M.SC Computer Science: Mother Teresa Women'S University
M.SC Computer Science: Mother Teresa Women'S University
M.SC Computer Science: Mother Teresa Women'S University
UNIT II
Mobile computing through Telephony: Evolution of Telephony – Multiple Access
Procedures – mobile computing through telephone-developing an IVR application –
voice XML – Telephony Application Programming Interface. Emerging Technologies:
Introduction – Bluetooth – radio Frequency Identification – wireless broadband-mobile
IP – Internet Protocol version 6 -Java card.
UNIT III
Global System for Mobile Communications: Global system for Mobile communications –
GSM Architecture – GSM Entities –call routing in GSM –PLMN Interfaces-GSM address
and identifiers-Network aspects in GSM-GSM Frequency Allocation –Authentication and
Security. General PacketRadio Service: Introduction-GPRS and packet Data Network –
GPRS Network operations-Data Services in GPRS-Application for GPRS-Limitations of
GPRS-Billing and charging in GPRS.
UNIT IV
Wireless Application Protocol: Introduction –WAP-MMS-GPRS applications. CDMA and
3G. Introduction – Speed spectrum technology-IS95-CDMA versus GSM-Wireless Data-
Third Generation Networks-Application on 3G.
UNIT V
Wireless LAN: Introduction –wireless LAN advantages-IEEE802.11 standards-wireless
LAN architecture-mobility in wirelessLAN –deploying wireless LAN-Mobile adhoc
Networks and sensor Networks – Wireless LAN Security-WIFI versus 3G-Internet
networks-SS#7 signaling-IN Conceptual Model-softswitch-programmable networks-
technologies and Interfaces for IN
Books Prescribed:
1.Mobile Computing Technology applications and Service creation, Asoke K Talukder,
Roopa R Yavagal, Tata McGraw-Hill publishing company New Delhi 2007.
Reference Books
1.Mobile Communication- Jochen Schiller 2nd edition Pearson 2003.
UNIT I
INTRODUCTION
MOBILE COMPUTING Mobile computing can be defined as a computing environment
over physical mobility. The user of mobile computing environment will be able to access
data, information or other logical objects from any device in any network while on the
move. The computing environment is mobile and moves along with the user. This is
similar to the telephone number of a GSM (GLOBAL SYSTEM FOR MOBILE
COMMUNICATION) phone, which moves with the phone. The offline (local) and real
time (remote) computing environment will move with the user. In real time mode user
will be able to use all his remote data and service online.
Nomadic Computing: The computing environment is nomadic and moves along with
the mobile user. This is true for both local and remote services.
Ubiquitous Computing: A disappearing (nobody will notice its presence) every place
computing environment. User will be able to use both local and remote services.
Mobile computing
Mobile Computing describes the application of small, portable, wireless computing and
communication devices, which is used when mobile is changing its location. It requires
wireless network to support outdoor mobility and handover from one network to another
network. Challenges of the mobile computing are mobility context aware applications,
naming and locating, routing data and messages, reliability in the presence of
disconnection, data management, transaction models, security and seamless mobility.
Dialog Control
In any communication there are two types of user dialogues. These are long session –
oriented transactions and short transaction. Going through a monolithic document page
by page can be considered as a session-oriented transaction. Going to a particular
page directly through an index can be considered as a short transaction. Selection of
the transaction mode will depend on the type of advice we use. A session may be
helpful in case of services offered through computers with large screens and mouse.
For devices with limited input/output like SMS for instance, short transactions may be
desired.
Let us consider an example of bank balance enquiry over the internet. In case of
internet banking through desktop computer, the user has to go through the following
minimum dialogues:
1.Enter the URL of the bank site.
2. Enter the account number/password and login into the application.
3.Select the balance enquiry dialogue and see the balance,
4.Logout from the internet banking.
Networks
Mobile computing will use different types of networks. These can be fixed telephone
networks, GSM, GPRS, ATM, Frame Relay, ISDN, CDMA, CDPD, DSL, Dial-up,WiFi,
802.11, Bluetooth,Ethernet,Broadband,etc.,
Wireline Networks
Wireline networks will be linked by network devices, such as repeaters, hubs,
switches, bridges, and routers, and joined by physical pipe, such as electronic and fiber
cable. Wireless networks will be connected by many antennas or WiFi or WiMAX
devices.
Wireless Networks
Wireless networks are computer networks that are not connected by cables of any
kind. The use of a wireless network enables enterprises to avoid the costly process of
introducing cables into buildings or as a connection between different equipment
locations.
Adhoc Networks
An ad hoc network is a network that is composed of individual devices communicating
with each other directly. The term implies spontaneous or impromptu construction
because these networks often bypass the gatekeeping hardware or central access
point such as a router.
Bearers
Bearer service. In telecommunications, Bearer Service or data service is a service that
allows transmission of information signals between network interfaces. ...
The bearer services include the following: Rate adapted sub-rate information like circuit
switched asynchronous and synchronous duplex data, 300-9600 bits.
There are some middleware components like behavior management middleware, which
can be a layer between the client device and the application. In mobile computing
context we need different types of middleware components and gateways at different
layers of the architecture.
• These are:
1. Communication middleware
2. Transaction processing middleware
3. Behavior management middleware
4. Communication gateways.
Communication middleware
• The application will communicate with different nodes and services through
different communication middleware.
• Different connectors for different services will fall in this category.
• Examples could be TN3270 for IBM mainframe services, or Javamail connector
for IMAP or POP3 services.
1. Device loss was the top concern. If an employee leaves a tablet or smartphone in a
taxi cab or at a restaurant, for example, sensitive data, such as customer information or
corporate intellectual property, can be put at risk. According to Marcus Carey, a security
researcher at Boston-based compliance auditing firm Rapid7 Inc., such incidents have
been behind many high-profile data breaches.
3. Device data leakage was the third-ranking mobile security issue. Nearly all of the
chief concerns identified in the mobile security survey, from data loss and theft to
malicious applications and mobile malware, are sources of data leakage. While most
corporate access privileges on mobile devices remain limited to calendar items and
email, new mobile business applications can tap into a variety of sources, if the
enterprise accepts the risks, said mobile security expert Lisa Phifer. Increased
corporate data on devices increases the draw of cybercriminals who can target both the
device and the back-end systems they tap into with mobile malware, Phifer said. "If
you're going to put sensitive business applications on those devices, then you would
want to start taking that threat seriously."
4. Malware attacks were the fourth-ranking mobile security concern. A new report from
Finland-based antivirus vendor F-Secure Corp. found the vast majority of mobile
malware to be SMS Trojans, designed to charge device owners premium text
messages. Experts say Android devices face the biggest threat, but other platforms can
attract financially motivated cybercriminals if they adopt Near Field Communications
and other mobile payment technologies. An F-Secure analysis of more than 5,000
malicious Android files found that 81% of mobile malware can be classified as Trojans,
followed by monitoring tools (10.1%) and malicious applications (5.1%).
5. Device theft was fifth on the list of top concerns. Smartphone theft is a common
problem for owners of highly coveted smartphones such as the iPhone or high-
end Android devices. The danger of corporate data, such as account credentials and
access to email, falling into the hands of a tech-savvy thief, makes the issue a major
threat to the IT security pros who took the survey.
It is only through the use of standards that the requirements of interconnectivity and
interoperability can be assured. It is only through the application of standards that the
credibility of new products and new markets can be verified. In summary standards fuel
the development and implementation of technologies that influence and transform the
way we live, work and communicate.
Standard Bodies
The international organization for standardization is a world wide federation of national
standards bodies from more than 140 countries one from each country. ISO is a non
governmental organization established in 1947. The mission of ISO is to promote the
development of standardization and related activities in the world with a view to
facilitation the international exchange of good and services.
The first state places a mobile computer within a cell and capable of communicating.
The second state places the mobile computer out of range of any service cell and not
capable of communication.
The third state places a mobile computer in a cell, communicating, but just ready to
cross a cell boundary.
History of computers
The first counting device was used by the primitive people. They used sticks, stones
and bones as counting tools. As human mind and technology improved with time more
computing devices were developed.
Abacus
The history of computer begins with the birth of abacus which is believed to be the first
computer. It is said that Chinese invented Abacus around 4,000 years ago.It was a
wooden rack which has metal rods with beads mounted on them. The beads were
moved by the abacus operator according to some rules to perform arithmetic
calculations. Abacus is still used in some countries like China, Russia and Japan.
Napier's Bones
It was a manually-operated calculating device which was invented by John Napier
(1550-1617) of Merchiston. In this calculating tool, he used 9 different ivory strips or
bones marked with numbers to multiply and divide. So, the tool became known as
"Napier's Bones. It was also the first machine to use the decimal point.
Stepped Reckoner or Leibnitz wheel
It was developed by a German mathematician-philosopher Gottfried Wilhelm Leibnitz in
1673. He improved Pascal's invention to develop this machine. It was a digital
mechanical calculator which was called the stepped reckoner as instead of gears it was
made of fluted drums.
Difference Engine
In the early 1820s, it was designed by Charles Babbage who is known as "Father of
Modern Computer". It was a mechanical computer which could perform simple
calculations. It was a steam driven calculating machine designed to solve tables of
numbers like logarithm tables.
Analytical Engine
This calculating machine was also developed by Charles Babbage in 1830. It was a
mechanical computer that used punch-cards as input. It was capable of solving any
mathematical problem and storing information as a permanent memory.
History of Internet
Advanced Research Project Agency(ARPA) was formed to fund Science and
Technology projects and position USA as a leader in technology. Internet represents
one of the best examples of the benefits of sustained investment on research and
development through ARPA. Beginning with the early research in packet switching, the
government, industry and academia have been partners in evolving and deploying the
exciting Internet technology. People in almost all parts of life starting from education, IT,
telecommunication, business, and society at large have felt the influence of this
pervasive information infrastructure.
Mobile computing devices have changed the way we look at computing. Laptops
and personal digital assistants (PDAs) have unchained us from our desktop computers.
A group of researchers at AT&T Laboratories Cambridge are preparing to put a new
spin on mobile computing. In addition to taking the hardware with you, they are
designing a ubiquitous networking system that allows your program applications to
follow you wherever you go.
A 3-tier architecture is an application program that is organized into three major parts,
comprising of:
The data access layer tier at the bottom,
The application tier (business logic) in the middle and
The client tier (presentation) at the top.
Each tier is distributed to a different place or places in a network. These tiers do
not necessarily correspond to physical locations on various computers on a network, but
rather to logical layers of the application.
1. Presentation Layer (UI):
This layer presents data to the user and optionally permits data manipulation and
data entry, also this layer requests the data form Business layer.
This layer accomplished through use of Dynamic HTML and client-side data
sources and data cursors.
2. Business Logic Layer:
The business logic acts as the server for client requests from workstations. It acts
according Business rules fetch or insert data through the Data Layer.
In turn, it determines what data is needed (and where it is located) and acts as a
client in relation to a third tier of programming that might be located on a local or
mainframe computer.
Because these middle-tier components are not tied to a specific client, they can
be used by all applications and can be moved to different locations, as response
time and other rules require.
3. Data Access Layer:
The third tier of the 3-tier system is made up of the DBMS that provides all the
data for the above two layers.
This is the actual DBMS access layer.
Avoiding dependencies on the storage mechanisms allows for updates or
changes without the application tier clients being affected by or even aware of
the change.
Design Considerations for mobile computing
Following guidelines to ensure that your application meets your requirements and
platforms efficiently in scenarios common to mobile computing through Internet –Making
existing applications mobile-enabled.
a)Decide If you build a rich client, a thin web client, or Rich internet application
b)Dteremine the device types you will support.
c)Design considering occasionally connected limited bandwidth scenario when
required.
d)Design a UI appropriate for mobile devices, taking into platform constraint.
e)Design a layered architecture appropriate for mobile devices that improves reuse and
maintainability.
UNIT II
MOBILE COMPUTING THROUGH TELEPHONY
The 60s and 70s saw a variety of commercial car services – the earliest weighed 90-
100 pounds
These services operated using high power transmissions
The concept of low power transmission in hexagonal cells was introduced in 1947
The electronics were advanced enough by the 60s to pull it off, but there was no
method for handoffs from one cell to the next
Evolution of Telephony
That problem was solved with the first functioning cell system and first real cell phone
call in 1973. The phone, which weighed about six pounds, was developed by Martin
Cooper of Motorola Bell Labs and Motorola were the main competitors in the US. Bell
Labs did most of the work developing the cell technology, but Motorola was ahead in
phone development
But they both lost out to Japan and Northern Europe. Service began in Tokyo in 1979
and Nordic Mobile Telephone was founded in Norway, Sweden, Finland, and Denmark
the same year
Tests began in the Baltimore/DC area in 1981
The first commercial service began in 1983 with the advent of the legendary Motorola
DynaTAC 8000X
In 1984 Bell Labs perfected the modern system of cellular telephony that we use today
Thus began first generation analog cellular telephony (1G), though we didn’t call it that
at the time
In this technique, selective interference on one frequency at worst hits only every ith
time slot, if there are i frequencies available for hopping. Thus the signal transmitted by
a frequency hopping technique uses frequency diversity. Of course, the hopping
sequences must be orthogonal, i.e. one must ascertain that two stations transmitting in
the same time slot do not use the same frequency. Since the duration of a hopping
period is long compared to the duration of a symbol, this technique is called slow
frequency hopping. With fast frequency hopping, the hopping period is shorter than a
time slot and is of the order of a single symbol duration or even less. This technique
then belongs already to the spread spectrum techniques of the family of code division
multiple access techniques, Frequency Hopping CDMA (FH-CDMA).
As mentioned above, for TDM access, a precise synchronization between mobile and
base station is necessary. This synchronization becomes even more complex through
the mobility of the subscribers, because they can stay at varying distances from the
base station and their signals thus incur varying propagation times. First, the basic
problem is to determine the exact moment when to transmit. This is typically achieved
by using one of the signals as a time reference, like the signal from the base station
(Figure). On receiving the TDMA frame from the base station, the mobile can
synchronize and transmit time slot synchronously with an additional time offset (e.g.
three time slots in Figure ).
Another problem is the propagation time of the signals, so far ignored. It also depends
on the variable distance of the mobile station from the base. These propagation times
are the reason why the signals on the uplink arrive not frame-synchronized at the base,
but with variable delays. If these delays are not compensated, collisions of adjacent
time slots can occur (Figure ). In principle, the mobile stations must therefore advance
the time-offset between reception and transmission, i.e. the start of sending, so much
that the signals arrive frame-synchronous at the base station.
Thus one can realize a code-based multiple access system. If an orthogonal family of
spreading sequences is available, each subscriber can be assigned his or her own
unique spreading sequence. Because of the disappearing cross-correlation of the
spreading sequences, the signals of the individual subscribers can be separated in spite
of being transmitted in the same frequency band at the same time.
Figure : Simplified scheme of code division multiple access (uplink)
In a simplified way, this is done by multiplying the received summation signal with the
respective code sequence (Figure ). Thus, if direct sequence spreading is used, the
procedure is called Direct Sequence Code Division Multiple Access (DS-CDMA).
The directional characteristics of the array antenna can be controlled adaptively such
that a signal is only received or transmitted in exactly the spatial segment where a
certain mobile station is currently staying. On the one hand, one can thus reduce co-
channel interference in other cells, and on the other hand, the sensitivity against
interference can be reduced in the current cell. Furthermore, because of the spatial
separation, physical channels in a cell can be reused, and the lobes of the antenna
diagram can adaptively follow the movement of mobile stations. In this case, yet another
multiple access technique (Figure 2.13) is defined and known as Space Division
Multiple Access (SDMA).
The telephone companies soon came up with a brilliant idea to solve this problem of
multiple numbers by offering 800 services using Intelligent Networks technology. This
also commonly known as TOLL Free numbers. In this technology only one number like
1-800-2MYBANK is published. The number is not attached to any specific exchange or
any specific city. When a subscriber calls this number an optimal routing is done and
the call is connected to the nearest service center.
To make this type of mobile computing work through voice interfaces, we use interactive
voice response. In USA and Japan IVRs are commonly known as Voice Response Unit.
The technical name for this technology is Computer Telephony. IVR software can be
hosted on a Windows-NT, Linus, or other computers with the voice cards. There are
many companies who manufacture voice cards; however, one of the most popular card
vendors is from Inter/Dialogic. IVR works as the gateway between a voice based
telephone system and a computer system. Multiple telephonelines are connected to
the voice card through appropriate telecom interfaces. When a caller dials the IVR
number , a ring tone is received by the voice card with in the IVR. The voice card
answers the call and establishes a connection between the caller and the IVR
application.
Voice XML
In mobile computing through telephone, the IVR is connected to the server through
client/server architecture. It is also possible to host the IVR and the application on the
same system. Today internet is used in addition to client/server interface between the
IVR and the server. This increase the flexibility in the whole mobile computing
architecture. Http is used for voice portals as well. In the case of a voice portal, a user
uses an internet site through voice interface. For all these advanced features,
VoiceXML has been introduced. Recent IVRs are equipped with DSP and are capable
or recognizing voice. The output is synthesized voice through TTS(Text to speech).
The voice eXtensible Markup Language is an XML based markup language for creating
distributed voice applications. VoiceXML is designed for creating audio dialogs that
feature synthesized speech, digitized audio, recognition of spoken voice and DTMF key
input. Using VoiceXML, we can create web-based voice applications that users can
access through telephone.
Emerging Technologies:
Introduction
Bluetooth is a technology in the personal area network. RFID is emerging as a leading
technology in the logistics, manufacturing, and retail industry.
Bluetooth
Bluetooth is a wireless technology standard for exchanging data between fixed and
mobile devices over short distances using short-wavelength UHF radio waves in
the industrial, scientific and medical radio bands, from 2.400 to 2.485 GHz, and
building personal area networks (PANs). It was originally conceived as a wireless
alternative to RS-232 data cables.
The Bluetooth Core Specification provides for the connection of two or more piconets to
form a scatternet, in which certain devices simultaneously play the master role in one
piconet and the slave role in another.At any given time, data can be transferred
between the master and one other device (except for the little-used broadcast mode).
The master chooses which slave device to address; typically, it switches rapidly from
one device to another in a round-robin fashion. Since it is the master that chooses
which slave to address, whereas a slave is (in theory) supposed to listen in each
receive slot, being a master is a lighter burden than being a slave. Being a master of
seven slaves is possible; being a slave of more than one master is possible. The
specification is vague as to required behavior in scatternets.
RFID tags are used in many industries. For example, an RFID tag attached to an
automobile during production can be used to track its progress through the assembly
line; RFID-tagged pharmaceuticals can be tracked through warehouses; and implanting
RFID microchips in livestock and pets enables positive identification of animals.Since
RFID tags can be attached to cash, clothing, and possessions, or implanted in animals
and people, the possibility of reading personally-linked information without consent has
raised serious privacy concerns. These concerns resulted in standard specifications
development addressing privacy and security issues. ISO/IEC 18000 and ISO/IEC
29167 use on-chip cryptography methods for untraceability, tag and
reader authentication, and over-the-air privacy. ISO/IEC 20248 specifies a digital
signature data structure for RFID and barcodes providing data, source and read method
authenticity. This work is done within ISO/IEC JTC 1/SC 31 Automatic identification and
data capture techniques. Tags can also be used in shops to expedite checkout, and to
prevent theft by customers and employees.
Wireless broadband
Wireless technologies are proliferating in a major way in to the first-mile or last-mile
subscriber access, as opposed to twisted-pair local loop. These technologies are
generally referred to as Wireless local loop. Wireless local loop is also known as fixed
wireless system .the world is moving towards a convergence of voice, data and video.
IEEE 802.6 is a standard governed by the ANSI for Metropolitan Area Networks (MAN).
It is an improvement of an older standard (also created by ANSI) which used the Fiber
distributed data interface (FDDI) network structure. The IEEE 802.6 standard uses the
Distributed Queue Dual Bus (DQDB) network form.
IEEE 802.16 air interface for fixed broadband wireless access systems, also
called wireless MAN or wireless local loop, has protocol stack:
o It provides multimegabits wireless services for voice, Internet, movies on
demand, etc.
• Physical layer operates in 10 to 66 GHz range, and base has multiple antennas,
each pointing at a separate sector.
For close-in subscribers, 64QAM is used, so typical 25 MHz spectrum
offers 150 Mbps; for medium-distance subscribers, 16QAM is used; and for
distant subscribers QPSK is used
• Data link layer consists of three sublayers
– Security sublayer manages encryption, decryption, and key
management, crucial for privacy and security
– Service-specific convergence replaces logical link control,
providing seamlessly interface for network layer that may have both datagram
protocols and ATM
Terminologies:
Mobile Node (MN):
It is the hand-held communication device that the user caries e.g. Cell phone.
Home Network:
It is a network to which the mobile node originally belongs to as per its assigned IP
address (home address).
Home Agent (HA):
It is a router in home network to which the mobile node was originally connected
Home Address:
It is the permanent IP address assigned to the mobile node (within its home
network).
Foreign Network:
It is the current network to which the mobile node is visiting (away from its home
network).
Foreign Agent (FA):
It is a router in foreign network to which mobile node is currently connected. The
packets from the home agent are sent to the foreign agent which delivers it to the
mobile node.
Correspondent Node (CN):
It is a device on the internet communicating to the mobile node.
Care of Address (COA):
It is the temporary address used by a mobile node while it is moving away from its
home network.
Working:
Correspondent node sends the data to the mobile node. Data packets contains
correspondent node’s address (Source) and home address (Destination). Packets
reaches to the home agent. But now mobile mode is not in the home network, it has
moved into the foreign network. Foreign agent sends the care-of-address to the home
agent to which all the packets should be sent. Now, a tunnel will be established
between the home agent and the foreign agent by the process of tunneling.
Tunneling establishes a virtual pipe for the packets available between a tunnel entry
and an endpoint. It is the process of sending a packet via a tunnel and it is achieved by
a mechanism called encapsulation.
Now, home agent encapsulates the data packets into new packets in which the source
address is the home address and destination is the care-of-address and sends it
through the tunnel to the foreign agent. Foreign agent, on other side of the tunnel
receives the data packets, decapsulates them and sends them to the mobile node.
Mobile node in response to the data packets received, sends a reply in response to
foreign agent. Foreign agent directly sends the reply to the correspondent node.
Key Mechanisms in Mobile IP:
Agent Discovery:
Agents advertise their presence by periodically broadcasting their agent advertisement
messages. The mobile node receiving the agent advertisement messages observes
whether the message is from its own home agent and determines whether it is in the
home network or foreign network.
Agent Registration
Mobile node after discovering the foreign agent, sends registration request (RREQ) to
the foreign agent. Foreign agent in turn, sends the registration request to the home
agent with the care-of-address. Home agent sends registration reply (RREP) to the
foreign agent. Then it forwards the registration reply to the mobile node and completes
the process of registration.
Tunneling:
It establishes a virtual pipe for the packets available between a tunnel entry and an
endpoint. It is the process of sending a packet via a tunnel and it is achieved by a
mechanism called encapsulation. It takes place to forward an IP datagram from the
home agent to the care-of-address. Whenever home agent receives a packet from
correspondent node, it encapsulates the packet with source address as home address
and destination as care-of-address.
GSM Architecture
A GSM network comprises of many functional units. These functions and interfaces are
explained in this chapter. The GSM network can be broadly divided into:
The Mobile Station (MS)
The Base Station Subsystem (BSS)
The Network Switching Subsystem (NSS)
The Operation Support Subsystem (OSS)
The MS and the BSS communicate across the Um interface. It is also known as the air
interface or the radio link. The BSS communicates with the Network Service Switching
(NSS) center across the A interface.
GSM Entities
The GSM technical specifications define different entities that form the GMS network by
defining their functions and interface requirements. The GSM network can be divided in
to four main groups.
The mobile station. - This includes the mobile equipment and the subscriber identify
module
The Base station subsystem. - This includes the base transceiver station and the base
station controller.
The network and switching substystem. – This includes mobile switching center. Home
location register, visitor location register, Equipment identity register, and the
Authentication Center.
The operation and support subsystem- This includes the operation and maintenance
center.
Mobile Station
Mobile station is the technical name of the mobile or the cellular phone. In early days
mobile phones were a little bulky and were sometimes installed in cars like other
equipment’s. Even the handheld terminals were quite big. Though the phones have
become smaller and lighter, they are still called mobile station. Mobile station consists of
two main elements. The mobile equipment or the mobile device. In otherwords, this is
the phone without the SIM card. The subscriber identity module. These are different
types of terminals distinguished principally by their power and application. The handheld
GSM terminals have experienced the highest evolution. The weight and volume of these
terminals are continuously decreasing.
Channel Coding
This introduces redundancy into the data for error detection and possible error
correction where the gross bit rate after channel coding is 22.8kbps. These 456 bits are
divided into eight 57-bit blocks and the result is interleaved amongst eight successive
time slot bursts for protection against burst transmission errors. Interleaving this step
rearranges a group of bits in a particular way to improve the performance of the error
correction mechanisms. The interleaving decreases the possibility of losing whole
bursts during the transmission by dispersing the errors.
Ciphering
This encrypts blocks of user data using a symmetric key shared by the mobile station
and the BTS. Burst formatting
It adds some binary information the ciphered block for use in synchronization and
equalization of the received data.
Modulation
This techniques chosen for the GSM system is the Gaussian Minimum shift keying
where binary data is converted back into analog signal to fit the frequency and the time
requirements for the multiple access rules. This signal is then radiated as radio wave
over the air.
Synchronization
For successful operation of a mobile radio system, time and frequency synchronization
are needed. Frequency synchronization is necessary so that the transmitter and
receiver frequency match while time synchronization is necessary to identify the frame
boundary and the bits within the frame.
Call Routing
• The call first goes to the local PSTN exchange where PSTN exchange looks at
the routing table and determines that it is a call to a mobile networks.
• PSTN forwards the call to the Gateway MSC of the mobile network.
• MSC enquires the HLR to determine the status of the subscriber. It will decide
whether the call is to be routed or not. If MSC finds that the call can be
processed, it will find out the address of the VLR where the mobile is expected
to be present
• If VLR is that of a different PLMN, it will forward the call to the foreign PLMN
through the Gateway MSC. If the VLR is in the home network, it will determine
the Location area.
• Within the LA, it will page and locate the phone and connect the call.
PLMN Interfaces
A public land mobile network (PLMN) is any wireless communications system intended
for use by terrestrial subscribers in vehicles or on foot. Such a system can stand alone,
but often it is interconnected with a fixed system such as the public switched telephone
network (PSTN). The most familiar example of a PLMN end user is a person with a cell
phone. However, mobile and portable Internet use is also becoming common.
The ideal PLMN provides mobile and portable users with a level of service comparable
to that of subscribers in a fixed network. This can be a special challenge in regions
where the terrain is irregular, where base station sites are hard to find and maintain, and
in urban environments where there are numerous obstructions such as buildings, and
myriad sources of radio-frequency (RF) radiation that can cause noise and interference.
Most systems today use digital technology rather than the older analog methods. This
transition has resulted in improved communications coverage and reliability, but as
anyone who regularly uses a cellular telephone knows, perfection has yet to be
achieved.
MS Protocols
Based on the interface, the GSM signaling protocol is assembled into three general
layers:
Layer 1 : The physical layer. It uses the channel structures over the air interface.
Layer 2 : The data-link layer. Across the Um interface, the data-link layer is a
modified version of the Link access protocol for the D channel (LAP-D) protocol
used in ISDN, called Link access protocol on the Dm channel (LAP-Dm). Across
the A interface, the Message Transfer Part (MTP), Layer 2 of SS7 is used.
Layer 3 : GSM signalling protocol’s third layer is divided into three sublayers:
o Radio Resource Management (RR), - It controls the set-up maintenance
and termination of radio and fixed channels including handovers.
o Mobility Management (MM), and – It manages the location updating and
registration procedures as well as security and authenticaton
o Connection Management (CM)- it handles general call control and
manages supplementary services and the short message service.
Mobility management
Mobility management is a functionality that facilitates mobile device operations in
Universal Mobile Telecommunications System (UMTS) or Global System for Mobile
Communications (GSM) networks. Mobility management is used to trace physical user
and subscriber locations to provide mobile phone services, like calls and Short Message
Service (SMS).
Security in GSM
GSM allows three-band phones to be used seamlessly in more than 160 countries. In
GSM, security is implemented in three entities:
1) Subscriber identity module (SIM) contains authentication key Ki (64-bit), ciphering
key (Kc) generating algorithm, and authentication algorithm. SIM is a single chip
computer containing the operating system (OS), the file system, and applications. SIM
is protected by a PIN and owned by an operator. SIM applications can be written with a
SIM tool kit.
2) GSM handset contains ciphering algorithm.
3) Network uses algorithms and IDs that are stored in the authentication center.
Degree of security in GSM is higher basic security mechanisms are:
a) Access control and authentication :It prevents access by unregistered users.
b) Encryption: It prevents unauthorized listening.
c) Confidentiality: It prevents subscriber’s location discloser.
General Packet Radio Service:
Introduction
General Packet Radio Services (GPRS) is a packet-based wireless communication
service that promises data rates from 56 up to 114 Kbps and continuous connection to
the Internet for mobile phone and computer users. The higher data rates allow users to
take part in video conferences and interact with multimedia Web sites and similar
applications using mobile handheld devices as well as notebook computers. GPRS is
based on Global System for Mobile (GSM) communication and complements existing
services such circuit-switched cellular phone connections and the Short Message
Service (SMS).
In theory, GPRS packet-based services cost users less than circuit-switched services
since communication channels are being used on a shared-use, as-packets-are-needed
basis rather than dedicated to only one user at a time. It is also easier to make
applications available to mobile users because the faster data rate means
that middleware currently needed to adapt applications to the slower speed of wireless
systems are no longer be needed. As GPRS has become more widely available, along
with other 2.5G and 3G services, mobile users of virtual private networks (VPNs) have
been able to access the private network continuously over wireless rather than through
a rooted dial-up connection.
GPRS attempts to reuse the existing GSM network elements as much as possible, but
to effectively build a packet-based mobile cellular network, some new network
elements, interfaces, and protocols for handling packet traffic are required.
Mobile Station (MS) New Mobile Station is required to access GPRS services.
These new terminals will be backward compatible with
GSM for voice calls.
GPRS Support Nodes The deployment of GPRS requires the installation of new
(GSNs) core network elements called the serving GPRS support
node (SGSN) and gateway GPRS support node (GGSN).
Databases (HLR, VLR, etc.) All the databases involved in the network will require
software upgrades to handle the new call models and
functions introduced by GPRS.
Internal Backbone
The internal backbone is an IP based network used to carry packets between different
GSNs. Tunneling is used between SGSNs and GGSNs, so the internal backbone does
not need any information about domains outside the GPRS network. Signaling from a
GSN to a MSC, HLR or EIR is done using SS7.
Routing Area
GPRS introduces the concept of a Routing Area. This concept is similar to Location
Area in GSM, except that it generally contains fewer cells. Because routing areas are
smaller than location areas, less radio resources are used While broadcasting a page
message.
PDP context consists of PDP type, PDP address(optional), QoS parameters (optional),
access point name, etc. The optional means that when activating a context, these are
optional; when context is active, they have some negotiated or subscribed value.GPRS
uses the concept of non-anonymous and anonymous PDP contexts.
The user may have several subscribed contexts which are used to access to external
data networks. Any of the contexts can be activated or deactivated independently.
When context is activated, user can send and receive data packets from MS to fixed
network, from fixed network to MS, or form MS to MS. When a context is not activated,
the network drops the packets.
There are two kinds of activation, Anonymous PDP context activation and Non-
anonymous PDP context activation. Here only Non-anonymous PDP context activation
is given (with defined address), see Figure
Figure :non-anonymous PDF context activation address
defined
The main procedures are:
1. MS informs the network that it wants to activate this PDP context
2. SGSN checks that MS is allowed to activate the context. Also SGSN
fills/defines missing (=optional) parameters
3. SGSN selects GGSN to be used
4. QoS negotiation: MS requests some QoS level ( or default); SGSN may
downgrade the QoS (if it can not handle that high); GGSN may downgrade
even further
In order to communicate with network, the MS shall activate one or more PDP contexts.
Once the MS has been attached to the network, the PDP context can be negotiated with
the SGSN. If access is permitted, the SGSN informs the GGSN to update the context
for the MS. The GGSN context includes the address of the SGSN that is currently
serving the MS and tunneling information. The PDP context activation is completed by
an acknowledgement from the network to the MS.
Routing(Data Transmission)
The data transmission can be Mobile oriented data transmission, Mobile terminated
data transmission, and Mobile originated and terminated data transmission.In the case
of a mobile-originated transmission (cf. Figure), the SGSN encapsulates the incoming
packets from MS and routes them to the appropriate GGSN, where they are forwarded
to the correct PDN. Inside PDN, PDN-specific routing procedures are applied to send
the packets to the corresponding host.
Packets coming from a corresponding host are routed the GGSN through the PDN
based on the examination of the destination address. The GGSN checks the routing
context associated with this destination address and determines the serving SSGN
address and tunneling information.
Mobility management
Mobility management [1], [4], [6] is also needed in GPRS. There are three activities
related to mobility management, that is attach, detach, and location update. Attach
means entering/joining the system. Detach means leaving the system. Location update
includes routing area (RA) update and cell update.Before an MS is able to send data to
a corresponding host, it has to attach to the GPRS system. During the attachment
procedure, the GPRS shall do the following things:
1. Inform the network for the MS's request to be active
2. Network check the MS's identity and initiate ciphering mode for data
communication
3. If SGSN does not already have the MS�s subscription info, download the
information from HLR to SGSN
4. Update MSC/VLR
5. Signal between the MS and SGSN
As a result of this attachment, a logical link control context, including a temporary logical
link identity (TLLI), is established between the MS and SGSN.
A cell update is performed implicitly on the logical link control level. In cell update, the
following information needs to be updated:
1. Specific cell update message
2. Any valid signaling message
3. Any user data sent uplink
When MS changes RA, the GPRS needs to update routing area (cf. Figure ). The MS
sends a routing update request containing the cell identity and the identity of the
previous routing area (RA) to the SGSNn. If the RA is served by the same SGSN, the
location information is updated and an acknowledge is sent back to the MS. There is no
need to inform the GGSN, because the SGSN and tunneling information are not
changed.
However if the previous RA is served by another SGSN, the GGSN must be informed.
The GGSN address and tunneling information can be requested from the previous
SGSNo. Simultaneously, the SGSNo is requested to transmit the undelivered data
packets to the new SGSN. Afterwards, the information context of the MS is deleted from
the memory of the SGSNo. As soon as the address and tunneling information is
received from the SGSNo, the new SGSN address and tunneling information is
delivered to GGSN.
GPRS Applications
GPRS supports standard data network protocol (TCP/IP, X.25) based applications ,
such as www, ftp, telnet, email, video, audio for wireless PCs or mobile offices. There
are also GPRS specific protocol based applications, e.g. point-to-point application (Toll
road system, UIC train control system, etc.) and point-to-multipoint application (weather
info, road traffic info, news, fleet management).
GPRS supports Quality of Service. The QoS profile attributes in GPRS are:
1. Precedence class---indicates the importance of the packet with regard to
discarding it in case of problems and degradation of QoS when necessary)
2. Reliability class---specifies the mode of operation for various error detection and
recovery protocols, how securely the data should be delived.
3. Delay class---the transfer delay includes the uplink radio channel access or
downlink radio channel scheduling delay, the radio channel transit delay, and
GPRS network transit delay
4. Peak throughput class --- define the maximum allowed transfer rate
5. Mean throughput class --- define long term average transfer rate
In GPRS, the default QoS profile is defined in HLR. The SGSN and GGSN control QoS
in GPRS, but mainly in the SGSN.One of the problems of GPRS is relatively low
bandwidth and the lack of capability to perform packet multiplexing between LLC
packets with different QoS requirement of same PDP context. Another problem is
regarding the packets discarding when the MS moves from one BSS to another.
Limitations of GPRS
There are some limitations with GPRS which can be summarized as:
Limited Cell Capacity for All Users: Only limited radio resources can be deployed for
different uses. Both Voice and GPRS calls use the same network resources.
Speed Lower in Reality: Achieving the theoretical maximum GPRS data transmission
speed of 172.2 kbps would require a single user taking over all eight time slots without
any error protection.
Support of GPRS Mobile Terminate Connection for a mobile server not
supported: As of date, a GPRS terminal can only act as a client device. There are
many services for which server has to be mobile.
The data rate supported by GPRS is slower than the data rate of the latest wireless
standards like LTE, LTE-advanced, etc.,
• We cannot troubleshoot the error in case any issue appears in front of us.
• The problem of congestion also occurs in GPRS which means that if multiple users of
GPRS are utilizing the services of GPRS in the same area at the same time, then
slower data connection there.
The SGSN and GGSN register all possible aspects of a GPRS user's behavior and
generate billing information accordingly. This information is gathered in so-called
Charging Data Records (CDR) and is delivered to a billing gateway.
UNIT IV
WIRELESS APPLICATION PROTOCOL
Introduction
Wireless application protocol (WAP) is a communications protocol that is used
for wireless data access through most mobile
wireless networks. WAP enhances wireless specification interoperability and facilitates
instant connectivity between interactive wireless devices (such as mobile phones) and
the Internet.
WAP
WAP (Wireless Application Protocol) is a specification for a set of
communication protocols to standardize the way that wireless devices, such as cellular
telephones and radio transceivers, can be used for Internet access, including e-mail, the
World Wide Web, newsgroups, and instant messaging. While Internet access has been
possible in the past, different manufacturers have used different technologies. In the
future, devices and service systems that use WAP will be able to interoperate.
The WAP was conceived by four companies: Ericsson, Motorola, Nokia, and Unwired
Planet (now Phone.com). The Wireless Markup Language (WML) is used to create
pages that can be delivered using WAP.There are other approaches to an industry
standard besides WAP, including i-Mode.
MMS
Multimedia Messaging Service (MMS) is a communications technology developed by
3GPP (Third Generation Partnership Project) that was developed to enable the
transmission of multimedia content via text message.
An extension to the Short Message Service (SMS) protocol, MMS defines a way to send
and receive, almost instantaneously, wireless messages that include images, audio,
and video clips in addition to text.
GPRS applications.
A number of unique services are given to the wireless mobile subscriber by GPRS.
Some of them provides increased value services to the users. Following are the some
characteristics:
Mobility – GPRS provides uninterrupted data and voice connectivity while on the
move.
Immediacy – Whenever needed, the connectivity is established. Not to worry about
the location you are in and the login session.
Localization – GPRS gives you information relevant to their current location on the
facilities they can get from.
Number of applications are developed using the above characteristics and provided to
the users. All the applications are segregated to two high-level categories:
Corporation
Consumer
Apart from the above applications, we have non-voice services as well like MMS, SMS
along with voice calls. After GPRS came into existence, Closed User Group (CUG) term
used in common. Other services that are in plan to implement are Call Forwarding
Unconditional (CFU), and Call Forwarding on Mobile subscriber Not Reachable
(CFNRc).
IS95
IS-95 was the first CDMA mobile phone system to gain widespread use and it is found
widely in North America. Its brand name is cdmaOne and the initial specification for the
system was IS95A, but its performance was later upgraded under IS-95B. It is this later
specification that is synonymous with cdmaOne. Apart from voice the mobile phone
system is also able to carry data at rates up to 14.4 kbps for IS-95A and 115 kbps for
IS-95B.
IS95 / cdmaOnewas the first cellular telecommunications system to use the CDMA -
code division multiple access system. Previous systems had used FDMA - frequency
division multiple access or TDMA - time division multiple access. With IS-95 being a
second generation - 2G system and all the later 3G systems using CDMA as their
access system, this meant that IS95 / cdmaOne was a pioneering system.
1. Technology
The CDMA is based on spread spectrum technology which makes the optimal use of
available bandwidth. It allows each user to transmit over the entire frequency spectrum
all the time. On the other hand GSM operates on the wedge spectrum called a carrier.
This carrier is divided into a number of time slots and each user is assigned a different
time slot so that until the ongoing call is finished, no other subscriber can have access
to this. GSM uses both Time Division Multiple Access (TDMA) and Frequency Division
Multiple Access (FDMA) for user and cell separation. TDMA provides multiuser access
by chopping up the channel into different time slices and FDMA provides multiuser
access by separating the used frequencies.
2. Security
More security is provided in CDMA technology as compared with the GSM
technology as encryption is inbuilt in the CDMA. A unique code is provided to every
user and all the conversation between two users are encoded ensuring a greater level
of security for CDMA users. The signal cannot be detected easily in CDMA as
compared to the signals of GSM, which are concentrated in the narrow bandwidth.
Therefore, the CDMA phone calls are more secure than the GSM calls. In terms of
encryption the GSM technology has to be upgraded so as to make it operate more
securely.
3. Spectrum Frequencies
The CDMA network operates in the frequency spectrum of CDMA 850 MHz and 1900
MHz while the GSM network operates in the frequency spectrum of GSM 850 MHz and
1900 MHz.
4. Global Reach
GSM is in use over 80% of the world’s mobile networks in over 210 countries as
compared to CDMA. CDMA is almost exclusively used in United States and some parts
of Canada and Japan. As the European Union permissions GSM use, so CDMA is not
supported in Europe. In North America, especially in rural areas, more coverage is
offered by CDMA as compared to GSM. As GSM is an international standard, so it’s
better to use GSM in international roaming. GSM is in use by 76% of users as
compared to CDMA which is in use by 24% users.
5. Data Transfer Rate
CDMA has faster data rate as compared to GSM as EVDO data transfer technology is
used in CDMA which offers a maximum download speed of 2 mbps. EVDO ready
mobile phones are required to use this technology. GSM uses EDGE data transfer
technology that has a maximum download speed of 384 kbps which is slower as
compared to CDMA. For browsing the web, to watch videos and to download music,
CDMA is better choice as compared to GSM. So CDMA is known to cover more area
with fewer towers.
6. Radiation Exposure
GSM phones emit continuous wave pulses, so there is a large need to reduce the
exposures to electromagnetic fields focused on cell phones with “continuous wave
pulses”. On the other hand CDMA cell phones do not produce these pulses. GSM
phones emit about 28 times more radiation on average as compared to CDMA phones.
Moreover, GSM phones are more biologically reactive as compared to CDMA.
Wireless Data
The transmission of data over the air. Wireless data includes all Internet-based
communications, and although voice can be carried via the Internet protocol (voice over
IP), the term excludes voice transmission that is paid by minutes of usage to a carrier.
Wireless data generally refers to transmission to and from a mobile device; however,
"fixed wireless" applications transmit data over the air between stationary objects.
Location-based services
LBS will be an area for value-added corporate applications this year. More than 50
percent of all phones being sold to companies have GPS chips, and accuracy levels
continue to improve. A number of carriers have built an extensive partner network to
deliver location-enabled applications that are delivering ROI daily in the enterprise
market. We are increasingly seeing integrated products that combine LBS with in-office
software to link assignment, dispatch, notification and tracking.
Enterprises should think about LBS in two ways: as a unique capability for specific
vertical segments, such as fleets and transportation; and as a value-added capability
within existing applications. In the U.S., for example, mobile carrier Sprint has partnered
with IBM and Microsoft to deliver a Web services capability for location, where APIs are
included in the application framework.
Packaged applications
In 2006 there will be a number of packaged applications in the areas of salesforce and
field-force automation, offered directly by the wireless operators. One driving force is the
reduced need to optimize certain functions for mobile using expensive and complex
middleware, because of significantly improved wireless network and device capabilities.
Additionally, small and midsize businesses are looking for plug-and-play software for
certain functions, and believe that applications such as salesforce automation can be
implemented without a great deal of customization.
Device management
Device management is becoming the new front in mobile security. As high-end devices
proliferate, sensitive corporate information can get into the wrong hands if a phone is
lost or stolen. More-advanced devices are also increasingly vulnerable to spam and
viruses. There are millions of enterprise workers carrying around high-end mobile
devices containing sensitive corporate information, and enterprises historically have not
done a good job of tracking these devices as assets.
IEEE802.11 standards
802.11 and 802.11x refers to a family of specifications developed by the IEEE for
wireless LAN technology. 802.11 specifies an over-the-air interface between a wireless
client and a base station or between two wireless clients. The IEEE accepted the
specification in 1997.
By using ad hoc mode, all devices in the wireless network are directly communicating
with each other in peer to peer communication mode. No access point
(routers/switches) is required for communication between devices.
For setting up ad hoc mode, we need to manually configure the wireless adaptors of all
devices to be at ad hoc mode instead of infrastructure mode, and all adaptors must use
the same channel name and same SSID for making the connection active.
Ad hoc mode is most suitable for small group of devices and all of these devices must
be physically present in close proximity with each other. The performance of network
suffers while the number of devices grows. Disconnections of random device may occur
frequently and also, ad hoc mode can be a tough job for network administrator to
manage the network. Ad hoc mode has another limitation is that, ad hoc mode networks
cannot bridge to wired local area network and also cannot access internet if without the
installation of special gateways.
However, Ad hoc mode works fine in small environment. Because ad hoc mode does
not need any extra access point (routers/switches), therefore it reduces the cost. Ad hoc
can be very useful as a backup option for time being if network based on centrally
coordinated wireless network (infrastructure mode) and access points are
malfunctioning.
An ad hoc mode uses the integrated functionality of each adaptor to enable wireless
services and security authentication. The characteristics of an Ad hoc wireless network
are listed as below:
• All access points in the network operate independently and has own configuration file.
• Access point is responsible for the encryption and decryption.
• The network configuration is static and does not respond to changing network
conditions.
Infrastructure mode deployments are more suitable for larger organizations or facility.
This kind of deployment helps to simplify network management, and allows the facility to
address operational concerns. And resiliency is also assured while more users can get
connected to the network subsequently.The infrastructure mode provides improved
security, ease of management, and much more scalability and stability. However, the
infrastructure mode incurs extra cost in deploying access points such as routers or
switches.
Roaming
Roaming is the process of moving from one cell to another without losing connection.
This function is similar to the cellular phones handover, with two main differences
1. On a packet-based LAN system, the transition from cell to cell may be
performed between packet transmissions, as opposed to telephony where
the transition may occur during a phone conversation.
2. On a voice system, a temporary disconnection during handoff does not
affect the conversation. However, in a packet – based environment it
significantly reduces performance because retransmission is performed by
the upper layer protocols.
AP Transmission Power
The transmission power of most Aps ranges from 1 mw upto 100 mw. Transmission
power affects the effective range of the radio signal. The higher the transmission power,
the longer the range of the signal. Higher power settings are appropriate in many large
enterprise installations with cube wall offices and a lot of open space. Lower settings
are appropriate in environments such as test labs or small offices where the longer
range is not required. Because lowering the transmission power reduces the range of
an AP, lower power settings can also enable the wireless network to provide higher
aggregate throughput. At lower power settings, more Aps can be installed to serve a
particular area than is possible at higher power levels.
Mobile adhoc Networks and sensor Networks
A mobile ad-hoc network (MANET) consists of mobile hosts equipped with wireless
communication devices. The transmission of a mobile host is received by all hosts
within its transmission range due to the broadcast nature of wireless communication
and omni-directional antennae. If two wireless hosts are out of their transmission ranges
in the ad hoc networks, other mobile hosts located between them can forward their
messages, which effectively builds connected networks among the mobile hosts in the
deployed area. Due to the mobility of wireless hosts, each host needs to be equipped
with the capability of an autonomous system, or a routing function without any statically
established infrastructure or centralized administration. The mobile hosts can move
arbitrarily and can be turned on or off without notifying other hosts. The mobility and
autonomy introduces a dynamic topology of the networks not only because end-hosts
are transient but also because intermediate hosts on a communication path are
transient.
Characteristics
Operating without a central coordinator
Multi-hop radio relaying
Frequent link breakage due to mobile nodes
Constraint resources (bandwidth, computing power, battery lifetime, etc.)
Instant deployment
Applications
Military applications
Collaborative computing
Emergency rescue
Mesh networks
Wireless sensor networks
Multi-hop cellular networks
Wireless Community Network
Major Issues and Challenges
Hidden terminal problem
Exposed terminal problem
Channel efficiency
Access delay and fairness
Differential service
Realistic mobility modeling
power-aware routing
Constructing virtual backbone
Distinguish contention, packet drop, and noise errors
Security
Efficient multicasting
WIFI versus 3G
Imagine you want to send a picture of your new toy car to your friend. This picture
is data and it has some size in MB, say 3 Mega Bytes. If you are at home and using
your laptop to share this picture then you will use internet through your Wi-Fi router.
Here Wi-Fi is the technology that lets you connect to internet wirelessly provided you
have internet connection at home.
Internet exists as a group of inter connected computer networks, that means the data
from your laptop has to reach your friends house hence this connection between you
and your friend is established by internet.
Mobile service providers let us access the same internet using 3G/4G connection from
our phones or tablets. Since its a mobile service it lets us access internet from any
place provided the service is available.
IN Conceptual Model
A conceptual model is a representation of a system, made of the composition
of concepts which are used to help people know, understand, or simulate a subject the
model represents. It is also a set of concepts. Some models are physical objects; for
example, a toy model which may be assembled, and may be made to work like the
object it represents.
The term conceptual model may be used to refer to models which are formed after
a conceptualization or generalization process. Conceptual models are often
abstractions of things in the real world whether physical or social. Semantic studies are
relevant to various stages of concept formation. Semantics is basically about concepts,
the meaning that thinking beings give to various elements of their experience.
Conceptual models (models that are conceptual) range in type from the more concrete,
such as the mental image of a familiar physical object, to the formal generality and
abstractness of mathematical models which do not appear to the mind as an image.
Conceptual models also range in terms of the scope of the subject matter that they are
taken to represent. A model may, for instance, represent a single thing (e.g. the Statue
of Liberty), whole classes of things (e.g. the electron), and even very vast domains of
subject matter such as the physical universe. The variety and scope of conceptual
models is due to the variety of purposes had by the people using them. Conceptual
modeling is the activity of formally describing some aspects of the physical and social
world around us for the purposes of understanding and communication.
Softswitch
A softswitch can be used to control calls and process media on circuit switched Time-
Division Multiplex (TDM) network infrastructure, packet switched Internet Protocol
(IP) infrastructure, or a combination of the two. Many network operators use a softswitch
with both TDM and IP capability as an essential transitional element as they go through
the process of IP network transformation.
A softswitch combines two elements: a call agent or call feature server for call control,
routing and signalling, and a mediagateway or access gateway for processing media
streams. These two elements can be co-located on a single piece of hardware, or
located on separate hardware where one call agent or call feature server can control
one or more gateways.
The softswitch concept only applies to Next Generation Network (NGN) architecture or
older networks. This does not apply in the IP Multimedia Subsystem (IMS) architecture,
where the concept of a softswitch doesn't exist. In an IMS network, a Media Gateway
Control Function (MGCF) or Access Gateway Control Function (AGCF) controls the
gateways and the two components are not conceptually aggregated into one.
Programmable networks
The term programmable network is used by some vendors as a synonym for software-
defined networking. In its infancy, SDN was often referred to as the "Cisco killer"
because it allows network engineers to support a switching fabric across multi-vendor
commodity hardware and use software to shape traffic from a centralized control
console without having to touch individual switches.
Cisco, however, has adopted the term programmable networking to describe its own
vision for the future of networking -- a future that goes beyond separating the control
and forwarding planes to actually permitting programming up and down the network
stack. To that end, Cisco says it will address demand for programmable networks in
three ways. First, it will offer software-defined networking and OpenFlow for some
users. Second, Cisco will support virtual network overlays like LISP and VXLAN, to
bridge the physical and virtual worlds. Third, Cisco will introduce a software
development kit (SDK) that makes all of its routers and switches programmable through
a universal API.
PARLAY
Parlay X was a set of standard Web service APIs for the telephone network (fixed and
mobile). It is defunct and now replaced by OneAPI, which is the current valid standard
from the GSM association for Telecom third party API.
It enables software developers to use the capabilities of an underlying network. The
APIs are deliberately high level abstractions and designed to be simple to use. An
application developer can, for example, invoke a single Web Service request to get the
location of a mobile device or initiate a telephone call.
The Parlay X Web services are defined jointly by ETSI, the Parlay Group, and the Third
Generation Partnership Project (3GPP). OMA has done the maintenance of the
specifications for 3GPP release 8.
The APIs are defined using Web Service technology: interfaces are defined
using WSDL 1.1 and conform with Web Services Interoperability (WS-I Basic Profile).