UNIT - 2-Mobile Computing
UNIT - 2-Mobile Computing
UNIT-II
                                                                by-                 applications, Data broadcasting, Mobile IP, WAP architecture, Protocol stack,
                                                 Ashutosh Pandey
                                                Assistant Professor                 application environnent, applications.
                                                        UIM (011)
 Wireless networking is a computer network that uses radio frequency (RF)  Wireless networking refers to the communication between devices such as
connections between devices. This allows devices to connect to a network computers, smartphones, tablets, and other hardware using radio
while still moving around, unlike wired networks, which use cables. frequency signals instead of traditional wired connections.
 Wireless networking is popular in homes, businesses, and  This technology allows users to access networks and the internet without
telecommunications networks. the constraints of physical cables, providing flexibility and mobility.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 3 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 4
                                                                                                                                                                             1
                                                                                                                                                                     5/10/2024
                                                                                                                                                                            2
                                                                                                                                                                     5/10/2024
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 9 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 10
 Authentication: Users and devices are authenticated before being                Range and Coverage: The range of a wireless network depends on factors
granted access to the network, typically through passwords, digital               like the transmission power of the devices, obstacles in the environment,
certificates, or other authentication methods.                                    and the frequency band used. Extenders or mesh networking systems can be
                                                                                  used to extend coverage in large or challenging environments.
 Access Control: Access control mechanisms, such as MAC address
filtering and network segmentation, help control which devices can                Performance: Factors like network congestion, signal strength, and the
connect to the wireless network and what resources they can access.               number of connected devices can impact the performance of a wireless
                                                                                  network. Proper network design, channel planning, and Quality of Service
                                                                                  (QoS) configurations can help optimize performance.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 11 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 12
                                                                                                                                                                            3
                                                                                                                      5/10/2024
                                                                                                                             4
                                                                                                                                                                      5/10/2024
1. Collision Avoidance                                                             Collision Avoidance: In wireless LANs, multiple devices share the same
2. Hidden Terminal Problem                                                         medium for transmission. To avoid collisions where two or more devices
3. MAC Address Filtering                                                           transmit data simultaneously, a mechanism known as Carrier Sense
4. Quality of Service (QoS)                                                        Multiple Access with Collision Avoidance (CSMA/CA) is employed.
5. Channel Allocation                                                              However, collisions can still occur due to hidden terminal problems or other
                                                                                   issues, leading to degraded network performance.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 17 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 18
Hidden Terminal Problem: This occurs when two nodes within the network             MAC Address Filtering: Wireless LANs often implement MAC address
are out of range of each other but are within the range of a common                filtering as a security measure, allowing only devices with approved MAC
access point. As a result, they may not be able to detect each other's             addresses to connect to the network. However, managing a large number of
transmissions and may inadvertently transmit simultaneously, leading to            MAC addresses can be cumbersome, and spoofing MAC addresses is
collisions.                                                                        relatively easy for determined attackers.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 19 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 20
                                                                                                                                                                             5
                                                                                                                                                                     5/10/2024
Quality of Service (QoS): MAC layer protocols often include mechanisms             Channel Allocation: Wi-Fi networks operate on different channels within
for prioritizing certain types of traffic over others to ensure that real-time     the RF spectrum. Proper channel allocation is essential to minimize
applications such as voice or video streaming receive adequate bandwidth           interference between neighboring access points and maximize the available
and minimal latency. However, misconfigurations or improper QoS                    bandwidth. However, overlapping channels or insufficient channel separation
settings can lead to suboptimal performance for critical applications.             can lead to co-channel interference, reducing network performance.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 21 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 22
                                                                                                                                                                            6
                                                                                                                                                            5/10/2024
                                                                                                        IEEE 802.11
                                                                           The IEEE 802.11 standard, commonly known as Wi-Fi.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 27 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 28
                                                                                                                                                                   7
                                                                                                                                                                     5/10/2024
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 29 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 30
                                                                                                                   Bluetooth
                                                                                   Bluetooth technology plays a significant role in mobile computing, enabling
                                                                                  wireless communication between devices over short distances using a band
                                                                                  of 2.4 to 2.485 GHz..
                                 Bluetooth                                         Bluetooth is also known as IEEE 802.15 standard or specification that uses
                                                                                  low power radio communications to link phones, computers and other
                                                                                  network devices over a short distance without using any type of connecting
                                                                                  wires.
                                                                                                                                                                            8
                                                                                                                                                                        5/10/2024
 In Bluetooth technology, the wireless signals transmit data and files over a
short distance, typically up to 30 feet or 10 meters.
 Bluetooth technology was developed by a group of 5 companies known as
Special Interest Group formed in 1998.
 The companies are Ericsson, Intel, Nokia, IBM, and Toshiba.
Baseband Layer /
Radio Layer /
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 33 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 34
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 35 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 36
                                                                                                                                                                               9
                                                                                                                                                                                                     5/10/2024
 The radio layer defines the air interface's details, including frequency,
 transmit power, and frequency hopping.
                                                                                                           Wireless Application Protocol
 The baseband layer defines the addressing scheme, packet frame format,
 timing, and power control algorithms. The baseband layer also establishes the
 ACL link, defines master/slave relationships, and controls the radio signal
 strength.
                                                                                                                                                                                                           10
                                                                                                                                                                    5/10/2024
                                                                                                                  Mobile IP
                                                                           Mobile IP is a communication protocol
                                                                           (created by extending Internet Protocol,
                                                                           IP) that allows the users to move from one
                                                                           network to another with the same IP
                       Mobile IP                                           address.
                                                                           It ensures that the communication will
                                                                           continue without user’s sessions or
                                                                           connections being dropped.
                                                                                                                                                                          11
                                                                                                                                                                                                                                            5/10/2024
Server X
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 47 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 48
                                                                                                                                                                                                                                                  12
                                                                                                                                                                                                                         5/10/2024
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 49 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 50
 Enables hosts to be tracked without needing to change their IP address Transaction Layer (WTP)
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 51 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 52
                                                                                                                                                                                                                               13
                                                                                                                                                              5/10/2024
                                                                                                                                       with WML-Script
                                         TLS/SSL                                                   WML Encoder                CGI
                                                                                                                                         WML Decks
                                          TCP/IP                               WML-                                          Scripts
                                                                                        WSP/WTP      WMLScript
                                                                                                                      HTTP    etc.
                                                                               Script
                                                                                                      Compiler
                                                                               WTAI
                                                                                                  Protocol Adapters          Content
                                                                                Etc.
By: Ashutosh Pandey, Department of Computer Application, UIM (011) 53 By: Ashutosh Pandey, Department of Computer Application, UIM (011) 54
14