Mobile Computing 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Mobile Computing 21-22

Question-1
(a) Assess why is the MAC protocol designed for infrastructure based
wireless a network may not work satisfactory in infrastructure-less
environment. Justify your answer.
Ans. A MAC (Media Access Control) protocol designed for infrastructure-
based wireless networks may not work satisfactorily in infrastructure-less
environments due to several key differences between these two types of
networks. Here are some justifications for why this is the case.

1. Centralized vs. Decentralized Control:


• Infrastructure-based networks typically have centralized control
mechanisms, such as access points or base stations, that coordinate
access to the wireless medium.
• In infrastructure-less environments, there is no central coordination,
and nodes must rely on decentralized protocols to manage access to
the wireless medium. MAC protocols designed for centralized control
may not be suitable for decentralized environments due to differences
in control and coordination mechanisms.
2. Topology and Connectivity:
• Infrastructure-based networks have a predefined topology with fixed
access points or base stations that provide connectivity to the network.
• Infrastructure-less environments, such as ad hoc or mesh networks,
have dynamic and changing topologies where nodes may join or leave
the network at any time. MAC protocols designed for infrastructure-
based networks may not be able to handle the dynamic nature of
infrastructure-less environments, leading to inefficiencies in resource
allocation and contention resolution.
Mobile Computing 21-22

(b) What are the limitations of mobile computing?


Ans. Mobile Computing is a technology that allows transmission of
data, voice and video via a computer or any other wireless
enabled device without having to be connected to a fixed physical
link.

Limitations 1. Hardware Challenges:


• Limited Battery Life: Mobile devices are powered by batteries, which have
limited capacity. Users often experience the need to recharge their devices
frequently, especially with intensive usage, limiting the device's operational
time.
• Limited Processing Power: Mobile devices typically have less processing
power compared to desktop computers. This can affect the performance of
resource-intensive applications, such as gaming or video editing.
• Limited Memory: Mobile devices often have limited memory (RAM)
compared to desktop computers. This can restrict the number of applications
that can run simultaneously and may lead to slower performance when
multitasking.
• Small Screen Size: Mobile devices have smaller screen sizes compared to
desktop monitors or laptops. This can make it challenging to view content,
especially for tasks that require detailed information or multitasking.
• Limited Storage Capacity: Mobile devices have limited internal storage
capacity for storing apps, media files, and documents. Users may need to
manage their storage space carefully or rely on cloud storage solutions.

• Compatibility Issues with Different Devices: Compatibility issues


between different devices and operating systems is another
important hardware challenge in mobile computing. Mobile device
users often face compatibility issues when trying to connect their
device with other peripherals such as printers or USB drives due to
differences in proprietary connectors used by each manufacturer.

2. Software Challenges:

• Network Connectivity Issues: Mobile connectivity can be unreliable


or unavailable in certain areas, such as remote locations or areas
with poor network coverage. This can affect the ability to access
online services, download content, or make voice calls.
Mobile Computing 21-22

• Security Concerns: Mobile devices are susceptible to security threats such as


malware, phishing attacks, and data breaches. Users need to take precautions,
such as installing security software and avoiding unsecured networks, to
protect their devices and data.
• Compatibility Issues: Mobile applications and content may not be
compatible with all devices or operating systems. Users may encounter
compatibility issues when trying to access or use certain apps or files.
• Privacy Concerns: Mobile devices collect and store a significant amount of
personal data, including location information, contacts, and browsing history.
Users need to be aware of privacy risks and take steps to protect their
personal information from unauthorized access or misuse.
• Compatibility Issues with Different Operating Systems:
different operating systems (e.g., iOS vs Android) have varying levels
of compatibility with third−party software applications, which can make
it difficult for some users to find apps that will work on their device.
Hardware challenges remain a significant issue for mobile computing
today despite advances in technology over time.

(b) Illustrate the structure of mobile computing applications.


Ans. Structure of mobile computing:

The Three Tiers In Detail


• Presentation Tier
It is the user interface and topmost tier in the architecture. Its purpose
is to take request from the client and displays information to the client.
It communicates with other tiers using a web browser as it gives output
on the browser. If we talk about Web-based tiers then these are
developed using languages like- HTML, CSS, JavaScript.
• Application Tier
It is the middle tier of the architecture also known as the logic tier as
the information/request gathered through the presentation tier is
processed in detail here. It also interacts with the server that stores the
data. It processes the client’s request, formats, it and sends it back to
the client. It is developed using languages like- Python, Java, PHP, etc.
• Data Tier
It is the last tier of the architecture also known as the Database Tier. It
is used to store the processed information so that it can be retrieved
later on when required. It consists of Database Servers
Mobile Computing 21-22

like- Oracle, MySQL, DB2, etc. The communication between the


Presentation Tier and Data-Tier is done using middle-tier i.e.
Application Tier.

(c) Explain GSM architecture and its services with neat diagram.

Ans. Global System for Mobile communication: GSM stands for Global
System for Mobile communication. It is a standard developed by European
Telecommunication Standards Institute (ETSI) to describe protocols for second
generation (2G) digital cellular networks. It was a replacement for the first
generation (1G) cellular networks. It is not only used for voice calls, it can also
be used for data computing and sending text messages.

The biggest disadvantage of GSM is that multiple users share the same bandwidth.
This may cause interference and due to interference bandwidth limitation occurs.

GSM architecture
Mobile Computing 21-22

Question-2

(a). What are the architectural changes required to make in the


conventional a distributed commit protocols suitable for increasingly
complex mobile environment (In context of cellular network)? Discuss
your answer from practical point of view.

Ans. In the context of increasingly complex mobile environments, such as


cellular networks, several architectural changes are required to adapt
conventional distributed commit protocols. Here are some key
architectural changes:

• Adaptability to Unreliable Connectivity: Mobile environments often


have unreliable network connections due to factors like signal
strength, handovers between cells, and network congestion.
Distributed commit protocols need to be modified to handle
intermittent connectivity gracefully. This may involve implementing
techniques such as buffering committed transactions locally on
mobile devices and asynchronously synchronizing them with the
network when connectivity is available.
• Battery and Bandwidth Conservation: Mobile devices have limited
battery life and bandwidth resources, so distributed commit
protocols should be designed to minimize energy consumption and
network usage. For example, protocols can employ techniques like
adaptive power management, data compression, and traffic
scheduling to conserve battery and bandwidth resources.
• Handling Disconnections and Failures: In practical terms,
distributed commit protocols must be robust in handling network
disruptions and failures. This may involve implementing retry
mechanisms, timeout handling, and recovery procedures to ensure
transactional integrity even in the face of disconnections or node
failures.
• Support for Mobility and Roaming: Mobile devices are often in
motion and may roam between different network cells or access
points. Distributed commit protocols should be modified to support
mobility and roaming seamlessly.
Mobile Computing 21-22

• Security and Privacy: Practical architectural changes should


prioritize security and privacy in mobile transaction processing. This
includes ensuring the confidentiality, integrity, and authenticity of
transactions, as well as protecting sensitive information from
unauthorized access or disclosure. Practical adaptations may involve
employing encryption, authentication,

(b). Discuss the problem related to the role of personal and terminal
mobility and query processing in the mobile environment.
Ans. The role of personal and terminal mobility in query processing within a mobile
environment presents several challenges that need to be addressed:

• Location Dependency: Personal mobility refers to the movement of


individuals carrying mobile devices, while terminal mobility refers to the
movement of the devices themselves. Both types of mobility introduce
location dependencies, as the user or device may change their location
frequently. This poses challenges for query processing, as the data being
queried may be distributed across different locations, and the query result
may depend on the current location of the user or device.
• Network Connectivity: Mobility often leads to changes in network
connectivity, such as handovers between different base stations or network
technologies. These changes can result in disruptions or fluctuations in
network connectivity, affecting the ability to execute queries or retrieve data
reliably. Query processing mechanisms must be able to handle these
variations in network conditions and adapt accordingly to ensure
uninterrupted service.
• Resource Constraints: Mobile devices typically have limited computational
power, memory, and battery life. This imposes constraints on query
processing, as complex queries or data-intensive operations may exceed the
device's capabilities. Query optimization techniques need to take into account
these resource constraints and prioritize efficient use of resources to minimize
the impact on device performance and battery life.
• Privacy and Security: Mobility introduces additional privacy and security
concerns, as sensitive data may be accessed or transmitted over insecure
networks. Query processing mechanisms must incorporate privacy-preserving
techniques such as data encryption, anonymization, and access control to
protect user data from unauthorized access or disclosure.
Mobile Computing 21-22

(c). Discuss the characteristics of the Mobile Transactions used in mobile


database system.
Ans
Mobile transactions in mobile database systems have several characteristics that distinguish
them from transactions in traditional database systems. These characteristics are essential for
ensuring the integrity, reliability, and efficiency of data operations in mobile environments.

• Disconnected Operation: Mobile devices often operate in disconnected or


occasionally connected modes, where network connectivity may be
intermittent or unavailable. Mobile transactions need to support operations in
disconnected environments by allowing users to perform data updates locally
on their devices. These updates are then synchronized with the central
database when connectivity is restored.
• Resource Constraints: Mobile devices have limited computational resources,
memory, and battery life. Mobile transactions should be designed to minimize
resource consumption and optimize energy efficiency to ensure optimal
performance on resource-constrained devices.
• Location Sensitivity: Mobile transactions may involve location-dependent
operations, where the outcome of transactions depends on the user's current
location. For example, location-based queries or updates may be used in
mobile applications to provide personalized services or context-aware
functionality.
• Security and Privacy: Mobile transactions require robust security
mechanisms to protect sensitive data transmitted over potentially insecure
networks. Encryption, authentication, and access control mechanisms are
essential for ensuring the confidentiality, integrity, and authenticity of mobile
transactions and preventing unauthorized access or tampering.

A transaction is a single logical unit of work that accesses and possibly


modifies the contents of a database. In order to maintain consistency in a
database, before and after the transaction, certain properties are followed.
These are called ACID properties.
Mobile Computing 21-22
Mobile Computing 21-22

Question-3
(a). What is mobile agent? What are the benefits/good
reasons for using mobile a agents?
Ans. A mobile agent is a type of software program or script that can autonomously
migrate from one computing device to another over a network. Unlike traditional client-
server models where the client initiates requests to a server, in the case of mobile agents, the
agent itself travels to different nodes or servers to perform tasks on behalf of a user or
system.

Benefits:
• Reduced Network Traffic: Mobile agents can execute tasks locally on remote
servers or devices, reducing the need for constant communication with a
central server. This reduces network traffic and latency, especially in
bandwidth-constrained environments.
• Improved Scalability: Mobile agents can distribute tasks across multiple
nodes or servers, improving the scalability of distributed systems. They can
dynamically adapt to changes in system load and distribute computation or
processing tasks efficiently.
• Fault Tolerance and Resilience: Mobile agents can continue executing tasks
even in the event of network failures or interruptions.
• Complex Task Execution: Mobile agents are well-suited for executing
complex tasks that involve interactions with multiple nodes or servers. They
can aggregate, process, and analyze data locally, reducing the need for
centralized processing and improving overall efficiency.
• Adaptability to Dynamic Environments: Mobile agents can adapt
dynamically to changes in the network topology, resource availability, and
system requirements. They can migrate between nodes to optimize task
execution and respond effectively to changing conditions.
• Mobile Agents are autonomous and self-driven in nature.
• They are maintenance-friendly or easily maintainable.
• They are Fault-tolerant. It means they are able to operate without an active
connection between client and server.
• They reduce the compilation time.
• They provide less delay in the network.
• They provide fewer loads on the network.
• They facilitate parallel processing. It means they can be asynchronously
executed on multiple heterogeneous network hosts.
Mobile Computing 21-22

• They provide dynamic adaptation in which their actions are dependent on the
state of the host environment.
• LIFE CYCLE OF AGENT

The most significant advantage of mobile agents is the possibility of moving complex
processing functions to the location where you have enormous amounts of data and
that have to be processed.
Mobile Computing 21-22

(b). What are fundamental differences between wired


networks and ad hoc wireless 2 networks related to
routing?
Ans. The primary difference between wired networks and ad hoc wireless networks
related to routing lies in their underlying infrastructure and the routing protocols
they use:
Infrastructure:
• Wired Network: In a wired network, devices are connected to each
other through physical cables or wired connections. This fixed
infrastructure provides stable and predictable communication paths
between nodes.
• Ad Hoc Wireless Network: Ad hoc wireless networks, on the other
hand, do not rely on fixed infrastructure. Devices communicate with
each other wirelessly, forming temporary networks on-the-fly without
the need for pre-existing infrastructure.
Routing Protocols:
• Wired Network: In wired networks, routing protocols such as OSPF
(Open Shortest Path First) or RIP (Routing Information Protocol) are
commonly used. These protocols typically rely on algorithms that
compute shortest paths or routes based on network topology and
metrics like link cost.
• Ad Hoc Wireless Network: Ad hoc wireless networks use routing
protocols specifically designed for dynamic and changing network
topologies. Examples include AODV (Ad Hoc On-Demand Distance
Vector), DSR (Dynamic Source Routing), and OLSR (Optimized Link
State Routing). These protocols are reactive or proactive and are
optimized to handle mobility, limited bandwidth, and intermittent
connectivity.
Scalability and Coverage:
• Wired Network: Wired networks can support large-scale deployments with
extensive coverage, as long as infrastructure is in place.
• Ad Hoc Wireless Network: Ad hoc wireless networks are more flexible in
terms of coverage, as they can be set up quickly and easily without the need
for infrastructure. However, they may face challenges with scalability and
coverage in large-scale deployments due to limitations in wireless range and
interference.

(c). What is frequency reuse?


Ans. frequency reuse: In mobile computing, frequency reuse is a technique where the
same frequencies are used across different cells within a cellular network. This allows for
Mobile Computing 21-22

more efficient use of the available frequency spectrum, increasing capacity and enabling
more users to be served simultaneously.

In mobile computing, especially within cellular networks, frequency reuse is a


strategy used to optimize the use of the available radio frequency spectrum. Here's
how it works:

Cellular Network Structure: Cellular networks are divided into smaller geographic
areas called cells. Each cell is served by a base station (also known as a cell tower)
that communicates with mobile devices within its coverage area.

You might also like