Académique Documents
Professionnel Documents
Culture Documents
Mobile computing- It is the technology that allows the transmission of data, voice
and multimedia via any wireless enabled media.
1) User mobility – user mobility refers to the user who has access to the same
or similar telecommunication services at different places.
2) Device portability- here the device is concerned , i.e. it is responsible to
provide the same service to the use as it was providing earlier to user in
some area.(the communication is still possible when the device is still
moving).
Smartphones
1.1 Smartphones have the capability to run multiple programs concurrently.
These phones include high-resolution touch screens, web browsers that
can access and properly display standard web pages rather than just
mobile-optimized sites, and high-speed data access via Wi-Fi and high
speed cellular broadband.
1.2
1) LOCATION FLEXIBILITY-
2) SAVES TIME
3) ENHANCED PRODUCTIVITY
4) STREAMLINING OF BUSINESS PROCESSES
5) EASE OF RESEARCH
6) ENTERTAINMENT
1.6 Conclusion
Today's computing has rapidly grown from being confined to a single
location. With mobile computing, people can work from the comfort of any
location they wish to as long as the connection and the security concerns
are properly factored. In the same light, the presence of high speed
connections has also promoted the use of mobile computing.
1) Presentation layer
2) Application layer
3) Data layer
1) This layer deals with the device handling and rendering, this layer consist
of user system interface where the user service are reside. This is the
layer of user presentation and system application. This tier is responsible
for presenting the information to the user. Presentation layer include the
web browsers such as (Mozilla fire fox, internet explorer.
2) The second layer is the application layer or process management layer.
The middle layer process management tier controls transaction to ensure
the reliable completion of transaction. It performs the business logic of
processing the user input, obtaining data and taking decisions. Besides
managing the business logic there are also other function such as(
decision taking, security, database access). Middleware frame work is
defined as a layer of software, which sits in middle between the operating
system and the user facing software.
3) The third final tier is the data management or data layer. This layer is for
database access and management. This tier is used to store the data
needed by the application and acts as a repository for temporary data
and permanent data. This can range from hierarchical database,
relational database or even a simple text files.
The GSM-900 was founded in 1982. It was designed to provide the voice
services compatible to ISTN( international switch telephone network) and other
PSTN( public switch telephone network) services.
1) Bearer services
2) Tele services
3) Data services
1) Bearer services-
a) Non-Transparent bearer services- if data is transferred between
the physical to physical layer then the lowered layers are not
inform about the transfer of data.(functionality is hidden)
b) Transparent services- If data is transferred between the
physical layers to another physical layer then lowered level
layers are informed about the transfer of data.(functionality is
not hidden).
2) Data services-
a) Circuit switched- It is less efficient.
b) Packet switched- It is more efficient.
DISADVANTAGES OF GSM
AIR INTERFACE- The interface between the MS and BTs is known as um. The GSM is
based on (TDMA)time division multiple access and frequency division duplex(FDD).
PROTOCOLS OF GSM ARCHITECTURE-
protocol architecture used for the exchange of signaling messages on each interface.
The protocols are layered according to the OSI Reference Model. It consists of the
Physical Layer, Data Link Layer, and Layer 3. This Layer 3 is not the same as defined in
OSI Layer 3. In GSM, the Layer 3 functions include call, mobility, and radio resource
management. In the OSI model, these functions are provided by the higher layers. GSM
reuses a few established protocols such as CCS7 MTP, TCAP, SCCP, ISUP, and ISDN
LAPD protocols. The MAP and BSSAP are new protocols to support GSM specific
needs.
V. Power control
b) LAYER 2(DATA LINK LAYER )- It is based on the LAPDm protocol which is the
variation of ISDN-LAP-D protocol. The main task of LAPDm is to provide a
reliable signaling link between network and mobile station.. LAP-D protocol has
been modified to adapt in the mobile environment. . The physical layer itself does
the frame delimitation.
c) LAYER 3(NETWORK LAYER)- It takes care of the signaling between the MS and
network. It consist of 3 sub-layers:-
ii. Ciphering
iv. Paging
i. Security
iii. Authentication
i. Call control
MS to BTS Protocols
The RR layer is the lower layer that manages a link, both radio and fixed,
between the MS and the MSC. For this formation, the main components
involved are the MS, BSS, and MSC. The responsibility of the RR layer is to
manage the RR-session, the time when a mobile is in a dedicated mode,
and the radio channels including the allocation of dedicated channels.
The MM layer is stacked above the RR layer. It handles the functions that arise
from the mobility of the subscriber, as well as the authentication and security
aspects. Location management is concerned with the procedures that enable
the system to know the current location of a powered-on MS so that incoming
call routing can be completed.
The CM layer is the topmost layer of the GSM protocol stack. This layer is
responsible for Call Control, Supplementary Service Management, and Short
Message Service Management. Each of these services are treated as individual
layer within the CM layer. Other functions of the CC sublayer include call
establishment, selection of the type of service (including alternating between
services during a call), and call release.
BSC Protocols
The BSC uses a different set of protocols after receiving the data from the
BTS. The Abis interface is used between the BTS and BSC. At this level, the
radio resources at the lower portion of Layer 3 are changed from the RR to
the Base Transceiver Station Management (BTSM). The BTS management
layer is a relay function at the BTS to the BSC.
To transit from the BSC to the MSC, the BSS mobile application part or the
direct application part is used, and SS7 protocols is applied by the relay, so
that the MTP 1-3 can be used as the prime architecture
MSC Protocols
Location registers are included in the MSC databases to assist in the role of
determining how and whether connections are to be made to roaming users.
Each GSM MS user is given a HLR that in turn comprises of the user’s
location and subscribed services. VLR is a separate register that is used to
track the location of a user. When the users move out of the HLR covered
area, the VLR is notified by the MS to find the location of the user. The VLR
in turn, with the help of the control network, signals the HLR of the MS’s
new location. With the help of location information contained in the user’s
HLR, the MT calls can be routed to the user.
a) Intra-cell handover:- here the source and target are the same cell and
only the used channel is changed during the handover. Such handover in
which cell is not changed is called intra-cell handover.
b) Inter-cell handover:- when the source and target cells may be served
from different cell sites. Such a handover in which the source and the
target cell are different is known as inter-cell handover.
c) Hard handover:- an instantaneous handover in which the existing
connection is terminated and the connection to the destination channel is
made. It is also known as break-before-make handover. The process is
so instantaneous that the user does not hear any noticeable interruption.
In this handover BTS change with the change in the frequency.(BTS-1 F1
BTS-2 F2).
d) Soft handover:- A substantial handover where the connection to new
channel is made before the connection from source channel is
disconnected. This type of handover is very effective in poor coverage
areas. In this handover BTS change but the frequency remains the
same.(BTS-1 F1 BTS-2 F1).
SECURITY- GSM offers several security services using confidential
information stored in AUC and in the individual SIM. The SIM stores the
secret, personal data and is protected with the PIN against unauthorized
use. Three algorithms have been specified to provide security services in
GSM. (A3) is used for authentication, (A5) for encryption and (A8) for the
generation a cipher key.
PRIVACY-
APPLICATION OF GPRS-
1. COMMUNICATION- Email, fax, internet access.
2. VALUE-ADDED SERVICES- information services and games.
3. E-COMMERCE- retail, banking and financial trading.
4. ADVERTSING- user entering the mall can receive advertisements
specific to the stores in the mall.
All the uplink uses the bandwidth between 890 and 915 MHz and downlink uses
935 to 960 MHZ. Each channel uplink and downlink has a bandwidth of 200
KHz.
TDMA- Compared to the FDMA, time division multiple access (TDMA) offers a
much more flexible scheme, which comprises of all the technologies that
allocate certain time slots form communication. Now receiver can stay at the
same frequency for all the time. Using only one frequency, simple the receivers
and transmitters, many algorithm exist to control the medium access. Listening
to different frequencies at the same time is quite difficult, but listening to many
channels separated at same time is simple. This scheme runs on wired network
such as- Ethernet, ATM and Token ring. Synchronization between the receiver
and sender has to be reached in time domain. This can be done similar to
FDMA, allocating the certain time slots to channel using dynamic allocation
scheme. MAC address used as identification.