Introduction to Mobile Computing

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which sequence accurately represents the evolution of computing devices based on decreasing volume?

  • Mainframe, Workstation, Laptop, Personal Computer, Mini-Computer, Smartphone, mm-scale sensors (correct)
  • Mainframe, Workstation, Laptop, Mini-Computer, Personal Computer, Smartphone, mm-scale sensors
  • Mainframe, Workstation, Laptop, Personal Computer, Mini-Computer, mm-scale sensors, Smartphone
  • Mainframe, Workstation, Laptop, Mini-Computer, Personal Computer, mm-scale sensors, Smartphone

Which of the following best describes mobile computing?

  • Technologies that transmit data, voice, and video only via smartphones through fixed physical links.
  • Technologies limited to transmitting only voice data over wireless devices.
  • Technologies focused on wired connections for data transmission using portable devices.
  • Technologies that allow transmission of data, voice, and video via computers and smartphones without needing a fixed physical link. (correct)

What is a key function of mobile communication infrastructure in mobile computing?

  • Focusing solely on bandwidth allocation to support stated services.
  • Supporting seamless and reliable communication through devices, protocols, services and sufficient bandwidth. (correct)
  • Restricting services to maintain minimal bandwidth usage.
  • Ensuring devices are connected via physical cables for reliable communication.

In the context of mobile devices/hardware, what is a key characteristic?

<p>They include components that can receive or access mobility services and are capable of sensing and receiving signals. (B)</p>
Signup and view all the answers

What is the primary role of mobile software in mobile computing?

<p>To run applications based on the hardware's capabilities and the requirements of those applications. (C)</p>
Signup and view all the answers

What is the main significance of portability in mobile computing?

<p>It allows users to operate from anywhere, not being restricted to a single physical location. (A)</p>
Signup and view all the answers

What is the key function of a sensor in the context of mobile and wireless devices?

<p>To transmit state information without requiring complex software. (B)</p>
Signup and view all the answers

Why has the use of pagers declined significantly in many countries?

<p>Mobile phones offer more versatile communication options. (D)</p>
Signup and view all the answers

Which feature differentiates modern smartphones from traditional mobile phones?

<p>Smartphones offer full-color graphic displays, touch screens, and internet browsers. (D)</p>
Signup and view all the answers

What is the main function of a Personal Digital Assistant (PDA)?

<p>To act as an electronic organizer and provide basic office software applications. (D)</p>
Signup and view all the answers

What is the primary distinction between a notebook/laptop and a desktop computer?

<p>Notebooks/laptops have size, weight, and battery operation as key differentiators. (B)</p>
Signup and view all the answers

In vehicle and traffic management, how is digital audio broadcasting (DAB) used?

<p>For providing music, news, road conditions, and weather reports. (D)</p>
Signup and view all the answers

What role does ad-hoc networking play among cars driving in the same area?

<p>It helps cars build a local network for quick information exchange. (C)</p>
Signup and view all the answers

In emergency situations, what is the importance of a high-quality wireless connection in an ambulance?

<p>To enable sending vital information about injured persons to the hospital. (C)</p>
Signup and view all the answers

During natural disasters like hurricanes or earthquakes, what role do wireless networks play?

<p>They serve as the only means of communication when other infrastructures fail. (D)</p>
Signup and view all the answers

In business applications, what capability does wireless technology provide to a CEO?

<p>Ability to call meetings with distant employees via video conferencing without any location restriction. (C)</p>
Signup and view all the answers

What is a key application of wireless networks related to remote sensors?

<p>Providing environmental information and monitoring weather conditions where wiring is impractical. (A)</p>
Signup and view all the answers

How can wireless networks enhance the experience of tourists using a travel guide app?

<p>By providing up-to-date information at any location and facilitating electronic payments. (B)</p>
Signup and view all the answers

What functionality do location-dependent services provide?

<p>They follow the user's location to provide services tailored to their current environment. (D)</p>
Signup and view all the answers

In the context of privacy in location-dependent services, what is a key consideration for users?

<p>Users may want to exclude certain services based on location and time to maintain privacy. (B)</p>
Signup and view all the answers

When considering challenges in mobile computing, how do wireless computers compare to stationary (wired) computers in terms of resources?

<p>Wireless computers have fewer resources relative to stationary computers. (C)</p>
Signup and view all the answers

What impact do obstacles in the surrounding environment have on wireless communication?

<p>They pose challenges to implementing wireless communication by interfering with message signals. (C)</p>
Signup and view all the answers

Why is wireless communication more susceptible to disconnections?

<p>Wireless signals are prone to interference and obstruction. (B)</p>
Signup and view all the answers

In relation to bandwidth, how do wireless networks typically compare to wired networks?

<p>Wireless networks usually deliver lower bandwidth than wired networks. (B)</p>
Signup and view all the answers

Why is security a significant concern in wireless communication?

<p>Wireless connections are easier to compromise due to the accessibility of wireless links. (A)</p>
Signup and view all the answers

What is address migration in the context of mobility in mobile computing?

<p>It involves mobile computers using different network access points as they move. (C)</p>
Signup and view all the answers

What is a key challenge related to location-dependent information in mobile computing?

<p>Mobile computing must intelligently factor out location information and obtain relevant configuration data. (A)</p>
Signup and view all the answers

Why is reducing battery weight important in portable computing devices?

<p>Batteries are the largest single source of weight in a portable computer (A)</p>
Signup and view all the answers

What are the primary risks associated with making computers more portable?

<p>Increased risk of physical damage, unauthorized access, data loss, and theft. (B)</p>
Signup and view all the answers

What is a limitation of small user interfaces on portable devices?

<p>They make it impractical to have multiple windows open at the same time. (D)</p>
Signup and view all the answers

Why are disk drives considered a liability in mobile computers?

<p>They consume more power and have limited storage space. (B)</p>
Signup and view all the answers

What is the role of the physical layer in wireless communication according to the Simplified Reference Model?

<p>Converting a stream of bits into signals for transmission and handling carrier frequencies. (A)</p>
Signup and view all the answers

What are the main tasks of the data link layer in the Simplified Reference Model?

<p>Accessing the medium, multiplexing data streams, error correction, and synchronization. (A)</p>
Signup and view all the answers

What is the primary function of the network layer according to the Simplified Reference Model?

<p>Routing packets through the network and managing device handover. (D)</p>
Signup and view all the answers

According to the Simplified Reference Model, what is the role of the transport layer?

<p>Establishing an end-to-end connection and controlling quality of service. (B)</p>
Signup and view all the answers

What does the application layer handle according to the Simplified Reference Model?

<p>Supporting multimedia applications, adaptive application, and wireless web access. (D)</p>
Signup and view all the answers

What differentiates wireless transmission from wired transmission?

<p>Wireless transmission involves data transfer through air, without any physical media. (C)</p>
Signup and view all the answers

Why are radio frequencies regulated in wireless transmission?

<p>To avoid interference between different transmissions. (B)</p>
Signup and view all the answers

What characterizes Omni-directional antennas?

<p>They radiate radio waves in all directions for broadcast communications. (B)</p>
Signup and view all the answers

What distinguishes wired networks from wireless networks concerning signal behavior?

<p>The wire helps determine the direction of propagation in wired networks, which is not the case in wireless networks. (B)</p>
Signup and view all the answers

What is the effect of multipath propagation on signal transmission?

<p>It causes signals to take multiple paths, leading to scattering and diffraction. (D)</p>
Signup and view all the answers

What is 'multiplexing' in the context of wireless communication?

<p>A technique to share a common medium among several users with minimal interference. (B)</p>
Signup and view all the answers

Flashcards

Mobile Computing

A bundle of technologies for data, voice, and video transmission via a computer, smartphone, or wireless device, without a fixed physical link.

Mobile Communication

The infrastructure ensuring smooth and reliable communication, including devices, protocols, services, and bandwidth.

Mobile Devices

Mobile devices or components that receive or access mobility services; examples include laptops, smartphones and tablets.

Mobile Software

An actual program that runs on the mobile hardware. It focuses on meeting the characteristics and requirements of mobile applications.

Signup and view all the flashcards

Sensor

A very simple wireless device that transmits state information, such as a switch sensing whether a door is open or closed.

Signup and view all the flashcards

Pager

A simple receiver that can display short text messages but cannot send messages.

Signup and view all the flashcards

Personal digital assistant

Acts as an electronic organizer or day planner and comprises simple versions of office software. It is an extension of the PC, not a replacement.

Signup and view all the flashcards

Pocket computer

The next steps toward full computers with tiny keyboards, color displays, and simple versions of programs found on desktop computers.

Signup and view all the flashcards

Infotainment travel apps

Provide constant updates at a certain location on things like history of a building, weather etc.

Signup and view all the flashcards

Location Dependent Services

Services that adjust based on the user's current location. They follow user location to provide services wherever the user is.

Signup and view all the flashcards

Address Migration

Occurs when mobile computers use different network access points (addresses) as people move.

Signup and view all the flashcards

Portability

The ability of a communication device to move with or without a user. Batteries are the largest single source of weight in a portable computer.

Signup and view all the flashcards

Wireless Transmission

A wireless communication setup where data transmits between endpoints through air, without any physical connection.

Signup and view all the flashcards

Multiplexing

The process of combining multiple signals into one for transmission over a shared medium.

Signup and view all the flashcards

Space Division Multiplexing

Divides the transmission medium into discrete spatial channels.

Signup and view all the flashcards

Frequency Division Multiplexing (FDM)

Subdivides the frequency dimension into several non-overlapping frequency bands. The technique assigns different frequency bands to multiple signals.

Signup and view all the flashcards

Time Division Multiplexing (TDM)

Each channel can fully use bandwidth for a specified time. A method of sending signals by dividing the signal into discrete segments.

Signup and view all the flashcards

Code Division Multiplexing (CDM)

All channels use the same spectrum, and separation is based on assigning orthogonal codes to each channel.

Signup and view all the flashcards

Analog Modulation

Shifting center frequency of baseband signal up to the radio carrier to allow the use of smaller antennas and for the frequency division multiplexing.

Signup and view all the flashcards

Amplitude Shift Keying(ASK)

amplitude shift keying. Two binary values, 1 and 0, are represented by use of amplitude.

Signup and view all the flashcards

Frequency Shift Keying(FSK)

Assigns one frequency f₁ to the binary 1 and another frequency f₂ to the binary 0.

Signup and view all the flashcards

Phase Shift Keying(PSK)

Uses shifts in the phase of a signal to represent data.

Signup and view all the flashcards

Spread Spectrum

Spreads the narrow (frequency) band signal into a broad band signal using a special code.

Signup and view all the flashcards

Spread sequence spread spectrum

Use civil and military spread sequence factors.

Signup and view all the flashcards

Relationship between spread factor and signal bandwidth

The original signal needs a bandwidth w, the resulting signal needs bandwidth of s*w after spreading

Signup and view all the flashcards

Frequency hopping spread spectrum

Splits band into many channels of smaller bandwidth plus guard spaces between the channels

Signup and view all the flashcards

Fast Hopping

A cellular system where transmitter changes the frequency several times during the transmission of a single bit.

Signup and view all the flashcards

Cellular Systems

System where base covers a cell in hexagon.

Signup and view all the flashcards

Medium Access Control (MAC)

Regulates user access to a medium using SDM, TDM, FDM, or CDM, Similar to traffic regulations in the highway

Signup and view all the flashcards

Medium Access Control

Method for MAC which detects idle before the transmission of data.

Signup and view all the flashcards

TDMA

Multiple Access with Collision Avoidance. Which helps to solve the hidden terminal problem, B (Hidden terminal problem is solved)

Signup and view all the flashcards

Near and far terminals

Stations A and B send, whereas C receives. Solution is achieved using power and precise algorithm.

Signup and view all the flashcards

SDMA (Space Division Multiple Access)

Used for assigning separated space to users in wireless networks: Mobile phone may receive the data sent using stations

Signup and view all the flashcards

FDMA (Frequency Division Multiple Access)

Which used to allocats frequency to the channels according transmission : Allocation can will radio stations (e.g. radio stations) or dynamic

Signup and view all the flashcards

TDMA (Time Division Multiple Access)

assign transmission channel to each sender for a certain amount of time

Signup and view all the flashcards

Aloha

A scheme invented used for to support wireless stations: access without control where channels access random

Signup and view all the flashcards

Slotted Aloha

This provides time slots and the senders transmission only will during synchronized : This access is not coordinate

Signup and view all the flashcards

CDMA (Code Division Multiple Access)

Codes must be certain autocorrelation ,these codes must distinct and isolate data send

Signup and view all the flashcards

Study Notes

  • Unit 01 provides an introduction to Mobile Computing.

Evolution of Computing Devices

  • A graph illustrates the evolution of computing devices over time.
  • The volume of different devices (Mainframe, Workstation, Laptop, Mini-Computer, Personal Computer, and Smartphone) in cubic millimeters (mm³) has decreased from 1960 to 2020.
  • The X-axis represents the year of introduction of different computing devices.

Mobile Computing

  • Mobile computing involves technologies that allow the transmission of data, voice, and video.
  • This happens through a computer, smartphone, or any wireless-enabled device.
  • The connection doesn't require a fixed physical link which enables users to access data regardless of their location.
  • Mobile computing consists of mobile communication, mobile devices/hardware, and mobile software.
  • Mobile communication refers to the infrastructure for seamless and reliable communication which includes devices, protocols, services, and bandwidth.
  • Mobile devices or hardware includes components that receive or access the service of mobility, like portable laptops, smartphones, tablet PCs, and Personal Digital Assistants (PDAs).
  • These devices have a receptor medium for sensing and receiving signals, operate in full-duplex mode, and use existing networks, mostly wireless.
  • Mobile software is the actual program that runs on the mobile hardware.
  • The software's main factor is portability, allowing users to operate from anywhere.

Mobile and Wireless Devices

  • Sensors are simple wireless devices represented by a sensor transmitting state information.
  • Pagers are simple receivers that display short text messages, but cannot send any messages and are virtually replaced by mobile phones
  • Mobile phones/smartphones send/receive voice or short messages and now have color graphic displays, touch screens, and internet browsers.
  • They can run multiple programs concurrently and have high-speed data access via Wi-Fi and cellular broadband.
  • Personal Digital Assistants (PDAs) act as electronic organizers, comprising simple versions of office software.
  • Pocket computers are a step towards full computers that have tiny keyboards, color displays, and simple versions of programs.
  • Notebooks/laptops offer similar performance to desktop computers with the only difference being size, weight, and the ability to run on battery.

Applications of Mobile Computing

  • Vehicles/Traffic applications use wireless communication for mobility-aware systems.
  • These systems receive music, news, road conditions, and weather reports via digital audio broadcasting (DAB).
  • UMTS are used for personal communication with voice and data connectivity.
  • Satellite communication provides a connection in remote unknown areas and uses GPS to find the exact position.
  • Cars in the same location can form an ad-hoc network for quick information exchange.
  • Emergency applications include ambulances with high-quality wireless connections.
  • These systems share vital information about injured persons from the accident scene with the hospital.
  • Specialist suggestions can be prepared in advance and doctors can be consulted early for diagnosis.
  • Wireless networks are used for communication when hurricanes or earthquakes happen.
  • Decentralized, wireless ad-hoc networks and mobile phone systems may be the only systems that survive, if the fixed telephone system fails.
  • Business applications allow CEOs to call distant video conferences and allow travelling salesman to access the database.

More Applications for Mobile Computing

  • Wireless networks can replace wired networks in certain situations like remote sensor locations, where deploying weather forecasts or earthquake detection is impossible due to deployment costs.
  • Tradeshows may need to dynamically setup an infrastructure for the show.
  • Cabling takes a long time and inflexible in historic buildings when a lot of cabling can destroy valuable walls or floors.
  • A wireless access point can be setup in the corner of a room as a solution.
  • In Entertainment, Apps will provide travel guides and building information for the user Users can pay for goods via their card on their phone.

Location Dependent Services

  • These services can follow the user location or detect the user's location for custom services to be provided.
  • If a conference call starts, then it will be forwarded to the location of the current user.
  • Email services will follow the location of the user to the current location
  • Information services will allow you to search for local businesses, like ATM's.
  • Important information must be secure when transferred to the user such as bank information, and video calls.

Challenges in Mobile Computing

  • Challenges in mobile computing include wireless communication, mobility, and portability due to having fewer resources to stationary machines.
  • This means devices need to be smaller, lighter and consume less.
  • Obstacles make the wireless connection difficult to implement due to the errors the wireless connection causes.
  • Wireless communication is more susceptible to disconnection. Resources need to be allocated to handle disconnection.
  • Wireless networks deliver lower bandwidth than wired and mobile designs must be concerned about bandwidth consumption.
  • User experience must be of good quality.

Additional Challenges in Mobile Computing

  • Security risks are greater with wireless. Security is further complicated if users allowed to cross security domains, secure communication over insecure channels is accomplished by encryption.
  • A mobile computer needs a mechanism for determining which server to use as a mobile computer's network address keeps changing.
  • Mobility requires an update to what the current "address" of a user is at all times in conjunction to local name servers, printers, and more.
  • Weight should be minimal, and batteries should still have long lives.
  • Breaches of data can happen easier as mobile devices get lost easier.

Portability Challenges

  • Smaller devices have inadequate techniques to show windowing. Surface areas of devices are smaller making other forms of input difficult.
  • Smaller Storage occurs as it's limited by physical size in comparison to larger desktop computers.

Simplified Reference Model

  • There are 5 components to this reference model: Physical, Data Link, Network, Transport, and Application.
  • The physical Layer is responsible for managing the transfer of of all information that is going to be transmitted. This includes signals, frequency, detecting signals, generating them, modulation, and more.
  • Data Link is responsible for transferring data by synchronizing different streams, correcting transmission errors, and more.
  • Network is responsible for sending packets through a given network.
  • Transport is responsible for providing the service that the networks provides.
  • Application is responsible for ensuring all prior layers can interact with the world wide web (www)

Wireless Transmissions

  • Wireless transmission occurs between 2 points without any physical media.
  • The distances of transmission can range from meters, to thousands kilometers. The frequencies used are regulated.
  • Wireless has hurdles that wired transmission typically does not.
  • IR is commonly used in fiber optics as well in wireless communication.
  • Radio transmission frequency: Very Low, Low, Medium, High, Very High, Ultra High.

Wireless Transmission: Frequencies Regulation

  • Mobile phones generally transmit using: NMT, AMPS, TDMA, CDMA, GSM, UMTS (FDD), and W-CDMA.
  • Cordless telephones generally transmit using: UMTS (TDD), CT1+, CT2, DECT, and PACS.
  • Wireless LANS generally transmit using: IEEE 802.11, HIPERLAN2, and IEEE 802.11a.
  • Others can transmit using RF-Control, and Satellites.
  • Signals can be the physical representations of data when the user exchanges it.
  • Signal function parameters = Amplitude A, Frequency f, and Phase Shift φ

Wireless Transmission: Signals

  • The signal parameters are: Amplitude A, Frequency f, and Phase Shift.
  • Amplitude, A is measured in Volts (V). The value is displayed versus the frequency f(Hz).
  • Transmissions can be manipulated in 3 directions. Amplitude, Frequency and Phase shift.
  • Antennas couple electromagnetic energy to and from a medium
  • Some antennas transmit Omni directionally in communications for ulticast communications like radio, TV and some paging systems.
  • Others are unidirectional for unicast communications such as telephone and satellites.

Wireless Transmission: Signal Propogation

  • Signal Propagation means that wired/wireless networks have senders/receivers. However, transversal has some differences.
  • Wireless networks only transmit if there are no wires in the selected direction.
  • Line of Site: Emitted waves follow on the ground for distances and direct communication.
  • When a transmission is being sent, the range can be: Transmission, Detection, Interference
  • Signals that travel like light are known as "Line Of Sight"

Wireless Transmission: Multipath Propgation

  • Signals can take many paths between the sender and receiver, such as reflection, scattering, and diffraction.
  • When multiple signals arrive to the receiver it can cause interferences, creating a delay in the signal sent to the receiver.
  • Some signals follow an irregular path, creating sky waves/ground waves.
  • Signals follow ground waves which allow the earth's surface transmissions to propagate for a long time, for the use of submarines.
  • Distant communication also makes use of short waves that follow the earth/ionosphere.

Wireless Transmission: Multiplexing

  • Mutliplexing means a common medium can be shared by other users with the use of different techniques to avoid interference.
  • Users use a highway, or lane, with the lanes providing the space.
  • Multiplexing can use four dimensions, time, space frequency and code.
  • Using guard spaces is important, this gives the users time to start their transmissions.
  • Criteria to ensure quality:
    • Minimum interference
    • Max utilisation of the medium
  • Multiplexing can also divide space into three dimensions (SDM.)
  • Different senders must be wide enough from one another to isolate the other user.
  • Some channels may establish to close, which creates issues leading to radio interference.
  • Different senders use a certain space to their own frequency band so they continuously transmit data. A well known example of this is Radio.
  • Multiple transmissions leads to waste and is very inflexible.

More Detailed Information on Wireless Transmission Channels

  • Each channel has it's own individual frequency band for data to continuously be transmitted and uses radios (FDM.)
  • TDM can be used to create a full bandwidth line with guard spaces.
  • Time-Division Multiple Access (TDM): can be used when each kᵣchannel gives a certain bandwidth for a certain length of time (GSM.)
  • Different radio channels talk to each other, but use a code to identify them by their code division (CDM.)
  • Coding assigns a certain code to a channel creating a code division.
  • Since you're assigning codes to different channels, this causes a good protection against data interference.
  • With each channel being able to use the same spectrum and separation being coded, channels can interfere creating background static in the line .
  • This means better signal regeneration is critical for good code division, while also making the data lower.

Modulation Systems: Digital, and Analog System

  • Digital modulation requires analogizing it. By amplitude or frequency (FSK.)
  • Analog modulation requires shifting the frequency to act as the receiver. This includes smaller antennas/multiplexing using radio and more.
  • Signals can be manipulated in three different methods. Digital can be modified, or used as amplitude by shifting it.

Modulation Systems Digital Details

  • Amplitudes is where the system can be zero, which represents the binary.
  • With FSK the frequency is either increased or decreased as an indicator for changing the signal. Implementers can use an alternate or two separate signals with slightly different paths.
  • Finally, with phase, the signal phase is given with a signal shifting data.
  • When data is set with "1", a +1 is set to multiply the frequency. When "0" is set, a one (1) is implemented.

Spread Spectrum

  • Spread spectrum creates bands around the signal to broadcast the signal around a certain portion of a code.
  • The original data can be built even if the interference occurs.
  • Two transmission techniques used for SS are: DSS, and FHSS
  • DSS spreads the signals throughout the code.
  • HHSS splits transmissions between channels.

More Detailed Information on Spread Spectrums

  • It's common to XOR the signal with a chipping sequence to encrypt a spread.
  • The higher the chipping sequence means a wider system.
  • These systems are commonly used with many factors to consider,
    • civil app are set for factors of 10-100
    • Military is set as 10,000 and higher
  • The bandwidth of these transmissions is important.
  • With FHSS frequencies are split among channels. The transmitter and receiver typically stay on one of these channels. The dwell time is the time the signal spends on one channel. The signal is faster at running different routes, also known as fast hopping.
  • Signals can be used at one channel for several periods.

Additional Topics in Transmission and Cellular Networks.

  • The frequency synthesizer creates a chain to find the right bandwidth and modulate it. Once the receiver comes, the signal can be demodulated and show.
  • Cellular System design allow mobile communications to connect and implement SDM.
  • These are called base stations. The Radius is also determined by weather, building, and load of a phone network.
  • Mobile telemetry has cell around a location to communicate in vice versa.

Cellular System Benefits

  • Cellular systems install thousands of base stations rather than one massive transmitter.
  • SDM increase capacity of a signal and ensure it can connect.
  • Less Transmission occurs from nearby base stations sending energy to it.
  • Distance between sender and receiver increase, then that means the interferences will increase. Having a shorter range will only have the mobile or base deals with local areas.
  • Using signals can be decentralized across certain segments, causing the whole signal is good. The influences will be smaller as well.
  • Small cells have Infrastructure costs, but are required for better speeds and overall services. Handovers depend on cell size and speed.
  • When two frequencies interfere with one another frequencies have to be handled delicately.

Summary of Different Network Operations

  • A mechanism requires a user to access a medium using SDM, TDM, FDM and CDM.
  • MAC regulates the highway for example.
  • Wireless systems require multiple forms of authentication to create a good connection.
  • CSMA/CD scheme detects a collision every time.
  • Problems with wireless
    • Signal is not always in range
    • Objects attenuate the signal
    • Receiver may receive collisions from far senders.

Multiple Access Control

  • Multiple Access Control needs to be configured to support what is happening and if it's exposed during collision scenarios can cause an issue when devices wants to transmits, creating an idle medium.
  • The signal strength is drowned from B, making C unable to receive at all.
  • There needs to be a power control of sensors to allow the end user to use the full strength and medium around one receiver.
  • There should be different access methods in use, such as: MDMA, FDMA.
  • Different cells provide different quality in connection.

Medium Access Control Methods

  • SDMA allows different separated devices in users in wireless.
  • The MAC algorithm decides its cell is associated with terminal station code.
  • FDMA allows the radio stations to act as transmitters over time.
  • Allocation is configured to assign all the same time points, or even combining FDMA with TDMA for better transmission.
  • Channel transmissions are limited to what the sender does. You can always listen on the frequency, what's flexible is the wired based networks which are also designed on TDMA.
  • Fixed TDM occurs where a time slot can be created as a static channel in fixed patterns typically in bandwidth, used to implement duplexes/etc, TDD assigns uplink/downlink frequencies.

More Info on Time Division Multiple Access (TDMA)

  • The protocol in this, ALOHA, was invented at the University of Hawaii where there was no access. If two stations access, there would be created issues and destroy data. The works only for the light, and require complicated access.

  • New systems implement time slots to handle the lack of connections, such as slotted ALOHA. These schemes introduce time slots. Senders must synchronize while transmission can create some collisions to some degree.

  • A has already started the process, as the message sends in real time.

  • A is hidden from C for it is already communicating with A. However, after the connection with STS C can no longer create a connection.

  • Exposed terminal problems can result in a system by which one station has multiple ways of communicating at a certain point of time.

Better Forms of Connection Control

  • Busy tone signaling is the best method for sensing connections and transmissions.
  • Better forms of this rely on multiple systems, and can even come from other data sources.

Code Division Multiple Access

  • CDMA uses code to split access by creating very certain characteristics to handle the transmission. These systems used exact codes. Good codes can be separated from noise by two code categories. autocorrelation or have to be orthogonal. The vectors have to create inner products for this to workout.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Wireless Communication Fundamentals Quiz
10 questions
Mobile Computing Chapter 2 Revision Quiz
12 questions
Mobile Computing Basics
45 questions

Mobile Computing Basics

HilariousHarpGuitar5744 avatar
HilariousHarpGuitar5744
Use Quizgecko on...
Browser
Browser