Академический Документы
Профессиональный Документы
Культура Документы
PRACTICAL-1
Mobile Computing’s Architecture is based on the number of the Functions. The O.S. is one
of them. An Operating System is required to run the software components on the Hardware. The
middleware components will deployed in mobile devices. It has also a protocols and layers structure,
which used for transmission and reception of data in a network of the mobile Devices and systems.
Mobile Computing Architecture has Different Areas, which is listed below.
• Programming Languages
• Operating Systems
• Middlewares
• Architectural Layers
• Protocols
• Layers
1. Programming Languages:
A variety of programming languages is used in the mobile computing architecture.
One popular language for the mobile devices is Java, due to its platform independent
characteristics. Java uses its own compiler. (J2ME and JavaCard are most used languages in
mobile devices as a part of Java.)
2. Operating Systems:
An Operating System enables the user to run an application without considering the
hardware specification and functionalities. The OS provides management functions for tasks
and memory, also for the scheduling multiple tasks in system.
An OS provides the communication between different layers of the hardware devices.
3. Middleware:
Middleware are the software components that link the application components with
the network distributed components. Here listed the few examples of it.
• To Discover the nearby Bluetooth Device.
• To Discover the nearby hot spot
• To Achieve device synchronization with the server or an enterprise server
• To Retrieve data from a network database
• For Service Discovery
• For Adaptation of the application to the Platform and services availability
4. Architectural Layers:
It deals with defining various layers between the user applications, interfaces, device
and network hardware. A well-defined architecture is necessary for Systematic
Computations and access to data and software objects in the layers. An application deploys
the software components and APIs. The Client APIs can b considered at a layer in the
architecture.
The middleware components layers deals with the number of services. And OS is a
layer in between the application and the Hardware. It facilitates to running the Program,
hiding the h/w information and provides many O.S. functions. (An application can use
functions directly.)
5. Protocols:
Interchanges between two diversified and distributed components need protocols and
standards. MC services use a number of mobile Communication protocols like
GSM900/1800/1900, UMTS, WPAN, etc.
6. Layers:
There are different layers in network interchange of information, like WAP protocols
Layers. It also follows OSI 7 layers format.
PRACTICAL-2
You can use a wireless network (WLAN) to share Internet access, files, printers,
game consoles, and other devices among all the computers in your home. After you’ve
completed the initial wireless router setup and added your computers and devices to the
network, you can use your home network to surf the web or to play online games—whether
you're sitting in your living room or relaxing in your backyard. It's easier than ever to set up
a wireless network.
HOW YO SETUP?
The Windows 7 operating system fully supports wireless networking. For Windows
Vista users, we recommend installing Windows Vista Service Pack 2. For Windows XP
users, we recommend Windows XP Service Pack 2.
• A router converts the signals coming across your Internet connection into a wireless
broadcast, sort of like a cordless phone base station. Newer DSL and cable modems come
with integrated wireless networking capability and are called modem routers. If you do need
to purchase a wireless router, be sure that you buy a wireless router and not a wireless
access point. The Linksys router is a popular router for wireless networks as it is simple to
set up. The 802.11G or 802.11N is the best as they offer excellent performance and are
compatible with almost everything. This is called an ad hoc network.
• First, locate your cable modem or DSL modem and unplug it to turn it off.
Next, connect your wireless router to your modem. Your modem should stay
connected directly to the Internet. Later, after you've hooked everything up, your computer
will wirelessly connect to your router, and the router will send communications through
your modem to the Internet.
[ Note: The instructions below apply to a Linksys wireless router. The ports on your router
may be labeled differently, and the images may look different on your router. Check the
documentation that came with your equipment for additional assistance. Or do a Bing search
on “(your manufacturer/model) wireless router setup” to find images and instructions. ]
Next, plug in and turn on your cable or DSL modem. Wait a few minutes to give it
time to connect to the Internet, and then plug in and turn on your wireless router. After a
minute, the Internet, WAN, or WLAN light on your wireless router should light up,
indicating that it has successfully connected to your modem.
Using the network cable that came with your wireless router, you should temporarily
connect your computer to one of the open network ports on your wireless router (any port
that isn't labeled Internet, WAN, or WLAN). If you need to, turn your computer on. It should
automatically connect to your router.
Next, open Internet Explorer and type in the URL or address to configure your router.
[NOTE: Do this on the computer that you are using to set up your wireless network. The
computer automatically links you to the router’s page. If you type the router’s URL on a
different computer, typing the address in the navigation bar will not take you to your
router’s configuration page.]
On the router configuration page, you might be prompted for a password. The address
and password you use varies depending on what type of router you have, so refer to the
instructions included with your router or on the manufacturer’s website.
For quick reference, this table shows the default addresses, user names, and
passwords for some common router manufacturers. If the address is not listed here, you can
read the documentation that came with your router or go to the manufacturer's webpage to
find it. There may be multiple website addresses you can use.
Internet Explorer shows your router's configuration page, along with the modem IP
address and other information. Most of the default settings should be fine, but you need to
configure three things:
Your wireless network name, known as the SSID. This name identifies your
network, and it appears in a list of available wireless networks. You should change the
default SSID that your ISP provided and give your network a unique name that none of your
neighbors are using. This helps you identify your network, and it can help keep your
wireless network secure by preventing it from overlapping with other wireless networks that
might be using the default SSID.
Wi-Fi Protected Access (WPA or WPA2), which can help protect your wireless
network. It’s important to help secure your wireless network by setting up a network
security key, which turns on encryption. With encryption, people can't connect to your
network without the security key, and all information sent across your network is encrypted
so that only computers with the key to decrypt the information can read it. This can help
prevent attempts to access your network and files without your permission. Wi-Fi Protected
Access (WPA or WPA2) is the recommended wireless network encryption method.
Wireless encryption (WEP) is not as secure. Windows 7, Windows Vista Service Pack 2,
and Windows XP support WPA2. When you set up most routers are asked to provide a
password phrase that the router uses to generate several keys. Make sure that your password
phrase is unique and long. Some routers and modem routers now come with a function
called Quick Security Setup (or QSS) that automatically issues you a key when you press a
button on the router. Be sure to keep a hard copy and a digital copy of your network security
key and password phrase, in case you lose or misplace them. You can recover a lost network
key or reset it on your router, but these are complicated processes that are different for every
router and they sometimes entail setting up your network again.
Your administrative password, which controls your wireless network. Just like
any other password, it should not be a word that you can find in the dictionary, and it should
be a combination of letters, numbers, and symbols. Be sure to save a hard copy and a digital
copy of this password, too, because you'll need it if you ever have to change your router's
settings.
The exact steps you follow to configure these settings will vary depending on the type
of router you have. After each configuration setting, be sure to click Save Settings, Apply,
or OK to save your changes.
Now, before connecting your computers and devices to the network, you should
disconnect the wireless network cable from your computer.
PRACTICAL-3
The definitions of the Transport Layer are slightly different in these two models. This
article primarily refers to the TCP/IP model, in which TCP is largely for a convenient
application programming interface to internet hosts, as opposed to the OSI model definition
of the Transport Layer.
The most well-known transport protocol is the Transmission Control Protocol (TCP).
It lent its name to the title of the entire Internet Protocol Suite, TCP/IP. It is used for
connection-oriented transmissions, whereas the connectionless User Datagram Protocol
(UDP) is used for simpler messaging transmissions. TCP is the more complex protocol, due
to its stateful design incorporating reliable transmission and data stream services. Other
prominent protocols in this group are the Datagram Congestion Control Protocol (DCCP)
and the Stream Control Transmission Protocol (SCTP).
PRACTICAL-4
DESIGNING:
CODING:
OUTPUT:
PRACTICAL-5
DESIGNING:
CODING:
End Sub
End Sub
End Sub
OUTPUT:
PRACTICAL-6
CODING:
Case2
Msgbox”This is Monday”
Case3
Msgbox”This is Tuesday”
Case4
Msgbox”This is Wednesday”
Case5
Msgbox”This is Thursday”
Case6
Msgbox”This is Friday”
Case7
Msgbox”This is Saturday”
Case else
Msgbox”This is Sunday”
End select
End if
Loop while not w1>0 and w1<7
End sub
OUTPUT:
PRACTICAL-7
EX. Registration Form which displays all fields entry on Submit button’s Click event.
PROGRAM:
Private Sub Check1_Click()
txtTrackHobbies.Text = ""
txtTrackHobbies.Text = txtTrackHobbies.Text + "," + "Reading"
End Sub
lstState.AddItem "Warwickshier"
'lstState.AddItem ""
End If
End Sub
'List1.AddItem ("First Name " + " " + txtFirstName.Text + " " + txtLastName.Text + " " +
txtTrackGender.Text + " " + txtTrackHobbies.Text + " " + cmbCountry.Text + " " + lstState.Text)
List1.AddItem "First Name :" + " " + txtFirstName.Text
List1.AddItem "Last Name : " + " " + txtLastName.Text
List1.AddItem "Gender:" + " " + txtTrackGender.Text
'List1.AddItem "Hobbies:" + " " + txtTrackHobbies.Text
'List1.AddItem "Country:" + " " + cmbCountry.Text
'List1.AddItem "State :" + " " + lstState.Text
List1.AddItem "Hobbies:"
If Check1.Value = 1 Then
List1.AddItem " " + Check1.Caption
End If
If Check2.Value = 1 Then
List1.AddItem " " + Check2.Caption
End If
If chkHobbie4.Value = 1 Then
List1.AddItem " " + chkHobbie4.Caption
End If
If Check4.Value = 1 Then
List1.AddItem " " + Check4.Caption
End If
List1.AddItem "Country:" + " " + cmbCountry.Text
List1.AddItem "State :" + " " + lstState.Text
End Sub
PRACTICAL-7
DESIGN:
Program:
PRACTICAL-8
DESIGN:
PROGRAM:
End Sub