You are on page 1of 79

Mobile Computing

Lecture-1

Tutor: Dr. P. K. Pattnaik

Two major developments over the last decade have revolutionized the way people use their computers. First, advances in miniaturization of circuits and components . The second major development concern computer communication and has made wireless networking of portable computers a reality. These developments have merged portable personal computing and communication to form the discipline of mobile computing.

Mobile computing is widely described as the ability to compute and communicate while on the move.
Computing denotes that automatically carrying out certain processing. Mobility, on the other hand provides the capability to change its location during communication and computing. the flexibility it provides to the user

Mobile Computing and Wireless Networking These two terms are not synonymous, Wireless networking need not necessarily be used for mobile computing, Using mobile computing, you could do computing on the move wherever you go : office, home, conference, hotel, and so on.

However, it should be clear that wireless networking is, an important ingredient of mobile computing.

The wireless network can be classified into two basic type. fixed Infrastructure & Ad-hoc Network

Wireless LAN

Wired LAN

Access point

B C A D

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) provide connectivity between computers over short distances using the wireless medium. Typical indoor applications of WLANs may be in educational institutes, office buildings and factories where the required coverage distances are usually restricted to less than a few hundred feet.

Wireless Hardware Wireless Network Protocols Wireless Programming

Access Points
There are many different manufacturers of access points (APs), and all of them perform essentially the same function. However, there are substantial differences in security and features among the various vendors. For example, some access points are capable of restricting user connections based on the MAC address of the wireless network card, while others have the capability to turn off the beacon broadcast.

Fortunately, advanced security features such as these are becoming more common in SOHO (small office/home office) access points.
The survey says that out of 1,300 access points , Cisco was the leader , next Lucent after that Linksys. We will discuss some market available access point brands say Linksys WAP11 and NetGear ME 102

Linksys WAP11

Homepage: http://www.linksys.com

The Linksys WAP11 is a simple but effective low-cost/highperformance access point. The device has several capabilities, such as the Capability to disable the beacon broadcast, and

To restrict connections based on the client's MAC address.


Administration of the WAP11 requires client-based software, and is performed via a USB interface or SNMP over an Ethernet connection (not wireless)
Linksys access points that are designed for SOHO use are finding their way into the corporate workplace at a rapid pace.

Figure 1.1. Basic Settings tab on the Linksys WAP11 management interface.

Figure 1.2. IP Setting tab on the Linksys WAP11 management interface.

Tech Specs

Default SSID: Default IP: Default Channel: Encryption: Clients: Dimensions:


Length: 8.9 Width: 5 Height: 1.6 Weight:12 oz.

Linksys 192.168.1.250 6 40/128-bitWEP 32

NetGear ME102
Homepage:

http://www.netgear.com

NetGear ME102 is a fully functional access point packed into a very small package. Measuring only 6.4 inches long, 5.6 inches wide, and 1.1 inches high, it is one of the smallest access points on the market.
This makes it perfect for traveling, or for use in any area where space is a consideration.

However, do not let the small size fool you. the ME102 is capable of 128-bit WEP encryption, point-to-point and point-to-multipoint configurations, and enhanced access point client features with MAC address restriction.

Figure 1.3. MAC address restriction configuration.

Figure 1.4. Statistics page from the administration interface.

Tech Specs Default SSID:WirelessDefault IP:192.168.0.5Default Channel:6Encryption:40/128-bit WEPClients:32Dimensions:Length: 6.4"Width: 5.6"Height: 1.1"Weight:0.076 lb.

Antennas
Antennas are merely an extension of a radio transmitter or receiver. As a signal is generated, it is passed from the radio to the antenna to be sent out over the air and received by another antenna, then passed to another radio. The signal that is generated and later transmitted is measured in Hertz (Hz); Lower frequencies generally have the ability to travel farther distances, but are more subject to high latency that limits data flow. A higher frequency has a lower (better) latency, but it is limited in distance and penetration of objects such as buildings and other obstructions.

Antennas are fundamental components to the transmission of radio frequencies. In many situations, a lower power signal transmitted using a good antenna can arrive at its destination with more accuracy than a highpowered signal transmitted using a poor antenna.

Antennas are rated by the amount of gain that they provide. Gain is the increase in power you get by using a directional antenna.

The overall gain is compared to a theoretical isotropic antenna. Isotropic antennas cannot exist in the real world, but they serve as a common point of reference. If an antenna's gain is just specified as dB, check with the manufacturer to see whether the rating is dBi or dBd. If they cannot tell you, or simply do not know, save your money and go someplace else.

A dipole antenna has 2.14dB gain over a 0-dBi isotropic antenna. So if an antenna gain is given in dBd and not dBi, add 2.15 to it to get the dBi value.

As stated above, most antennas are sold with gain measured in dBi, but this is not the only factor to consider when evaluating overall performance.

There are two primary types of antennas that are used on wireless networks omni-directional and directional. Omni-directional antennas can receive and transmit from all sides (360 degrees). These are useful when covering a large room, or for providing general coverage. Directional antennas take the RF energy and concentrate it in a specific direction.

This can be compared to a naked light bulb versus a flashlight. The light bulb would be similar to the omni-directional antenna, as it gives off light in all directions equally. In contrast, the flashlight (similar to the directional antenna) focuses the light bulb with the help of a reflector, and concentrates it in a single direction.

Radome-Enclosed Yagi Antenna: HyperLink HG2415Y


Homepage: http://www.hyperlinktech.com

The HG2415Y is a high quality Yagi (directional) antenna with very strong performance. The antenna weighs approximately 1.8 pounds, which makes it lightweight and extremely easy to install. It comes complete with two U-bolt mounting brackets.

We used a CA-WL2CABLE1 to connect the antenna to an ORiNOCO PCMCIA (Personal Computer Memory Card International Association) card. Our initial tests revealed that while using this antenna, we were able to connect to our test access point from three times the distance, on an unamplified signal, using stock antennas on the access point.

Overall, this antenna is the top of the line, and one of our recommendation for first choices. Tech Specs

Frequency: Gain: -3dB Beam Width: Impedance:

24002500MHz 14.5-dBi 30 degrees 50 Ohm

Max. Input Power: 5


VSWR: Weight: Length: Polarization: Wind Survival:

0 Watts
< 1.5:1 avg. 1.8 lb. 19" long x3" diameter Vertical > 150 MPH

Parabolic Grid Antenna: HyperLink HG2419G Homepage: http://www.hyperlinktech.com

The HyperLink HG2419G is also a very high-performance tool. This highgain, ultra-efficient antenna is extremely well-engineered. The antenna is built from durable, galvanized welded steel, and is coated with a light gray UV powdercoat, making it not only strong, but also attractive. Hyperlink makes three versions of this antenna: a 15-dBi, a 19-dBi and a 24-dBi model.

TechnoLab Log Periodic Yagi Homepage: http://www.technolab-inc.com


This Yagi antenna from TechnoLab is truly one of a kind. Its low profile and small design make it a great indoor directional antenna. In addition, by placing this antenna on the outer perimeter of a building, you can easily create building-to-building links.

Our tests revealed that this little antenna is quite capable of getting the job done. For our tests, we connected the Yagi antenna directly to our test access point and attempted to connect to it using a standard ORiNOCO PCMCIA card. We found that the antenna was fairly selective, and offered good improvement in signal strength in the desired direction.

Wireless NICs
Wireless network interface cards (WNICs) are basic yet essential components of your wireless hardware setup. Session we will discuss the ORiNOCO brands alone, as they stand out head and shoulders above any competitors.

ORiNOCO PC Card Homepage: http://www.orinocowireless.com ORiNOCO wireless cards by Agere Systems are the best on the market. The cards are standard and will fit into one Type II slot on a laptop or portable computer. There are two models of the card, Silver and Gold. The Silver card offers 64bit WEP protection, while the Gold offers 128-bit. Both cards offer connection speeds of up to 11Mbps and are Wi-Fi-compliant, making them compatible with other systems. One of the better features of both the Gold and Silver cards is the capability to connect an external antenna. The feature for wireless auditing and network management. In addition, the cards are widely supported across multiple operating systems, such as Mac, Novell, Windows and Linux. The ORiNOCO cards can be configured to work in peer-to-peer (ad-hoc) or infrastructure modes. Peer-to-peer mode allows you to form a small network in which the cards communicate without the use of an access point.

Handheld Devices

Handheld computing devices, or personal data assistants (PDAs), are rapidly growing in popularity. Along with the growing use of PDAs has come a corresponding growth in the demand for wireless network connectivity, auditing, and management. Many companies are already developing high-end productivity applications for the PDA market. For example, the Pocket PC (which uses Microsoft's embedded operating system, Windows CE) ships with a Microsoft Terminal Server Client, allowing you to connect to servers virtually anywhere on your network.

Medical students are even using PDAs connected to wireless networks to watch surgeries via streaming video.

Compaq iPAQ Homepage: http://www.compaq.com The iPAQ from Compaq is the leader among handheld devices with wireless functionality. The iPAQ runs Microsoft's Pocket PC 2002 operating system on a 206MHz Intel StrongArm 32-bit RISC processor. With up to 64MB of RAM.

Networking Protocol Overview


Long before wireless networks climbed out from the primordial ooze of Ethernet, the Institute of Electrical and Electronics Engineers (IEEE) had set up a system by which new technologies could become certified. The IEEE's certification ensures that a technology can be compatible with other products using the same certified technology. One of the many technologies is LAN. However, there are a number of rules and specifications that are required in order for a product to be deemed LAN-compliant. Thus, to handle this specific technology sector, the IEEE created the 802 group. which is responsible for reviewing both old and new networking technologies to ensure that they are reliable and conflict-free.

If a new technology is submitted for certification, it is intensely scrutinized by this group, and it will undergo many tests before it is deemed worthy.

The 802 certification includes many subsets, which represent different facets of networking. For example, 802.3 is the standard that defines how Ethernet works. If a product is to be considered "Ethernet. it must meet all the requirements specified in 802.3. This leads us to "wireless Ethernet," which is classified and controlled by 802.11.

802.11 is further broken down into more specific certifications, such as 802.11a, 802.11b, and 802.11g. Each of these defines a different method for providing wireless Ethernet. Each protocol specifies various aspects of data transfer that distinguish them from the other certifications.

Understanding CSMA/CD One of the most popular standards set by the 802 group was the 802.3 standard. This is the certification used by Ethernetready devices. For example, an Ethernet device must support a technology known as Carrier Sense Multiple Access/Collision Detection (CSMA/CD). Now CSMA/CD might seem like a mouthful, but you use the same type of rules when sitting in a classroom. CS is carrier sense, which basically means only one person (or device) can talk at a time. Imagine the confusion if everyone in the classroom talking at the same time!

The next part is multiple access, which is a technical way of saying there is more than one person listening to the conversation. In a class, everyone hears the words spoken by the instructor or another student. However, if the instructor is talking to one specific student only, the information being passed is irrelevant to the others and can be ignored by the rest of the class. The same applies to an Ethernet network.

The last part is collision detection, which is another way of saying every Ethernet can determine whether two devices have started talking at the same time. When humans do this, we simply stop and then one person starts talking again. In an Ethernet environment, as in humans, the devices will stop and wait a random amount of time.

Understanding CSMA/CA
Why is this relevant? The answer is found in the fact that 802.11 uses CSMA/CA, or CSMA/Collision Avoidance, which is the alternative to CSMA/CD. It does this by broadcasting a message of intention to talk. In other words, this is like "calling" the ball when playing volleyball.

802.11 is a series of standards that defines wireless methods of transmitting Ethernet traffic. Commonly referred to as Wi-Fi or WLAN traffic, this technology is tested and marketed by the WECA (Wireless Ethernet Compatibility Alliance). This standard has several substandards important to your understanding of WLANs 802.11a, 802.11b, and 802.11g. Each of these is based on a different physical layer, and has its own benefits and disadvantages.

Pre-Standard/Non-Standard Wireless LANs


Prior to the ratification of the 802.11 standard by the IEEE, several other technologies were developed that used various forms of spectrum hopping to facilitate wireless data transfer. These technologies were proprietary, and were typically slower than the finalized standards, with speeds at 12Mbps and frequencies in the 900MHz and 2.4GHz ranges. All of the 802.11x standards use the ISM (Industrial, Science, and Medical) frequencies, These frequencies900MHz, 2.4GHz, and 5GHzare all open ranges that can be used by anyone for testing or consumer goods. After the IEEE ratified 802.11 in 1997, three main frequency technologies became the main methods of data transmission: DSSS, FHSS, and IrDA. Of the three, DSSS and FHSS showed the most promise, and were eventually incorporated into most WLAN technology.

Understanding 802.11b

An 802.11b device operates by sending a wireless signal using direct sequence spread spectrum in the 2.4GHz range.

It should be noted that the current implementation of 802.11b supports the 12Mbps speed of older WLAN products, providing they use DSSS in the 2.4GHz range.

Understanding 2.4GHz

The 2.4GHz range is an open frequency in which many devices operate, including phones and microwaves. In other words, anyone can make a 2.4GHz device and use it without fear of breaking into the range of a regulated frequency.

Although setting aside the 2.4GHz range was a good idea, the concept of "too much of a good thing" is now causing WLAN users some problems. Because so many other devices use the 2.4GHz range, it is likely that some interference will occur. For example, have you ever heard someone else's conversation on your wireless house phone? This is because they are on the same frequency as you. The same can happen to a WLAN device.

Understanding DSSS
DSSS (direct-sequence spread spectrum), helps prevent interference by spreading the signal out over several frequencies at one time. In other words, DSSS takes a byte of data, splits it up into several chunks, and sends the chunks out at the same time by multiplexing them onto different frequencies. As the next byte is selected it is then split up and sent out over another set of frequencies. This helps increase bandwidth, and allows for multiple devices to operate on one WLAN. As long as the time and frequency domains don't collide, the data will remain intact.

Inside the 802.11a Standard


802.11a was the first officially ratified wireless Ethernet standard. However, it was not rapidly accepted Because it was based on new technologies, and used a different nature of data transmission. Because of this, 802.11b made it to the market first and became the standard most WLAN products use.

802.11a is the fastest of the current 802.11 standards. It is capable of speeds up to 54Mbps, which is roughly five times faster than the more common 802.11b that operates at 11Mbps. 802.11a also operates in a different frequency (5GHz) and uses a different method of transmission (OFDM).

The 5GHz Frequency

2.4GHz range is becoming saturated by the many devices rushing to cash in on wireless technologies. However, the 5GHz range is still mostly free of this problem. In addition, a 5GHz signal means more data transfer at the same time.

A gigahertz means there are 1 billion cycles per second; therefore, 5GHz as compared to 2.4GHz is more than twice as fast. This added speed, in combination with a different type of frequency control, makes 802.11a five times faster than its predecessor 802.11b.

OFDM

802.11a uses Orthogonal Frequency Division Multiplexing to take the 5GHz frequency and split it up into multiple overlapping frequencies. each allowing its own data transmission. This not only speeds up data transmission, but also allows for multiple frequencies, and thus reduces collision with other wireless device transmissions.

Understanding FHSS

HomeRF uses another frequency control standard called FHSS (Frequency Hopping Spread Spectrum). Used in combination with a 2.4GHz frequency, a signal can change channels 50 times per second. This helps provide reliable service, even with the existence of other HomeRF networks.

Understanding IrDA
IrDA stands for the Infrared Data Association, standardizing the hardware and software protocols that make up this wireless technology designed for the PAN.

Bluetooth Technology Connect cell phones to laptop computers, but it is expected that it will gradually replace cables and infrared as the primary means of wireless exchange of information between devices. One of the objectives of Bluetooth technology is to enable users to connect a wide range of computing and telecommunications devices easy and simply, without the need to buy, carry, or connect cables. It delivers opportunities for rapid ad-hoc connections, and the possibility of automatic, unconscious connections between devices. It will virtually eliminate the proprietary cabling to connect individual devices.

Bluetooth is a new communication system for electrical devices in the home. A Bluetooth is a wireless system that uses radio waves for communication. It has the ability to communicate with many different devices at once without interference.
Bluetooth is based on a low-cost, low power, short range radio link. Bluetooth cuts the cord that used to tie up digital devices. when two Bluetooth devices come within 50 meters range of each other , they establish a connection together. In future, Bluetooth is likely to be standard in tens of millions of mobile phones, PCs, laptops and a whole range of other electronic.

It operates at 2.45 GHz which is available globally, although


slight variation of location and width of band apply.

The range is set at 10 to100 meters to optimize for target market of


mobile and business user. The range can, however, be increased.

Gross data rate is 1Mbit/s, with second generation plans to increase


to 2 Mbit/s. One-to-one connections allow maximum data transfer rate of 723

kbits/s. It has low power consumption, drawing only 0.3 mA in standby mode. This enables maximum performance longevity for battery
powered devices. During data transfer the maximum current drain is 30 mA. However, during pauses or at lower data rates the drain would be lower.

Virtually any digital device can be part of the Bluetooth system.


Phones and pagers Modems LAN access devices Headsets Notebook computers Desktop and handheld computers Printers Fax machines Keyboards & Joysticks

Working Principle
Bluetooth radios operate in the unlicensed 2.4GHz frequency range ; already widely used by devices such as microwave ovens, baby monitors, cordless telephones . Bluetooth uses a technology called Spread spectrum frequency hopping in order to avoid interference from these devices . In Spread-spectrum frequency hopping , the Bluetooth-enabled devices will use 79 individual, randomly chosen frequencies within a designated range and change from one to another on a regular basis. Because Bluetooth transmitters change frequencies 1,600 times every second, more devices can make full use of a limited slice of the radio spectrum without interferring with each other. Since the transmitters hop so frequently, any interference from other Bluetooth devices would only last a fraction of a second. Bluetooth also uses the lowest transmit power of the wireless technologies, which further minimizes interference from other devices.

Car Battery

Microphone Control Box Bluetooth enabled Handset Car Stereo Mode Cable Car Speaker

What is a Piconet?
Once two or more Bluetooth-capable devices strike up a conversation with each other, the devices form a network to create what is called a personal-area network (PAN), or PICONET. Up to eight devices can be supported on a Bluetooth piconet at a time. A piconet consists of a minimum of one master and one slave

Master :Controls all timing Master

including the clock and hopping.

Slave 1

Slave 2

Slave 8

All slaves synchronize to the master

Introducing: The Scatternet !


If two piconets were within the same coverage area ,they have overlapping coverage areas. This scenario is provided for in the Bluetooth specification and is referred to as a scatternet.

PC (Master)

Card Scanner (Slave)

Headset (Slave)

Phone (Master) Phone (Slave)

CUBICLE #1

CUBICLE #2

Bluetooth Security
Reception of data in uncorrupted condition In security mode 1 No security measures are utilized. Any other Bluetooth device can access the data and services of a device. No eavesdropping i.e. High information security

Authentication

Security mode 2 Enacts security measures based on authorization. In this mode, different trust levels can be defined for each of the services offered by the device.

Security mode

Security mode 3 Requires both authentication and encryption.

What about radiation; is it dangerous?

It is a matter of concern for some people that the carrier waves used by Bluetooth's transmitters use the same frequency range as microwave Ovens (Bluetooth uses 2.402 GHz to 2.480 GHz). What does it feel like to get in the path of such waves? Actually, the transmitting power is far too weak to be noticeable for humans. Moreover, the radiation is not concentrated in a beam, but dispersed more or less in all directions. When using a wireless phone or a Bluetooth device, some of the emitted RF energy is absorbed by the body. The penetration depth is about 1.5 cm at 2450 MHz (about 2.5 cm at 900 MHz), which means that the absorption is very superficial.

Bluetooth In Competing Technologies


In the revolution of miniature of computers, the scientists are ahead with Bluetooth technology. See the forthcoming computers within your pockets ..

This pen sort of instrument produces both the monitor as well as the keyboard on flat surfaces from where you can just carry out the normal operations you do on your desktop

1 3

2 4

Competing technologies of Bluetooth

How about Infrared technology ?


One of the 3 IrDA-standards that are used today is called IrDA-Data, and this standard is primarily meant for data transmission. But the main differences as compared to Bluetooth are: IrDA is not omnidirectional, as is Bluetooth. The IrDAbeam has to be aimed at the receiving antenna. IrDA must have a free line of sight. IrDA is point-to-point; only 2 units at a time can communicate.

So there you are; Bluetooth is simply the best!

Mobile Computing Environment


User mobility :Though the user roams from one place to another he should be able to use the same service. This service may be a remote network or home network.

Bearer mobility : In this case the user may move from one bearer to another bearer but use the same service. Host mobility : In host mobility the user device can be either a server or a client. If it is a host mobility the mobility of that IP should be given more care. But if it is server or host mobility, some complexities will change. Service mobility : Though the user changes from one service to another service it should remain enabled and if a user is sending a mail and he refers some information in his PC stored file for adding in his mail he should be allowed to do so.

Different Names of Mobile Computing Virtual Home Environment: VHE to operate a device like heater in a persons home though he is away from his place. He has a virtually available feeling at his home that is the ability to share data drives, files, printers, and other devices benefits many types of home and home office users. Nomadic Computing: The entire mobile computing environment is nomadic in nature and it moves with the roaming user. Wearable Computer: The wearable computers are used like wearable accessories like shoes, clothes etc. by Human beings..

Services Ubiquity: Usually users carry hand-held devices wherever they go thus making themselves available to wireless network.

Location Awareness:Hand held device equipped with global positioning system provides current location of user .
Adaptively: is a crucial issue in mobile environment because of its diverse behavior-intermittent disconnections , symmetric communication bandwidth , bandwidth limitation hand off, different capability of hand-held devices and etc.

Broadcasting: Cellular communication technology is a means to reach out many users and to disseminate information. Personalization: Services in mobile environment are catered according to users profile .

Architecture of mobile computing The presentation layer is concerned about user interaction. Its applications run on the client devices. This layer also includes web browsers, and the customized client programs. The application tier is also known as middle tier which is like on engine to the automobile. This layer includes technology like Java, NET services, cold fusion web logic, iplanet, Z end etc. it is database independent. The middleware also covers a wide range of software systems, mobile application support etc. Data tier consist of database management and data store.

Mobile Computing Applications


We are now in a society where information is a power. Development of mobile technology has enable people to send or extract information while on move. The deployment and scalability are important positive points in favor of data transmission on wireless medium. When a data is on air , all the devices on listen mode can receive the data. This , therefore creates very difficult security issues that must overcome to ensure privacy of transmitted data.

Mobile communication refers to the conversation established between two users at two different places with their hand held equipment. Initially the focus of mobile communication was towards voice but later it also dealt with data. Today, cellular phones provide many services like electronic mail, internet access, short message service, Electronic address book, games, calculator.

Generation Of Mobile Communication


The first generation technology is based on CDMA and protocol is demonstrated by Advanced Mobile Phone System (AMPS). This is the analog cell phone standard. Although this system useses digital signaling to connect the radio towers. Global System for Mobile Communication(GSM), which followed the above, is categorized as second generation technology with the higher digital voice quality and low cost alternatives to making calls such as text messaging..
Global Packet Radio System(GPRS) is an extension of GSM and treated as 2.5 generation technology. The exciting thing about GPRS is that it will allow user to remain connected to the internet and enables multimedia capabilities including graphics and video viewing. Universal Mobile Telephone Standard(UMTS) enlisted as the third generation technology with the capabilities like voice data and non-voice data(exchanging email, instant messaging and video telephony)

Global System for Mobile Communication(GSM) GSM is a digital mobile telephone system that is widely used in Europe and other parts of the world. GSM uses a variation of time division multiple access(TDMA) . GSM digitizes and compresses data, then sends it down a channel with two other streams of user data , each in its own time slot. It operates at either the 900MHz or 1800 MHz frequency band.

The advantage for network operators has been the ability to deploy equipment from different vendors because the open standard allows easy inter-operability. Like other cellular standards GSM allows network operators to offer services which mean subscribers can use their phones all over the world.
Radio Interface Subscriber Identity Module GSM Security

Radio Interface.
GSM is a cellular network , which means that mobile phones connect to it by searching for cells in the immediate vicinity. GSM networks operate in four different radio frequencies. Most GSM networks operate in the 900 MHz or 1800 MHz bands . GSM uses linear Predictive coding (LPC). The purpose of LPC. Is to reduce the bit rate. The LPC provides parameters for a filter that mimics the vocal tract. The signal passes through this filter, leaving behind a residual signal. Speech is encoded at 13 kbit/s.

Indoor coverage is also supported by GSM and may be achieved by using an indoor an indoor picocell base station , or an indoor repeatrer with distributed indoor antennas fed through power splitters, to deliver the radio signal from an antenna outdoors to the separate indoor distributed antenna system. These are typically deployed when a lot of call capacity is needed indoors, for example in shopping centers or airports. However, this is not a pre-requisite, since indoor coverage is also provided by in-building penetration of the radio signals from nearby cells.

The modulation used in GSM is Gaussian minimum shift keying (GMSK), a kind of continuous phase frequency shift key . In GMSK , the signal to be modulated onto the carrier is first smoothed with a Gaussian low pass filter prior to being fed through frequency modulator , which greatly reduces the interference to neighboring
channels.

The network behind the GSM system seen by the customer is large and complicated in order to provide all of the services which are required .It is divided into a number of sections;
The Base Station Subsystem (BSS)( the base stations and their controllers). The Network and Swishing Subsystem(NSS)(the part of the network most similar to a fixed network).This is sometimes also just called the core network. All of the elements in the system combine to produce many GSM services such as voice calls and SMS.

Subscriber Identity Module One of the key features of GSM is the subscriber Identity Module(SIM),commonly Known as a SIM card. The SIM is a detachable smart card containing the users subscription information and phonebook. This allows the user to retain his information after switching handsets. Alternatively , the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a signal SIM, or only a SIM issued by them ; this practice is known as SIM Locking , and is illegal in some countries.

GSM Security
GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using shared-secret cryptography. Communications between the subscriber and the base

station can be encrypted .

General Packet Radio Service (GPRS) GPRS is a bearer service for GSM (Global system for mobile communications) that greatly improves and simplifies wireless access to packet data networks. It transfers data packets from GSM mobile stations to external packet data networks (PDN) using a packet radio principle. Packets can be directly routed from the GPRS mobile stations to packet switched networks. Networks based on the internet protocol (IP) and X.25 networks are supported by GPRS. GSM uses a billing system based on time of connection, whereas GPRS uses a billing system based on amount of transmitted data rather than time of connection. So, user can remain connected to the system still not charged and only charged for the amount of transmitted data.

GPRS system Architectures


GPRS is integrated with existing GSM architecture with the help of GPRS support nodes (GSN), these GSN are responsible for packet delivery and recovery between mobile stations and external packet data networks (PDN). Mobile stations (MS) move around cells formed by Base Transceiver stations (BTS). Several BTSs are controlled by one Base Switching Center (BSC). These BSCs are again connected to Mobile Switching Center (MSC) which control the traffic. A serving GPRS Support Node (SGSN) is responsible for data packets delivery and routing, mobility management, authentication and charging within the network. It maintains a location register to store the information of all GPRS users within its service area. A Gateway GPRS support Node (GGSN) connects GPRS backbone network and the external packet data networks. It does the necessary packet format conversion between GPRS and external PDNs (e.g. IP,X.25 etc.). The GGSN is also responsible for authentication and charging issues across networks.

A Gateway GPRS support Node (GGSN) connects GPRS backbone network and the external packet data networks. It does the necessary packet format conversion between GPRS and external PDNs (e.g. IP,X.25 etc.). The GGSN is also responsible for authentication and charging issues across networks.
Home Location Register (HLR) is used to store the users current location. Visited Location Register (VLR) is used to store the information of users who are currently in the area of control. Authentication Center (AUC) generates and stores security-related data and Equipment Identity Register (EIR) uses equipment data

GPRS Interfaces The network components of GPRS are connected together by well defined interfaces. These interfaces support packet switched data between the components and used for signaling and data transfer.
GPRS Services GPRS offers end-to-end packet switched data transfer services which are mainly categorized into two types: 1) Point-To-Point (PTP) service 2) Point-To-Multipoint (PTM) service

Universal Mobile Telecommunications Systems (UMTS) UMTS, using W-CDMA, supports up to 14.0 Mbit/s data transfer rates in theory (with HSDPA), although at the moment users in deployed networks can expect a performance up to 384 Kbit/s for R99 handsets, and 3. Mbit/s for HSDPA handsets in the downlink connection. This is still much greater than the 14.4 kbit/s of a single GSM error-corrected circuit switched data channel or multiple 14.4 Kbit/s channels in HSCSD, and in competition to other network technologies such as CDMA2000, PHS or WLAN- offers access to the World Wide Web and other data services on mobile devices.

W-CDMA
W-CDMA (Wideband Code Division Multiple Access) is a type of 3G cellular network. W-CDMA is the higher speed transmission protocol used in the Japanese Freedom of mobile multimedia access (FOMA) system and in UMTS system, an advanced 3G system, designed as a replacement for the aging 2GGSM networks deployed worldwide. More technically, W-CDMA is a wideband spreadspectrum mobile air interface that utilizes the direct sequence Code Division Multiple Access signaling method (or CDMA) to achieve higher speeds and support more users compared to the older TDMA signaling method or GSM networks. W-CDMA is a competitor to CDMA2000.

Mobile Phone and Human Body Many people focused on intracranial tumours because of deposition of energy from RF fields from a mobile phones is mainly within a small area of the skull near the handset. The Scientific Committee on Toxicity, Ecotoxicity and the Environment (CSTTE) presented an opinion on possible effects of Electromagnetic Fields (EMF), Radio Frequency Fields (RF) and Microwave Radiation on human health in 2001. Since the adoption of the 2001 opinion, extensive research has been conducted regarding possible health effects of exposure to low intensity RF fields.

This research has investigated a variety of possible effects and has included epidemiologic, in vivo, and in vitro research. The overall epidemiologic evidence suggests that mobile phone use of less than 10 years does not pose any increased risk of brain tumour or acoustic neuroma. For longer use, data are sparse, since only some recent studies have reasonably large numbers of longterm users.

Any conclusion therefore is uncertain and tentative.

You might also like