Mobile computing syllabus cs8601 pdf free download. The mac sublayer and the logical link control llc sublayer together make up the data link layer. Raghavan2 and jing deng3 1electrical and computer engineering department, clarkson university, potsdam, ny 699, usa 2embedded software for digital televisions group, ati research inc. Mobile computing wireless mac issues exam study material. Multiplexing is a method to combine multiple digital or analog signals into one signal over the data channel. Locationbased mac protocols for mobile wireless networks. Mobile telecommunication system mobile communication systems global system for mobile. In addition, 5g mac protocols should adapt to the service requirements of realtime and mission critical applications.
Mobile ad hoc network manet is a wireless network of mobile nodes connected by wireless link without a central control. Pdf the mac medium access control protocols can be roughly categorized into three. The effectiveness of osmac is extensively evaluated using an ns2based simulation. Sample cs8601 important questions mobile computing. Mobile computing important questions cs8601 pdf free download. Energy efficiency performance analysis of mac protocols in. For example, such protocols could be used to transmit traffic information.
We consider medium access control mac protocols for mobile ad hoc networks that are designed for mac layer broadcasts. To overcome the challenges above, we plan this feature topic to help both academic and industrial research communities understand the recent research progress and contribute to the emerging technologies of 5g ran architecture. Mobile computing is the use of an easily transported computer such as a tablet that the user interacts with regularly throughout the day. Mobile computing cs8601 anna university lecture notes. Mobile computers are capable of doing just about anything one can do from a desktop computer. Medium access control protocols for ad hoc wireless networks. It6601 mc important questions, mobile computing answer key. Vaidya, mac protocols using directional antennas in ieee 802. This work categorizes the recently developed traffic prioritization mac protocols in the classes of adaptive contention. Characteristics of mobile computing structure of mobile computing application. A survey of cooperative mac protocols for mobile communication networks weihua zhuang and yong zhou, university of waterloo, canada abstract cooperative communication is a promising and practical technique for realizing spatial diversity through a virtual antenna array formed by multiple antennas of different nodes.
The medium access control mac protocol is one of the important issues. Mac protocols used by wireless sensor networks and a general. A taxonomy for mac protocols in wireless sensor networks. Medium access control of wireless lans for mobile computing. Media access control mac protocols for mobile wireless networks. Routing protocols in mobile adhoc networks krishna gorantala june 15, 2006. So mobile ip has to use the same interfaces and mechanisms to access the lower layers as ip does. Medium access control in mobile computing engineers portal. Pdf mac vs routing protocols in mobile adhoc network v. The choice of mac protocol has a direct bearing on the reliability and ef. Wireless link between lan hub and mobile data terminal. Gate preparation, nptel video lecture dvd, computerscienceandengineering, mobilecomputing, wirelessmacissues, mobile computing, wireless networking, networking.
Wireless networks and mobile computing pdf notes wnmc pdf. Introduction to mobile computing applications of mobile computing generations of mobile communication technologies multiplexing spread spectrum mac protocols sdma tdma fdma cdma. Mac performance metrics delay defined as the average time spent by a packet in the mac queue, i. Mac protocols wireless mac issues fixed assignment schemes randomassignment schemes reservation based schemes. In many emerging applications, it is regarded essential to prioritize the heterogeneous traffic for reliable performance of wsn. Routing protocols in mobile adhoc networks krishna gorantala june 15, 2006 masters thesis in computing science, 10 credits supervisor at csumu. Mac protocols wireless mac issues fixed assignment schemes random assignment schemes reservation based schemes. A node that has just woke up sends a short beacon so other nodes know it is up. Media access control mac is a sublayer of the data link layer dll in the sevenlayer osi network reference model. Medium access control mac address is a hardware address use to uniquely identify each node of a network. Finally, endsystems enhanced with a mobile ip implementation should still be able to communicate with fixed systems without mobile ip.
Mobile computing is used in different contexts with different names. Medium access control of data communication protocol is also named as media access control. Mobile computing pdf free download introduction to mobile computing. Random access mac protocols ethernet mac random access analysis other ethernet issues taking turns mac and other lans lecture 5. International journal of computer science and mobile computing a monthly journal of computer science and information technology issn 2320088x ijcsmc, vol. The medium access control mac protocol is primarily responsible for regulating access to the shared medium. Medium access control protocols for wireless sensor. This encompasses the use of mobile computing, hardware, and software. Toh, ad hoc mobile wireless networks, chapter 4 ad hoc wireless media protocols, prentice hall bob ohara and al petrick, ieee 802. Feb 23, 2016 medium access control mac address is a hardware address use to uniquely identify each node of a network. The performance of osmac is compared with 1 that of existing spectrumaccess methods and 2 that of an idealmac protocol, demonstrating that osmac is far more effective than current access protocols from both the networks and the users perspectives.
The effects of mac protocols on ad hoc network communications. Jul 09, 2012 media access control mac is a sublayer of the data link layer dll in the sevenlayer osi network reference model. Cs8601 important questions mobile computing regulation 2017. Proceedings of the 2nd ieee workshop on mobile computing systems and applications, pp. Characterizing the interaction between routing and mac. Wattenhofer 121 mobile devices performance and size pager receive only tiny displays simple text messages mobile phone voice, data simple text display pda simple graphical displays character recognition simplified www palmtop tiny keyboard simple versions. Apr, 2012 this means that mobile ip must not require special media or mac llc protocols. This ensures optimum utilization of expensive resource and time. It provides addressing and channel access control mechanisms to enable the several terminals or network nodes to communicate in a specified network. Mobile communication protocols use multiplexing to send information.
Optimizing sensor networks in the energylatencydensity design space. Edu notes computer science resources mobile computing. The energy consumption of sensor nodes is greatly affected by mac protocol which. In conclusion, we present a brief summary of key ideas and a general direction for future work. The desired mac protocol for multihop and wireless mobile ad hoc networks. Mobile ip was developed for ipv4, but ipv6 simplifies the protocols q security is integrated, not addon, authentication of registration included q coa can be assigned via autoconfiguration dhcpv6 is one candidate. Mobile computing applications characteristics of mobile computing structure of mobile computing application mac protocols wireless mac issues fixed assignment schemes random assignment schemes reservation based schemes unit ii. Various media access control mac protocols have been developed to deal with the heterogenous traffic in wireless sensor networks wsn.
Comparison of the mac protocols in vehicular adhoc network. In ieee 802 lanman standards, the medium access control mac, also called media access control sublayer is the layer that controls the hardware responsible for interaction with the wired, optical or wireless transmission medium. Mobile computing system allows a user to perform a task from anywhere using a computing device in the public the web, corporate business information and personal information spaces medical record, address book. In these networks, the medium access control mac protocols are responsible for coordinating the access from active nodes.
Medium access control protocols for wireless mobile ad hoc networks. For example, a traffic monitoring network using the tdma protocol described in 15 has a lifetime of 1,000 days, compared to 10 days. In the near future, tens of millions of people will carry a portable palmtop or laptop computer. No a prioricoordination among nodes two or more transmitting nodes a.
Medium access control mac protocols for ad hoc wireless. Mac protocols for cyberphysical systems feng xia springer. Conventional tcpip protocols, indirect tcp, snooping tcp, mobile tcp, other transport layer protocols for mobile networks. Wireless sensor networks, ieee transactions on mobile computing, vol. Mac is responsible for the transmission of data packets to and from the networkinterface card, and to and from another remotely shared channel. Mobile computing pdf download lecture notes, study material. Analyze btl4 2 i describe the various random assignment schemes that are used in mac protocol. Contentionbased mac protocols usually consume more energy than tdma protocols since they waste energy during collisions and idle listening 14. Mac protocols wireless mac issues fixed assignment schemes random assignment schemes reservation. Tdma and hybrid mac, deemac, sparemac, zmac and amac. Part i carrier sense multiple access modes and their throughput. Mobile ip was developed for ipv4, but ipv6 simplifies the protocols q security is integrated, not addon, authentication of registration included q coa can be assigned via. The rapidly expanding technology of cellular communication, wireless lans, and satellite services will make information accessible anywhere and at any time.
565 443 1186 133 478 822 540 805 427 798 727 157 1074 1504 1126 1023 1431 603 1115 741 548 988 1223 1101 1025 1165 1250 574 283 737 707 644 1318 655 1139 331 781 1026 831 70 1077 1305 327 541