Cosc411 M3 2023

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

DATABASES FOR MOBILE COMPUTING


(MODULE 3)
Introduction
Recent advances in wireless technology have led to mobile computing, a new dimension in data
communication and processing. The mobile computing environment will provide database
applications with useful aspects of wireless technology. The mobile computing technology
platform allows users to establish communication with other users and to manage their work while
they are mobile. It allows transmission of data from one device to another without being connected
to any physical link (cable). This feature is especially useful to geographically dispersed
organizations. Typical examples might include traffic police, taxi dispatchers, and weather
reporting services, as well as financial market reporting and information brokering applications.
Mobile Computing Architecture
The general architecture of a mobile computing platform is illustrated in Figure 3.1. It is a
distributed architecture where a number of computers, generally referred to as Fixed Hosts and
Base Stations, are interconnected through a high-speed wired network. Some of the basic terms
are as follows:
 Fixed Host (FH): Fixed hosts are general purpose computers that are not equipped to
manage mobile units but can be configured to do so.
 Base Station (BS): Base stations are computers equipped with wireless interfaces and can
communicate with mobile units to support data access.
 Cell: Cell is the basic service area, one Base Transceiver Station (BTS) covers one cell.
Each cell is given a Cell Global Identity (CGI), a number that uniquely identifies the cell.
 Location Area (LA): A group of cells form a Location Area. Each Location Area is
assigned a Location Area Identity (LAI). Each Location Area is served by one or more
Base Station Controllers (BSCs).
 Mobile Unit (MU) or Host: MU communicate with BS through wireless channels having
bandwidths significantly lower than those of a wired network. A downlink channel is used
for sending data from a BS to an MU and an uplink channel is used for sending data from
an MU to its BS.

Page 1 of 9
COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

Figure 3.1: Mobile Computing Architecture

Characteristics of Mobile Computing Environments

In mobile database environments,

1) Data generally changes very rapidly. Users often query servers to remain up-to-date. More
specifically, they often want to track every broadcast for their data item of interest.
Examples of this type of data are stock market information, weather data, and airline
information.
2) Users are mobile and randomly enter and exit from cells. The average duration of a user’s
stay in the cell is referred to as residence latency (RL).
3) User reference behavior tends to be localized—i.e., users tend to access certain parts of the
database very frequently.
4) Servers maintain neither client arrival and departure patterns nor client-specific data
request information.

Types of Data in Mobile Applications

Data in mobile applications may be classified into three categories:

1) Private data: A single user owns this data and manages it. No other user may access
it.

Page 2 of 9
COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

2) Public data: This data can be used by anyone who can read it. Only one source updates
it. Examples include weather bulletins or stock prices.
3) Shared data: This data is accessed both in read and write modes by groups of users.
Examples include inventory data for products in a company.

Advantages of Mobile Computing


1) Portability: Mobile devices are smaller and easy to carry and use everywhere.
2) Affordability: Nowadays, mobile devices have become cheaper and affordable.
3) Wireless communication: Devices exchange messages which include text, video, etc.
instantly without the need for wired connection.
4) More data: Mobile computing enables users to collect more data, such as geo-location of
devices and their users.
Challenges of Mobile Computing
1) Connectivity: The narrow bandwidth of the wireless communication channels.
2) Power: The relatively short active life of the power supply (battery) of mobile units.
3) Dynamic information: The changing locations of required information (sometimes in
cache, sometimes in the air, sometimes at the server).
4) Architecture: Mobile computing has its own unique architectural challenges.
5) Over dependency: Users may become over dependents on mobile devices, which
sometimes can lead to unhealthy behaviours, such as addiction.
6) Distraction: Mobile devices can be distracting sometimes and potentially dangerous,
more especially in a hazardous work environment, where employee’s attention is required.
7) Data security: Users may have sensitive or confidential data on their devices while on
transit.

Global System for Mobile Communication (GSM)


GSM is the most popular standard for mobile phones in the world. It is a digital mobile telephony
system that is widely used in all parts of the world. The GSM architecture is shown in Figure 3.2.
The GSM system should meet certain business objectives:
1) Support for international roaming
2) Good speech quality
3) Ability to support handheld terminals

Page 3 of 9
COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

4) Low terminal and service cost.


5) Spectral efficiency

Figure 3.2: GSM Network Architecture

GSM Network Components


GSM network can be divided into Four (4) Major Components which are briefly explained as
follows:
1. Mobile Station (MS)
Mobile Station (MS) is the device used by a mobile subscriber to communicate with the
mobile network. Several types of MSs exist, each allowing the subscriber to make and
receive calls. The mobile station consists of Mobile Equipment (ME) and Subscriber
Identity Module (SIM).
 Mobile Equipment (ME): “Cellular phone without SIM card” The ME has a unique
international mobile equipment identity (IMEI) which is used by EIR.
 Subscriber Identity Module (SIM): SIM card used in phones are smart processor
cards. It possesses a processor and a small memory. The SIM stores permanent and
temporary data about the mobile, the subscriber and the network. It contains a serial
no, PIN, PUK, IMSI, etc.
2. Base Station Subsystem (BSS)

Page 4 of 9
COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

Base station is the central connection point for wireless mobile devices to communicate.
BSS contains Two (2) components: Base Transceiver Station (BTS) and Base Station
Controller (BSC).
 Base Transceiver Station (BTS): BTS is a fixed radio transceiver in any mobile
network that connects mobile devices to the network. It comprises all radio equipment
(e.g. antenna, signal processing & amplifier required for transmission). It is placed in
the center of a cell. Its transmitting power defines the size of a cell. It is connected to
MS via Um interface and connected to BSC via Abis Interface.
 Base Station Controller (BSC): BSC is a component responsible for controlling the
activities of one or more BTS. It connects the BTS and MSC of Network Switching
Subsystem (NSS).
3. Network Switching Subsystem (NSS)
It is the mobile switching centre that performs the switching of calls between the mobile
and other fixed or mobile network users, as well as the management of mobile services
such as authentication. Key elements of NSS are MSC, HLR, and VLR.
 Mobile Services Switching Centre (MSC): It is used for connection between mobile
phone to mobile phone within same network. It is used for connection between mobile
phone to fixed phone within a network. All mobile communications are routed from
the BS through the MSC.
 Home Location Register (HLR): The HLR is a centralized network database that
stores and manages all mobile services belonging to a specific operator. It acts as a
permanent store for a person’s subscription information until that subscription is
cancelled. It is considered as a database which stores the information about the
subscriber within covering area of MSC. Information includes phone number, current
location of the mobile and all the service providing information. Since mobile phones
users are on the move, the HLR is used to identify their last known location. If a new
MS user comes into location area, then VLR will provide relevant information by
bringing it from HLR.
 Visitor Location Resister (VLR): It is a temporary storage device of GSM network.
It is a server that supports roaming functions for users outside the coverage area of their

Page 5 of 9
COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

own HLR. It stores subscribers’ subscription information for MS which are within the
particular MSC service Area as visitors. There is one VLR for each MSC service area.
4. Operation and Support Subsystem (OSS)
OSS is the component from which the network operator monitors and controls the entire
system. It contains necessary functions for network operation and maintenance. Key
Elements of OSS are OMC, EIR, and AUC.
 Operation and Maintenance Center (OMC): In GSM networks, OMC is the central
location to operate and maintain the network. It is connected to different components
of NSS & BSC. OMC is used to monitor and maintain the performance of each MS,
BS, BSC and MSC within a GSM network.
 Equipment Identity Register (EIR): EIR is a database that contains a list of all valid
mobile equipment within the network, where each device is identified by International
Mobile Equipment Identity (IMEI) number. The IMEI number identifies the mobile
device itself not its user. EIR contains a list of IMEI of all valid terminals. An IMEI is
marked invalid if its terminal is stolen. EIR allows the MSC to forbid calls from this
stolen terminal.
 Authentication Center (AUC): AUC is a database that authenticates each SIM that
attempts to connect to the GSM network. It is defined to protect user identity &
transmission. It is a protected database that stores a copy of secret information stored
in SIM card. These data help to verify user’s identity.
Mobility Management (MM) in Mobile Computing
Mobility management handles the function that arises due to mobility of the subscriber. The main
objective of MM is location tracking & call set up. There are two aspects of mobility in a mobile
computing network. They are Handoff and Roaming.
1. Handoff: When a mobile user is engaged in conversation, the MS is connected to BS via
radio link. If the user moves to the coverage area of another BS, the radio link to old BS is
disconnected and radio link to new BS is established to continue conversation. This process
is called automatic link transfer or handoff. Depending on the mobility of MS, the handoff
is divided into two categories:
 Inter-BS Handoff/ Inter Cell Handoff: This occurs when an MS moves from one BS
to another BS under one MSC.

Page 6 of 9
COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

 Inter-MSC Handoff/ Inter-System Handoff: This occurs when an MS moves from


one BS to another BS served by a different MSC.
2. Roaming: Roaming is when a mobile device being used moves outside the range of its
native network to another available cell network. Then the system should be informed of
the current location of the user, otherwise it is impossible to deliver services. Two basic
operations are performed under roaming management.
 Location Update: Where MS informs the system its current location.
 Location Tracking: Process during which a system locates MS. Location tracking is
required when network attempts to deliver call to a mobile user.

Wide Area Computer Network (WAN) Database


WAN is a large computer network that connect several networks over large distances. They are
used by large businesses, organizations, etc. to connect their various offices or buildings, which
have local area networks. So, any large network that spreads out over wide geographic area is a
WAN. Figure 3.3 shows this type of network.
Therefore, a WAN database is a collection of multiple, logically interrelated databases distributed
and possibly replicated across sites that are connected through a wide area network.
Features of WAN Database
The characteristic features of WAN database are as follows:
1) Data are spread across sites that are separated through a wide area links.
2) The quality of communication through wide area links is relatively poor.
3) There are severe bandwidth restrictions.
4) Links are subject to latencies of tens to thousands of milliseconds.
5) Connections between sites are much less reliable.

Page 7 of 9
COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

Figure 3.3: WAN Network Architecture

Satellite Networks Database


Satellite Network is the use of man-made earth satellites as relay stations to transmit radio waves
in order to achieve communication between two or more earth stations. This type of network
consists of a number of remote terminals of varying types (such as flyaway, portable, maritime,
fixed, etc.). Figure 3.4 shows this type of network. For one to have connectivity in this type of
network, his system’s antenna must have direct access to the satellite. Basically, there are two
types satellite network, as briefly described here.
1) Low Earth Orbit (LEO) Satellite Networks: These are made up of multiple satellites
that move constantly orbiting the earth at an altitude of 1,000 miles or less. When one
moves out of the coverage his communication is handed over to another satellite that is
within the range.
2) Geostationary Orbit (GEO) Satellite Networks: In this type of network, the satellites
are placed at a higher altitude of about 22,000 miles above the earth along the equator.
They move constantly orbiting the earth at the same speed with the rotation of the earth.
This keeps them stationary above us.

Page 8 of 9
COSC 411: DATABASE SYSTEMS II 2022/2023 SESSION

Figure 3.4: Satellite Network Architecture

Page 9 of 9

You might also like