Mobile and Pervasive Computing
Mobile and Pervasive Computing
2
and Wireless Networking
bridging† between the wireless and the wired mediums. A station must be
recognized by an AP to be able to connect to the network. The AP may
require authentication and this in turn is used as the basic means to keep out
the unauthorized users. In an infrastructureless network, the communication
between hosts occurs directly or via a few intermediate nodes that form
the hops. For example, station A in Fig. 2.2 can communicate with station
C using either the hops A–B, B–C or A–D, D–C.
A recent development in this context, is wireless networking of various
types of devices using the Bluetooth technology. As already discussed in
Chapter 1, the Bluetooth technology can also be used to establish direct
wireless connection of cell phones with devices such as printers, cameras,
scanners, laptop and desk computers. Bluetooth is gradually replacing
cables and infrared as the dominant way of exchanging information
between devices. One of the objectives of the Bluetooth technology is to
enable users to easily connect to a wide range of personal computing and
telecommunication devices, without the need to buy, carry, or lay out
cables. In fact, the Bluetooth technology enables setting up of personal
area networks (PANs) known as piconets and ad hoc networks known
as scatternets. It provides opportunities for rapid deployment of ad hoc
connections, and the possibility of automatic, transparent connections
between devices. It promises to eliminate the need to purchase additional
or proprietary cabling and configuration exercises needed to connect the
individual devices.
†
A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI reference model.
Introduction to Mobile Computing and Wireless Networking 27
Presentation (Tier-1)
Application (Tier-2)
Data (Tier-3)
Presentation tier
The topmost level of a mobile computing application concerns the user
interface. A good user interface facilitates the users to issue requests and
to present the results to the them meaningfully. Obviously, the programs
at this layer run on the client’s computer. This layer usually includes web
browsers and customized client programs for dissemination of information
and for collection of data from the user.
Application tier
This layer has the vital responsibility of making logical decisions and
performing calculations. It also moves and processes data between the
presentation and data layers. We can consider the middle tier to be
like an “engine” of an automobile. It performs the processing of user
input, obtaining information and then making decisions. This layer is
implemented using technology like Java, .NET services, cold fusion, etc.
The implementation of this layer and the functionality provided by this
layer should be database independent. This layer of functionalities is
usually implemented on a fixed server.
30 Fundamentals of Mobile Computing
Data tier
The data tier is responsible for providing the basic facilities of data
storage, access, and manipulation. Often this layer contains a database.
The information is stored and retrieved from this database. But, when only
small amounts of data need to be stored, a file system can be used. This
layer is also implemented on a fixed server.
In a cellular mobile system, the area of coverage is split into cells as shown
in Fig. 2.5. Even though the cells have been shown to be non-overlapping
hexagons for simplicity, but in reality cell shapes are irregular and do
overlap to some extent. A base station (BS) is located at the centre of each
cell. The BS in a cell receives communications from all mobile handsets
in the cell and forwards the data to the appropriate handset. Thus, a
base station keeps track of the calls of all handsets in its cell. When a
mobile handset while still continuing a call, moves to another cell, the BS
“hands-off” the call to the BS in the new cell. When a cell covers a crowded
area having too many users, then the users can experience frequent call
drops. To overcome this problem, such cells are split into smaller cells.
First generation
The first generation (1G) cellular system was designed in the late 1960s,
but was commercially deployed in the early 1980s. The first commercial 1G
system in the United States was known as Advanced Mobile Phone System
(AMPS). It became operational in 1982 and supported only voice calls.
This was a completely analog system. In an analog system, analog signals
are transmitted by modulating them on a higher frequency carrier signal,
without first converting the signal into digital form through quantization.
In a completely analog system, it is difficult to support SMS and other data
services. Also, the signals from different users cannot be intermixed on the
same channel, and have to be transmitted in clearly separated channels.
32 Fundamentals of Mobile Computing
Mobile
Features Standards Data speed
gen.
1G Analog transmissions, pri- NMT, AMPS, 600–1200 bps
marily supported voice TACS
communications.
2G Digital transmissions, impro- GSM 9.6 kbps
ved performance by letting
multiple users share a single
channel.
2.5G Enhanced multimedia and GPRS 28 kbps or
streaming video, web browsing. higher
3G Enhanced multimedia and UMTS, HSPDA, 384 kbps or
streaming video capabilities. EDGE, W-CDMA higher
Sub-band 1
Sub-band 2
Band Sub-band 3
Sub-band 4
Sub-band 5
Time
Figure 2.7 1G frequency band split into five sub-bands.
The 1G systems were of multiple access type, since once a caller hanged
up, another caller could use the same frequency. For this reason, the 1G
technology was also called Frequency Division Multiple Access (FDMA).
It was possible to reuse the same frequencies in the non-adjacent cells,
because the transmitter power output was restricted. For example, the cells
shown shaded in Fig. 2.8 could use the same set of frequencies.
When a caller crossed a cell boundary, the channel being used might
not be made available in the new cell as it might already be in use in some
other cell. During handoff, a different channel was possible to be allocated
in this case, otherwise the call got dropped if none were available. Beside
the number of callers that could be accommodated being low, the voice
quality was poor due to analog transmission. Also, it provided no security
at all, since any one could hear a call by tuning into a channel.
Second generation
As already pointed out, the 1G technology had many disadvantages. The
major drawback was the small number of simultaneous calls that could
be made and the high risk of call drops during handoffs. Calls in 1G
were expensive because of the inherent inefficient usage of the bandwidth
spectrum and hence very few could afford to use a cell phone. Further, the
1G networks were not capable of providing several useful services such as
caller identity and SMS. The disadvantages of 1G systems were overcome
by the second generation (2G) cellular systems.
The 2G systems encoded voice and other information digitally before
transmitting them. Digital transmission has many advantages over analog
transmissions. These include noise immunity and better bandwidth utiliza-
tions. The 2G system offered significant advancements in the evolution of
the mobile cellular technologies. Hence the 2G technology rapidly replaced
the 1G technology because of the drastic reductions in the cost of phone
calls and availability of a wider range of services coupled with substantial
improvements in the quality of services. Also, SMSs became possible.
34 Fundamentals of Mobile Computing
2.5 Generation
General Packet Radio Service (GPRS) is an extension of GSM and is
considered to be the 2.5 generation technology. As indicated by the name,
it is based on packet switching compared to circuit switching used in 2G.
This was a significant improvement over 2G and helped to reduce call
costs dramatically. Another important advantage of GPRS is that it allows
users to remain connected to the Internet without incurring additional
charge and supports multimedia capabilities including graphics and video
communications. GPRS deployments began in 2000, followed by EDGE
in 2003. EDGE enhances the capabilities of GPRS, allows faster Internet
browsing, and makes it possible to use streaming applications. Though
this technology provided faster data rates over 2G systems, it is called
2.5G because it did not offer the multi-megabit data rates which are the
characteristics of the 3G system.
Third generation
The 3G systems are often referred to as IMT-2000 (International Mobile
Telecommunications-2000) systems since this was made a global standard
by ITU. The 3G systems support much higher data transmission rates and
offer increased bandwidth, which makes them suitable for high-speed
data applications as well as for high quality traditional voice calls. The
Introduction to Mobile Computing and Wireless Networking 35
Fourth generation
A 4G system provides a faster data rate than that of 3G (at least 10 times
faster) and makes mobile broadband Internet access possible. The 4G
system has made possible high speed Internet access from smartphones
and laptops with USB wireless modems. A few applications that could
not be supported in earlier generations of the cellular phone systems,
have now become possible in 4G including IP telephony, gaming services,
high-definition mobile TV, video conferencing and 3D television. The 4G
technology is expected to help solve the last mile problem that prevents
the mobile users from running applications that are available on wired
networks. There are at present two competing 4G standards: Mobile
WiMAX standard and the Long Term Evolution (LTE) standard.
In the following section, we provide a brief overview of the working of
a few cellular wireless technologies that are being popularly used at present.
Bearer services
Bearer services give the subscribers the capability to send and receive data
to/from remote computers or mobile phones. For this reason, bearer services
are also known as data services (see Box 2.1). These services also enable the
transparent transmission of data between GSM and other networks like
PSTN, ISDN, etc. at rates from 300 bps to 9600 bps. These services are
implemented on the lower-three layers of the OSI reference model. Besides
supporting SMS, e-mail, voice mailbox, and Internet access, this service
provides the users with the capability to execute remote applications. GSM
supports data transfer rates of up to 9.6 kbps.
Teleservices
GSM provides both the voice-oriented teleservices and the non-voice
teleservices, as discussed below.
Telephony: The main goal of GSM was to provide high quality digital
voice transmission, offering the bandwidth of 3.1 kHz of analog phone
systems. Special codecs are used for voice transmission, while other codecs
are used for the transmission of analog data for communication with
traditional computer modems used in fax machines.
Emergency number: The same number is used throughout an area. This
service is free of cost and mandatorily provided by all service providers.
This connection will automatically be set up with the closest emergency
centre.
Short message services: This service offers transmission of text messages
of sizes up to 160 characters. SMS services use the signalling channels,
making possible the duplex system of the sending and receiving the SMSs
messages.
Fax: In this service, using modems fax data is transmitted as digital
data over the analog telephone network according to the ITU-T Standards
T.4 and T.30.
Supplementary services
GSM provides certain supplementary services such as user identification,
call redirection, and forwarding of ongoing calls. In addition, standard
ISDN features such as ‘close user groups’ and ‘multiparty’ communication
are available.
Mobile Station (MS): A mobile station (MS) or cell phone contains two
major components: the subscriber identity module (SIM) and the mobile
device. The SIM is a removable smart card. Each mobile device has a
unique identifier that is known as its IMEI (International Mobile Equipment
Identity). Apart from the telephone interface, an MS also offers other types
of interfaces to the users such as USB, Bluetooth, etc. Despite its small size,
a SIM card is a very important component of a GSM network. It contains all
the subscription information of a subscriber and holds the key information
that activates the phone after it is powered on. It contains a microcontroller
to primarily store and retrieve data from the flash storage on the SIM.
Identification information is stored in the SIM card’s protected memory
(ROM) that is not accessible or modifiable by the customer. Additional
flash memory is included in the mobile device to allow storage of other
information such as addresses, pictures, audio and video clips, and short
Introduction to Mobile Computing and Wireless Networking 39
messages. The SIM card contains many other identifiers and tables such
as card type, serial number, a list of subscribed services, and a Personal
Identity Number (PIN).
Base Station Subsystem (BSS): A GSM network comprises many BSSs.
Each BSS consists of a Base Station Controller (BSC) and several Base
Transceiver Stations (BTSs). We will explain these components subsequently.
A BSS performs all functions necessary to maintain radio connections to
an MS, as well as does coding/decoding of voice.
Authentication
The purpose of authentication is to protect the network against unauthorized
use. In the GSM context, it helps protect the GSM subscribers by denying
the possibility for intruders to impersonate authorized users. A GSM
network operator can verify the identity of the subscriber, making it highly
improbable to clone someone else’s mobile phone identity.
Authentication can be achieved in a simple way by using a password
such as Personal Identification Number (PIN). This method is not very
secure in GSM networks as an attacker can “listen” the PIN and easily
break the code.
Confidentiality
A GSM network protects voice, data and sensitive signalling information
(e.g. dialed digits) against eavesdropping on the radio path. Confidentiality
of subscriber-dialled information in the GSM network is achieved by
using encryption techniques prescribed by the GSM designers. Data on
the radio path is encrypted between the Mobile Equipment (ME) and
the BTS which protects user traffic and sensitive signalling data against
eavesdropping.
Introduction to Mobile Computing and Wireless Networking 41
Anonymity
A GSM network protects against someone tracking the location of a user
or identifying calls made to (or from) the user by eavesdropping on the
radio path. The anonymity of the subscriber on the radio access link in
the GSM network is achieved by allocating Temporary Mobile Subscriber
Identity (TMSIs) instead of permanent identities. This helps to protect
against tracking a user’s location and obtaining information about a user’s
calling pattern.
CDMA2000 and UMTS were developed separately and are two separate
ITU approved 3G standards. In these networks, coverage is provided by
a combination of various cell sizes, ranging from “in building” pico cells
to global cells provided by satellites, giving service to the remote regions
of the world.
The UMTS was developed mainly for countries with GSM networks,
and it is expected that all GSM networks will be upgraded to UMTS
networks. Because it is a new technology, a whole new radio access
network has to be built. An important advantage of UMTS is that it gives
significantly enhanced capacities to operators.
Introduction to Mobile Computing and Wireless Networking 43
The UMTS specification has been designed so that the UMTS systems
are compatible with GSM networks. Therefore, the UMTS networks can
easily work with any existing GSM/GPRS network. The UMTS systems use
different frequency bands, so the BTSs do not interfere with each other.
Let us now discuss the dissimilarities between these networks. The
UMTS networks are different from the 2G networks in the following
respects:
Higher speech quality: In addition to speech traffic, the UMTS supports
the advanced data and information services and can be called a true
multimedia network.
Higher data rate: The UMTS supports 2 Mbps data rate, which is much
higher than that supported by the 2G mobile systems.
The UMTS network architecture can be divided into three main elements:
User Equipment (UE): The User Equipment (UE) is the name by which
a cell phone is referred to. The new name was chosen because of the
considerably greater functionality that the UE incorporates compared to a
cell phone. It can be thought of as both a mobile phone used for talking
and a data terminal attached to a computer with no voice capability.
Radio Network Subsystem (RNS): The RNS is the equivalent of the Base
Station Subsystem (BSS) in GSM. It provides and manages the wireless
interface for the overall network.
Core Network: The core network is the equivalent of the GSM Network
Switching Subsystem (NSS).
Extensive research has been conducted to study the possible health effects
of continuous exposure to low intensity RF fields produced by mobile
phones. The overall evidence suggests that mobile phone usage of less than
10 years does not pose any increased risk of brain tumour. The effect of
still longer use is unclear due to non-availability of data. Any conclusion
44 Fundamentals of Mobile Computing
SUMMARY
FURTHER READINGS
EXERCISES
1. State true or false against each of the following statements. Give
appropriate reasons for your answer.
(i) Mobile computing and wireless networking are synonymous
terms.
(ii) The Bluetooth technology is an example of an infrastructure-
less network.
(iii) WLAN is an example of an infrastructure-less network.
(iv) A sensor network is essentially based on a single hop wireless
communication.
(v) 2G cellular phones support electronic mail services.
(vi) In the Global Packet Radio Service (GPRS), the customer is
charged for Internet access based on connection time rather
than on total information download.
(vii) GSM stands for Group of Special Mobiles.
(viii) UMTS networks can easily work with the existing GSM/GPRS
networks.
2. What is mobile computing? Mention at least three applications of
mobile computing.
46 Fundamentals of Mobile Computing
A MAC protocol in a wireless medium is much more complex than its wired
counterpart. First, a collision detection scheme is difficult to implement
in a wireless environment, since collisions are hard to be detected by
the transmitting nodes. Also, in infrastructure-less networks, the issue of
hidden and exposed terminals make a MAC protocol extremely inefficient
unless special care is taken to overcome these problems. We elaborate the
hidden and exposed terminal problems in the following:
The hidden terminal problem arises when at least three nodes (A, B, and C), as
shown in Fig. 3.1, communicate among each other. As shown in this figure,
MAC Protocols 49
A B C
For simplicity, we assume that all nodes transmit on the same frequency
at the same time using the entire bandwidth of the transmission channel.
Each sender has a unique random number key, and the sender XORs the
signal with this random number key. The receiver can “tune” into this
signal if it knows the pseudorandom number. Consider an example, where
X, Y are the transmitters and Z is a receiver. Sender X_data = 1 and X_Key
= (010011). Its autocorrelation representation is (–1, +1, –1, –1, +1, +1). The
signal to be calculated at sender X is Xs = X_data X_key = +1X_key =
(–1, +1, –1, –1, +1, +1). Similarly, sender Y_data = 0 and Y_key = (110101)
and the signal to be sent at Y is Ys = –1Y_key = –1(+1, +1, –1, +1, –1,
+1) = (–1, –1, +1, –1, +1, –1). The signal received by receiver Z is Xs + Ys
= (–1, +1, –1, –1, +1, +1) + (–1, –1, +1, –1, +1, –1) = (–2, 0, 0, –2, +2, 0).
At the receiver, in order to receive the data sent by sender X, the signal
54 Fundamentals of Mobile Computing
There are a number of random assignment schemes that are used in MAC
protocols. A few important ones are the following:
• ALOHA
• Slotted ALOHA
• CSMA
• CSMA/CD
• CSMA/CA
receiver sends a CTS (Clear to Send) packet, and the actual data transfer
commences only after that. When the other nodes sharing the medium
sense the CTS packet, they refrain from transmitting until the transmission
from the sending node is complete.
In a contention-based MAC protocol, a node wanting to send a message
first reserves the medium by using an appropriate control message. For
example, reservation of the medium can be achieved by transmitting a
“Ready To Send” (RTS) message and the corresponding destination node
accepting this request answers with a “Clear To Send” (CTS) message. Every
node that hears the RTS and CTS messages defers its transmission during
the specified time period in order to avoid a collision. A few examples of
RTS-CTS based MAC protocols are MACA, MACAW, MACA-BI, PAMAS,
DBTMA, MARCH, S-MAC protocols which have specifically been designed
for sensor networks. In the following, we discuss MACA as a representative
protocol belonging to this category of protocols.
3.6.1 MACA
MACA stands for Multiple Access Collision Avoidance. MACA solves the
hidden/exposed terminal problems by regulating the transmitter power.
A node running MACA requests to use the medium by sending an RTS
to the receiver. Since radio signals propagate omni-directionally, every
terminal within the sender’s radio range will hear this and then refrain
from transmitting. As soon as the receiver is ready to receive data, it
responds with a CTS.
Figure 3.6 schematically shows how MACA avoids the hidden terminal
problem. Before the start of its transmission, it sends a Request To Send
(RTS). B receives the RTS that contains the sender’s name and the receiver’s
name, as well as the length of the future transmission. In response to the
RTS, an acknowledgment from B is triggered indicating Clear To Send
(CTS). The CTS contains the names of the sender and receiver, and the
length of the planned transmission. This CTS is heard by C and the medium
is reserved for use by A for the duration of the transmission.
The IEEE 802.11 is the most widely used standard for WLANs today.
Low cost WLAN cards can be easily purchased from the market to set up
a WLAN. The IEEE 802.11 standard defines the functional aspects of the
medium access control (MAC) sublayer. The IEEE 802.11 defines separate
standards for infrastructure-based and ad hoc networks. The network
interface cards can be set to work in either of these two modes.
CSMA, IEEE 802.11 DCF, etc. However, the use of common active/sleep
periods may not be suitable for applications with irregular traffic, because
nodes use contention inside active periods, which would be prohibitive
when nodes wake up without communicating, and may cause collisions
when there is high traffic that cannot be absorbed by the initially envisaged
size of the active periods.
SUMMARY
FURTHER READINGS
Deng, J. and Z. Haas, “Dual Busy Tone Multiple Access (DBTMA): A New
Medium Access Control for Packet Radio Networks”, Florence, Italy,
1998.
Dam, T.V. and K. Langendoen, “An Adaptive Energy-efficient MAC
Protocol for Wireless Sensor Networks”, in SenSys ’03, New York,
USA: ACM Press, pp. 171–180, 2003.
Heidemann, J., W. Ye, and D. Estrin, “Medium Access Control with
Co-ordinated Adaptive Sleeping for Wireless Sensor Networks”,
IEEE/ACM Transactions on Networking, 12, No. 3, pp. 493–506, 2004.
Karn, P., “A New Channel Access Method for Packet Radio”, ARRL/CRRL
Amateur Radio 9th Computer Networking Conference, Sept. 22, 1990.
Lichun Bao, J.J. Garcia-Luna-Aceves, “Hybrid Channel Access Scheduling in
Ad hoc Networks”, Proceedings of the 10th IEEE International Conference
on Network Protocols, 2002.
Rhee, I., A. Warrier, M. Aia, and J. Min, “ZMAC: a Hybrid MAC for
Wireless Sensor Networks”, New York, USA: ACM Press, 2005,
pp. 90–101.
62 Fundamentals of Mobile Computing
EXERCISES
1. What is the role of a MAC protocol? At which ISO/OSI layer does
it operate?
2. What is a hidden terminal? What problem does it create during
wireless communications? Explain your answer using a suitable
schematic diagram.
3. When does the exposed terminal problem arise? Explain your answer
using a suitable example.
4. What are the principal responsibilities of the MAC protocols? How
do MAC protocols for wireless networks differ from those in wired
networks?
5. What are the broad categories of MAC protocols? Name one popular
protocol from each of these categories.
6. Explain the working of a contention-based MAC protocol. Give two
examples of contention-based MAC protocols.
7. What are the different categories of MAC protocols. Identify the
situations under which protocols from one category would be
preferable over the other categories. Explain the working of a
reservation-based MAC protocol.
8. Why are collision-detection based protocols not suitable for wireless
networks?
9. Name one MAC protocol that is used in mobile ad hoc networks.
Briefly explain its working.
MAC Protocols 63
10. Name one MAC protocol that is used in sensor networks. Briefly
explain its working.
11. What is MACA protocol? In which environment is it suitable? Briefly
explain its working. How does MACA protocol solve the hidden/
exposed terminal problems?
12. What do you mean by a schedule-based MAC protocol? Name a
schedule-based MAC protocol. Briefly explain its working.
13. What is FDMA? Briefly explain its working and at least one of its
important applications.
14. What is TDMA? Briefly explain its working and at least one of its
important applications.
15. Explain the basic scheme of the CDMA protocol. What is the role of
a pseudorandom sequence generator in the working of the CDMA
protocol?
16. Briefly explain the IEEE 802.11 standard and discuss its application.
17. Do you agree with the following statement: “In CSMA/CD protocol,
when two nodes transmit on a shared medium, a collision can occur
only when two nodes start transmitting exactly at the same time
instant.” Explain your answer.
18. Identify the specific reasons as to why the MAC protocols designed
for infrastructure-based wireless networks may not work satisfactorily
in infrastructure-less environments.