SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Wireless & Mobile
  Computing

  Submitted by : Manika Gandhi
                115325
            Company
               N1
            LOGO
Company
 LOGO        Contents

1.Wireless communication          7.CDMA & DAMA

2.Effects of device portability   8.Wireless networks

3.Mobile computing platform       9.CSMA problems

4.Wireless & fixed networks       10.Hidden terminal problem

5.Wireless management             11.Applications

6.Building blocks                 12.Security concerns
Company
LOGO      Mobile/wireless communication

 Two aspects of mobility:

  user mobility: users communicate
   (wireless) “anytime, anywhere, with
   anyone”

  device portability: devices can be
   connected anytime, anywhere to the
   network
Company
LOGO
Company
LOGO      Effects of device portability

  Power consumption
  –limited computing power, low quality
   displays
  –loss of data with higher probability
  Limited user interfaces
  –compromise between size of fingers and
   portability
  –character/voice recognition, abstract
   symbols
Company
LOGO            MobileComputing Platforms Platforms
                  Mobile Computing

                                                       Server
  Mobile Device                                        (Web Server, eMail server,
  (Cell Phone, PDA, Pocket PC)                         Mainframe)

       Application                                             Application

          Middleware                                           Middleware
           Services               Mobile                        Services
                                  Computing
    Local      Network            Platform                 Local     Network
   Platform    Transport                                  Platform   Transport
   Services    Services                                   Services   Services



                           Physical Wireless Network
                     (Antennas, Transceivers, Base Stations,
                       Cellular Networks, 802.11 LANs,
                       Satellites)
Company
LOGO       Wireless v/s fixed networks

    Higher loss rates due to interference
    Restrictive regulationsTEXTfrequencies
                   TEXT
                             of       TEXT


    Low transmission rates
    Higher delays, higher jitter
    Lower security, simpler active attacking
    Always shared medium
Company
LOGO               Wireless Management & Business
               STRATEGIC PLANNING
               • Business Strategy Analysis
               •Analyzing Business Processes and Business Workflows
               •Mobile Application Identification and Selection.


                                         CAPABILITY EVALUATION
ORGANIZING/STAFFING                      •Wireless Infrastructure Planning
. Mobile Virtual Teams                   •Capacity Planning & Traffic Engineering
. Mobile Real-time Enterprises           •Resource and Cost Estimation



MONITORING AND CONTROL
                                            DEVELOPMENT AND DEPLOYMENT
•Wireless fault and
                                            • Mobile application development
 performance management
                                            • Wireless infrastructure development
•Wireless Security and                      Outsourcing the Wireless Infrastructure
 configuration management
Company
   LOGO         The Building Blocks of Mobile Computing
Drivers

                                                        •Wireless Business,
                Mobile Business, Government, and Life   Regulations, and
                                                        Standards
                    Mobile Computing Applications


                                                        •Architectures and
                                                        Integration
                     Mobile Computing Platforms
                   (Wireless Middleware, Mobile IP)
                                                        •Wireless Security


                           Wireless Networks            •Management and
                  (Wireless LANs, Cellular Networks,    Support
                   Satellites, Wireless Local Loops)


     Enablers
Company
LOGO      Demand Assignment Multiple Access
  In a DAMA protocol, nodes first reserve
   slots which they intend to use for
   broadcasting.

  Each round of broadcast is preceded by a
   reservation round.

  DAMA protocols are widely used in
   satellite communication and increasingly
   being used in wireless networking.
Company
LOGO      Code Division Multiplexing
  CDMA has been adopted for the 3G
   mobile phone technology.

  CDMA is not very suitable for ad hoc
   networking as we cannot expect
   specialized hardware/software support at
   the nodes.

  TDMA and its variations are most suitable
   for ad hoc networking.
Company
 LOGO                        Wireless Networks
                               Wireless Networks




  Wireless LANs                 Wireless MANs               Wireless WANs



                               Wireless                 Cellular    Satellite      Paging
Personal          Business     Local Loops              Networks    Systems        Networks
Area              LANs         (Fixed Wireless)
Networks

Example1:         Example1:      Example1:        Example1:        Example1:       Example1:
Bluetooth         802.11b        LMDS             GSM, 9.6 Kbps,   Motorola        FLEX,
1 Mbps,           11 Mbps,       37 Mbps,         wide coverage    Iridium
10 Meters         100 Meters                                                       1.2 Kbps
                                 2-4 Km                            up to 64 Mbps
                                                  Example2:        globally
Other examples:   Other          Example2:        3G, 2 Mbps,                      Example2:
wireless sensor   examples:      FSO              wide coverage    Example 2:      ReFLEX,
networks, UWB     802.11g,       1.25 Gbps                         Deep space      6.4Kbps
                  HiperLAN2      1-2 KM                            communication
Company
LOGO         Physical layers in wireless networks

       Use a medium that has neither absolute nor readily
        observable boundaries outside which stations are
        unable to receive frames
       Are unprotected from outside signals
       Communicate over a medium significantly less
        reliable than wired PHYs
       Have dynamic topologies
       Lack full connectivity and therefore the assumption
        normally made that every station (STA) can hear
        every other STA in invalid (I.e., STAs may be “hidden”
        from each other)
       Have time varying and asymmetric propagation
        properties
Company
LOGO      CSMA Problems in Wireless Network

  Collision detection is easy in wired networks but
   difficult in wireless medium

  With only one antenna, nodes can only listen or
   send

  Full duplex radios are extremely expensive

  CSMA gives rise to hidden terminal and exposed
   terminal problems
Company
LOGO      Hidden Terminal Problem
  Wireless transmission is usually short
   range. Even if the medium is free near the
   transmitter, it may not be free near the
   intended receiver.



              A        B        C


                    Collision
                      at B
Company
LOGO      Message Loss due to Collision
  Using CSMA in wireless medium results in
   message loss and requires retransmission of
   lost messages.

  A node spends much more energy while
   receiving or transmitting messages. Hence,
   retransmission wastes a lot of energy.

  The other alternative is to use a reservation
   based TDM protocol.
Company
LOGO      Applications I

 Mobile, pervasive, ubiquitous, nomadic
  computing
 Computing anytime anywhere
                          TEXT

 Distributed computing, CORBA TEXT
 Cellular and satellite networks
 Ad hoc networks: rescue, battlefield, conference
 Sensor networks: monitoring environment to
  detect object movement or presence of
                        TEXT
  chemicals, fire, temperature reports
 Mesh networks;: rooftop networks for multi-hop
  wireless Internet access
Company
LOGO       Applications II

  Vehicles
 –transmission of news, road condition, weather, music
 –personal communication using GSM
 –position via GPS
 –local ad-hoc network with vehicles close-by to prevent
  accidents, guidance system, redundancy
 –vehicle data (e.g., from busses, high-speed trains) can be
  transmitted in advance for maintenance
  Emergencies
 – early transmission of patient data to the hospital
 – replacement of a fixed infrastructure in case of
   earthquakes, hurricanes, fire etc.
Company
LOGO             Security Concerns
  Authentication is critical
 » Normal network point of attachment is a wall
   tap
 » Wireless access makes network attachment
   too easy
  Exposure to over-the-air wiretapping
 » Any transmitter can also be a receiver
 » Some wireless networks provide secure air
   links
 » Made more difficult by spread spectrum
   technologies
Company
LOGO




          Thanks

Contenu connexe

Tendances

mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc networkitsjadu
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile ComputingNitin Ujgare
 
Wireless communication systems-classifications
Wireless communication systems-classificationsWireless communication systems-classifications
Wireless communication systems-classificationspulugurtha venkatesh
 
Basic concepts of wireless communication system
Basic concepts of wireless communication systemBasic concepts of wireless communication system
Basic concepts of wireless communication systemBogs De Castro
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile ComputingMadhuri Badgujar
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
Mobile computing seminar
Mobile computing seminarMobile computing seminar
Mobile computing seminarMeenakshi Devi
 
Wireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawWireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawMulatu Gebeyaw
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologiesAkhil Sabu
 
introduction to data comunication
introduction to data comunicationintroduction to data comunication
introduction to data comunicationRavi Patel
 
The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)ainizbahari97
 
Wireless technology
Wireless technologyWireless technology
Wireless technologyFatma Ala'a
 

Tendances (20)

Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
 
Wireless communication systems-classifications
Wireless communication systems-classificationsWireless communication systems-classifications
Wireless communication systems-classifications
 
Basic concepts of wireless communication system
Basic concepts of wireless communication systemBasic concepts of wireless communication system
Basic concepts of wireless communication system
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
 
Wireless communaction
Wireless communactionWireless communaction
Wireless communaction
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
Pan
PanPan
Pan
 
Mobile computing seminar
Mobile computing seminarMobile computing seminar
Mobile computing seminar
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Wireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawWireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu Gebeyeaw
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologies
 
introduction to data comunication
introduction to data comunicationintroduction to data comunication
introduction to data comunication
 
The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 

En vedette

Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...Daniela Mazza
 
Wireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computingWireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computingSubhashini Sundaram
 
Space robotics(my seminor) final
Space robotics(my seminor) finalSpace robotics(my seminor) final
Space robotics(my seminor) finalAnkur Pathak
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introductionVintesh Patel
 
Gi fi seminar Report
Gi fi seminar ReportGi fi seminar Report
Gi fi seminar ReportShivam Joshi
 
5g wireless systems
5g wireless systems5g wireless systems
5g wireless systemsAmar
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless TechnologyNiki Upadhyay
 

En vedette (12)

Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
Challenges on wireless Heterogeneous Networks for Mobile Cloud Computing in a...
 
Wireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computingWireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computing
 
Gi fi
Gi fiGi fi
Gi fi
 
Space robotics(my seminor) final
Space robotics(my seminor) finalSpace robotics(my seminor) final
Space robotics(my seminor) final
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
Space robotics
Space roboticsSpace robotics
Space robotics
 
Gi fi Technology
Gi fi TechnologyGi fi Technology
Gi fi Technology
 
Gi fi seminar Report
Gi fi seminar ReportGi fi seminar Report
Gi fi seminar Report
 
Gi fi technology finl ppt
Gi fi technology finl pptGi fi technology finl ppt
Gi fi technology finl ppt
 
Gi-Fi ppt presentation
Gi-Fi ppt presentationGi-Fi ppt presentation
Gi-Fi ppt presentation
 
5g wireless systems
5g wireless systems5g wireless systems
5g wireless systems
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 

Similaire à Manika

Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...Pieter Geldenhuys
 
cellular communications-1
   cellular communications-1   cellular communications-1
cellular communications-1Jaya Prakash
 
Ishiriya Wireless Technologies-ARM Wireless
Ishiriya Wireless Technologies-ARM WirelessIshiriya Wireless Technologies-ARM Wireless
Ishiriya Wireless Technologies-ARM Wirelessbhadrah
 
4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband OverviewSigit Priyanggoro
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
Dwika Vision
Dwika VisionDwika Vision
Dwika Visionvideinc
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devicesUnhappy Verse
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vfJustino Lourenço
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPLbhattsipl
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryanjansubbarao
 

Similaire à Manika (20)

Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...Head to Head - The Battle between the Bellheads and the Netheads for control ...
Head to Head - The Battle between the Bellheads and the Netheads for control ...
 
cellular communications-1
   cellular communications-1   cellular communications-1
cellular communications-1
 
Ishiriya Wireless Technologies-ARM Wireless
Ishiriya Wireless Technologies-ARM WirelessIshiriya Wireless Technologies-ARM Wireless
Ishiriya Wireless Technologies-ARM Wireless
 
5G 2
5G 25G 2
5G 2
 
4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview4G LTE Mobile Broadband Overview
4G LTE Mobile Broadband Overview
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Wireless
Wireless Wireless
Wireless
 
4G Network
4G Network4G Network
4G Network
 
Dwika Vision
Dwika VisionDwika Vision
Dwika Vision
 
Lecture1
Lecture1Lecture1
Lecture1
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devices
 
5g technology ppt
5g technology ppt5g technology ppt
5g technology ppt
 
Fourth generation
Fourth generationFourth generation
Fourth generation
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
 
1.pptx
1.pptx1.pptx
1.pptx
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPL
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Manika

  • 1. Wireless & Mobile Computing Submitted by : Manika Gandhi 115325 Company N1 LOGO
  • 2. Company LOGO Contents 1.Wireless communication 7.CDMA & DAMA 2.Effects of device portability 8.Wireless networks 3.Mobile computing platform 9.CSMA problems 4.Wireless & fixed networks 10.Hidden terminal problem 5.Wireless management 11.Applications 6.Building blocks 12.Security concerns
  • 3. Company LOGO Mobile/wireless communication Two aspects of mobility:  user mobility: users communicate (wireless) “anytime, anywhere, with anyone”  device portability: devices can be connected anytime, anywhere to the network
  • 5. Company LOGO Effects of device portability  Power consumption –limited computing power, low quality displays –loss of data with higher probability  Limited user interfaces –compromise between size of fingers and portability –character/voice recognition, abstract symbols
  • 6. Company LOGO MobileComputing Platforms Platforms Mobile Computing Server Mobile Device (Web Server, eMail server, (Cell Phone, PDA, Pocket PC) Mainframe) Application Application Middleware Middleware Services Mobile Services Computing Local Network Platform Local Network Platform Transport Platform Transport Services Services Services Services Physical Wireless Network (Antennas, Transceivers, Base Stations, Cellular Networks, 802.11 LANs, Satellites)
  • 7. Company LOGO Wireless v/s fixed networks  Higher loss rates due to interference  Restrictive regulationsTEXTfrequencies TEXT of TEXT  Low transmission rates  Higher delays, higher jitter  Lower security, simpler active attacking  Always shared medium
  • 8. Company LOGO Wireless Management & Business STRATEGIC PLANNING • Business Strategy Analysis •Analyzing Business Processes and Business Workflows •Mobile Application Identification and Selection. CAPABILITY EVALUATION ORGANIZING/STAFFING •Wireless Infrastructure Planning . Mobile Virtual Teams •Capacity Planning & Traffic Engineering . Mobile Real-time Enterprises •Resource and Cost Estimation MONITORING AND CONTROL DEVELOPMENT AND DEPLOYMENT •Wireless fault and • Mobile application development performance management • Wireless infrastructure development •Wireless Security and Outsourcing the Wireless Infrastructure configuration management
  • 9. Company LOGO The Building Blocks of Mobile Computing Drivers •Wireless Business, Mobile Business, Government, and Life Regulations, and Standards Mobile Computing Applications •Architectures and Integration Mobile Computing Platforms (Wireless Middleware, Mobile IP) •Wireless Security Wireless Networks •Management and (Wireless LANs, Cellular Networks, Support Satellites, Wireless Local Loops) Enablers
  • 10. Company LOGO Demand Assignment Multiple Access  In a DAMA protocol, nodes first reserve slots which they intend to use for broadcasting.  Each round of broadcast is preceded by a reservation round.  DAMA protocols are widely used in satellite communication and increasingly being used in wireless networking.
  • 11. Company LOGO Code Division Multiplexing  CDMA has been adopted for the 3G mobile phone technology.  CDMA is not very suitable for ad hoc networking as we cannot expect specialized hardware/software support at the nodes.  TDMA and its variations are most suitable for ad hoc networking.
  • 12. Company LOGO Wireless Networks Wireless Networks Wireless LANs Wireless MANs Wireless WANs Wireless Cellular Satellite Paging Personal Business Local Loops Networks Systems Networks Area LANs (Fixed Wireless) Networks Example1: Example1: Example1: Example1: Example1: Example1: Bluetooth 802.11b LMDS GSM, 9.6 Kbps, Motorola FLEX, 1 Mbps, 11 Mbps, 37 Mbps, wide coverage Iridium 10 Meters 100 Meters 1.2 Kbps 2-4 Km up to 64 Mbps Example2: globally Other examples: Other Example2: 3G, 2 Mbps, Example2: wireless sensor examples: FSO wide coverage Example 2: ReFLEX, networks, UWB 802.11g, 1.25 Gbps Deep space 6.4Kbps HiperLAN2 1-2 KM communication
  • 13. Company LOGO Physical layers in wireless networks  Use a medium that has neither absolute nor readily observable boundaries outside which stations are unable to receive frames  Are unprotected from outside signals  Communicate over a medium significantly less reliable than wired PHYs  Have dynamic topologies  Lack full connectivity and therefore the assumption normally made that every station (STA) can hear every other STA in invalid (I.e., STAs may be “hidden” from each other)  Have time varying and asymmetric propagation properties
  • 14. Company LOGO CSMA Problems in Wireless Network  Collision detection is easy in wired networks but difficult in wireless medium  With only one antenna, nodes can only listen or send  Full duplex radios are extremely expensive  CSMA gives rise to hidden terminal and exposed terminal problems
  • 15. Company LOGO Hidden Terminal Problem  Wireless transmission is usually short range. Even if the medium is free near the transmitter, it may not be free near the intended receiver. A B C Collision at B
  • 16. Company LOGO Message Loss due to Collision  Using CSMA in wireless medium results in message loss and requires retransmission of lost messages.  A node spends much more energy while receiving or transmitting messages. Hence, retransmission wastes a lot of energy.  The other alternative is to use a reservation based TDM protocol.
  • 17. Company LOGO Applications I  Mobile, pervasive, ubiquitous, nomadic computing  Computing anytime anywhere TEXT  Distributed computing, CORBA TEXT  Cellular and satellite networks  Ad hoc networks: rescue, battlefield, conference  Sensor networks: monitoring environment to detect object movement or presence of TEXT chemicals, fire, temperature reports  Mesh networks;: rooftop networks for multi-hop wireless Internet access
  • 18. Company LOGO Applications II  Vehicles –transmission of news, road condition, weather, music –personal communication using GSM –position via GPS –local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy –vehicle data (e.g., from busses, high-speed trains) can be transmitted in advance for maintenance  Emergencies – early transmission of patient data to the hospital – replacement of a fixed infrastructure in case of earthquakes, hurricanes, fire etc.
  • 19. Company LOGO Security Concerns  Authentication is critical » Normal network point of attachment is a wall tap » Wireless access makes network attachment too easy  Exposure to over-the-air wiretapping » Any transmitter can also be a receiver » Some wireless networks provide secure air links » Made more difficult by spread spectrum technologies
  • 20. Company LOGO Thanks