**2. Formulation of the application**

Now let us start with the hardware functionality. The Hardware implementation was configured and formulated within the Smartphones themselves. Every smartphone was unique in its own way with both for its features and functionalities, but one aspect that still remained stagnant throughout the course of time was the sensors which were equipped and associated within a particular device.

Since the dawn of smartphones were introduced, our mobility with sensory took flight in the form like camera, proximity, gyroscope, accelerometer, light, ambient aura, motion, pedometer, rotation vector, orientation, touch, magnetometer,

### *A Revolutionary Gaming Style in Motion DOI: http://dx.doi.org/10.5772/intechopen.100551*

thermometer, microphone, fingerprint with many more. But over the passage of time, almost 95% of the smartphones had the majority of all the basic sensors which the application required to collaborate with the devices associated along with it and as for the rest, it was mainly software implementation with various rendering provided from designing, coding, wireframing and terminal commanding sequence of the programming perspective. To minimize the complexity for the functionality and user experience, virtual triggers with touch buttons were placed for the utility feature deployment of the application (**Figure 1**).

Next, the development for the application was built and deployed under three phases where each and every node connection was confirmed with the establishment through the Internet Protocol (IP) associated within the internet network connection. As I am sure, we are all familiar with the terminology of the subnet mask and default gateway for the render of an internet connection provided by the ISP. But please bear in mind, the pathway connection would work only when the user is within the same network [29]. For a better understanding on this matter, let us break down the connection bridge of the communication which mainly takes place and is performed inside an internet connection and how the operation will be executed.

The subnet mask was employed by the TCP/IP protocol to see whether or not a bunch is on the native subnet or in a foreign network. Internet Protocol (IP) Access provides users with an IP address to remote networks. IP Access connects the user to a beacon of victimization which is called an OpenVPN tunnel. Afterwards, the GRE protocol is then configured to bridge this affiliation across the present beacon VPN tunnel established from the node to the beacon, onto the management local area network connected to the node. Whereas when connected, the user will access the IP addresses on the remote management local area network directly, like by the usage of the ping command or by writing them into the browser address bar. To be more specific on the matter, consider this aspect as the back-end computation factor considering our browsers and the establishment of a successful internet connection.

Bluetooth which if utilized properly would also be a source of wireless technology traditional for exchanging information between mounted and mobile devices over short distances, short-wavelength frequency, radio waves inside the economic,

**Figure 1.**

*A graphical view of the hardware components (smartphone).*

scientific, and medical radio bands, ranging from 2.400 to 2.485 GHz, and building personal house networks (PANs). IEEE 802.11 is a part of the IEEE 802 set of local area network protocols which specifies the set of the media access management (MAC) and physical layer (PHY) protocols for implementing wireless native house network, wireless local area network (WLAN), the deployment of wireless fidelity (Wi-Fi), laptop computer communication in varied frequencies, also as but not restricted to a tier of four, five and sixty rate frequency bands. These are the protocols which do the square measure.

Typically, square measure utilized in conjunction with the IEEE 802.2, and a square measure designed to interwork seamlessly with the local area network, and square measure fairly and usually accustomed to carry the internet Protocol traffic. The 802.11 family consists of a series of a half-duplex over-the-air modulation techniques that use constant basic protocol. The 802.11 protocol family use carrier-sense multiple access with collision dodging whereby instrumentality listens to a channel for various users (including non 802.11 users) before causing and interfacing with each and every individual packet. A router may need interfaces for numerous styles of physical layer connections, like copper cables, fiber optics, or wireless transmission. It can also support wholesome transmissions which are completely different networklayer transmission standards availing to the current standards provided till now.

Every network interface that is utilized to change the information packets to be forwarded from one gear end to another which is very unique. Routers could, in addition, be conversant in connecting to a pair of or plenty of logical groups of a laptop or computing peripheral devices referred to as subnets, each with a definite network prefix. Once that information is transferred from one device to a unique on an Internet Protocol (IP) network, it's lessened into smaller units referred to as packets. In addition, with that, to the actual info, each packet includes a header that contains the information to help it to induce to its destination, rather like the physical address information realized on a mailed envelope like the traditional methods available. Transmission Management Protocol (TCP) and other rendered protocols which actually are totally different protocols, do their work within the data on the machine, then it's sent to the data process module, where the data packets unit bundled into information science packets and are sent over the network which is inclined with individual users along with their activity and connectivity to the internet.

To succeed in their destination on the opposite facet of the planet, the information packets should meet up with several routers. The work these routers do and performs, is termed routing. Each of the intermediate routers "reads" the destination information processing address of every received packet. Supported to the data, the router sends the packets within the acceptable direction as every router incorporates a routing table wherever data concerning neighboring routers (nodes) is held on. This data includes the value (in terms of network necessities and resources) of forwarding a particular packet within the direction of that neighboring node. Data from those table is employed to choose the foremost economical node to use or the most effective route on that pathway in order to send the information packets. Every packet is sent in a very totally different direction, however, they eventually all get routed to a constant destination machine. As a consequence, to this, using a global positioning system (GPS) navigation it is also possible to track that movement remotely which is also implemented within the current design approach of the application.

Fast forward to today, with the rapid improvement and innovations in technology, most of the communication protocols have given birth to better enhanced and advanced connectivity which are now achievable in terms of mirror cast, NFC, wireless share, screen cast, nearby share plus many more.
