IT6601 MC Notes
Anna University Regulation 2013 Computer Science & Engineering (CSE) IT6601 MC Notes for all 5 units are provided below. Download link for CSE 6th SEM IT6601 Mobile Computing Lecture Notes are listed down for students to make perfect utilization and score maximum marks with our study materials.
Unit -1 IT6601- Mobile Computing Notes
Introduction to Mobile Computing
The rapidly expanding technology of cellular communication, wireless LANs, and satellite services will make information accessible anywhere and at any time. Regardless of size, most mobile computers will be equipped with a wireless connection to the fixed part of the network, and, perhaps, to other mobile computers. The resulting computing environment, which is often referred to as mobile or nomadic computing, no longer requires users to maintain a fixed and universally known position in the network and enables almost unrestricted mobility. Mobility and portability will create an entire new class of applications and, possibly, new massive markets combining personal computing and consumer electronics.
Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. A communication device can exhibit any one of the following characteristics:
1. Fixed and wired: This configuration describes the typical desktop computer in an office. Neither weight nor power consumption of the devices allow for mobile usage. The devices use fixed networks for performance reasons.
2. Mobile and wired: Many of today’s laptops fall into this category; users carry the laptop from one hotel to the next, reconnecting to the company’s network via the telephone network and a modem.
3. Fixed and wireless: This mode is used for installing networks, e.g., in historical buildings to avoid damage by installing wires, or at trade shows to ensure fast network setup.
4. Mobile and wireless: This is the most interesting case. No cable restricts the user, who can roam between different wireless networks. Most technologies discussed in this book deal with this type of device and the networks supporting them. Today’s most successful example for this category is GSM with more than 800 million users.
Limitations of Mobile Computing Resource constraints:
Battery Interference: Radio transmission cannot be protected against interference using shielding and result in higher loss rates for transmitted data or higher bit error rates respectively Bandwidth: Although they are continuously increasing, transmission rates are still very low for wireless devices compared to desktop systems. Researchers look for more efficient communication protocols with low overhead.
Dynamic changes in communication environment: variations in signal power within a region, thus link delays and connection losses Network Issues: discovery of the connection-service to destination and connection stability
Interoperability issues: the varying protocol standards
Security constraints: Not only can portable devices be stolen more easily, but the radio interface is also prone to the dangers of eavesdropping. Wireless access must always include encryption, authentication, and other security mechanisms that must be efficient and simple to use.
IT6601 MC Unit 1 notes – Download Here
If you require any other notes/study materials, you can comment in the below section.
For IT6601 MC Previous Year Question Papers – Click here
For IT6601 MC Question Bank/2marks 16marks with answers – Click here
For IT6601 MC Important Questions/Answer Key – Click here
Anna University 6th SEM CSE MC Lecture Notes
IT6601 Mobile Computing Notes free download
Anna University CSE MC Notes Regulation 2013
IT6601 Notes, MC Unit wise Lecture Notes – CSE 6th Semester
Motivation for a specialized MAC
One of the most commonly used MAC schemes for wired networks is carrier sense multiple access with collision detection (CSMA/CD). In this scheme, a sender senses the medium (a wire or coaxial cable) to see if it is free. If the medium is busy, the sender waits until it is free. If the medium is free, the sender starts transmitting data and continues to listen into the medium. If the sender detects a collision while sending, it stops at once and sends a jamming signal. But this scheme doest work well with wireless networks. The problems are:
a) Signal strength decreases proportional to the square of the distance
b) The sender would apply CS and CD, but the collisions happen at the receiver
c) It might be a case that a sender cannot “hear” the collision, i.e., CD does not work
d) Furthermore, CS might not work, if for e.g., a terminal is “hidden”