Академический Документы
Профессиональный Документы
Культура Документы
GSM 522
Session Plan
The Vision of Mobile Computing Going Beyond Mobile Computing: An Idea of Pervasive Computing Wireless Infrastructure Mobile Processors Mobile Protocols References and Reading
No Network
Fixed Network
Nomadic Computing
Mobile Computing
Ubiquitous Computing
Internet
Intranet
Commuters Travelers Stock traders Medical Law enforcement Package delivery Education Insurance Emergency Trucking Intelligence Military
Adhoc network
Servers
Clients
The work that a user is doing now is his/ her primary activity
Wireless Infrastructure
Wireless Infrastructure
Global Satellite
Suburban
Urban In-Building
Micro-Cell Macro-Cell
Pico-Cell dik
In-Room (BlueTooth)
IMT
IMT-2000 FPLMTS
ETSI
SMG
UMTS
GSM
D-AMPS/IS-95
UMTS
0.1-2.3 GHz
2-4 GHz
Campus
Office Room DECT 10K 100K 1M 10M 100M 1G 20-50 GHz DECT
Bandwidth
Today
Android
The iphone
MyVu
The iPad
22Moo
Portable projectors
Frequent Disconnections
Handoff blank out (>1ms for most cellulars) Drained battery disconnection Battery recharge down time Voluntary disconnection (turned off to preserve battery power, also off overnight) Theft and damage (hostile environment) Roam-off disconnections
Asymmetric duplex bandwidth Limited communication bandwidth exacerbates the limitation of battery lifetime.
Introduction
There are two fundamentally different ways of designing CPUs The CPU can be designed to have an instruction set with:
very basic instructions OR a wide range of complex instructions
RISC vs CISC
The reduced instruction set computer architecture can be highly optimised because the number of operations is small The overall transistor count can be corresponding low and the chip area small and hence low cost However to implement a line of a high level language may take many instructions
33
RISC vs CISC
The complex instruction set computer architecture cannot easily be fine tuned It requires a high transistor count and a large chip size and a correspondingly higher cost However to implement a line of a high level language may only take one complex instruction
What is CISC
Complex Instruction Set Computer High level Instruction Set Executes several low level operations Ex: load, arithmetic operation, memory store
Features of CISC
Instructions can operate directly on memory Small number of general purpose registers Instructions take multiple clocks to execute Few lines of code per operation
What is RISC?
Reduced Instruction Set Computer RISC is a CPU design that recognizes only a limited number of instructions Simple instructions Instructions are executed quickly
Features of RISC
Reduced instruction set Executes a series of simple instruction instead of a complex instruction Instructions are executed within one clock cycle Incorporates a large number of general registers for arithmetic operations to avoid storing variables on a stack in memory Only the load and store instructions operate directly onto memory Pipelining = speed
Pipelining
Assembly Line Technique to process multiple instructions at the same time Allows instructions to be executed efficiently
Pipelining Example
RISC vs CISC
In practice real computer architectures are neither pure RISC or CISC RISC CPUs may have units which support Floating Point Operations and Multimedia Operations CISC CPUs may preprocess the instruction queue (trace cache) into internal RISC-like instructions
41
43
Mobile Processors
Mobile applications originally focused on battery life e.g. classic mobile phone The requirements of current systems is more diverse typical mobile systems require both battery life and processing performance e.g.
Netbooks Tablets/ Slates/ Pads Smartphones
44
Mobile Processors
ARM designs are ideal for the hardware of systems such as mobile phones, slates, netbooks etc There is however a problem Windows does not execute on the ARM architecture (other than Windows Phone) This is mainly of interest to netbook products
45
Mobile Processors
Intel mainstream processors consume too much power for the truly mobile market However the stripped down Atom x86 is a potential candidate It has the advantage of running Windows 7
46
ARM Cortex-A9
The ARM Cortex-A9 processor delivers exceptional capabilities for less power than consumed by high performance compute platforms, including
Unrivalled performance with 2GHz typical operation with the TSMC 40G hard macro implementation Low power targeted single core implementations into cost sensitive devices Scalable up to four coherent cores with advanced MPCore technology Optional NEON media and/or floating point processing engine
47
48
49
98% of mobile phones use at least one ARM processor 90% of embedded 32-bit systems use ARM
50
CISC vs RISC
CISC RISC Complex instructions require multiple cycles Many instructions can reference memory Instructions are executed one at a time Few general registers Reduced instructions take 1 cycle
Only Load and Store instructions can reference memory Uses pipelining to execute instructions Many general registers
Mobile Protocols
Wireless Components
Network interface card (NIC)/client adapter: A PC or workstation uses a wireless NIC to connect to the wireless network. The NIC scans the available frequency spectrum for connectivity and associates it to an access point or another wireless client. The NIC is coupled to the PC/workstation operating system using a software driver.
Wireless Components
Bridge: Wireless bridges are used to connect multiple LANs (both wired and wireless) at the Media Access Control (MAC) layer level. Used in building-to-building wireless connections, wireless bridges can cover longer distances than APs (IEEE 802.11 standard specifies 1 mile as the maximum coverage range for an AP).
Wireless Components
Antenna: An antenna radiates the modulated signal through the air so that wireless clients can receive it. Characteristics of an antenna are defined by propagation pattern (directional versus omnidirectional), gain, transmit power, and so on. Antennas are needed on both the AP/bridge and the clients.
Wireless Protocols
Proprietary
IEEE
802.11a/b Ratified
1999
2000
2001
2002
2003
Wi-Fi
Popular term for the 802.11 wireless networking standards Used extensively for wireless access Range of wi-fi is of the order of 1000 meters
Bluetooth
Popular term for the 802.15 wireless networking standard, which is used to create small personal-area networks (PANs) in the 2.4 GHz range Has extremely low power requirements and is therefore used for PDAs, cell phones and handheld computers FedEx uses Bluetooth to transmit delivery data to cellular transmitters