Mobile Computing 1
Mobile Computing 1
NOTES
(Subject Code – CSE506)
for
Diploma
in
Unit-I
Introduction 10 hrs
Unit II
Mobile Network & Transport Layer 12 hrs
Unit III
Wireless Networking 10 hrs
Wireless LAN Overview: MAC issues, IEEE 802.11, Blue Tooth, Wireless
multiple access protocols, TCP over wireless, Wireless applications, data
broadcasting, Mobile IP, WAP: Architecture, protocol stack, application
environment, applications.
Unit IV
Mobile Ad hoc Networks 10 hrs
Security problems: In this paper the author had mentioned varied sorts of security
problems and
protocols that are used for securing the information once communication between
them.
activities by composing the user and his/her activities are joined if and once
necessary.
Primarily author has mentioned on parallel and uneven key coding mechanisms
for providing security
to the information across the network
Location aptitude: Mobile computers move they come across networks with
completely different options. A mobile computer should be ready to switch from
infrared mode to radio mode because it moves from inside to outdoors. In addition
it ought to be capable of change from cellular mode of operation to satellite mode
because the computer moves from urban and rural areas. In mobile computing as
computers are operating in cells and are being maintained by totally different
network suppliers, the physical distance might not replicate actuality network
distance. A little movement might end in a far longer path if cell or network
boundaries are crossed. It will additionally result in change of the placement
7
Power Consumption: Mobile Computers can deem their batteries because the
primary power supply. Batteries should be ideally as lightweight as potential
however at constant time they must be capable of longer operation times. Power
consumption should be decreased to extend battery life. Chips are redesigned to
control at lower voltages. Power management may also facilitate. Individual
Components, be high-powered down once they are idle.
Computers are one among the main inventions of the world. The invention of
computer has modified the world. During lately each field of life looks to be
processed. Later within the 21st century a replacement technology was introduced
within the world referred to as mobile computing. Now-a-days computers area
unit changed into mobile computers referred to as laptops. A little introduction of
mobile computing is that you just will do your add motion. In easy words it means
you'll do your work whereas sitting anyplace within the world. You are doing not
need to sit at one place to try to your work. The most challenge of Mobile
computing is that, we are able to communicate with alternative people’s whereas
sitting anyplace within the world.
The name MOBILE comes from the primary letter in every of the six classes that
conjure the framework. The six classes are:
For Estate Agents: Estate agents will work either reception or call at the sector.
With mobile computers they will be a lot of productive. They will acquire current
property data by accessing multiple listing services, that they will do from home,
workplace or automobile once out with purchasers. They will give shoppers with
immediate feedback concerning specific homes or neighbourhoods, and with
quicker loan approvals, since applications is submitted on the spot. Therefore,
mobile computers enable them to devote longer to purchasers.
In courts: Defence counsels will take mobile computers in court. Once the
opposing counsel references a case that they are not familiar, they'll use the
computer to induce direct, period access to on-line legal information services,
wherever they'll gather data on the case and connected precedents. Mobile
computers enable immediate access to a wealth of data, creating individuals
higher knowing and ready.
In companies: Managers will use mobile computers in, say, and essential shows
to major customers. They will access the most recent market share data. At a tiny
low recess, they will revise the presentation to require advantage of this data.
They will communicate with the workplace regarding doable new offers and
decision conferences for discussing responds to the new proposals. Therefore,
mobile computers will leverage competitive blessings.
Cellular Telephony
separated from one another by a distance large enough to keep interference level
within tolerable limits as shown in Fig. 5.9.2. Cells with the same letter use the
same set of frequencies, called reusing cells. N cells which collectively use the
available frequencies (S = k.N) is known as cluster. If a cluster is replicated M
times within a system, then total number duplex channels (capacity) is C =
M.k.N= M.S.
Reuse factor: Fraction of total available channels assigned to each cell within a
cluster is 1/N. Example showing reuse factor of ¼ is shown in Fig. 5.9.2 (a) and
Fig. 5.9.2(b) shows reuse factor of 1/7.
B
G C
A
B F D
D C B B EB
A D C G G
C B
B A A A
G C
D C F F
D D
A
A E FE D
E
A B
B B
G C G C
A A
F D F D
E E
A caller enters a 10-digit code (phone number) and presses the send button.
The MS scans the ba nd to select a free channel and sends a strong signal
to send the number entered.
The BS relays the number to the MSC.
The MSC in turn dispatches the request to all the base stations in the
cellular system.
The Mobile Identification Number (MIN) is then broadcast over all the
forward control channels throughout the cellular system. It is known as
paging.
The MS responds by identifying itself over the reverse control channel.
The BS relays the acknowledgement sent by the mobile and informs the
MSC about the handshake.
The MSC assigns an unused voice channel to the call and call is
established.
All the idle mobile stations continuously listen to the paging signal to
detect messages directed at them.
When a call is placed to a mobile station, a packet is sent to the callee’s
home MSC to find out where it is.
A packet is sent to the base station in its current cell, which then sends a
broadcast on the paging channel.
The callee MS responds on the control channel.
In response, a voice channel is assigned and ringing starts at the MS.
Mobility Management
Handoff: At any instant, each mobile station is logically in a cell and under the
control of the cell’s base station. When a mobile station moves out of a cell, the
base station notices the MS’s signal fading away and requests all the
neighbouring BSs to report the strength they are receiving. The BS then transfers
ownership to the cell getting the strongest signal and the MSC changes the
channel carrying the call. The process is called handoff. There are two types of
handoff; Hard Handoff and Soft Handoff. In a hard handoff, which was used in
the early systems, a MS communicates with one BS. As a MS moves from cell A
to cell B, the communication between the MS and base station of cell A is first
broken before communication is started between the MS and the base station of
B. As a consequence, the transition is not smooth. For smooth transition from one
cell (say A) to another (say B), an MS continues to talk to both A and B. As the
MS moves from cell A to cell B, at some point the communication is broken with
the old base station of cell A. This is known as soft handoff
FDMA: When all the people group in widely separated areas and talk within each
group.
TDMA: When all the people are in the middle of the room, but they take turn in
speaking.
CDMA: When all the people are in the middle of the room, but different pairs
speak in different languages.
FDMA: The bandwidth is divided into separate frequency bands. In case of burst
traffic, the efficiency can be improved in FDMA by using a dynamic sharing
technique to access a particular frequency band; channels are assigned on demand
CDMA: Data from all stations are transmitted simultaneously and are separated
based on coding theory as shown in Fig. 5.9.6. In TDMA and FDMA the
transmissions from different stations are clearly separated in either time or
frequency. In case of CDMA, the transmission from different stations occupy the
entire frequency band at the same time. Multiple simultaneous transmissions are
separated by using coding theory. Each bit is assigned a unique m-bit code or chip
sequence.
Second Generation
The first generation cellular network was developed for analog voice
communication. To provide better voice quality, the second generation was
developed for digitized voice communication. Three major systems were evolved
Second Generation
IS-95
IS-136
GSM CDMA
D-AMPS
Third Generation
We are presently using the second generation technologies and the development
of the
third generation technologies are in progress. Goals of the third generation (3G)
technologies are mentioned below:
Allow both digital data and voice communication.
To facilitate universal personnel communication.
Listen music, watch movie, access internet, video conference, etc.
Third generation
GSM radio subsystem and list any four GSM air interface
specifications
The Mobile Station and the Base Station Subsystem communicate across
the Um interface, also known as the air interface or radio link.
The Base Station Subsystem communicates with the Mobile services
Switching Centre across the A interface.
Mobile Station:
The mobile station (MS) consists of the mobile equipment (the terminal)
and a smart card called the Subscriber Identity Module (SIM).
Supplementary services
GSM provides the following Supplementary services
Multiparty Service or conferencing
Call Waiting.
Call Hold
Call Forwarding
Number Identification.
Closed User Groups (CUGs).
18
Half Rate
Traffic Channel
Full Rate
19
The Basic Parameters stored in the HLR in telecom are listed below:
1. Subscriber ID (IMSI and MSISDN)
2. Current Subscriber VLR (Current Location)
3. Supplementary Services Subscriber to (Caller Tone, Missed Call Alert,
Any Other Services etc.)
4. Subscriber Status (Registered or Deregistered)
5. Authentication Key and AUC Functionality
6. Mobile Subscriber Roaming Number
Definition
In cellular communications, the handoff is the process of transferring an active
call or data session from one cell in a cellular network or from one channel to
another. In satellite communications, it is the process of transferring control from
one earth station to another. Handoff is necessary for preventing loss of
interruption of service to a caller or a data session user. Handoff is also called
handover.
Handoff of subscriber 1
from cell 2 microcell Basic Station of Cell 2
Handoff of subscriber 2
From cell 3 to cell 4
Cells are often sub-divided into microcells. A handoff may occur when
there is a transfer of duties from the large cell to the smaller cell and vice
versa. For example, there is a traveling user moving within the jurisdiction
of a large cell. If the traveller stops, then the jurisdiction is transferred to a
microcell to relieve the load on the large cell.
Handoffs may also occur when there is an interference of calls using the
same frequency for communication.
Types of Handoffs
There are two types of handoffs –
Hand Handoff
Soft Handoff
A
20
Channels
10
C Channels
5
Channels
B
Home Foreign
Agent Agent
Router Router
Wireless Wireless
Transceiver Transceiver
Internet
Reverse Tunnel
Forward Tunnel
IP Correspondent Node
Network
Mobile Node (MN): It is the hand-held communication device that the user caries
e.g., Cell phone.
Home Network: It is a network to which the mobile node originally belongs to
as per its assigned IP address (home address).
Home Agent (HA): It is a router in home network to which the mobile node was
originally connected
Home Address: It is the permanent IP address assigned to the mobile node
(within its home network).
Foreign Network: It is the current network to which the mobile node is visiting
(away from its home network).
Foreign Agent (FA): It is a router in foreign network to which mobile node is
currently connected. The packets from the home agent are sent to the foreign
agent which delivers it to the mobile node.
Correspondent Node (CN): It is a device on the internet communicating to the
mobile node.
Care of Address (COA): It is the temporary address used by a mobile node while
it is moving away from its home network.
29
3.
Router
Home Router 2. FA MN
Network HA
Foreign
Network
4.
Internet
1.
CN
Router
STEP 1: CN sends the packet as usual to the IP address of MN. With Source
address as CN and Destination address as MN. The internet, which does not have
any information of the current location of MN, routes the packet to the router
responsible for the home network of MN. This is done using the standard routing
mechanisms of the internet.
STEP 2: The HA now diverts the packet, knowing that MN is currently not in its
home network. The packet is not forwarded into the subnet as usual, but
encapsulated and tunnelled to the COA. A new header is put in front of the old IP
header showing the COA as new destination and HA as source of the
encapsulated packet.
STEP 3: The foreign agent (FA) now decapsulates the packet, i.e., removes the
additional header (newly added as COA as destination and HA as source), and
forwards the original packet with CN as source and MN as destination to the MN.
Again, for the MN mobility is not visible.
Finally, the MN Receives the packet with the Source address as CN and
Destination address as MN.
30
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint. Packets entering a tunnel are forwarded inside the tunnel and
leave the tunnel unchanged. Tunnelling, i.e., sending a packet through a tunnel is
achieved by using encapsulation
Encapsulation is the mechanism of taking a packet consisting of packet header
and data and putting it into the data part of a new packet. The reverse operation,
taking a packet out of the data part of another packet, is called de-capsulation.
Encapsulation and de-capsulation are the operations typically performed when a
packet is transferred from a higher protocol layer to a lower layer or from a lower
to a higher layer respectively. The HA takes the original packet with the MN as
destination, puts it into the data part of a new packet and sets the new IP header
so that the packet is routed to the CO. The new header is called outer header.][1]
Boot
INIT
-/DHCPDISCOVER
DHCPOFFER
SELECTING
DHCP ACK
Lease time 50% expired Lease Cancelled
DHCPREQUEST DHCPRELEASE
BOUND
INIT State: When the DHCP client first starts, it is in the INIT state
(initializing state). The client broadcasts a DHCPDISCOVER message (a
request message with the DHCPDISCOVER option), using port 67.
BOUND State: In this state, the client can use the IP address until the lease
expires. When 50 percent of the lease period is reached, the client sends
another DHCPREQUEST to ask for renewal. It then goes to the renewing
state. When in the bound state, the client can also cancel the lease and go
to the initializing state.
RENEWING State: The client remains in the renewing state until one of
two events happens. It can receive a DHCPACK, which renews the lease
agreement. In this case, the client resets its timer and goes back to the
bound state. Or, if a DHCPACK is not received, and 87.5 percent of the
lease time expires, the client goes to the rebinding state.
REBINDING State: The client remains in the rebinding state until one of
three events happens. If the client receives a DHCPNACK or the lease
expires, it goes back to the initializing state and tries to get another IP
address. If the client receives a DHCPACK, it goes to the bound state and
resets the timer.
34
Traditional TCP
Congestion control
TCP has been designed for fixed networks with fixed end-systems
Hardware and software are mature enough to ensure reliability of data
The probable reason for a packet loss in a fixed network is a temporary
overload some point in the transmission path, i.e., a state of congestion at
a node
The packet buffers of a router are filled and the router cannot forward the
packets fast enough
The only thing a router can do in this situation is to drop packets
The sender notices the missing acknowledgement for the lost packet and
assumes a packet loss due to congestion
Retransmitting the missing packet and continuing at full sending rate
would now be unwise, as this might only increase the congestion.
Slow start
The behaviour TCP shows after the detection of congestion is called slow
start
The sender always calculates a congestion window for a receiver.
The start size of the congestion window is one segment (TCP packet).
This scheme doubles the congestion window every time the
acknowledgements come back, which takes one round trip time (RTT) like
1, 2, 4, 8 etc.
This is called the exponential growth of the congestion window in the slow
start mechanism.
The exponential growth stops at the congestion threshold.
As soon as the congestion window reaches the congestion threshold,
further increase of the transmission rate is only linear by adding 1 to the
congestion window each time the acknowledgements come back
35
Fast Recovery
Implications on mobility
Access Point
(foreign agent)
‘Wired’ Internet
Mobile Host
Standard TCP
‘Wireless’ TCP
Access Point 1
Socket migration
Internet
and state transfer
Access Point 2
Mobile Host
Splitting of the TCP connection at, e.g., the foreign agent into 2 TCP
connections, no real end-to-end connection any longer
Hosts in the fixed part of the net do not notice the characteristics of the
wireless part
Advantages
No changes in the fixed network necessary, no changes for the hosts (TCP
protocol) necessary, all current optimizations to TCP still work
transmission errors on the wireless link do not propagate into the fixed
network
simple to control, mobile TCP is used only for one hop between, e.g., a
foreign agent and mobile host
38
Snooping TCP
The foreign agent buffers all packets with destination mobile host and
additionally ‘snoops’ the packet flow in both directions to recognize
acknowledgements
buffering enable the FA to perform a local retransmission in case of packet
loss on the wireless link
Transparent extension of TCP within the foreign agent
buffering of packets sent to the mobile host
lost packets on the wireless link (both directions!) will be retransmitted
immediately by the mobile host or foreign agent, respectively (so called
“local” retransmission)
The foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
Changes of TCP only within the foreign agent
Foreign agent
Local retransmission
Correspondent Host
‘Wired’ Internet
Mobile Host
Problems
o snooping TCP does not isolate the wireless link as good as I-TCP
o snooping might be useless depending on encryption schemes
Advantages
The end-to-end TCP semantic is preserved
The correspondent host does not need to be changed; most of the
enhancements are in the foreign agent
It does not need a handover of state as soon as the mobile host moves to
another foreign agent.
It does not matter if the next foreign agent uses the enhancement or not
Disadvantages
Snooping TCP does not isolate the behaviour of the wireless link as well
as ITCP
Using negative acknowledgements between the foreign agent and the
mobile host assumes additional mechanisms on the mobile host.
All efforts for snooping and buffering data may be useless if certain
encryption schemes are applied end-to- end between the correspondent
host and mobile host
40
Mobile TCP
Supervisory host
o no caching, no retransmission
o monitors all packets, if disconnection detected
set sender window size to 0
sender automatically goes into persistent mode
o Old or new SH reopen the window
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network
adapted TCP on wireless link
Advantage
simple changes result in significant higher performance
Disadvantage
further mix of IP and TCP, no transparent approach
41
TCP freezing
o MAC layer is often able to detect interruption in advance
o MAC can inform TCP layer of upcoming loss of connection
o TCP stops sending, but does now not assume a congested link
o MAC layer signals again if reconnected
Advantage
scheme is independent of data
Disadvantage
TCP on mobile host has to be changed, mechanism depends on MAC
layer
Selective Retransmission
Advantage
much higher efficiency
Disadvantage
more complex software in a receiver, buffer needed at the receiver
42
Transaction-oriented TCP
TCP phases
o setup, data transmission, connection release
o using 3-way-handshake needs 3 packets for setup and release, respectively
o thus, even short messages need a minimum of 7 packets!
Advantage: efficiency
Disadvantage
o Requires changed TCP
o Mobility no longer transparent
Disadvantages of WLANs
Quality of Services: Quality of wireless LAN is typically lower than wired
networks. The main reason for this is the lower bandwidth due to
limitations is radio transmission, higher error rates due to interference and
higher delay/delay variation due to extensive error correction and detection
mechanisms.
Proprietary Solutions: Due to slow standardization procedures, many
companies have come up with proprietary solutions offering
standardization functionality plus many enhanced features. Most
components today adhere to the basic standards IEEE 802.11a or 802.11b.
Restrictions: Several govt. and non-govt. institutions world-wide regulate
the operation and restrict frequencies to minimize interference.
Global operation: Wireless LAN products are sold in all countries so,
national and international frequency regulations have to be considered.
Low Power: Devices communicating via a wireless LAN are typically
power consuming, also wireless devices running on battery power.
Whereas the LAN design should take this into account and implement
special power saving modes and power management functions.
License free operation: LAN operators don't want to apply for a special
license to be able to use the product. The equipment must operate in a
license free band, such as the 2.4 GHz ISM band.
Robust transmission technology: If wireless LAN uses radio
transmission, many other electrical devices can interfere with them (such
as vacuum cleaner, train engines, hair dryers, etc.).Wireless LAN
transceivers cannot be adjusted for perfect transmission is a standard office
or production environment.
47
In theory C can therefore have a parallel transmission with any node that
cannot hear the transmission from B, i.e. out of range of B. But C will not transmit
to any node because its an exposed node. Exposed nodes waste bandwidth.
Capture
Capture is said to occur when a receiver can cleanly receive a transmission from
one of two simultaneous transmissions both within its range Assume node A and
D transmit simultaneously to B. The signal strength received from D is much
higher than that from A, and
D‘s transmission can be decoded without errors in presence of transmissions from
A.D has captured A. Capture is unfair because it gives preference to nodes that
are closer to the receiver. It may improve protocol performance.
50
Distribution System
Access Access
Station Station Point
Point
Station Station
Station Station
ESS
STA: Station
AP: Access Point
BSS: Basic Service Set
ESS: Extended service Set
IEEE 802.11 supports three basic topologies for WLANs, the independent basic
service set (IBSS), the basic service set, and the extended service set (ESS). The
MAC layer supports implementations of IBSS, basic service set, and ESS
configurations.
Independent basic service set: The IBSS configuration is referred to as an
independent configuration or an ad-hoc network. An IBSS configuration is
analogous to a peer-to-peer office network in which no single node is required to
act as a server. IBSS WLANs include a number of nodes or wireless stations that
communicate directly with one another on an ad-hoc, peer-to-peer basis.
Generally, IBSS implementations cover a limited area and are not connected to
any large network. An IBSS is typically a short-lived network, with a small
number of stations, that is created for a particular purpose.
Basic service set: The basic service set configuration relies on an AP that acts as
the logical server for a single WLAN cell or channel. Communications between
station 1 and station 4 actually flow from station 1 to AP1 and then from AP1 to
AP2 and then from AP2 to AP4 and finally AP4 to station 4 (refer to Figure 2).
An AP performs a bridging function and connects multiple WLAN cells or
channels, and connects WLAN cells to a wired enterprise LAN.
52
AP #3
AP #2
AP #1
ST #4
ST #1
Extended service set: The ESS configuration consists of multiple basic service
set cells that can be linked by either wired or wireless backbones called a
distributed system. IEEE 802.11 supports ESS configurations in which multiple
cells use the same channel, and configurations in which multiple cells use
different channels to boost aggregate throughput. To network the equipment
outside of the ESS, the ESS and all of its mobile stations appear to be a single
MAC layer network where all stations are physically stationary. Thus, the ESS
hides the mobility of the mobile stations from everything outside the ESS (refer
figure 1).
53
Bluetooth Technology
Bluetooth technology is a high speed and low powered wireless technology
designed to connect phones or other portable equipment for communication or
file transmissions. This is based on mobile computing technology. Following is a
list of some prominent features of Bluetooth technology:
Bluetooth is also known as IEEE 802.15 standard or specification that uses
low power radio communications to link phones, computers and other
network devices over a short distance without using any type of connecting
wires.
As Bluetooth is an open wireless technology standard so, it is used to send
or receive data to connected devices present across a certain distance using
a band of 2.4 to 2.485 GHz.
In Bluetooth technology, the wireless signals transmit data and files over a
short distance, typically up to 30 feet or 10 meters.
Bluetooth technology was developed by a group of 5 companies known as
Special Interest Group formed in 1998. The companies are Ericsson, Intel,
Nokia, IBM, and Toshiba.
The range of Bluetooth technology for data exchange was up to 10 meters
in older versions of devices, but the latest version of Bluetooth technology
i.e., Bluetooth 5.0, can exchange data in the range of about 40-400 meters.
The average speed of data transmission in Bluetooth technology was
around 1 Mbps in the very first version. The second version was 2.0+ EDR,
which provided the data rate speed of 3Mbps. The third was 3.0+HS, which
provided the speed of 24 Mbps. The latest version of this technology is 5.0.
History of Bluetooth
There is an amazing story behind the history of Bluetooth technology. The
Bluetooth wireless technology was named after a Danish King named Harald
Blatant. His last name means "Bluetooth" in English. The name "Bluetooth" was
awarded to this technology because the Danish King named Harald Blatant was
united the Denmark and Norway, same as Bluetooth wireless technology is used
to unite two disparate devices for communication or data transmission.
Ericsson Mobile Communications started the development of Bluetooth
technology in 1994. The main motive behind the development of this amazing
technology was to find an alternative to the use of cables for communication
between mobile phones and other devices. In 1998, 4 big companies of that time
named Ericsson, IBM, Nokia and Toshiba formed the Bluetooth Special Interest
Group (SIG), which published the 1st version of Bluetooth technology in 1999.
54
After that, four versions have been released. The latest version of this technology
is Bluetooth 5.2.
The Architecture of Bluetooth Technology
In Bluetooth technology, the network of Bluetooth consists of a Personal
Area Network or a
Bluetooth's architecture is also called a "Piconet" because it is made of
multiple networks.
It contains a minimum of 2 to a maximum of 8 Bluetooth peer devices.
It usually contains a single master and up to 7 slaves.
Piconet provides the technology which facilitates data transmission based
on its nodes, i.e., Master node and Slave Nodes.
The master node is responsible for sending the data while the slave nodes
are used to receive the data.
In Bluetooth technology, data transmission occurs through Ultra-High
frequency and short-wavelength radio waves.
The Piconet uses the concept of multiplexing and spread spectrum. It is a
combination of code division multiple access (CDMA) and frequency
hopping spread spectrum (FHSS) technique.
SB S SB
S
S
M
S
P
P
S
Explanation
The parked node is a type of node that is ready to be connected and stand
by node is a type of node that can either become a slave or parked node or
remains idle or disconnected.
In Bluetooth technology, the data transmission can only occur between
master and slave nodes. It cannot be done between slave and slave nodes.
However, two master nodes can be connected.
If the connection from the master node gets disconnected, the whole
Piconet gets disconnected.
If there is a connection between two master nodes, then that network is
called as Scatter-net.
It means scatter-nets are created when a device becomes an active member
of more than one Piconet and the adjoining device shares its time slots
among the different piconets.
If the number of slaves or devices is increased in a Piconet, then the data
transmission speed will be decreased, and if the number of slaves or
devices is decreased in number, then the data transmission speed will be
increased.
56
1. RANDOM ACCESS
In random access or contention methods, no station is superior to another
station and none is assigned the control over another. No station permits,
or does not permit, another station to send. At each instance, a station that
has data to send uses a procedure defined by the protocol to make a
decision on whether or not to send.
This decision depends on the state of the medium (idle or busy).Two
features give this method its name. First, there is no scheduled time for a
station to transmit. Transmission is random among the stations. That is why
these methods are called random access. Second, no rules specify which
station should send next. Stations compete with one another to access the
medium. That is why these methods are also called contention methods
ALOHA
This random-access method, was developed at the University of Hawaiian early
1970. It was designed for a radio (wireless) LAN, but it can be used on any shared
medium. It is obvious that there are potential collisions in this arrangement. The
medium is shared between the stations. When a station sends data, another station
may attempt dodo so at the same time. The data from the two stations collide and
become garbled.
59
2. CONTROLLED ACCESS
Controlled Access
In controlled access, the stations consult one another to find which station has the
right to send. A station cannot send unless it has been authorized by other stations.
We discuss three popular controlled-access methods.
Reservation
In the reservation method, a station needs to make a reservation before sending
data. Time is divided into intervals. In each interval, a reservation frame precedes
the data frames sent in that interval. If there are N stations in the system, there are
exactly N reservation minislots in the reservation frame. Each minislot belongs
to a station. When a station needs to send a data frame, it makes a reservation in
its own minislot.
The stations that have made reservations can send their data frames after the
reservation frame. Figure below shows a situation with five stations and a five-
mini slot reservation frame. In the first interval, only stations 1, 3, and 4 have
made reservations. In the second interval, only station 1 has made a reservation.
1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
Data Data Data Data
0 0 0 0 0 Station 1 1 0 0 0 0 Station 4 Station 3 Station 1 1 0 1 1 0
Reservation frame
Polling
Polling works with topologies in which one device is designated as a primary
station and the other devices are secondary stations. All data exchanges must be
made through the primary device even when the ultimate destination is a
secondary device.
The primary device controls the link; the secondary devices follow its
instructions. It is up to the primary device to determine which device is allowed
to use the channel at a given time. The primary device, therefore, is always the
initiator of a session
61
If the primary wants to receive data, it asks the secondary ‘s if they have
anything to send; this is called poll function. If the primary wants to send data,
it tells the secondary to get ready to receive; this is called select function.
Token Passing:
In the token-passing method, the stations in a network are organized in a
logical ring. In other words, for each station, there is a predecessor and a
successor. The predecessor is the station which is logically before the
station in the ring; the successor is the station which is after the station in
the ring.
The current station is the one that is accessing the channel now. The right
to this access has been passed from the predecessor to the current station.
The right will be passed to the successor when the current station has no
more data to send.
Token management is needed for this access method. Stations must be
limited in the time they can have possession of the token. The token must
be monitored to ensure it has not been lost or destroyed.
For example, if a station that is holding the token fails, the token will
disappear from the network. Another function of token management is to
assign priorities to the stations and to the types of data being transmitted.
And finally, token management is needed to make low-priority stations
release the token to high priority stations.
3. CHANNELIZATION
Channelization is a multiple-access method in which the available bandwidth of
a link is shared in time, frequency, or through code, between different stations.
Three channelization protocols: FDMA, TDMA, and CDMA.
Code Code
Code
Freq
Freq
Telecoms Exchange
Internet
Firewall
WAP Gateway
Internet
Application
Server
Database
Server
64
Request Response
Content
Protocol Decoder
Stack
Decoded HTTP
Response Response
WAP facilitates you to access the Internet from your mobile devices.
You can play games on mobile devices over wireless devices.
It facilitates you to access E-mails over the mobile Internet.
Mobile hand-sets can be used to access timesheets and fill expenses claims.
Online mobile banking is very popular nowadays.
It can also be used in multiple Internet-based services such as geographical
location, Weather forecasting, Flight information, Movie & cinema
information, Traffic updates etc. All are possible due to WAP technology.
67
Business
Travelling Salesman
o Directly access to customer files stored in a central location.
o Consistent databases for all agents
o Mobile office
o To enable the company to keep track of all the activities of their travelling
employees.
In Office
o Wi-Fi wireless technology saves businesses or companies a considerable
amount of money on installations costs.
o There is no need to physically setup wires throughout an office building,
warehouse or store.
o Bluetooth is also a wireless technology especially used for short range that
acts as a complement to Wi-Fi. It is used to transfer data between
computers or cell phones.
Transportation Industries
o In transportation industries, GPS technology is used to find efficient routes
and tracking vehicles.
o Replacement of Wired Network
o Wireless network can also be used to replace wired network. Due to
economic reasons it is often impossible to wire remote sensors for weather
forecasts, earthquake detection, or to provide environmental information,
wireless connections via satellite, can help in this situation.
o Tradeshows need a highly dynamic infrastructure, since cabling takes a
long time and frequently proves to be too inflexible.
o Many computers fairs use WLANs as a replacement for cabling.
o Other cases for wireless networks are computers, sensors, or information
displays in historical buildings, where excess cabling may destroy valuable
walls or floors.
Location dependent service
o It is important for an application to know something about the location
because the user might need location information for further activities.
Several services that might depend on the actual location can be described
below:
o Follow-on Services:
o Location aware services: To know about what services (e.g. fax, printer,
server, phone, printer etc.) exist in the local environment.
o Privacy: We can set the privacy like who should get knowledge about the
location.
o Information Services: We can know about the special offers in the
supermarket. Nearest hotel, rooms, cabs etc.
69
Even though many mobile and wireless devices are available, there will be many
more devices in the future. There is no precise classification of such devices, by
sizes, shape, weight, or computing power. The following list of given examples
of mobile and wireless devices graded by increasing performance (CPU, memory,
display, input devices, etc.)
Sensor: Wireless device is represented by a sensor transmitting state information.
1 example could be a switch, sensing the office door. If the door is closed, the
switch transmits this information to the mobile phone inside the office which will
not accept incoming calls without user interaction; the semantics of a closed door
is applied to phone calls.
Embedded Controller: Many applications already contain a simple or
sometimes more complex controller. Keyboards, mouse, headsets, washing
machines, coffee machines, hair dryers and TV sets are just some examples.
Pager: As a very simple receiver, a pager can only display short text messages,
has a tiny display, and cannot send any messages.
Personal Digital Assistant: PDAs typically accompany a user and offer simple
versions of office software (calendar, notepad, mail). The typically input device
is a pen, with built-in character recognition translating handwriting into
characters. Web browsers and many other packages are available for these
devices.
Pocket computer: The next steps towards full computers are pocket computers
offering tiny keyboards, color displays, and simple versions of programs found
on desktop computers (text processing, spreadsheets etc.)
Notebook/laptop: Laptops offer more or less the same performance as standard
desktop computers; they use the same software - the only technical difference
being size, weight, and the ability to run on a battery. If operated mainly via a
sensitive display (touch sensitive or electromagnetic), the device are also known
as notepads or tablet PCs.
70
Client
Broadcasting Witbful
Station Network
Client (Fixed)
Client
Client
Data Broadcasting
• Server continually broadcasts data to MUs.
• Scalability: Cost does not depend on number of users listening.
• Mobile Unit may/may not have cache.
• Facilitates data access during disconnected periods.
• Allows location dependent data access.
• No need to predict with 100% accuracy the future data needs.
• Broadcast based on probability of access.
• Periodic broadcasting of all data.
71
Mobile IP
Mobile IP or MIP is an Internet Engineering Task Force (IETF) RFC 2002, De-
Facto standard communication protocol. It is created by extending Internet
Protocol, IP.
The Mobile IP allows mobile device users to move from one network to another
while maintaining the same permanent IP address.
The concept and role of Mobile IP are very important in the field of mobile
computing technology.
The mobile IP makes the communication flawless and ensures that the
communication will occur without the user's sessions or connections being
dropped.
Mobile IP is based on IP, so it is scalable for the Internet. Any media that supports
IP can also support Mobile IP.
Introduction to Mobile IP Technology
In IP networks, when a device is within its home network, the routing is based on
the static IP addresses. The device within a network is connected through normal
IP routing by the IP address assigned on the network. It is the same as how a
postal letter is delivered to the fixed address on the envelope. The problem occurs
when a device goes away from its home network and is no longer reachable using
normal IP routing. In this condition, the active sessions of the device are
terminated. The idea of Mobile IP was introduced to resolve this issue. It
facilitates users to keep the same IP address while going to a different network or
a different wireless operator without being communication disrupted or without
sessions or connections being dropped.
The mobility function of the Mobile IP is performed on the network layer rather
than the physical layer.
The architecture of Mobile IP Technology
The components of the Mobile IP and the relationship among them are specified in the following image:
Mobile node
visiting Mobile node
foreign network at Home
Foreign Network
Foreign Agent
72
Mobile Node
The Mobile Node is a device or a user or a router that can frequently change their
network positions without changing its original IP address. Examples of mobile
nodes are cell phone, personal digital assistant (PDA), laptop, etc. whose software
enables network roaming capabilities.
Home Agent
The Home Agent is a router on the home network. It serves as the anchor point
for communication with the Mobile Node.
Foreign Agent
The Foreign Agent is a router that provides several services such as tunnelling
data-grams whenever a mobile node visits a foreign network. It is responsible for
delivering packets from the Home Agent to the Mobile Node.
Home Network
The home network is the base station network to which the mobile node originally
belongs to.
Foreign Network
Any network other than the home network or the networks on which mobile nodes
have a registered IP is called a foreign network.
Corresponding Node
The partner nodes which are used for communication with mobile nodes are
called corresponding nodes.
Care of Address
The Care of Address or COA is used to define the mobile node's current position
or user. It is used to deliver data packets through the process of tunnelling.
73
Working of Mobile IP
The working of Mobile IP can be described in 3 phases:
Agent Discovery
In the Agent Discovery phase, the mobile nodes discover their Foreign and Home
Agents. The Home Agent and Foreign Agent advertise their services on the
network using the ICMP Router Discovery Protocol (IRDP).
Registration
The registration phase is responsible for informing the current location of the
home agent and foreign agent for the correct forwarding of packets.
Tunnelling
This phase is used to establish a virtual connection as a pipe for moving the data
packets between a tunnel entry and a tunnel endpoint.
Applications of Mobile IP
The mobile IP technology is used in many applications where the sudden changes
in network connectivity and IP address can cause problems. It was designed to
support seamless and continuous Internet connectivity.
It is used in many wired and wireless environments where users have to carry
their mobile devices across multiple LAN subnets.
Although Mobile IP is not required within cellular systems such as 3G, it is often
used in 3G systems to provide seamless IP mobility between different packet data
serving node (PDSN) domains.
Internet
WAP
Gateway
Mobile Devices
WAP Model: The user opens the mini-browser in a mobile device. He selects a
website that he wants to view. The mobile device sends the URL encoded request
via network to a WAP gateway using WAP protocol.
Scripts
WAE Encoded
Request Encoders Request(URL)
User and
Agent Decoders
Encoded Response
Response (Content) DB
76
The WAP gateway translates this WAP request into a conventional HTTP URL
request and sends it over the internet. The request reaches to a specified Web
server and it processes the request just as it would have processed any other
request and sends the response back to the mobile device through WAP gateway
in WML file which can be seen in the micro-browser.
WAP Protocol stack:
WTA
Web User agent
Server Response Encoded
With Response
content With
content
Encoded WML
Push & Encoded User agent
Content Push
Other Decoders Content
Connect Server
Other
WTA
Request Encoded user agent
request
WAP Applications
“At first, the most popular mobile Internet service is likely to be e-mail. SMS
(short message service) messages have proved a big success in the Nordic nations
and volumes are growing rapidly throughout western Europe”
One of the most significant advantages of Internet access from mobile rather that
your PC is the ability to instantly identify users geographic location. This opens
up a huge opportunity for highly customized services.
As Ericsson puts it,
“the content providers will know where their users are geographically and will be
able to direct them to specific destinations - restaurants or theatres, for example
handheld devices are mobile, but their position is instantly identifiable. So think
of content that knows where the user is, and offers content tailored to that
geography. Weather forecasts, restaurant locations (with table availability and
instant reservations fast food delivery, finding and booking a plumber, dating
services (with pre-recorded video profiles and e-mail or voicemail exchanges)
any service where physical proximity is important can migrate a vital part of its
value-added to the new devices.”
Some of the interesting applications of WAP (already existing or being worked
on) are:
Computer Sciences Corporation (CSC) and Nokia are working with a
Finnish fashion retailer who plans to send clothing offers direct to mobile
telephones using a combination of cursors, touch screen technology and
WAP to allow would-be shoppers to hot-link to order-entry pages on the
web.
In Finland, children already play new versions of competitive games such
as "Battleships", via the cellular networks. In the music world, Virgin
Mobile in the UK offers to download the latest pop hits to customers in a
daily offering.
Scala has developed several WAP products for small to medium-sized
companies which would allow, for example, a field sales force to access
customer order information and stock availability details via a WAP
handset.
A key growth area for the technology will be business-to-workforce, with
companies using WAP applications to reach employees at any time. Scala
is currently working on time-sheet applications and techniques for entering
and filing expense claims via the mobile phone.
Nokia says applications that will benefit from WAP include customer care
and provisioning, message notification and call management, e-mail,
mapping and location services, weather and traffic alerts, sports and
81
The mobile agents are autonomous with intelligence, social ability, learning, and
the most important feature is their mobility. They are independent in nature, self-
driven and do not require a corresponding node for communication. They can
work efficiently even after the user gets disconnected from the network.
Intelligence
Mobile Agents are capable of learning and searching for knowledge about their
domain. That's why they are called intelligent agents because they possess a
degree of domain knowledge. They can also transport their state from one
environment to another without disturbing the previous holding data and be
capable of performing appropriately in the new environment.
Autonomous
The Mobile Agents are Autonomous. It means the agents are not only motivated
by the outside actions initiated by the users or system but also they have internal
events that decided their performance and behavior. The mobile agents can also
take an autonomous decision while selecting a node.
85
Mobility
Mobile Agents contain some degree of mobility. The agent is not limited to its
home node only. They can migrate from one node to another and can carry out
tasks along with them. This feature distributes the processing and balancing of
the load. Another benefit of this capability is that when the user goes offline, the
agents will still keep functioning.
Communicative
Mobile Agents can communicate effectively with other agents, users and systems.
The mobile agents use a communication language for inter-agent communication.
USER PROGRAM
MOBILE
MOBILEAGENCY
AGENCY
Internet
Fault Tolerance
Fault Tolerance simply means a system’s ability to continue operating
uninterrupted despite the failure of one or more of its components. This is true
whether it is a computer system, a cloud cluster, a network, or something else. In
other words, fault tolerance refers to how an operating system (OS) responds to
and allows for software or hardware malfunctions and failures.
An OS’s ability to recover and tolerate faults without failing can be handled by
hardware, software, or a combined solution leveraging load balancers (see more
below). Some computer systems use multiple duplicate fault tolerant systems to
handle faults gracefully. This is called a fault tolerant network.
Web Server
Web Application
Load Balancer
Enhanced fault tolerance: a disk fails, and mirrored disks take over for it
immediately. This provides functionality despite partial system failure, or
graceful degradation, rather than an immediate breakdown and loss of
function.
High level fault tolerant computing: multiple processors collaborate to scan
data and output to detect errors, and then immediately correct them. Fault
tolerance software may be part of the OS interface, allowing the
programmer to check critical data at specific points during a transaction.
Fault-tolerant systems ensure no break in service by using backup
components that take the place of failed components automatically. These
may include:
Hardware systems with identical or equivalent backup operating systems.
For example, a server with an identical fault tolerant server mirroring all
operations in backup, running in parallel, is fault tolerant. By eliminating
single points of failure, hardware fault tolerance in the form of redundancy
can make any component or system far safer and more reliable.
Software systems backed up by other instances of software. For example,
if you replicate your customer database continuously, operations in the
primary database can be automatically redirected to the second database if
the first goes down.
Redundant power sources can help avoid a system fault if alternative
sources can take over automatically during power failures, ensuring no loss
of service.
Although both high availability and fault tolerance reference a system’s total
uptime and functionality over time, there are important differences and both
strategies are often necessary. For example, a totally mirrored system is fault-
tolerant; if one mirror fails, the other kicks in and the system keeps working with
no downtime at all. However, that’s an expensive and sometimes unwieldy
solution.
89
On the other hand, a highly available system such as one served by a load balancer
allows minimal downtime and related interruption in service without total
redundancy when a failure occurs. A system with some critical parts mirrored and
other, smaller components duplicated has a hybrid strategy.
In an organizational setting, there are several important concerns when creating
high availability and fault tolerant systems:
Cost. Fault tolerant strategies can be expensive, because they demand the
continuous maintenance and operation of redundant components. High
availability is usually part of a larger system, one of the benefits of a load
balancing solution, for example.
Downtime. The greatest difference between a fault-tolerant system and a highly
available system is downtime, in that a highly available system has some minimal
permitted level of service interruption. In contrast, a fault-tolerant system should
work continuously with no downtime even when a component fails. Even a
system with the five nines standard for high availability will experience
approximately 5 minutes of downtime annually.
Scope. High availability systems tend to share resources designed to minimize
downtime and co-manage failures. Fault tolerant systems require more, including
software or hardware that can detect failures and change to redundant components
instantly, and reliable power supply backups.
Certain systems may require a fault-tolerant design, which is why fault tolerance
is important as a basic matter. On the other hand, high availability is enough for
others. The right business continuity strategy may include both fault tolerance
and high availability, intended to maintain critical functions throughout both
minor failures and major disasters.
Fault tolerance computing also deals with outages and disasters. For this reason,
a fault tolerance strategy may include some uninterruptible power supply (UPS)
such as a generator—some way to run independently from the grid should it fail.
Byzantine fault tolerance (BFT) is another issue for modern fault tolerant
architecture. BFT systems are important to the aviation, blockchain, nuclear
power, and space industries because these systems prevent downtime even if
certain nodes in a system fail or are driven by malicious actors.
Fault tolerant design prevents security breaches by keeping your systems online
and by ensuring they are well-designed. A naively-designed system can be taken
offline easily by an attack, causing your organization to lose data, business, and
trust. Each firewall, for example, that is not fault tolerant is a security risk for
your site and organization.
91
MS2 MS2
MS4
Asymmetric link
MS3 MS5
MS7
Symmetric link
MS1
MS6
92
Advantages of MANET
The advantages of an Ad-Hoc network include the following:
They provide access to information and services regardless of geographic
position.
Independence from central network administration. Self-configuring
network, nodes are also act as routers. Less expensive as compared to wired
network.
Scalable—accommodates the addition of more nodes.
Improved Flexibility.
Robust due to decentralize administration.
The network can be set up at any place and time
93
Characteristics of MANET
Some characteristics of adhoc network are as follows:
Dynamic topologies: nodes are free to move arbitrarily; thus the network
topology may be changed randomly and unpredictably and primarily
consists of bidirectional links. In some cases where the transmission power
of two nodes is different, a unidirectional link may exist.
Bandwidth-constrained and variable capacity links: wireless links
continue to have significantly lower capacity than infrastructure networks.
Energy-constrained operation: some or all of the MSs in a MANET may
rely on batteries or other exhaustible means for their energy. For these
nodes or devices, the most important system design optimization criteria
may be energy conservation.
Limited physical security: MANETs are generally more prone to physical
security threats than wire line networks. The increased possibility of
eavesdropping, spoofing, and denial of services (DoS) attacks should be
considered carefully. To reduce security threats, many existing link
security techniques are often applied within wireless networks.
Applications of MANET
Some specific applications of ad hoc networks include industrial and commercial
applications involving cooperative mobile data exchange. There are many
existing and future military networking requirements for robust, IP-compliant
data services within mobile wireless communication networks, with many of
these networks consist of highly dynamic autonomous topology segments.
Advanced features of Mobile ad hoc networks, including data rates compatible
with multimedia applications global roaming capability, and coordination with
other network structures are enabling new applications.
Defense applications: Many defines applications require on the fly
communications set-up, and ad hoc/sensor networks are excellent
candidates for use in battlefield management.
Crisis management applications: These arise, for example, as a result of
natural disasters in which the entire communication infrastructure is in
disarray. Restoring communications quickly is essential.
Telemedicine: The paramedic assisting the victim of a traffic accident in a
remote location must access medical records (e.g. X-rays) and may need
video conference assistance from a surgeon for an emergency intervention.
In fact, the paramedic may need to instantaneously relay back to the
94
hospital the victim's X-rays and other diagnostic tests from the site of the
accident.
Tele-geoprocessing application: The combination of GPS, GIS
(Geographical Information Systems), and high-capacity wireless mobile
systems enables a new type of application referred to as tele- geo
processing.
Virtual Navigation: A remote database contains the graphical
representation of building, streets, and physical characteristics of a large
metropolis. They may also "virtually" see the internal layout of buildings,
including an emergency rescue plan, or find possible points of interest.
Education via the internet: Educational opportunities available on the
internet or remote areas because of the economic infeasibility of providing
expensive last-mile wire line internet access in these areas to all
subscribers.
Vehicular area network: This a growing and very useful application of
adhoc network in providing emergency services and other information.
This is equally effective in both urban and rural setup. The basic and
exchange necessary data that is beneficial in a given situation.
95
MANET Properties
Neighbour discovery─ One of the important characteristics of a MANET
node
Data routing abilities ─ data can be routed from a source node to a
neighbouring node
Flexible network architecture and variable routing paths ─ to provide
communication in case of the limited wireless connectivity range and
resource constraints
Flexibility─ enables fast establishment of networks
When a new network is to be established, the only requirement is to provide
a new set of nodes with limited wireless communication range
A node has limited capability, that is, it can connect only to the nodes
which are nearby and thus consumes limited power
Peer-to-Peer connectivity
Decentralization of Computations independent computational, switching
(or routing), and communication capabilities
Limited wireless connectivity range require that a node should move in the
vicinity of at least one nearby node within the wireless communication
range, else the node should be provided with the access-point of wired
communication
Weak connectivity and remote server latency
Unreliable links to base station or gateway ─ failure of an intermediate
node results in greater latency in communicating with the remote server
Resource constraints─ Limited bandwidth available between two
intermediate nodes
Node may have limited power and thus computations need to be energy-
efficient
No need of access-point
Only selected access-points provided for
connection to other networks or other MANETs
Need to solve exposed or hidden terminal problem
Diversity in nodes─ iPods, palm handheld computers, Smartphones,
PCs,smart labels, smart sensors, and automobile-embedded systems
Protocol diversity─ Nodes can use different protocols, for example, IrDA,
Bluetooth, ZigBee, 802.11, GSM, or TCP/IP
Data caching, saving, and aggregation at node
96