Unit 3 Mobile Computing
Unit 3 Mobile Computing
The radio waves have frequency range from 3 KHz to 1 GHz. These waves are
easy to generate and these can travel along long distances. These waves are
omni directional in nature which means that they can travel in all the
directions. They are widely used for the communication between both indoor
and outdoor because they have the property that they can penetrate through
the walls very easily. These waves are usually used for AM and FM radio,
television, cellular phones and wireless LAN.
These are
These are omni-directional in
1. Direction unidirectional
nature.
in nature.
They cannot
At low frequency, they can
penetrate
penetrate through solid objects
2. Penetration through any
and walls but high frequency
solid object and
they bounce off the obstacle.
walls.
Frequency
Frequency
3. Frequency range: 3 KHz to 1GHz. range: 300 GHz
range
to 400 GHz.
These offers
4. Security These offers poor security.
high security.
Attenuation is
5. Attenuation Attenuation is high.
low.
need of
waves require government government
License
license to use these. license to use
these waves.
Infrastructure BSS
Independent BSS – Supports mutual communication between wireless
clients. An ad-hoc network is spontaneously created and does not
support access to wired networks.
Independent BSS
Independent Basic Service Set
In the IBSS configuration, also referred to as independent configuration or ad-
hoc network, no single node is required to act as a server. The stations
communicate directly with one another in a peer-to-peer basis. Generally, IBSS
covers a limited area instead of a large network. Typically covering a specific
area, IBSS is used for specific, short-term purposes with a limited number of
nodes.
Extended Service Set
ESS connects multiple BSSs and consists of several BSS cells, which can be
interlinked through wired or wireless backbones known as a distributed
system. Multiple cells use the same channel to boost aggregate throughput to
network. The equipment outside of the ESS, the ESS and all of its mobile
stations comprise a single MAC layer network where all stations are virtually
stationary. Thus, all stations within the ESS appear stationary from an
outsider’s perspective.
Other components include:
Distribution System (DS): Links APs within the ESS.
Portal: Serves as a gateway to other networks.
Architecture for IEEE 802.11 Configuration
Advantages of IEEE 802.11 Architecture
Fault Tolerance: The centralized architecture minimizes the bottlenecks
and introduces resilience in the WLAN equipment.
Flexible Architecture: Supports both temporary smaller networks and
larger, more permanent ones.
Prolonged Battery Life: Efficient power-saving protocols extend mobile
device battery life without compromising network connections.
Disadvantages of IEEE 802.11 Architecture
Noisy Channels: Due to reliance on radio waves, signals may experience
interference from nearby devices.
Greater Bandwidth and Complexity: Due to necessary data encryption
and susceptibility to errors, WLANs need more bandwidth than their
wired counterparts.
Speed: Generally, WLANs offer slower speeds compared to wired LANs.
Applications of IEEE 802.11 Architecture
Home Networking: Connecting devices, laptops, smart TVs, speakers,
gaming consoles etc.
Wi-Fi Hotspots: Free or paid internet access to visitors in coffee shops,
hotels, airports, malls and restaurants.
Connectivity in Campus: Provide internet access in university, colleges,
schools or corporate campuses.
Differences
The major differences between Infrastructure and ad hoc mode are as follows −
In this mode, the transmitter and In the ad hoc mode transmitter and
receivers are in direct range of the receivers can communicate directly with
access point (AP). each other.
In this mode AP handles all wireless In ad hoc mode there is no need for an
nodes within the range. access point in the range.
In this mode each client's security Since in ad hoc mode there is no AP, the
setting must be configured to match network users have to configure what
the security setting of the access are the correct security settings and it
point (AP). must have to match with each client’s
security settings in the network.
In this mode, a client or a system can Since ad hoc is peer to peer mode with
only communicate with connected no central access point, it also allows
clients in managed mode. internet between any two connected
Infrastructure mode ad hoc mode
clients.
Bluetooth
Bluetooth is universal for short-range wireless voice and data communication.
It is a Wireless Personal Area Network (WPAN) technology and is used for
exchanging data over smaller distances. This technology was invented by
Ericson in 1994. It operates in the unlicensed, industrial, scientific, and medical
(ISM) band from 2.4 GHz to 2.485 GHz. Maximum devices that can be
connected at the same time are 7. Bluetooth ranges up to 10 meters. It
provides data rates up to 1 Mbps or 3 Mbps depending upon the version. The
spreading technique that it uses is FHSS (Frequency-hopping spread spectrum).
A Bluetooth network is called a piconet and a collection of interconnected
piconets is called scatternet.
What is Bluetooth?
Bluetooth simply follows the principle of transmitting and receiving data using
radio waves. It can be paired with the other device which has also Bluetooth
but it should be within the estimated communication range to connect. When
two devices start to share data, they form a network called piconet which can
further accommodate more than five devices.
Points to remember for Bluetooth:
Bluetooth Transmission capacity 720 kbps.
Bluetooth is Wireless.
Bluetooth is a Low-cost short-distance radio communications standard.
Bluetooth is robust and flexible.
Bluetooth is cable replacement technology that can be used to connect
almost any device to any other device.
The basic architecture unit of Bluetooth is a piconet.
Bluetooth Architecture:
The architecture of Bluetooth defines two types of networks:
1. Piconet
2. Scatternet
Piconet:
Piconet is a type of Bluetooth network that contains one primary node called
the master node and seven active secondary nodes called slave nodes. Thus,
we can say that there is a total of 8 active nodes which are present at a
distance of 10 meters. The communication between the primary and secondary
nodes can be one-to-one or one-to-many. Possible communication is only
between the master and slave; Slave-slave communication is not possible. It
also has 255 parked nodes, these are secondary nodes and cannot take
participation in communication unless it gets converted to the active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet
can act as master or we can say primary in another piconet. This kind of node
can receive a message from a master in one piconet and deliver the message to
its slave in the other piconet where it is acting as a master. This type of node is
referred to as a bridge node. A station cannot be mastered in two piconets.
Bluetooth protocol stack:
1. Radio (RF) layer: It specifies the details of the air interface, including
frequency, the use of frequency hopping and transmit power. It performs
modulation/demodulation of the data into RF signals. It defines the
physical characteristics of Bluetooth transceivers. It defines two types of
physical links: connection-less and connection-oriented.
2. Baseband Link layer: The baseband is the digital engine of a Bluetooth
system and is equivalent to the MAC sublayer in LANs. It performs the
connection establishment within a piconet, addressing, packet format,
timing and power control.
3. Link Manager protocol layer: It performs the management of the
already established links which includes authentication and encryption
processes. It is responsible for creating the links, monitoring their health,
and terminating them gracefully upon command or failure.
4. Logical Link Control and Adaption (L2CAP) Protocol layer: It is also
known as the heart of the Bluetooth protocol stack. It allows the
communication between upper and lower layers of the Bluetooth
protocol stack. It packages the data packets received from upper layers
into the form expected by lower layers. It also performs segmentation
and multiplexing.
5. Service Discovery Protocol (SDP) layer: It is short for Service Discovery
Protocol. It allows discovering the services available on another
Bluetooth-enabled device.
6. RF comm layer: It is a cabal replacement protocol. It is short for Radio
Frontend Component. It provides a serial interface with WAP and OBEX.
It also provides emulation of serial ports over the logical link control and
adaption protocol(L2CAP). The protocol is based on the ETSI standard TS
07.10.
7. OBEX: It is short for Object Exchange. It is a communication protocol to
exchange objects between 2 devices.
8. WAP: It is short for Wireless Access Protocol. It is used for internet
access.
9. TCS: It is short for Telephony Control Protocol. It provides telephony
service. The basic function of this layer is call control (setup & release)
and group management for the gateway serving multiple devices.
WAP Model
The user opens the mini-browser in a mobile device. He selects a website that
he wants to view. The mobile device sends the URL encoded request via
network to a WAP gateway using WAP protocol.
The WAP gateway translates this WAP request into a conventional HTTP URL
request and sends it over the internet. The request reaches to a specified web
server and it processes the request just as it would have processed any other
request and sends the response back to the mobile device through WAP
gateway in WML file which can be seen in the micro-browser.
WAP Protocol stack