Mobile Computing Synopsis UNIT-1: Generations of Wireless Mobile Systems
Mobile Computing Synopsis UNIT-1: Generations of Wireless Mobile Systems
Mobile Computing Synopsis UNIT-1: Generations of Wireless Mobile Systems
UNIT-1
Introduction to Mobile Communications and Computing:
mobile phone is a portable telephone that does not use a wired connection. It is also known as a wireless phone, cell
phone, or cellular telephone. In many developing countries, mobile technology is a substitute for traditional fixed
services. The evolution of cellular communication systems is commonly known by the 1G, 2G, 3G, and 4G
designations.
We are currently in the fourth generation (4G) cellular communication systems. The cellular network provides wireless
connection between mobile phones or between a mobile phone and landline phone using radio waves. These mobile
phones connect to the cellular networks which are further connected to the public switched telephone network (PSTN).
The cellular network uses a number of low-power transmitters called base stations (BSs) and each BS covers a unit area
called a “cell”.
Generations of wireless mobile systems
Cellular geometry
The main reason for defining cells in a cellular land mobile radio system is to outline areas in which specific
channels and specific cell sites are used.
Cell shapes
There are only certain patterns of cells or tessellations which can be repeated over a plane: the regular hexagon, the
square, the circle, and the triangle.
In the beginning, there were no handoffs and the cellular system’s size depended on how much power the centralized BS
could transmit and receive. Users who stepped out of range of one system had to re-establish the call in the next system.
The capacity of these systems was severely limited because only a small number of radio channels (available bandwidth)
were available for mobile systems. Therefore, they had to find a way to reuse radio channels in order to carry more than
one conversation. Repeatedly reusing the radio frequencies over a given geographical area provides number of
simultaneous conversations. The basic idea of the cellular concept is frequency reuse.
Frequency reuse
Frequency reuse refers to the use of radio channels on the same carrier frequency to cover different areas that are
separated from one another by sufficient distances. Since the users in different geographical areas (cells) may
simultaneously use the same frequency, this technique maximizes the number of mobile phones served in a given
geographical area and spectrum efficiency. Frequency reuse causes CCI which is a trade-off link quality versus
subscriber capacity. Cells with the same letter (A) use the same set of frequencies. A cell group or cluster is outlined in
bold and replicated over the coverage area.
Handoff
Notion of handoff is a crucial component in cellular concept. The mobile users by definition are mobile i.e. they can
move around while using the phone. Hence the network should be able to provide them continuous access as they move.
This will not be a problem if the user is moving within the same cell. But when the user moves from one cell to another,
a handoff is required.
Handoff is one of the important concepts in the cellular mobile communications. The mobile user can move around while
using the mobile phone, which is the main advantage of mobile phones. Even when the mobile user is moving, the access
to the network should be continuous. This problem does not arise if the user is moving within the same cell, but when the
user is moving from cell to cell, a handoff is needed.
Handoff is the process of transferring an active call from one cell to another as the mobile unit moves from the first cell
to the other cell without disconnecting the call. When a mobile moves into a different cell while the call is in progress,
the mobile switching centre (MSC) automatically transfers the call to a new channel belonging to the new BS. Handoff
operation involves identifying a new BS along with the allocation of voice and control signals.
GSM operation
Call from mobile phone to PSTN
Call from PSTN to mobile phone
Modulation techniques: There are three methods of modulating a signal so that it may be transmitted over the air:
• Amplitude modulation (AM): Amplitude modulation is very simple to implement for analogue signals but it is prone to
noise.
• Frequency modulation (FM): Frequency modulation is more complicated to implement but provides a better tolerance
to noise.
• Phase modulation (PM): Phase modulation provides the best tolerance to noise but it is very complex to implement for
analogue signals and therefore is rarely used.
2. Distribution Services
These services are also known as the DS services (DSS). There are five different services, and these services are
provided across a DS. The five distribution services are association, disassociation, distribution, integration with wired
network like LANs, and re-association. These services allow the users to move freely within an ESS and allow an IEEE
802.11 WLAN to connect with the wired LAN infrastructure. The distribution services determine how to forward frames
within the IEEE 802.11 WLAN and also how to deliver frames from one IEEE 802.11 WLAN to network destinations
outside of the WLAN. The wireless station uses the association and disassociation services to gain access and remove
access to WLAN services. The association service is used to make a logical connection between a mobile station and an
AP. Each station must become associated with an AP before it is allowed to send data through the AP onto the DS. The
connection is necessary in order for the DS to know where and how to deliver data to the mobile station. The mobile
station invokes the association service once and only once, typically when the station enters the WLAN. The
disassociation service is used either to force a mobile station to eliminate an association with an AP or for a mobile
station to inform an AP that it no longer requires the services of the WLAN. When a station becomes disassociated, it
must begin a new association by invoking the association service. An AP may force a station or stations to disassociate
because of resource restraints, the AP is shutting down or being removed from the network for a variety of reasons. When
a mobile station is aware that it will no longer require the services of an AP, it may invoke the disassociation service to
notify the AP that the logical connection to the services of the AP from this mobile station is no longer required
The re-association service enables a station to change its current association with an AP. The re-association service is
similar to the association service, with the exception that it includes information about the AP with which a mobile
station has been previously associated. A mobile station will use the re-association service repeatedly as it moves
throughout the ESS, loses contact with the AP with which it is associated, and needs to become associated with a new
AP. By using the re-association service, a mobile station provides information to the AP to which it will be associated
and information pertaining to the AP from which it will be disassociated. This allows the newly associated AP to contact
the previously associated AP to obtain frames that may be waiting there for delivery to the mobile station as well as other
information that may be relevant to the new association. The mobile station always initiates re-association. Distribution
is the primary service used by an 802.11 station. A station uses the distribution service every time it sends MAC frames
across the DS. The distribution service provides the distribution with only enough information to determine the proper
destination BSS for the MAC frame. The three association services (i.e. association, reassociation, and disassociation)
provide the necessary information for the distribution service to operate. Distribution within the DS does not necessarily
involve any additional features outside of the association services, though a station must be associated with an AP for the
distribution service to forward frames properly.
The integration service connects the 802.11 WLAN to other LANs, including one or more wired LANs or IEEE 802.11
WLANs. The integration service translates 802.11 frames-toframes that may traverse another network, as well as
translates frames from other networks to frames that may be delivered by an 802.11 WLAN.
Wireless PANs
A wireless personal area network (WPAN) is a network for interconnecting devices centered on an individual person’s
workspace – in which the connections are wireless. These might include a mobile phone, a laptop computer, pagers,
PDAs, and a personal stereo. There are many potential advantages of these devices being able to communicate to each
other, especially without wires. Typically, a WPAN uses Bluetooth technology, which was used as the basis for a new
standard, IEEE802.15. Bluetooth technology has been adopted as the IEEE 802.15.1 WPAN standards which are
commercially available in numerous devices ranging from cell phones, PDAs, laptops to wireless mouses, and cameras.
For example, today it is possible to link the laptop to a mobile phone through a cable connector and to wirelessly link
into a remote data network to retrieve e-mails or perform other actions. It permits communication within about 10 m,
which enables the use of low power, low cost, and extremely small-sized devices.
The concept of personal area networks (PANs) is that if each of these devices had a short-range communications tool
built into them, they could exchange information without wires and without any intervention from the user.
For example, the laptop, which was ostensibly in sleep mode, stored in a briefcase, could periodically talk to the cell
phone clipped to the user’s belt and ask it to check for e-mails. The cellular phone could retrieve these and send them to
the laptop over the short-range link. The laptop could then store them so that when the user turned the computer on, all
the e-mails would be available on the computer. As the user performs actions such as sending e-mails, the computer
would talk with the mobile phone and request transmission of these to the data network.
WPAN applications
The IEEE 802.15/WPAN technology applications are given below:
• WPANs are used to replace cables between a computer and its peripheral devices.
• WPANs can be used for transmitting images, digitized music, and other data.
• WPAN, popularly known as Bluetooth technology.
Hiper LAN
The need for mobile broadband communications has increased rapidly in recent years placing new demands for the
WLANs. The requirements of mobile broadband communication include support for QOS, security, handover, and
increased throughput. To meet these requirements, the European Telecommunications Standards Institute (ETSI) has
come up with High Performance Radio LAN (HIPERLAN), which is an alternative for the IEEE 802.11 WLAN
Standards.
The HIPERLAN standards provide features and capabilities similar to those of the IEEE802.11 WLAN standards. In
HYPERLAN, there are a number of base stations, and devices can communicate either with the base station or directly
with each other. The base stations, or APs, can automatically confi gure their frequency so that there is no need for
manual frequency assignment.
All computer networks come under packet switching. They use the following protocols:
• X.25
• Frame relay
• ATM
Packet switching is also called packet radio when used by a wireless link. It provides excellent channel efficiency for
data transmission, since the channel is utilized only when sending or receiving bursts of information.
Advantages of packet switching are as follows:
• Network supports many connections simultaneously
• Short messages not delayed by long messages
• More effi cient than circuit switching
Disadvantages of packet switching are as follows:
• Performance drops when many users share the same network
ATM
ATM is a standard for cell-based relay that carries voice, video, and data in small, fixed size cells. ATM networks are
connection-oriented networks that combine the benefits of circuit switching (guaranteed capacity and constant
transmission delay) with those of packet switching (flexibility and efficiency for intermittent traffic). Traditional circuit-
based networks use TDM, in which users are assigned a predetermined time slot; no other device can transmit during this
time slot. If a station has a lot of data to send, it can transmit only during its time slot, even if the other time slots are
empty. Conversely, if the station has nothing to transmit, the time slot is sent empty and is wasted. This arrangement is
called synchronous transmission.
ATM is asynchronous, which means that time slots are available on demand. This allows for a more efficient use of
available bandwidth. ATM uses small, fixed-sized cells (as opposed to the variable sized frames in frame relay), which
have 53 bytes (Figure 26.13). Computers usually define things in powers of two or eight. The 53-byte cell size represents
a compromise between the phone-standards folks and the data standards folks.
ATM networks use two devices. These are ATM switches and ATM endpoints. ATM switches accept cells from an
endpoint or another switch, evaluate the cell header, and quickly forward the cell to another interface toward the
destination. An ATM endpoint contains an ATM network interface adapter and is responsible for converting digital data
into cells and back again.
Examples of ATM endpoints include workstations, LAN switches, routers, and video coder decoders (codec’s).
ATM advantages
Several organizations that have a large investment in client/server technology are moving to implement ATM. New
demands to transmit voice and video data, as well as large database queries, require the bandwidth capabilities of ATM.
The five main advantages of ATM are as follows:
• Accommodates high-speed telecommunication
• Dependable and flexible at geographic distances
• Handles data, voice, and video transmissions
• Provides potentially significant cost saving in network resources
• Encodes in fixed-length, 53-byte relay units of data called cells
Replication issues
• Increasing the number of replicas will result in the increase of costs for updates and signaling.
• Mobile hosts can move anywhere and anytime.
Transaction Models
• All transactions must satisfy the ACID properties
– Atomic
– Consistent
– Isolated
– Durable
• Different concurrent transactions performed should be serializable – two-phase locking or timestamping
• Mobile transactions are, in general, distributed transactions where some actions are performed in mobile computers and
others in fixed hosts.
• ACID properties are hard to enforce, especially when the mobile computers are disconnected.
Query Processing
• Query processing is affected when mobility is considered.
• It is possible to formulate location dependent queries. For example: “where is the nearest gas station?” or “which are
the cinemas that project some film at 8:00pm in this city?” return different values depending on the location of the
mobile computer
• Query optimization methods try in general to obtain execution plans which minimize CPU, input/output and
communication costs.
• In centralized environments the cost that affects most is the input/output.
• In distributed environments, communication cost is the most important one.
• In a mobile distributed environment, the communication costs are much more difficult to estimate because the mobile
host may be situated in different locations.
• Dynamic optimization strategies are required in this mobile distributed context.
Caching
• Caching techniques for query processing can reduce communication costs dramatically.
• Difficult to apply caching techniques in mobile context because cache contents may change rapidly or get out-of-date
due to mobility.
• Updates to the cache memory may not be sent due to disconnections of the mobile unit.
Database Interfaces
• Design of query interface such as Query By Icons that
– are convenient to use.
– address the features of screen size.
– address limitations in memory and battery power and the restricted communication bandwidth.
• How the pen and voice can be used as substitutes for the mouse and keyboard.
• Implementation of a pen-based graphical database interface on a computer.
• GPS limitations
– strong attenuation of the satellite signals by buildings.
– GPS does not operate well (or at all) in dense ‘urban canyon’ areas, or inside buildings. Yet, these are often the
very areas where demand for location based services is the highest.
– In order to use GPS, the mobile handsets must be modified to integrate GPS receiver chips.
• Assisted GPS – refers to the GPS positioning technique whereby there is assistance data provided from a special GPS
server/base station by the mobile telephony network. – A-GPS enables GPS positioning even in urban and indoor areas,
where the signal is too weak to be acquired using standard signal tracking procedures within the receiver.
• Issues – Diverse mobile mapping standards – Interoperability – Market capacity – User Privacy
WHY CLUSTERING??
Reduce routing table size. Conserve communication bandwidth.
Avoids redundant message exchanges. Cluster head can aggregate data.
Clusters can schedule activities so sensors can sleep.
ROUTING PROTOCOLS
Location–Base Protocol Data-Centric Protocol Hierarchical Routing Protocol
CLUSTERING ALGORITHMS
LEACH (Low Power Adaptive Clustering Hierarchy)
HEED(Hybrid Energy Efficient Distributed )
GAF
WCA (Weighted Clustering Algorithm)
K-MEANS (K-Hop Clustering Algorithm)
LEACH It uses circular random clustering methods and each node in the network can be a cluster head in rotation,
this makes the energy- carrying of the network balancing to each node, extending the lifetime of the network.
BASIC BLOCK DIAGRAM (See net)
DISADVANTAGE OF LEACH
1.Applicable to only single hop communication mode.
2.LEACH assumes all the nodes to have same initial energy, which is not the case always in real-time problems. 3.It
cannot be applied for mobile nodes, failure of cluster-heads creates a lot of problems
COMPARISONS OF EECU WITH WCA ALGORITHM WCA:-WCA is a classical algorithm based on node degree,
the number of single-hop neighbours.
MAIN DRAWBACK :- The main drawback of WCA is that it needs to obtain the weight of the node and require each
node to save all the information of nodes before initializing network, so excessive amounts of computing and
communications may cause excessive consumption in clustering directly.
Operation of mobile IP
Mobile IP has the following functional entities:
• Mobile node: This is the mobile device, the one moving around the Internetwork.
• Home agent (HA): This is a router on the home network that is responsible for catching datagrams intended for the
MN and forwarding them to it when it is traveling. It also implements other support functions necessary to run the
protocol.
• Foreign agent (FA): This is a router on the network to which the MN is currently attached. It serves as a “home away
from home” for the MN, normally acting as its default router as well as implementing mobile IP functions.
Mobile IP registration
Once a MN has completed agent discovery, it knows whether it is on its home network or on a foreign network. If on its
home network it communicates as a regular IP device, but if on a foreign network it must activate the mobile IP. This
requires that it communicate with its HA so information and instructions can be exchanged between the two. This process
is called HA registration, or more simply, just registration.
Wireless application protocol
Another open standard, besides mobile IP, providing mobile users of wireless terminals access to telephony and
information services is the WAP. However, WAP is not actually a protocol as the terms hypertext transfer protocol
(HTTP) and IP suggest. Instead, multiple protocols and complete network architecture are involved in WAP for delivery
of wireless content. The architecture specifi ed by the WAP is based on the layers that follow OSI model. WAP is
designed to work with all wireless network technologies such as GSM, CDMA, and TDMA.
In near future, the WAP applications may extend the function of telephone, for example, the user will be allowed to
answer the phone message with an e-mail. The news feeds, stock quotes, and weather forecasts were featured in early
WAP application. These developments are setting hopes in wireless industry that in e-commerce applications like online
banking, the WAP devices will become popular. Signifi cant backlash against the hype and optimism surrounding WAP
has certainly occurred as a result of the uncertainty about its future.
The WAP is a universal, open standard developed by the WAP forum to provide mobile users of wireless phones and
other wireless terminals such as pagers and personal digital assistants (PDAs) access to telephony and information
services, including the Internet and the Web. WAP is designed to work with all wireless network technologies (e.g.,
GSM, CDMA, and TDMA). WAP is based on existing Internet standards, such as IP, XML, HTML, and HTTP, as much
as possible. It also includes security facilities. Ericsson, Motorola, Nokia, and Phone.com established the WAP forum in
1997, which now has several hundred members.
The use of mobile phones and terminals for data services are the significant limitations of the devices and the networks
that connect them. The devices have limited processors, memory, and battery life. The user interface is also limited, and
the displays small. The wireless networks are characterized by relatively low bandwidth, high latency, and unpredictable
availability and stability compared to wired connections. WAP is designed to deal with these challenges.
The WAP specification includes the following:
• A programming model based on the WWW programming model
• A markup language, the wireless markup language, adhering to Extendable Markup Language (XML)
• A specification of a small browser suitable for a mobile, wireless terminal
• A lightweight communications protocol stack
• A framework for wireless telephony applications (WTAs)
WAP architecture
WAP is designed in a layered fashion so that it can be extensible, flexible, and scalable. The WAP stack is divided into
five layers. The WAP layered architecture enables other services and applications to utilize the features of the WAP stack
through a set of well-defined interfaces. External applications may access the session, transaction, security, and transport
layers directly.
The WAP programming model is based on three elements: the client, the gateway (GW), and the original server. HTTP is
used between the GW and the original server to transfer content. The GW acts as a proxy server for the wireless domain.
Its processor(s) provide services that free from the limited capabilities of the handheld, mobile, wireless terminals.
For example, the GW provides DNS services, converts between WAP stack and the WWW stack (HTTP and TCP/IP),
encodes information from the Web into a more compact form that minimizes wireless communication, and, in the other
direction, decodes the compacted form into standard Web communication conventions. The GW also caches frequently
requested information.
The layers in the WAP architecture are defined below.
• Application layer: This layer contains content developer programming languages, WML, WML script, device
specifications, etc. which are of great interest to content developers.
• Session layer: WAP forum has designed wireless session protocol (WSP) to provide fast reconnection and connection
suspension.
• Transaction layer: Like UDP, the wireless transaction protocol (WTP) runs at the top of the datagram services. The
WTP which is part of the standard suit of TCP/IP protocols provides simplified protocol suitable for low-bandwidth
wireless stations.
• Security layer: According to the transport layer security (TLS) protocol standard, wireless transport layer security
(WTLS) incorporates security features. These features include data integrity checks, privacy, service denial, and
authentication services.
• Transport layer: The WAP is made bearer-independent by adapting the transport layer of the underlying bearer which
is the feature provided by wireless datagram protocol (WDP). The consistent data format is presented to the higher layers
of the WAP stack by WDP. This offers the advantage to the bearer-independent application developers.
Application layer
WAPs application layer is the wireless application environment (WAE). WAE directly supports WAP application
development with WML instead of HTML, and WML script instead of Java script. WAE also includes the wireless
telephony application interface (WTAI or WTA) that provides a programming interface to telephones for initiating calls,
sending text messages, and other networking capability. The WAE is a general-purpose application environment based on
a combination of WWW and mobile telephony technologies. The primary objective of the WAE effort is to establish an
interoperable environment that will allow operators and service providers to build applications and services that can
reach a wide variety of different wireless platforms in an efficient and useful manner. WAE includes a micro-browser
environment containing the following functionality:
• Addressing model: Syntax suitable for naming resources stored on servers. WAP uses the same addressing model as
the one used on the Internet, that is, uniform resource locators (URL).
• WML: A lightweight mark-up language designed to meet the constraints of a wireless environment with low band
width and small handheld devices. The WML is WAP’s analogy to HTML used on the WWW. WML is based on XML.
• WML script: WML script is a light-weight scripting language. It is based on European Computer Manufacturers
Association (ECMA) Script, the similar scripting language that Java script is based on. It can be used for enhancing
services written in WML in the way that it, to some extent, adds intelligence to the services, for example, procedural
logic, loops, conditional expressions, and computational functions.
• WTA or WTAI: A framework and programming interface for telephony services. The WTA environment provides a
means to create telephony services using WAP.
WAP model
• The WAP client (the handheld device or WAP terminal)
• The WAP GW
• The Web server
WAP client
The client, also known as WAE user agent, is a component of the WAP terminal. It consists of a micro browser and the
WAP stack to handle the execution of all requests and responses going through the WAP layered structure.
For example, this includes
• Session establishment
• Connectionless or connection-oriented data transport
• Setting up a secure environment including Applying encryption and authentication Encoding of outgoing
requests
• Decoding of incoming responses to minimize bandwidth
Origin server
The client’s micro browser requests WML pages. These WML pages are stored on the origin server, which might be a
Web server, connected via the Internet or intranet. WML pages may also be stored in an application server installed in the
GW itself. A WML page consists of a WML deck. One WML deck is divided into one or more WML cards. A WML card
can be regarded as a unit of interaction. Services let the user navigate back and forth between cards from one or several
WML pages. WML, especially designed for WAP terminals, provides a smaller set of mark-up tags than HTML. It is
based on HTTP 1.1. WML decks may also contain WML scripts, another way of coding Web pages.