
saved and then transported to the new host. It allows the program to continue execution from where
it left off before migration. The most significant advantage of mobile agents is the possibility of moving
complex processing functions to the location where you have enormous amounts of data and that
have to be processed.
Features of Mobile Agents: -
The mobile agents are autonomous with intelligence, social ability, learning, and the most important
feature is their mobility. They are independent in nature, self-driven and do not require a
corresponding node for communication. They can work efficiently even after the user get
disconnected from the network.
Mobile Ad hoc Network (MANET): -
A MANET consists of a number of mobile devices that come together to form a network as needed,
without any support from any existing internet infrastructure or any other kind of fixed stations.
A MANET can be defined as an autonomous system of nodes or MSs (also serving as routers)
connected by wireless links, the union of which forms a communication network modelled in the form
of an arbitrary communication graph.
This is in contrast to the well-known single hop cellular network model that supports the needs of
wireless communication between two mobile nodes relies on the wired backbone and fixed base
stations.
In a MANET, no such infrastructure exists and network topology may be changed dynamically in
an unpredictable manner since nodes are free to move and each node has limiting transmitting
power, restricting access to the node only in the neighboring range.

MANET Properties: -
Neighbor discovery─ One of the important characteristics of a MANET node
Data routing abilities ─ data can be routed from a source node to a neighboring node
Flexible network architecture and variable routing paths ─ to provide
communication in case of the limited wireless connectivity range and resource constraints
Flexibility─ enables fast establishment of networks
When a new network is to be established, the only requirement is to provide a new set of nodes
with limited wireless communication range
A node has limited capability, that is, it can connect only to the nodes which are nearby and thus
consumes limited power
Peer-to-Peer connectivity
Decentralization of Computations independent computational, switching (or routing), and
communication capabilities
Limited wireless connectivity range require that a node should move in the vicinity of at least one
nearby node within the wireless communication range, else the node should be provided with the
access-point of wired communication.
Weak connectivity and remote server latency.
Application of MANET: -
Defense applications: Many defines applications require on the fly communications set-up, and ad
hoc/sensor networks are excellent candidates for use in battlefield management.
Crisis management applications: These arise, for example, as a result of natural disasters in
which the entire communication infrastructure is in disarray. Restoring communications quickly is
essential.
Telemedicine: The paramedic assisting the victim of a traffic accident in a remote location must
access medical records (e.g., X-rays) and may need video conference assistance from a surgeon for an
emergency intervention. In fact, the paramedic may need to instantaneously relay back to the
hospital the victim's X-rays and other diagnostic tests from the site of the accident.
Tele-geoprocessing application: The combination of GPS, GIS (Geographical Information Systems)
and high-capacity wireless mobile systems enable a new type of application referred to as tele- geo
processing.
Traditional TCP: -

Transmission control protocol (TCP) is the transport control protocol that serves as an interface
between client and server. The TCP/IP protocol is used to transfer the data packets between
transport layer and network layer. Transport protocol is mainly designed for fixed end systems and
fixed, wired networks. In simple terms, the traditional TCP is defined as a wired network while
classical TCP uses wireless approach. Mainly TCP is designed for fixed networks and fixed, wired
networks.

Snooping TCP: -

Snooping TCP is one of the classical TCP improvement approaches. This approach is designed to
solve the end-to-end semantics loss in I-TCP. The basic concept is to buffer packets close to the
mobile node and retransmit them locally if a packet is lost.

I-TCP (INDIRECT TCP): -

We describe the design and implementation of I-TCP, which is an indirect transport layer
protocol for mobile hosts. I-TCP utilizes the resources of Mobility Support Routers (MSRs) to
provide transport layer communication between mobile hosts and hosts on the fixed network.
Mobile TCP: -
The M-TCP splits up the connection into two parts: An unmodified TCP is used on the Standard Host-
Supervisory Host section. An optimized TCP is used on the Supervisory Host- Mobile Host section.
Q. What is DHCP. Explain its all Character.

DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to


dynamically assign an IP address to any device, or node, on a network so it can communicate
using IP. DHCP automates and centrally manages these configurations rather than requiring
network administrators to manually assign IP addresses to all network devices. DHCP can be
implemented on small local networks, as well as large enterprise networks. DHCP assigns
new IP addresses in each location when devices are moved from place to place, which means
network administrators do not have to manually configure each device with a valid IP
address or reconfigure the device with a new IP address if it moves to a new location on the
network.

How DHCP works: - DHCP runs at the application layer of the TCP/IP stack. It dynamically
assigns IP addresses to DHCP clients and allocates TCP/IP configuration information to
DHCP clients. This information includes subnet mask information, default gateway IP
addresses and domain name system (DNS) addresses. DHCP is a client-server protocol in
which servers manage a pool of unique IP addresses, as well as information about client
configuration parameters. The servers then assign addresses out of those address pools.
DHCP-enabled clients send a request to the DHCP server whenever they connect to a
network.

DHCP characters: - The Cisco Dynamic Host Configuration Protocol (DHCP) Client feature
allows a Cisco device to act as a host requesting configuration parameters, such as an IP
address, from a DHCP server.

You might also like