SlideShare a Scribd company logo
20CS501 – Mobile Computing
III Year / VI Semester
Dr.R.Sathya
AP / IT
Objectives
The Student should be made to:
Understand the basic concepts of mobile computing
Be familiar with the network protocol stack
Learn the basics of mobile telecommunication system
Be exposed about the Ad-Hoc networks
Gain knowledge about different mobile platforms and
application development
Unit I - Introduction
Mobile Computing – Mobile Computing Vs wireless
Networking – Mobile Computing Applications –
Characteristics of Mobile computing – Structure of
Mobile Computing Application. MAC Protocols –
Wireless MAC Issues – Fixed Assignment Schemes –
Random Assignment Schemes – Reservation Based
Schemes
Mobile Computing
The ability to compute remotely while on the
move.
 Concepts:
 Mobile Communication
 Mobile Computing
Mobile Computing
 Mobile Computing denotes the capability to
automatically carry out certain processing related to
service invocations on a remote computer.
 Mobile Communication provides the capability to
change location while communicating to invoke
computing services to some remote computers.
Mobile Computing vs. Wireless
Networking
 Mobile computing essentially denotes
accessing information and remote
computational services while on the move,
wireless networking provides the basic
communication infrastructure necessary to
make this possible.
Mobile Computing vs. Wireless
Networking
 Mobile computing also requires the applications themselves
– their design and development, and the hardware at the
client and server sides.
 Mobile computing includes the area of wireless networking.
 Wireless networking is increasingly replacing traditional
networks because of the low setup time and low initial
investment required to set up the wireless network.
Mobile Computing vs. Wireless
Networking
 Wireless networks can be classified into two basic
types.
 Extension of Wired Networks: It uses fixed infrastructures
such as base stations to provide essentially single hop
wireless communication with a wired network.
 Ad Hoc Network: It does not use any fixed infrastructure
and is based on multi-hop wireless communication.
Mobile Computing vs. Wireless
Networking
 One popular example of a fixed infrastructure wireless
network is a Wireless LAN (WLAN) that implements
the IEEE 802.11 protocol.
 Only the last hop is through the wireless medium.
 An access point (AP) provides the last hop
connectivity of the mobile nodes to a wired network.
Mobile Computing vs. Wireless
Networking
 All communication goes through APs which perform
bridging between the wireless and the wired mediums.
 A station must be recognized by an AP to be able to
connect to the network.
 The AP may require authentication and this in turn is
used as the basic means to keep out the unauthorized
users.
Mobile Computing vs. Wireless
Networking
 In an infrastructureless network, the communication
between hosts occurs directly or via a few intermediate
nodes that form the hops.
 The Bluetooth technology can also be used to establish
direct wireless connection of a cell phone with devices
such as printers, cameras, scanners, laptop and desk
computers.
Mobile Computing vs. Wireless
Networking
 One of the objectives of the Bluetooth
technology is to enable users to easily connect
to a wide range of personal computing and
telecommunication devices, without the need
to buy, carry or lay out cables.
Mobile Computing vs. Wireless
Networking
 Bluetooth promises to eliminate the need to
purchase additional or proprietary cabling and
configuration exercises needed to connect
individual devices.
Mobile Computing vs. Wireless
Networking
 Ad hoc network – Mobile Ad hoc Network
(MANET).
 It is a collection of mobile nodes that form a
network on the fly without requiring the
support of any fixed infrastructure.
Mobile Computing Applications
 Vehicles:
 Transmission of news, road condition, weather, music via
Digital Audio Broadcasting.
 Personal communication using GSM
 Position via GPS
 Local ad-hoc network with vehicles close-by to prevent
accidents.
 Vehicle data can be transmitted in advance for maintenance
Mobile Computing Applications
 Medical
Doctors in hospital are now using Wireless Tablet PC /
WLAN to collect and share patient information.
 Sales:
 Sales representation are using Table PCs with Smart
phones for presentation.
 Sharing and Accessing information among offices
Mobile Computing Applications
 Credit Card Verification
Speed up the transaction process
 Taxi/Truck Dispatch
A central computer to be able to track and receive
status information from all of its mobile secure
delivery vans.
Mobile Computing Applications
Electronic Mail/Paging
 It allows him/her to keep in touch with any
colleagues.
 Access to the Internet, using mobile computing
technology, allows the individual to have vast
arrays of knowledge at his/her fingertips.
Mobile Computing Characteristics
 Ubiquity – present everywhere
 The ability of a user to perform computations from
anywhere and at anytime.
 Location awareness - GPS
 It provides information about the current location of a
user to a tracking station.
 Example: Traffic control and emergency services
Mobile Computing Characteristics
 Adaption:
 The ability of a system to adjust to bandwidth
fluctuation without inconveniencing the user.
 Broadcast:
 Efficient delivery of data can be made simultaneously
to hundreds of mobile users.
 Advertising information about nearby location.
Mobile Computing Characteristics
 Personalization:
 A mobile environment can be easily personalized
according to a user’s profile.
 The user avail information with their hand-held
devices.
Structure of Mobile Computing
Application
Presentation (Tier - 1)
Application (Tier – 2)
Data (Tier – 3)
Structure of Mobile Computing
Application
Presentation
Tier
Application
Tier
Data
Tier
Structure of Mobile Computing
Application
 Presentation Tier
 It concerns the user interface.
 A good user interface facilitates the user to issue requests and to
present the results to them meaningfully.
 The programs at this layer run on the client’s computer.
 This layer usually includes web browsers and customized
programs for dissemination of information and for collection of
data from the user.
Structure of Mobile Computing
Application
 Application Tier
 Responsibility of making logical decisions and
performing calculations.
 It also moves and processes data between the
presentation and data layers.
 It is like an “engine” of an automobile.
Structure of Mobile Computing
Application
 Application Tier
 It performs the processing of user input, obtaining
information and them making decisions.
 This layer is implemented using technology like
Java, .NET services, etc.
 It is database independent
 It is implemented on a fixed server.
Structure of Mobile Computing
Application
 Data Tier
 It is responsible for providing the basic facilities
of data storage, access and manipulation
 It contains a database.
 The information is stored and retrieved for this
database.
MAC Protocols
 In wireless network, multiple nodes may contend
to transmit on the same shared channel at the
same time.
 In this situation, the transmitted data would get
garbled unless a suitable medium access
arbitration scheme is deployed.
MAC Protocols
 It is the responsibility of the medium access
control (MAC) protocol to perform the task.
 To enforce discipline in the access of a shared
channel when multiple node contend to access
that channel.
MAC Protocols
 Maximization of the utilization of the channel
 Minimization of average latency of transmission.
 It ensures that no node has to wait for an unduly
long time, before it is allowed to transmit.
MAC Protocols
 Properties:
 It should implement some rules that help to enforce
discipline when multiple nodes contend for a shared
channel.
 It should help maximize the utilization of the channel.
 Channel allocation need to be fair.
MAC Protocols
 Properties:
 It should be capable of supporting several types of
traffic having different maximum and average bit
rates.
 It should be robust in the face of equipment
failures and changing network conditions.
MAC Protocols
 Issues:
 It is difficult to implement a collision detection scheme in
a wireless environment, since collisions are hard to be
detected by the transmitting nodes.
 Also, in infrastructure-less networks, the issue of hidden
and exposed terminals make a MAC protocol extremely
inefficient, unless special care is taken to overcome these
problems.
MAC Protocols
 The Hidden Terminal Problems:
MAC Protocols
 The Hidden Terminal Problems:
 The transmission range of A reaches B, but not C.
 The transmission range of C reaches B, but not A.
 Finally, the transmission range of B reaches A and
C, i.e., A cannot detect C and vice versa
MAC Protocols
 The Hidden Terminal Problems:
 A starts sending to B, C does not receive this
transmission. C also wants to send something to B
and senses the medium.
 The medium appears to be free, the carrier sense
fails. C also starts sending causing a collision at B.
MAC Protocols
 The Hidden Terminal Problems:
 But A cannot detect this collision at B and
continues with its transmission. A is hidden for C
and vice versa.
 While hidden terminals may cause collisions, the
next effect only causes unnecessary delay.
MAC Protocols
 The Exposed Terminal Problems:
MAC Protocols
 The Exposed Terminal Problems:
 Node D is within node A’s transmission range.
 Node B is within the transmission range of both the
nodes A and C, but the nodes A and C are not within
each other’s transmission range.
 MAC protocols usually inhibit transmission when
transmission from another terminal is detected.
MAC Protocols
 The Exposed Terminal Problems:
 As a result, node A will not be able to transmit to any
node when B is transmitting to C.
 On the other hand, had A transmitted to D, it would
have been received correctly by D and B’s
transmission would have also been correctly received
at C.
MAC Protocols
 The Exposed Terminal Problems:
 The problem arose only because A and B are within
each other’s transmission range, though the destination
nodes are in the transmission range of only one of the
nodes.
 In other words, the problem occurs because A is
exposed to B’s transmission.
MAC Protocols
 The Exposed Terminal Problems:
 The overall effect of this problem is that it leads to
inefficient spectrum usage as well as unnecessary
transmission delays unless these are carefully
addressed by a wireless MAC protocol.
MAC Protocols Categories
 Fixed assignment schemes
 Random assignment schemes
 Reservation-based schemes
Fixed assignment schemes
 Categories:
Frequency Division Multiple Access (FDMA)
Time Division Multiple Access (TDMA)
Code Division Multiple Access (CDMA)
Fixed assignment schemes
 Categories - Frequency Division Multiple
Access (FDMA):
 In FDMA, the available bandwidth (frequency
range) is divided into many narrower frequency
bands called channels.
Fixed assignment schemes
 Categories - Frequency Division Multiple
Access (FDMA):
 A division of the existing bandwidth into many
channels (showns as Ch 1, Ch 2, etc.).
Fixed assignment schemes
 Categories - Frequency Division Multiple Access
(FDMA):
 For full duplex communication to take place, each
user is allocated a forward link (channel) for
communicating from it (mobile handset) to the base
station (BS), and a reverse channel for communicating
from the BS to it.
Fixed assignment schemes
 Categories - Frequency Division Multiple Access
(FDMA):
 Thus, each user making a call is allocated two unique
frequency bands (channels), one for transmitting and the
other for receiving signals during the call.
 Obviously, when a call is underway, no other user would
be allocated the same frequency band to make a call.
Fixed assignment schemes
 Categories - Frequency Division Multiple Access
(FDMA):
 Unused transmission time in a frequency band that occurs
when the allocated caller pauses between transmissions, or
when no user is allocated a band, goes idle and is wasted.
 FDMA, therefore, does not achieve a high channel
utilization.
Fixed assignment schemes
 Categories - Time Division Multiple Access (TDMA):
 TDMA is an access method in which multiple nodes are
allotted different time slots to access the same physical
channel.
 That is, the timeline is divided into fixed-sized time slots
and these are divided among multiple nodes who can
transmit.
Fixed assignment schemes
 Categories - Time Division Multiple Access
(TDMA):
 Note that in this case, all sources use the same
channel, but take turns in transmitting.
Fixed assignment schemes
 Categories - Time Division Multiple Access
(TDMA):
 The Figure shows the situation where time slots are
allocated to users in a round robin manner, with each
user being assigned one time slot per frame.
 Unused time slots go idle, leading to low channel
utilization.
Fixed assignment schemes
 Categories - Code Division Multiple Access (CDMA):
 In CDMA, multiple users are allotted different codes that
consist of sequences of 0 and 1 to access the same channel.
 A special coding scheme is used that allows signals from
multiple users to be multiplexed over the same physical
channel.
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
 Three different users who have been assigned separate
codes are multiplexed on the same physical channel.
 In CDMA, multiple users use the same frequency at
the same time and no time scheduling is applied.
Fixed assignment schemes
 Categories - Code Division Multiple Access (CDMA):
 All the senders send signals simultaneously through a
common medium.
 The bandwidth of this medium is much larger than the
space that would be allocated to each packet transmission
during FDMA
 The signals can be distinguished from each other by means
of a special coding scheme that is used
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
 This is done with the help of a frequency spreading
code known as the m-bit pseudo-noise (PN) code
sequence.
Using m bits, 2m
– 1 different codes can be obtained.
From these codes, each user will use only one code.
Fixed assignment schemes
 Categories - Code Division Multiple Access (CDMA):
 It is possible to distinguish transmissions from different nodes by
ensuring some properties on the codes.
 A code for a user should be orthogonal (that is, non-interfering) to the
codes assigned to other nodes.
 The term “orthogonal” means that the vector inner product is zero, and
good autocorrelation uses the bipolar notation where a code sequence
of binary 0 is represented as –1 and binary 1 is represented as +1.
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
 On the receiving end, only the same PN sequence
is able to demodulate the signal to successfully
convert the input data.
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
 Each sender has a unique random number key, and
the sender XORs the signal with this random
number key. The receiver can “tune” into this
signal if it knows the pseudorandom number.
Fixed assignment schemes
 Categories - Code Division Multiple Access (CDMA):
 Consider an example, where X, Y are the transmitters and
Z is a receiver.
 Sender X_data = 1 and X_Key = (010011). Its
autocorrelation representation is (–1, +1, –1, –1, +1, +1).
The signal to be calculated at sender X is Xs = X_data *
X_key = +1*X_key = (–1, +1, –1, –1, +1, +1).
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
 Sender Y_data = 0 and Y_key = (110101) and the
signal to be sent at Y is Ys = –1*Y_key = –1*(+1,
+1, –1, +1, –1, +1) = (–1, –1, +1, –1, +1, –1).
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
 The signal received by receiver Z is Xs + Ys = (–1,
+1, –1, –1, +1, +1) + (–1, –1, +1, –1, +1, –1) = (–2, 0,
0, –2, +2, 0).
 At the receiver, in order to receive the data sent by
sender X, the signal Z is dispread.
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
 So now if Z wants to get information of sender X
data, then Z*X_key = (–2, 0, 0, –2, +2, 0)* (–1,
+1, –1, –1, +1, +1) = 2 + 0 + 0 + 2 + 2 + 0 = 6 > 0
(positive), that is the original bit was a 1.
Fixed assignment schemes
 Categories - Code Division Multiple Access
(CDMA):
 Similarly, the information of sender Y data may be
obtained as Z*Y_key = (–2, 0, 0, –2, +2, 0)(+ 1,
+1, –1, +1, –1, +1) = –2 + 0 + 0 – 2 – 2 + 0 = – 6 <
0 (negative). So the Y data original bit was a 0.
Random assignment schemes
 Schemes:
ALOHA
Slotted ALOHA
CSMA
CSMA/CD
CSMA/CA
Random assignment schemes
 Schemes – ALOHA:
 The basic (pure) ALOHA scheme , is a simple
protocol.
 If a node has data to send, it begins to transmit.
 The first step implies that Pure ALOHA does not
check whether the channel is busy before transmitting.
Random assignment schemes
 Schemes – ALOHA:
 If the frame successfully reaches the destination
(receiver), the next frame is sent. If the frame fails to
be received at the destination, it is sent again.
 The simple ALOHA scheme works acceptably, when
the chances of contention are small (i.e., when a small
number of senders send data infrequently).
Random assignment schemes
 Schemes – ALOHA:
 The collisions can become unacceptably high if the number of
contenders for transmission is high.
 An improvement over the pure ALOHA scheme is the slotted
ALOHA.
 The time is divided into equal-sized slots in which a packet can be
sent. Thus, the size of the packet is restricted.
 A node wanting to send a packet, can start to do so only at the
beginning of a slot.
Random assignment schemes
 Schemes – ALOHA:
 The slotted ALOHA system employs beacon signals
that are sent at precise intervals that mark the
beginning of a slot, at which point the nodes having
data to send can start to transmit.
 Again, this protocol does not work very well if the
number of stations contending to send data is high.
Random assignment schemes
 Schemes – CSMA:
 CSMA - Carrier Sense Multiple Access
 A node senses the medium before starting to transmit.
 If it senses that some transmission is already
underway, it defers its transmission.
 Techniques: collision detection (CSMA/CD) and the
collision avoidance (CSMA/ CA)
Random assignment schemes
 Schemes – CSMA:
 In a wireless network the CSMA/CD technique does
not work very well.
 In the CSMA/CD technique, the sender starts to
transmit if it senses the channel to be free. But, even if
it senses the channel to be free, there can be a collision
(why?) during transmission.
Random assignment schemes
 Schemes – CSMA:
 In a wireless network it is very difficult for a transmitting
node to detect a collision, since any received signal from
other nodes would be too feeble compared to its own signal
and can easily be masked by noise.
 As a result, a transmitting node would continue to transmit
the frame, and only the destination node would notice the
corrupted frame after it computes the checksum
Random assignment schemes
 Schemes – CSMA:
 This leads to retransmissions and severe wastage
of channel utilization.
In contrast, in a wired network when a node
detects a collision, it immediately stops
transmitting, thereby minimizing channel wastage.
Random assignment schemes
 Schemes – CSMA:
 In a wireless network, a collision avoidance scheme works
much better compared to a collision detection-based
scheme.
 A collision avoidance scheme is based on the idea that it is
necessary to prevent collisions at the moment they are most
likely to occur, that is, when the bus is released after a
packet transmission.
Random assignment schemes
 Schemes – CSMA:
 During the time a node is transmitting on the channel,
several nodes might be wanting to transmit.
 These nodes would be monitoring the channel and waiting
for it to become free.
 The moment the transmitting node completes its
transmission, these waiting nodes would sense the channel
to be free, and would all start transmitting at the same time.
Random assignment schemes
 Schemes – CSMA:
 In the collision avoidance scheme, all nodes are forced to wait
for a random time and then sense the medium again, before
starting their transmission.
 If the medium is sensed to be busy, a node waiting to transmit
waits for a further random amount of time and so on.
 The chance of two nodes starting to transmit at the same time
would be greatly reduced.
Reservation-based schemes
 A basic form of the reservation scheme is the RTS/CTS
scheme.
 In an RTS/CTS scheme, a sender transmits an RTS (Ready
to Send) packet to the receiver before the actual data
transmission.
 On receiving this, the receiver sends a CTS (Clear to Send)
packet, and the actual data transfer commences only after
that.
Reservation-based schemes
 When the other nodes sharing the medium sense the
CTS packet, they refrain from transmitting until the
transmission from the sending node is complete.
 A few examples of RTS-CTS based MAC protocols are
MACA, MACAW, MACA-BI, PAMAS, DBTMA,
MARCH, S-MAC protocols.
Reservation-based schemes
 MACA - Multiple Access Collision Avoidance:
 MACA solves the hidden/exposed terminal problems by regulating the
transmitter power.
 A node running MACA requests to use the medium by sending an RTS
to the receiver. Since radio signals propagate omni-directionally, every
terminal within the sender’s radio range will hear this and then refrain
from transmitting.
 As soon as the receiver is ready to receive data, it responds with a
CTS.
Reservation-based schemes
 MACA - Multiple Access Collision
Avoidance:
Reservation-based schemes
 MACA - Multiple Access Collision Avoidance:
 Before the start of its transmission, it sends a Request To
Send.
 B receives the RTS that contains the sender’s name and the
receiver’s name, as well as the length of the future
transmission.
 In response to the RTS, an acknowledgment from B is
triggered indicating Clear To Send (CTS).
Reservation-based schemes
 MACA - Multiple Access Collision Avoidance:
 The CTS contains the names of the sender and receiver,
and the length of the planned transmission.
 This CTS is heard by C and the medium is reserved for use
by A for the duration of the transmission.
 On receipt of a CTS from B, C refrains from transmitting
anything for the time indicated in the CTS.
Reservation-based schemes
 MACA - Multiple Access Collision
Avoidance:
 Thus a collision cannot occur at B during data
transmission, and the hidden terminal problem is
solved.
Reservation-based schemes
 MACA - Multiple Access Collision Avoidance:
 Though this is a collision avoidance protocol, a
collision can occur during the sending of an RTS.
 Both A and C could send an RTS at same time. But an
RTS occurs over a very small duration compared to the
duration of data transmission.
 Thus the probability of collision remains much less.
Reservation-based schemes
 MACA - Multiple Access Collision
Avoidance:
 B resolves this contention problem by
acknowledging only one station in the CTS.
 No transmission occurs without an appropriate
CTS.
Reservation-based schemes
 MACA - Multiple Access Collision
Avoidance:
Reservation-based schemes
 MACA - Multiple Access Collision Avoidance:
 Assume that B needs to transmit to A. B has to
transmit an RTS first.
 The RTS would contain the names of the receiver (A)
and the sender (B).
 C does not act in response to this message as it is not
the receiver, but A responds with a CTS.
Reservation-based schemes
 MACA - Multiple Access Collision
Avoidance:
 C does not receive this CTS and concludes that A
is outside the detection range.
 Thus C can start its transmission assuming that no
collision would occur at A.

More Related Content

PPTX
Wireless Network Presentation
PDF
Pci planning-for-lte
PPTX
2 g data call flow
PPSX
Classless subnetting
DOCX
Cours en réseau gsm et gprs
PDF
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
PDF
Summer internship report : LTE KPI OPTIMIZATION / Mumbai University (MMS / MBA)
PPTX
Mobile computing
Wireless Network Presentation
Pci planning-for-lte
2 g data call flow
Classless subnetting
Cours en réseau gsm et gprs
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
Summer internship report : LTE KPI OPTIMIZATION / Mumbai University (MMS / MBA)
Mobile computing

What's hot (20)

DOC
Dcr optimization after swap
DOC
3 gpp key performance indicators (kpi) for umts and gsm release 9
PDF
Enhanced fast dormancy ran 16
PDF
toaz.info-zte-fdd-lte-radio-network-optimization-guideline-v14-1-pr_2dc3a4737...
PDF
02 channel concept
PDF
2G Handover Details (Huawei)
PDF
LTE KPIs and Formulae
PDF
huawei-lte-kpi-ref
PPT
OSI model
PPT
Part 3 optimization 3G
PPTX
Tracking Area LTE.pptx
DOCX
Bts installation & commisioning
PDF
4G-Questions interview.pdf
PPTX
Introduction to Mobile Core Network
DOCX
PDF
Drive testing in mobile networks
PPT
06a_LTE mobility management v1_0.ppt
PPTX
LTE Presentation [French]
PDF
Telecom Roaming Overview
Dcr optimization after swap
3 gpp key performance indicators (kpi) for umts and gsm release 9
Enhanced fast dormancy ran 16
toaz.info-zte-fdd-lte-radio-network-optimization-guideline-v14-1-pr_2dc3a4737...
02 channel concept
2G Handover Details (Huawei)
LTE KPIs and Formulae
huawei-lte-kpi-ref
OSI model
Part 3 optimization 3G
Tracking Area LTE.pptx
Bts installation & commisioning
4G-Questions interview.pdf
Introduction to Mobile Core Network
Drive testing in mobile networks
06a_LTE mobility management v1_0.ppt
LTE Presentation [French]
Telecom Roaming Overview
Ad

Similar to Mobile Computing Unit 1 Introduction.ppt (20)

PPTX
IT6601 MOBILE COMPUTING UNIT1
DOC
Mobile Computing I-Unit Notes
PDF
CS8601-IQ.pdf
PDF
CS8601-IQ.pdf
PPTX
Mobile communication Mobile Networking.pptx
DOCX
12.7.2018
PDF
PPT
M commerce
PPTX
Unit2 network communication for CIM
PPT
Computer network
PPT
Computer network
PPT
Wireless
PPTX
Katie & toms_computer_network_project
PDF
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
PPTX
Mobile databases
PDF
Advantages And Disadvantages Of ATM Is A Deterministic...
PPTX
Wireless communication technologies
PPT
Cibm worhop 2 chapter seven
PPTX
COMPUTER NETWORKS
PPT
wifi-technology
IT6601 MOBILE COMPUTING UNIT1
Mobile Computing I-Unit Notes
CS8601-IQ.pdf
CS8601-IQ.pdf
Mobile communication Mobile Networking.pptx
12.7.2018
M commerce
Unit2 network communication for CIM
Computer network
Computer network
Wireless
Katie & toms_computer_network_project
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
Mobile databases
Advantages And Disadvantages Of ATM Is A Deterministic...
Wireless communication technologies
Cibm worhop 2 chapter seven
COMPUTER NETWORKS
wifi-technology
Ad

More from Sathya454753 (9)

PPT
20CS501Mobile Computing Unit 5 Mobile Platforms and Applications.ppt
PPT
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
PPT
Mobile Computing Unit 1 Mobile Telecommunication System.ppt
PPT
20CS501_Mobile Computing_Unit_II Mobile Internet Protocol and Transport Layer...
PPTX
Principles of Management: Unit-5 Controlling.pptx
PPTX
Principles of Management: Unit-4 Directing.pptx
PPT
Principles of Management: Unit-2 Planning.ppt
PPTX
Principles of Management: Unit - 1 Introduction.pptx
PPT
Slide share.ppt
20CS501Mobile Computing Unit 5 Mobile Platforms and Applications.ppt
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
Mobile Computing Unit 1 Mobile Telecommunication System.ppt
20CS501_Mobile Computing_Unit_II Mobile Internet Protocol and Transport Layer...
Principles of Management: Unit-5 Controlling.pptx
Principles of Management: Unit-4 Directing.pptx
Principles of Management: Unit-2 Planning.ppt
Principles of Management: Unit - 1 Introduction.pptx
Slide share.ppt

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
master seminar digital applications in india
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
RMMM.pdf make it easy to upload and study
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Cell Structure & Organelles in detailed.
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
TR - Agricultural Crops Production NC III.pdf
01-Introduction-to-Information-Management.pdf
VCE English Exam - Section C Student Revision Booklet
Complications of Minimal Access Surgery at WLH
Final Presentation General Medicine 03-08-2024.pptx
master seminar digital applications in india
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Sports Quiz easy sports quiz sports quiz
PPH.pptx obstetrics and gynecology in nursing
RMMM.pdf make it easy to upload and study
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Computing-Curriculum for Schools in Ghana
Renaissance Architecture: A Journey from Faith to Humanism
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

Mobile Computing Unit 1 Introduction.ppt

  • 1. 20CS501 – Mobile Computing III Year / VI Semester Dr.R.Sathya AP / IT
  • 2. Objectives The Student should be made to: Understand the basic concepts of mobile computing Be familiar with the network protocol stack Learn the basics of mobile telecommunication system Be exposed about the Ad-Hoc networks Gain knowledge about different mobile platforms and application development
  • 3. Unit I - Introduction Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes
  • 4. Mobile Computing The ability to compute remotely while on the move.  Concepts:  Mobile Communication  Mobile Computing
  • 5. Mobile Computing  Mobile Computing denotes the capability to automatically carry out certain processing related to service invocations on a remote computer.  Mobile Communication provides the capability to change location while communicating to invoke computing services to some remote computers.
  • 6. Mobile Computing vs. Wireless Networking  Mobile computing essentially denotes accessing information and remote computational services while on the move, wireless networking provides the basic communication infrastructure necessary to make this possible.
  • 7. Mobile Computing vs. Wireless Networking  Mobile computing also requires the applications themselves – their design and development, and the hardware at the client and server sides.  Mobile computing includes the area of wireless networking.  Wireless networking is increasingly replacing traditional networks because of the low setup time and low initial investment required to set up the wireless network.
  • 8. Mobile Computing vs. Wireless Networking  Wireless networks can be classified into two basic types.  Extension of Wired Networks: It uses fixed infrastructures such as base stations to provide essentially single hop wireless communication with a wired network.  Ad Hoc Network: It does not use any fixed infrastructure and is based on multi-hop wireless communication.
  • 9. Mobile Computing vs. Wireless Networking  One popular example of a fixed infrastructure wireless network is a Wireless LAN (WLAN) that implements the IEEE 802.11 protocol.  Only the last hop is through the wireless medium.  An access point (AP) provides the last hop connectivity of the mobile nodes to a wired network.
  • 10. Mobile Computing vs. Wireless Networking  All communication goes through APs which perform bridging between the wireless and the wired mediums.  A station must be recognized by an AP to be able to connect to the network.  The AP may require authentication and this in turn is used as the basic means to keep out the unauthorized users.
  • 11. Mobile Computing vs. Wireless Networking  In an infrastructureless network, the communication between hosts occurs directly or via a few intermediate nodes that form the hops.  The Bluetooth technology can also be used to establish direct wireless connection of a cell phone with devices such as printers, cameras, scanners, laptop and desk computers.
  • 12. Mobile Computing vs. Wireless Networking  One of the objectives of the Bluetooth technology is to enable users to easily connect to a wide range of personal computing and telecommunication devices, without the need to buy, carry or lay out cables.
  • 13. Mobile Computing vs. Wireless Networking  Bluetooth promises to eliminate the need to purchase additional or proprietary cabling and configuration exercises needed to connect individual devices.
  • 14. Mobile Computing vs. Wireless Networking  Ad hoc network – Mobile Ad hoc Network (MANET).  It is a collection of mobile nodes that form a network on the fly without requiring the support of any fixed infrastructure.
  • 15. Mobile Computing Applications  Vehicles:  Transmission of news, road condition, weather, music via Digital Audio Broadcasting.  Personal communication using GSM  Position via GPS  Local ad-hoc network with vehicles close-by to prevent accidents.  Vehicle data can be transmitted in advance for maintenance
  • 16. Mobile Computing Applications  Medical Doctors in hospital are now using Wireless Tablet PC / WLAN to collect and share patient information.  Sales:  Sales representation are using Table PCs with Smart phones for presentation.  Sharing and Accessing information among offices
  • 17. Mobile Computing Applications  Credit Card Verification Speed up the transaction process  Taxi/Truck Dispatch A central computer to be able to track and receive status information from all of its mobile secure delivery vans.
  • 18. Mobile Computing Applications Electronic Mail/Paging  It allows him/her to keep in touch with any colleagues.  Access to the Internet, using mobile computing technology, allows the individual to have vast arrays of knowledge at his/her fingertips.
  • 19. Mobile Computing Characteristics  Ubiquity – present everywhere  The ability of a user to perform computations from anywhere and at anytime.  Location awareness - GPS  It provides information about the current location of a user to a tracking station.  Example: Traffic control and emergency services
  • 20. Mobile Computing Characteristics  Adaption:  The ability of a system to adjust to bandwidth fluctuation without inconveniencing the user.  Broadcast:  Efficient delivery of data can be made simultaneously to hundreds of mobile users.  Advertising information about nearby location.
  • 21. Mobile Computing Characteristics  Personalization:  A mobile environment can be easily personalized according to a user’s profile.  The user avail information with their hand-held devices.
  • 22. Structure of Mobile Computing Application Presentation (Tier - 1) Application (Tier – 2) Data (Tier – 3)
  • 23. Structure of Mobile Computing Application Presentation Tier Application Tier Data Tier
  • 24. Structure of Mobile Computing Application  Presentation Tier  It concerns the user interface.  A good user interface facilitates the user to issue requests and to present the results to them meaningfully.  The programs at this layer run on the client’s computer.  This layer usually includes web browsers and customized programs for dissemination of information and for collection of data from the user.
  • 25. Structure of Mobile Computing Application  Application Tier  Responsibility of making logical decisions and performing calculations.  It also moves and processes data between the presentation and data layers.  It is like an “engine” of an automobile.
  • 26. Structure of Mobile Computing Application  Application Tier  It performs the processing of user input, obtaining information and them making decisions.  This layer is implemented using technology like Java, .NET services, etc.  It is database independent  It is implemented on a fixed server.
  • 27. Structure of Mobile Computing Application  Data Tier  It is responsible for providing the basic facilities of data storage, access and manipulation  It contains a database.  The information is stored and retrieved for this database.
  • 28. MAC Protocols  In wireless network, multiple nodes may contend to transmit on the same shared channel at the same time.  In this situation, the transmitted data would get garbled unless a suitable medium access arbitration scheme is deployed.
  • 29. MAC Protocols  It is the responsibility of the medium access control (MAC) protocol to perform the task.  To enforce discipline in the access of a shared channel when multiple node contend to access that channel.
  • 30. MAC Protocols  Maximization of the utilization of the channel  Minimization of average latency of transmission.  It ensures that no node has to wait for an unduly long time, before it is allowed to transmit.
  • 31. MAC Protocols  Properties:  It should implement some rules that help to enforce discipline when multiple nodes contend for a shared channel.  It should help maximize the utilization of the channel.  Channel allocation need to be fair.
  • 32. MAC Protocols  Properties:  It should be capable of supporting several types of traffic having different maximum and average bit rates.  It should be robust in the face of equipment failures and changing network conditions.
  • 33. MAC Protocols  Issues:  It is difficult to implement a collision detection scheme in a wireless environment, since collisions are hard to be detected by the transmitting nodes.  Also, in infrastructure-less networks, the issue of hidden and exposed terminals make a MAC protocol extremely inefficient, unless special care is taken to overcome these problems.
  • 34. MAC Protocols  The Hidden Terminal Problems:
  • 35. MAC Protocols  The Hidden Terminal Problems:  The transmission range of A reaches B, but not C.  The transmission range of C reaches B, but not A.  Finally, the transmission range of B reaches A and C, i.e., A cannot detect C and vice versa
  • 36. MAC Protocols  The Hidden Terminal Problems:  A starts sending to B, C does not receive this transmission. C also wants to send something to B and senses the medium.  The medium appears to be free, the carrier sense fails. C also starts sending causing a collision at B.
  • 37. MAC Protocols  The Hidden Terminal Problems:  But A cannot detect this collision at B and continues with its transmission. A is hidden for C and vice versa.  While hidden terminals may cause collisions, the next effect only causes unnecessary delay.
  • 38. MAC Protocols  The Exposed Terminal Problems:
  • 39. MAC Protocols  The Exposed Terminal Problems:  Node D is within node A’s transmission range.  Node B is within the transmission range of both the nodes A and C, but the nodes A and C are not within each other’s transmission range.  MAC protocols usually inhibit transmission when transmission from another terminal is detected.
  • 40. MAC Protocols  The Exposed Terminal Problems:  As a result, node A will not be able to transmit to any node when B is transmitting to C.  On the other hand, had A transmitted to D, it would have been received correctly by D and B’s transmission would have also been correctly received at C.
  • 41. MAC Protocols  The Exposed Terminal Problems:  The problem arose only because A and B are within each other’s transmission range, though the destination nodes are in the transmission range of only one of the nodes.  In other words, the problem occurs because A is exposed to B’s transmission.
  • 42. MAC Protocols  The Exposed Terminal Problems:  The overall effect of this problem is that it leads to inefficient spectrum usage as well as unnecessary transmission delays unless these are carefully addressed by a wireless MAC protocol.
  • 43. MAC Protocols Categories  Fixed assignment schemes  Random assignment schemes  Reservation-based schemes
  • 44. Fixed assignment schemes  Categories: Frequency Division Multiple Access (FDMA) Time Division Multiple Access (TDMA) Code Division Multiple Access (CDMA)
  • 45. Fixed assignment schemes  Categories - Frequency Division Multiple Access (FDMA):  In FDMA, the available bandwidth (frequency range) is divided into many narrower frequency bands called channels.
  • 46. Fixed assignment schemes  Categories - Frequency Division Multiple Access (FDMA):  A division of the existing bandwidth into many channels (showns as Ch 1, Ch 2, etc.).
  • 47. Fixed assignment schemes  Categories - Frequency Division Multiple Access (FDMA):  For full duplex communication to take place, each user is allocated a forward link (channel) for communicating from it (mobile handset) to the base station (BS), and a reverse channel for communicating from the BS to it.
  • 48. Fixed assignment schemes  Categories - Frequency Division Multiple Access (FDMA):  Thus, each user making a call is allocated two unique frequency bands (channels), one for transmitting and the other for receiving signals during the call.  Obviously, when a call is underway, no other user would be allocated the same frequency band to make a call.
  • 49. Fixed assignment schemes  Categories - Frequency Division Multiple Access (FDMA):  Unused transmission time in a frequency band that occurs when the allocated caller pauses between transmissions, or when no user is allocated a band, goes idle and is wasted.  FDMA, therefore, does not achieve a high channel utilization.
  • 50. Fixed assignment schemes  Categories - Time Division Multiple Access (TDMA):  TDMA is an access method in which multiple nodes are allotted different time slots to access the same physical channel.  That is, the timeline is divided into fixed-sized time slots and these are divided among multiple nodes who can transmit.
  • 51. Fixed assignment schemes  Categories - Time Division Multiple Access (TDMA):  Note that in this case, all sources use the same channel, but take turns in transmitting.
  • 52. Fixed assignment schemes  Categories - Time Division Multiple Access (TDMA):  The Figure shows the situation where time slots are allocated to users in a round robin manner, with each user being assigned one time slot per frame.  Unused time slots go idle, leading to low channel utilization.
  • 53. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  In CDMA, multiple users are allotted different codes that consist of sequences of 0 and 1 to access the same channel.  A special coding scheme is used that allows signals from multiple users to be multiplexed over the same physical channel.
  • 54. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):
  • 55. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  Three different users who have been assigned separate codes are multiplexed on the same physical channel.  In CDMA, multiple users use the same frequency at the same time and no time scheduling is applied.
  • 56. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  All the senders send signals simultaneously through a common medium.  The bandwidth of this medium is much larger than the space that would be allocated to each packet transmission during FDMA  The signals can be distinguished from each other by means of a special coding scheme that is used
  • 57. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  This is done with the help of a frequency spreading code known as the m-bit pseudo-noise (PN) code sequence. Using m bits, 2m – 1 different codes can be obtained. From these codes, each user will use only one code.
  • 58. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  It is possible to distinguish transmissions from different nodes by ensuring some properties on the codes.  A code for a user should be orthogonal (that is, non-interfering) to the codes assigned to other nodes.  The term “orthogonal” means that the vector inner product is zero, and good autocorrelation uses the bipolar notation where a code sequence of binary 0 is represented as –1 and binary 1 is represented as +1.
  • 59. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  On the receiving end, only the same PN sequence is able to demodulate the signal to successfully convert the input data.
  • 60. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  Each sender has a unique random number key, and the sender XORs the signal with this random number key. The receiver can “tune” into this signal if it knows the pseudorandom number.
  • 61. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  Consider an example, where X, Y are the transmitters and Z is a receiver.  Sender X_data = 1 and X_Key = (010011). Its autocorrelation representation is (–1, +1, –1, –1, +1, +1). The signal to be calculated at sender X is Xs = X_data * X_key = +1*X_key = (–1, +1, –1, –1, +1, +1).
  • 62. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  Sender Y_data = 0 and Y_key = (110101) and the signal to be sent at Y is Ys = –1*Y_key = –1*(+1, +1, –1, +1, –1, +1) = (–1, –1, +1, –1, +1, –1).
  • 63. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  The signal received by receiver Z is Xs + Ys = (–1, +1, –1, –1, +1, +1) + (–1, –1, +1, –1, +1, –1) = (–2, 0, 0, –2, +2, 0).  At the receiver, in order to receive the data sent by sender X, the signal Z is dispread.
  • 64. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  So now if Z wants to get information of sender X data, then Z*X_key = (–2, 0, 0, –2, +2, 0)* (–1, +1, –1, –1, +1, +1) = 2 + 0 + 0 + 2 + 2 + 0 = 6 > 0 (positive), that is the original bit was a 1.
  • 65. Fixed assignment schemes  Categories - Code Division Multiple Access (CDMA):  Similarly, the information of sender Y data may be obtained as Z*Y_key = (–2, 0, 0, –2, +2, 0)(+ 1, +1, –1, +1, –1, +1) = –2 + 0 + 0 – 2 – 2 + 0 = – 6 < 0 (negative). So the Y data original bit was a 0.
  • 66. Random assignment schemes  Schemes: ALOHA Slotted ALOHA CSMA CSMA/CD CSMA/CA
  • 67. Random assignment schemes  Schemes – ALOHA:  The basic (pure) ALOHA scheme , is a simple protocol.  If a node has data to send, it begins to transmit.  The first step implies that Pure ALOHA does not check whether the channel is busy before transmitting.
  • 68. Random assignment schemes  Schemes – ALOHA:  If the frame successfully reaches the destination (receiver), the next frame is sent. If the frame fails to be received at the destination, it is sent again.  The simple ALOHA scheme works acceptably, when the chances of contention are small (i.e., when a small number of senders send data infrequently).
  • 69. Random assignment schemes  Schemes – ALOHA:  The collisions can become unacceptably high if the number of contenders for transmission is high.  An improvement over the pure ALOHA scheme is the slotted ALOHA.  The time is divided into equal-sized slots in which a packet can be sent. Thus, the size of the packet is restricted.  A node wanting to send a packet, can start to do so only at the beginning of a slot.
  • 70. Random assignment schemes  Schemes – ALOHA:  The slotted ALOHA system employs beacon signals that are sent at precise intervals that mark the beginning of a slot, at which point the nodes having data to send can start to transmit.  Again, this protocol does not work very well if the number of stations contending to send data is high.
  • 71. Random assignment schemes  Schemes – CSMA:  CSMA - Carrier Sense Multiple Access  A node senses the medium before starting to transmit.  If it senses that some transmission is already underway, it defers its transmission.  Techniques: collision detection (CSMA/CD) and the collision avoidance (CSMA/ CA)
  • 72. Random assignment schemes  Schemes – CSMA:  In a wireless network the CSMA/CD technique does not work very well.  In the CSMA/CD technique, the sender starts to transmit if it senses the channel to be free. But, even if it senses the channel to be free, there can be a collision (why?) during transmission.
  • 73. Random assignment schemes  Schemes – CSMA:  In a wireless network it is very difficult for a transmitting node to detect a collision, since any received signal from other nodes would be too feeble compared to its own signal and can easily be masked by noise.  As a result, a transmitting node would continue to transmit the frame, and only the destination node would notice the corrupted frame after it computes the checksum
  • 74. Random assignment schemes  Schemes – CSMA:  This leads to retransmissions and severe wastage of channel utilization. In contrast, in a wired network when a node detects a collision, it immediately stops transmitting, thereby minimizing channel wastage.
  • 75. Random assignment schemes  Schemes – CSMA:  In a wireless network, a collision avoidance scheme works much better compared to a collision detection-based scheme.  A collision avoidance scheme is based on the idea that it is necessary to prevent collisions at the moment they are most likely to occur, that is, when the bus is released after a packet transmission.
  • 76. Random assignment schemes  Schemes – CSMA:  During the time a node is transmitting on the channel, several nodes might be wanting to transmit.  These nodes would be monitoring the channel and waiting for it to become free.  The moment the transmitting node completes its transmission, these waiting nodes would sense the channel to be free, and would all start transmitting at the same time.
  • 77. Random assignment schemes  Schemes – CSMA:  In the collision avoidance scheme, all nodes are forced to wait for a random time and then sense the medium again, before starting their transmission.  If the medium is sensed to be busy, a node waiting to transmit waits for a further random amount of time and so on.  The chance of two nodes starting to transmit at the same time would be greatly reduced.
  • 78. Reservation-based schemes  A basic form of the reservation scheme is the RTS/CTS scheme.  In an RTS/CTS scheme, a sender transmits an RTS (Ready to Send) packet to the receiver before the actual data transmission.  On receiving this, the receiver sends a CTS (Clear to Send) packet, and the actual data transfer commences only after that.
  • 79. Reservation-based schemes  When the other nodes sharing the medium sense the CTS packet, they refrain from transmitting until the transmission from the sending node is complete.  A few examples of RTS-CTS based MAC protocols are MACA, MACAW, MACA-BI, PAMAS, DBTMA, MARCH, S-MAC protocols.
  • 80. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:  MACA solves the hidden/exposed terminal problems by regulating the transmitter power.  A node running MACA requests to use the medium by sending an RTS to the receiver. Since radio signals propagate omni-directionally, every terminal within the sender’s radio range will hear this and then refrain from transmitting.  As soon as the receiver is ready to receive data, it responds with a CTS.
  • 81. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:
  • 82. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:  Before the start of its transmission, it sends a Request To Send.  B receives the RTS that contains the sender’s name and the receiver’s name, as well as the length of the future transmission.  In response to the RTS, an acknowledgment from B is triggered indicating Clear To Send (CTS).
  • 83. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:  The CTS contains the names of the sender and receiver, and the length of the planned transmission.  This CTS is heard by C and the medium is reserved for use by A for the duration of the transmission.  On receipt of a CTS from B, C refrains from transmitting anything for the time indicated in the CTS.
  • 84. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:  Thus a collision cannot occur at B during data transmission, and the hidden terminal problem is solved.
  • 85. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:  Though this is a collision avoidance protocol, a collision can occur during the sending of an RTS.  Both A and C could send an RTS at same time. But an RTS occurs over a very small duration compared to the duration of data transmission.  Thus the probability of collision remains much less.
  • 86. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:  B resolves this contention problem by acknowledging only one station in the CTS.  No transmission occurs without an appropriate CTS.
  • 87. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:
  • 88. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:  Assume that B needs to transmit to A. B has to transmit an RTS first.  The RTS would contain the names of the receiver (A) and the sender (B).  C does not act in response to this message as it is not the receiver, but A responds with a CTS.
  • 89. Reservation-based schemes  MACA - Multiple Access Collision Avoidance:  C does not receive this CTS and concludes that A is outside the detection range.  Thus C can start its transmission assuming that no collision would occur at A.