UNIT-III: Mobile Networking: Virtual IP Protocols - Loose Source Routing Protocols - Mobile IP - CDPD - GPRS
UNIT-III: Mobile Networking: Virtual IP Protocols - Loose Source Routing Protocols - Mobile IP - CDPD - GPRS
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
UNIT-III: Mobile Networking: Virtual IP Protocols - Loose Source Routing Protocols - Mobile IP – CDPD– GPRS –
UMTS - Security and Authentication – Quality of Service – Mobile Access to the WorldWide Web.
MOBILE NETWORKING
Internetworking mobile computers with the fixed-network raises the additional requirements of
mobility transparency and mobility and location management. The mobility behavior of a node should be
transparent to a peer node. A peer node should be able to communicate with a mobile node using some
fixed IP address irrespective of the current point of attachment.
The mobile networking protocol should also be transparent to the hosts and router which do not
understand or support mobility. Thus the mobility unaware routers should be able to route packets
destined to a mobile host as a normal IP data packets
Security is another important concern in networking. In mobile networking it is more so, since the
mobile nodes will be visiting foreign networks, and accessing data. Thus, it is important that the security
of the visiting network is not breached due to the presence of foreign node in its network.
Authentication of the mobile nodes and foreign networks is also important. Thus, at a minimum,
mobile networking protocols should provide authentication and security features comparable to those
found in fixed-network IP protocol such as IPv4 and IPv6.
1. Define AMT.
2. Explain Sunshine &Postel
3. Describe the SONY protocol.
4. Explain Virtual IP mechanism.
A mobile is a virtual network with a virtual address space. A mapping is maintained between the
physical or an actual IP addresses and the virtual IP addresses. This mapping is performed by the mobile
host which obtains a care of address from the local network being visited using either the Dynamic Host
Configuration Protocol (DHCP) or the BOOTP protocols or by any of the link layer protocols. Below, we
describe two Virtual IP protocols.
Sunshine And Postel
The SONY Protocol
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 1
BRANCH:IT FINAL YEAR SEVENTH SEM 2
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
This approach was proposed by DAVID JOHNSON of CMU in 1993. It uses the Loose Source option
available in IPv4 for routing packet data. The option allows the source to specify the intermediate
gateways in the IP packet.
Thus, the source can control the route the IP packet takes. At each destination, the gateway picks
up the next IP address from the IP packet, sets it as the destination, and advances a pointer stored in the IP
packet header.
The home network maintains a database of all mobile host native to its network. When a mobile
host changes location, it informs its home network of its location, it informs its home network of its new
location.
When an IP packet destined to the mobile host arrives at the home network, the packet is
forwarded to the mobile host at the current location address, and the corresponding source host is
informed of the current location of the mobile host.
The corresponding host can use this information to cache the location, thus avoiding
communication with the home network until the mobile host changes its location again. Source route set
up is done by the corresponding host.
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 2
BRANCH:IT FINAL YEAR SEVENTH SEM 3
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
The Mobile Internet Protocol defines enhancements to the IP to allow routing of IP packets to
mobile nodes in the internet. The IP version 4 assumes that the IP of a node uniquely identifies the point
of attachment of the node to the internetwork.
Packets are routed based on the IP address. In a mobile environment the point of attachment of the
mobile node will be different from time to time, and the mobile nodes could be attached to different
networks.
For IPv4 to work correctly in the mobile environment, the mobile node will either have to be
assigned a new IP address every time it changes its point of attachment, or the host specific routing
information has to be supplied throughout the network.
Both of these alternatives result in scalability and connection management problems. The mobile
IP protocol describes a mechanism which allows nodes to change their point of attachment on the internet.
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 3
BRANCH:IT FINAL YEAR SEVENTH SEM 4
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 4
BRANCH:IT FINAL YEAR SEVENTH SEM 5
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
7. The datagrams originating from the mobile node are routed in the normalfashion. The foreign agent
may act as a default router in this case.
The routing path of a datagram sent from a fixed host to a mobile node is asfollows:
The datagram is sent from the fixed host to the home agent using standard IP routing
The home agent encapsulates the received datagram inside another datagram and sends it to the
foreign agent (IP-in-IP tunneling)
The encapsulated IP packet is received by the foreign agent, decapsulated,and forwarded to the
mobile node
The mobile node replies by sendinga datagram to the fixed host through the foreign agent.
The Mobile IP protocolstack on the fixed network and on the mobile unit is depicted in Figure 7.1.
The Mobile Host Protocol, known as Mobile-IP, is an evolving standard being developed by the
IETF Working Group on IP Routing for Wireless/Mobile Hosts. Standards for both IPv4 and IPv6 have
been proposed and are being reviewed for enhancements in scalability and performance.
In particular, the triangular routing between the mobile node, the home agent, and the foreign
agent (that must be performed every time the mobile node switches over to another communication cell) is
a bottleneck that is being removed in IPv6 [81].
Packets addressed to the mobile node’s home address are transparently routed to its care-of
address. The optimized protocol enables IPv6 nodes to cache the binding of a mobile node’s home address
with its care-of address, and tothen send any packets destined for the mobile node directly to it at this
care-ofaddress.
The MosquitoNet project at Stanford [24] aimed at relaxing the requirement of foreign agent
availability. MosquitoNet follows the IETF specification of Mobile-IP to support host mobility, but does
not require FA support in foreign networks visited by the mobile node.
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 5
BRANCH:IT FINAL YEAR SEVENTH SEM 6
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
An ad-hoc mobile network is a collection of wireless mobile nodes forming atemporary network
without the aid of any established infrastructure or centralizedadministration.
Examples of ad-hoc networks include wireless portable devices of a group of collaborator, such as
an emergency team in a disasterarea. No routing is needed between ad-hoc nodes which are within
transmission range of each other’s. Otherwise, additional nodes must be used to form asequence of hops
from the source to the destination.
Routing algorithms in thead-hoc environment are therefore a necessary support for this mode of
mobile connection. Traditional routing algorithms used in wire line networks use distance vector
orlink state routing algorithms, which rely on periodically broadcasting routingadvertisements by each
router node.
The distance vector algorithm broadcastsits view of the distance from a router no each
host.
The link staterouting algorithm broadcasts its view of the adjacent network links.
Neitheralgorithm is suitable for the ad-hoc environment because periodic broadcastswill drain battery
power quickly.
Research in ad-hoc routing is dedicated to finding algorithms that avoid theneedless battery
consumption and the inefficient use of the wireless bandwidth.Dynamic source routing is one such
algorithm due to Johnson and Maltz. It allows for route discovery, route maintenance, and the use of
route caches. To discover an available route, a source node sends out a route request packet indicating
the source, the target nodes, and a request identifier.
When a mobile node receives a route request packet, it checks a list of recently processed
requests. If a request is found for the same source and request id, the request is dropped and no further
action is taken. Otherwise, the address of the node servicing the request is added to the route request
packet before the packet is re-broadcasted. However, if the address of the node servicing the request is
identical to the target node address, the requested route is discovered, and a reply is sent to the source
node.
Due to unpredictable node mobility, cached routes may become incorrect.Route maintenance is
therefore necessary in this environment. This is achievedby requiring nodes routing packets to
acknowledge successful forwarding andto send error messages to the source node if a route ceases to exist.
Activemonitoring such as MAC-level acknowledgements, as well as passive monitoring(listening to
nearby broadcast, in a promiscuous mode), can be used inroute maintenance.
Other recent ad-hoc routing protocols that can be found in the literature includethe on-demand
distance vector routing, the Location-Aided Routing (LAR)algorithm, and the Distance Routing Effect
Algorithm.
1. Define CDPD.
2. What is WDF?
3. What are MHF & SF?*
4. Define M-ES & MD-IS.*
5. Define MNRP & MNLP and writes its function.
6. Define MDBS.
7. Write the difference between CDPD & Mobile-IP.
8. Describe CDPD (6M) *
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 6
BRANCH:IT FINAL YEAR SEVENTH SEM 7
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
1. The user’s IP address must be assigned by the CDPD SERVICE provider. Mobile IP makes no
such assumptions.
2. Mobile IP allows the mobile node to also be a foreign agent. Combining the M-ES and the
serving MD-IS was not considered and is not practical in CDPD.
3. CDPD’S mobility tunneling is based on CLNP. Mobile IP’s mobility tunneling is based on the
IP-in-IP protocol, which is IP based.
4. Mobile IP operates completely above the data link layer. CDPD mobility, on the other hand, is
mostly above the data link layer.
5. Since the infrastructure of the CDPD network is closed there are less security consideration for
CDPD.
While the standardization process of Mobile IP has been progressing rather slowly, CDPD has been
deployed for a few years now, and is receiving the support of major AMPS carriers. However, due to its
lack of openness, the further of CDPD deployment and/or acceptance can only be guessed.
1. Define GSN. *
2. Define GPRS.*
3. Explain GGSN
4. Explain SGSN
5. Explain in detail about GPRS. (6M)
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 7
BRANCH:IT FINAL YEAR SEVENTH SEM 8
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
GPRS is a GSM packet data service developed by the (ETSI) European Telecommunication
Standards Institute as part of GSM phase 2+ developments. The goal of GPRS was to support data transfer
rates higher than the 9.6 kbps achieved through GSM’S circuit switching technology.
Unlike Mobile-IP, GPRS is not restricted to IP packet data protocols, and offer connection to
standard protocols (such as TCP/IP, X.25, and CLNP) AS well specialized data packet protocols. Mobile-
IP, however, influenced the design of mobility management in GPRS.
Figure 7.2 shows the architecture of a GSM system that uses GPRS. In addition to the BASE
Transceiver Station (BTS), Base Station Controller (BSC), and the Mobile Switching Center (MSC), a
new logical network node called the GPRS support node (GSN) was introduced in order to create an end-
to-end packet transfer mode.
P
hysically, the GSN can be integrated with the mobile switching center (MSC), or it can be a separate
network element based on the architecture of data networks routers. GSN is a mobility management with
the GPRS registers, and delivery of data packets to MSs, independently oftheir locations.
One GSN is designated the Gateway GSN (GGSN) and acts as a logical interfaceto external packet
data networks. The GGSN is similar to the home agentin Mobile-IP. It updates the location directory of
the mobile station (MS) usingrouting information supplied by the Serving GSN node (SGSN).
The latter issimilar to the foreign agent in Mobile-IP. GGSN also routes the external datanetwork
protocol packet encapsulated over the GPRS backbone to the SGSNcurrently serving the MS. It also
decapsulates and forwards external data networkpackets to the appropriate data network and handles the
billing of datatraffic.
The SGSN is responsible for the delivery of packets to the mobile stationswithin its service area.
The main functions of the SGSN are to detect newGPRS MSs in its service area, handle the process of
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 8
BRANCH:IT FINAL YEAR SEVENTH SEM 9
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
registering the new MSsalong with the GPRS registers, send/receive data packets to/from the GPRSMS,
and keep a record of the location of MSs Inside of its service area.
TheGPRS register acts as a database from which the SGSNs can ask whether anew MS in its area
is allowed to join the GPRS network. For the coordinationof circuit and packet switched services, an
association between the GSM MSCand the GSN is created. This association is used to keep routing and
locationarea information up-to-date in both entities.
UMTS: 1. Describe UMTS (6M)
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 9
BRANCH:IT FINAL YEAR SEVENTH SEM 10
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 10
BRANCH:IT FINAL YEAR SEVENTH SEM 11
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
Mobile network protocols such as Mobile-IP and GPRS provide mobility transparency at the
network layer level. This allows the higher layers of the protocol stack to be used unchanged.
Unfortunately, there are ill consequences to this transparency that are mostly attributed to the constraints
of the wireless and mobile environment.
Existing session protocols are not of much use under frequent disconnections and reconnections of
the same mobile computation.
Similarly, existing presentation layer protocols are inappropriate to use unchanged, in the wireless and
mobile environment.
Eg: A user with a limited display and limited battery PDA will not be able to browse the Web unless the
presentation of the downloaded data is changed to suite her PDA’s capabilities.
Regardless of which particular upper layer in the protocol stack suffers the consequence of
transparency, the effect on the end-user will always be felt as unacceptable fluctuation in the perceived
QoS.
Three research efforts that address QoS concerns in the wireless and mobile environment.
Since mobile user will need connection-oriented communication to obtain remote services, they will have
to use transport protocols developed for the fixed network. Unfortunately, such protocols likeTCP perform
poorly when used unmodified in the mobile network. Eg, TCP acknowledgement timeout is in the range
of tens of milliseconds.
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 11
BRANCH:IT FINAL YEAR SEVENTH SEM 12
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
A mobile unit crossing cell boundaries blanks out during a hand-off procedure that could last up to
1,000 milliseconds. This leads to sender timeouts and repeated re-transmission. Another source of re-
transmission is the high error rate inherent in the wireless transmission characteristics.
Another problem that can lead to performance degradation under standard TCP is bandwidth
allocation under unpredictable mobility. An unpredicted number of mobile user can move into the same
cell, thus competing on sharing the limited wireless link.
Under this scenario, it is difficult to build an application that provides performance guarantees or
quality of service. A few approaches have been proposed to optimize and extend thestandard TCP
protocol so that it can be used efficiently under a mobile networkprotocol such as Mobile IP.
1. Yavatkar et al
Yavatkar et al] proposed an approach whereby the communication path betweenthe mobile end
and the fixed end is split into two separate connections:one over the wireless link and another over the
wired links. The connection overthe wireless link may either use regular TCP or a specialized transport
protocoloptimized for better performance.
The splitting of a connection is transparent to an application and no changes are necessary to
protocol software on the stationary hosts. A new session layer protocol called Mobile Host Protocol
(MHP) is introduced atop standard TCP. MHP compensates for wireless link characteristics and for
host migration. It is located at both the base station and the mobile host.
An advantage of this approach is that performance degradation inTCP is limited to a “short”
connection over the wireless hop, while traffic overthe “long” connection over the wired network can be
protected from the impactof erratic behavior over the wireless link.
A second alternative is proposed inthe same work which is similar to the MHP alternative except
that MHP usesa specialized protocol instead of TCP over the wireless hop. The specializedprotocol
differs from standard TCP in that the former uses selective acknowledgementby the receiver, in which a
bitmask is used to indicate all missingsegments of the connection stream. This way, the recovery of all
losses canbe performed via a single round trip message, resulting in a better throughputperformance.
2. Balakrishnan et al
Balakrishnan et al took a slightly different approach to improve the performanceof TCP in the
mobile network. They focused on the re-transmissionbehavior of TCP due to hand-off. They redesigned
the network layer so that itcaches packets at the base stations. Retransmission can therefore be
performedlocally between the base station and the mobile unit.
The gain is that the erratictransmission characteristics of the wireless link are dealt with in
isolationof the rest of the fixed network. Experimental evaluation showed a throughputincrease of up to 20
times over standard TCP. Their results are based on theLucent/NCR Wavelan network.
3. Caceres et al
Similar research by Caceres and Iftode addressed the problem of communicationpauses due to
hand-off. They observed that such pauses are interpretedby standard TCP (Tahoe in their experiment) as
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 12
BRANCH:IT FINAL YEAR SEVENTH SEM 13
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
packet losses due to congestion,which consequently causes retransmissions that get further timed out
duringthe hand-off.
They proposed using the fast re-transmission option availablein TCP-Tahoe immediately after
hand-off is completed. Their experimentalverification shows clear smoothening of TCP performance
during hand-off.
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 13
BRANCH:IT FINAL YEAR SEVENTH SEM 14
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
The BARWAN project at the University of California at Berkeley developedan architecture that
supports applications’ graceful adaptation to theavailable bandwidth and latency of the wireless network.
The architectureassumes an overlay of various wireless networks ranging from regional-area,wide-area,
metropolitan-area, campus-area, in-building, and in-room wirelessnetworks.
A testbed of wireless overlay network management that supportsmedia-intensive applications has
been used to demonstrate the adaptability featuresof BARWAN. The testbed that has been developed in
the San FranciscoBay Area includes the participation of over six local carriers including Nexteland
Metricom.
The testbed integrates the participants’ networks and allowsfull coverage of the greater Bay Area.
The BARWAN architecture is gateway centric,meaning it provides gateway connections from the mobile
host to eachparticipating wireless networks. Medical imaging applications have been developedto drive
the testbed.
The layered architecture of BARWAN is shown in Figure 7.3. It shows all layersdesigned for
wireless overlay network integration and for providing applicationsupport. The lowest layer is the wireless
overlay subnets, which are the carrier networks including data link interface, and possibly carrier network
routing.
The detail of this layer depends on the specific subnets being integrated.Next is a layer called the
Overlay Network Management Layer which includesnetwork and transport functionalities including
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 14
BRANCH:IT FINAL YEAR SEVENTH SEM 15
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
In the heart of the WAP standard is the WAP protocol stack shown in fig: 7.5. The stack is similar to the
ISO/OSI stack and consists of a lowest layer containing air link interfaces such as GSM’S GPRS, CDPD,
D-AMPS, among others. This lowest layer corresponds to both the physical and the data link layer
combined in the OSI stack.
On top of the air link is the transport layer, in which datagram and connection-oriented streams are
supported. Also, transactional connections are supported to enable electronic commerce applications. This
layer corresponds to both the network and the transport layers of the OSI stack combined.
On top of the transport, WAP dedicates a layer for security. This includes encryption, authentication, and
capabilities. On top of security is the session layer which is responsible for enabling multi-tasking on the
hand-held device. This is because multiple connections can be maintained as multiple sessions managed
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 15
BRANCH:IT FINAL YEAR SEVENTH SEM 16
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
by the session’s layer. The session layer, which is the most elaborate layer, also contains QoS features
including:
•Exception mechanism to allow applications to register interest in QoS RELATED network
events and parameter thresholds. This allows the application to be mobility-aware, by using QoS API to
program how to adapt to changes in the environment.
• Mechanisms for capability and content negotiation. This will enable the WAP stack itself to
partner through its pieces to perceive and adapt to the mobility and the changes in network characteristics.
When certain information content is being delivered, the WAP stack negotiates with the device
capability to receive and display the contents. The negotiation decides for the feasibility of the transfer and
for the level of filtering that might be needed to deliver the information while maintaining QoS.
The first capability provides applications with the environment awareness needed to initiate QoS
adaptations. The second capability, on the other hand, provides the system with automated awareness
mechanisms not only of the environment, but also of the device capabilities and the characteristics of the
information content.
Another standardization effort similar to WAP is the Mobile Network Computer Reference Profile
(MNCRF), which is based on the NCRF standard developed by the Open Group. The first draft of the
standard has been released addressing the unique requirements of mobile network computing.
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
1. Define W4.*
2. Define MOWSER.*
3. Write the web access optimization methods.
4. Define caching.*
5. What is Differencing?
6. Define protocol reduction.
7. Define Header reduction.
8. Define CSI & SSI.*
9. Explain Web Express. (6m)*
10. Explain in detail about Mobile access to the World Wide Web. (11m)*
More and more users are becoming increasingly dependent on information theyobtain from the
World Wide Web. Users are also demanding ubiquitous access,anytime, anywhere, to the information they
rely on. Several research efforts exploredthe problems associated with wireless access to the Web. Most
solutionsused a Web proxy that enabled Web browsing applications to function overwireless links without
imposing changes on browsers and servers.
Web proxiesare also used to prefetch and cache Web pages to the mobile client’s machine,to
compress and transform image pages for transmission over low-bandwidthlinks, and to support
disconnected and asynchronous browsing operations.
Dynamic Documents
The concept of dynamic documents was introduced in [66] as an approach toextending and
customizing the WWW for mobile computing platforms. Dynamicdocuments are programs executed on a
mobile platform to generate adocument; they are implemented as Tcl scripts as part of the browser client.
A modified version of the NCSA Mosaic browser was used to run the dynamicdocuments it
retrieves through a modified Tcl interpreter. The interpreter isdesigned to execute only commands that do
not violate safety.
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 17
BRANCH:IT FINAL YEAR SEVENTH SEM 18
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
For example, the Tcl script could be a filter that reducesan incoming image so that it fits the screen
size or resolution. Unfortunately,dynamic documents being placed at the client side are not wireless-media
sensitive.This is because filtering occurs after all transmitted information is receivedby the client.
Although caching and prefetching can alleviate some of thecommunication overhead, excess data
(that would be reduced by the dynamicdocument) is, however, communicated, leading to inefficient
utilization of thewireless bandwidth.
Dynamic URLs
The Mosaic project [90] at the University of Washington extends standardclient browsers to
support dynamic URLs and active documents. The MosaicWeb client and the URL syntax are modified so
that when the user traversesa dynamic URL, the client resolves any references to dynamic information
itmay contain and sends the result back to the server. This is helpful in defininglocation-sensitive
resources.
Active documents are Web pages that notify theclient browser when dynamic information changes.
This feature also supportslocation-sensitive information by keeping the mobile client aware of
servicerelocation or of services offered by a mobile server.
In a design of a mobile-aware Web browser.The design isbased on a mediator server that filters
retrieved information according to thelimitations of the mobile unit. Color, resolution, display mode,
sound capability,and maximum file size are among the factors considered.
The browser,called MOWSER, connects to two servers in the fixed network. The first is
thepreference server that maintains the user profile; the second is a proxy serverthat implements all the
filtering indicated by the preference server.
MOWSERassumes that the user is aware of the mobile unit limitations, which in a waysacrifices
transparency. Similar to the dynamic document approach, MOWSERdoes not directly consider the
limitations of the wireless media (although themaximum file size indirectly preserves the limited
bandwidth).
WebExpress
It uses the proxy approach to intercept and control communications over the wireless link for the
purposes of reducing traffic volume and optimizing the communication protocol to reduce latency.
Two components are inserted into data path between the Web client and the Web server:
1. The Client Side Intercept (CSI) process that runs in the client mobile device
2. The Server Side Intercept (SSI) process that run within the wired and fixed network.
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 18
BRANCH:IT FINAL YEAR SEVENTH SEM 19
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 19
BRANCH:IT FINAL YEAR SEVENTH SEM 20
SUBJECT: MOBILE COMPUTING UNIT-III Mobile Networking
----------------------------------------------------------------------------------------------------------------------------- ------------------------------------
RAJIV GANDHI COLLEGE OF ENGINEERING & TECHNOLOGY/ DEPT. OF IT/ PREPARED BY M .BUVANESVARI PAGE 20