18001025661 / 8527794500

Syllabus | B. Tech. Electronics & Communication Engineering | MOBILE COMPUTING

Version1.0 Date of Approval: — 3 1 0 3
Pre-requisites//Exposure Semiconductor Devices and Circuits

Course Objectives

  1. Introduction of an advanced element of learning in the field of wireless communication.
  2. The students to the concepts of wireless devices and mobile computing.
  3. To introduce wireless communication and networking principles, that support connectivity to cellular networks, wireless internet and sensor devices.
  4. To understand the use of transaction and e-commerce principles over such devices to support mobile business concepts
  5. To appreciate the social and ethical issues of mobile computing, including privacy.

Course Outcomes

On completion of this course, the students will be able to

  1. A working understanding of the characteristics and limitations of mobile hardware devices including their user-interface modalities
  2. The ability to develop applications that are mobile-device specific and demonstrate current practice in mobile computing contexts.
  3. A comprehension and appreciation of the design and development of context-aware solutions for mobile devices.
  4. An awareness of professional and ethical issues, in particular those relating to security and privacy of user data and user behavior.

Catalog Description

Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage, which allows for transmission of data, voice and video. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications..

Text Books

  1. 1. 1. Jochen Schiller,“Mobile Communications”,Addison-Wesley. (Chapters 4,7,9,10,11),second edition, 2004.
  2. Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”, Wiley, 2002, ISBN 0471419028. (Chapters 11, 15, 17, 26 and 27)

Reference Books

  1. Reza Behravanfar, “Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML”, ISBN: 0521817331, Cambridge University Press, October 2004,
  2. Adelstein, Frank, Gupta, Sandeep KS, Richard III, Golden , Schwiebert, Loren, “Fundamentals of Mobile and Pervasive Computing”, ISBN: 0071412379, McGraw-Hill Professional, 2005.
  3. Hansmann, Merk, Nicklous, Stober, “Principles of Mobile Computing”, Springer, second edition, 2003.
  4. Martyn Mallick, “Mobile and Wireless Design Essentials”, Wiley DreamTech, 2003.

Course Content

Unit I: Introduction to Mobile Communications and Computing             12 lecture hours

Mobile Computing (MC) : Introduction to MC, novel applications, limitations, and architecture.

GSM : Mobile services, System architecture, Radio interface, Protocols, Localization and calling, Handover, Security, and New data services.

Unit II: Wireless) Medium Access Control                                         8 lecture hours

(Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA.  

Unit III: Mobile Network Layer                                                                           6 lecture hours

Mobile IP (Goals, assumptions, entities and terminology, IP packet delivery,
agent advertisement and discovery, registration, tunneling and encapsulation, optimizations), Dynamic Host Configuration Protocol (DHCP).  

Unit IV: Mobile Transport Layer                                                                  8 lecture hours

Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast recovery, Transmission /time-out freezing, Selective retransmission, Transaction oriented TCP.

Unit V: Database Issues                                                                                  6 lecture hours

Hoarding techniques, caching invalidation mechanisms, client server computing with adaptation, power-aware and context-aware computing, transactional models, query processing, recovery, and quality of service issues. 

 Mode of Evaluation: The theory and lab performance of students are evaluated separately.


  Theory   Theory and laboratory
Components Internal SEE    
Marks 50 50    
Total Marks 100  
Scaled Marks 75   100