Mobile Computing Unit 2
Mobile Computing Unit 2
1. Wireless LAN
Wireless LAN (WLAN) technology provides internet access within a building or a limited outdoor area.
First used within offices and homes, WLAN technology is now also used in stores and restaurants.
The use of home networks greatly increased as the COVID-19 pandemic forced office workers, students,
teachers and others to work and study from home.Most home network designs are simple. A modem
connects to the cable or fiber from a local service provider. A wireless router is connected to the modem
and receives the signal from the modem. The router also serves as the wireless access point (AP), which
then broadcasts using a wireless protocol, such as the 802.11 standards.Office networks are more
complicated. APs are usually mounted on the ceiling, with each broadcasting a wireless signal to the
surrounding area. Multiple APs are required in large offices, each connecting to the office backbone
network via a wired connection to a switch. APs coordinate support for users walking through the office
area and hand off support to maintain open, connected sessions from AP to AP.
THIS ARTICLE IS PART OF
What is wireless communications? Everything you need to know
Which also includes:
A history of wireless for business and a look forward
Wireless network capacity planning and requirements
12 types of wireless network attacks and how to prevent them
2. Wireless MAN
Wireless metropolitan area networks have been installed in cities worldwide to provide access for people
outside an office or home network. These networks cover a wider area than office or home networks, but
the principles are the same. APs are located on the sides of buildings or on telephone poles throughout the
covered area. APs are connected to the internet via a wired network and broadcast a wireless signal
throughout the area. Users connect to their desired destination by connecting to the nearest AP, which
forwards the connection through its internet connection.
Introduction to Wireless LAN
Wireless LAN stands for Wireless Local Area Network. It is also called LAWN (Local Area Wireless
Network). WLAN is one in which a mobile user can connect to a Local Area Network (LAN) through a
wireless connection.
The IEEE 802.11 group of standards defines the technologies for wireless LANs. For path sharing, 802.11
standard uses the Ethernet protocol and CSMA/CA (carrier sense multiple access with collision
avoidance). It also uses an encryption method i.e. wired equivalent privacy algorithm.
Wireless LANs provide high speed data communication in small areas such as building or an office.
WLANs allow users to move around in a confined area while they are still connected to the network.
In some instance wireless LAN technology is used to save costs and avoid laying cable, while in other
cases, it is the only option for providing high-speed internet access to the public. Whatever the reason,
wireless solutions are popping up everywhere.
Examples of WLANs that are available today are NCR's waveLAN and Motorola's ALTAIR.
Advantages of WLANs
o Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio
waves can penetrate walls, senders and receivers can be placed anywhere (also non-visible, e.g.,
within devices, in walls etc.).
o Planning: Only wireless ad-hoc networks allow for communication without previous planning,
any wired network needs wiring plans.
o Design: Wireless networks allow for the design of independent, small devices which can for
example be put into a pocket. Cables not only restrict users but also designers of small notepads,
PDAs, etc.
o Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc. whereas,
networks requiring a wired infrastructure will usually break down completely in disasters.
o Cost: The cost of installing and maintaining a wireless LAN is on average lower than the cost of
installing and maintaining a traditional wired LAN, for two reasons. First, after providing
wireless access to the wireless network via an access point for the first user, adding additional
users to a network will not increase the cost. And second, wireless LAN eliminates the direct
costs of cabling and the labor associated with installing and repairing it.
o Ease of Use: Wireless LAN is easy to use and the users need very little new information to take
advantage of WLANs.
Disadvantages of WLANs
o Quality of Services: Quality of wireless LAN is typically lower than wired networks. The main
reason for this is the lower bandwidth due to limitations is radio transmission, higher error rates
due to interference and higher delay/delay variation due to extensive error correction and
detection mechanisms.
o Proprietary Solutions: Due to slow standardization procedures, many companies have come up
with proprietary solutions offering standardization functionality plus many enhanced features.
Most components today adhere to the basic standards IEEE 802.11a or 802.11b.
o Restrictions: Several govt. and non-govt. institutions world-wide regulate the operation and
restrict frequencies to minimize interference.
o Global operation: Wireless LAN products are sold in all countries so, national and international
frequency regulations have to be considered.
o Low Power: Devices communicating via a wireless LAN are typically power consuming, also
wireless devices running on battery power. Whereas the LAN design should take this into account
and implement special power saving modes and power management functions.
o License free operation: LAN operators don't want to apply for a special license to be able to use
the product. The equipment must operate in a license free band, such as the 2.4 GHz ISM band.
o Robust transmission technology: If wireless LAN uses radio transmission, many other electrical
devices can interfere with them (such as vacuum cleaner, train engines, hair dryers, etc.).Wireless
LAN transceivers cannot be adjusted for perfect transmission is a standard office or production
environment.
WIRELESS MAC ISSUES
Smaller packets
Forward Error Correcting Codes
Retransmissions (Acks)
Exposed Nodes: Even if the medium is busy near the transmitter, it may be free near the intended
receiver
Capture: Capture occurs when a receiver can cleanly receive a transmission from one of
two simultaneous transmissions
Hidden Node/Terminal Problem
A hidden node is one that is within the range of the intended destination but out of range of sender Node
B can communicate with A and C both A and C cannot hear each other When A transmits to B, C cannot
detect the transmission using the carrier sense mechanism C falsely thinks that the channel is idle
Exposed Nodes
An exposed node is one that is within the range of the sender but out of range of destination .when a
node‘s received signal strength drops below a certain threshold the node is said to be in
fade .Handshaking is widely used strategy to ensure the link quality is good enough for data
communication. A successful handshake between a sender and a receiver (small message) indicates a
good communication link.
In theory C can therefore have a parallel transmission with any node that cannot hear the transmission
from B, i.e. out of range of B. But C will not transmit to any node because its an exposed node. Exposed
nodes waste bandwidth.
Capture
Capture is said to occur when a receiver can cleanly receive a transmission from one of two simultaneous
transmissions both within its range Assume node A and D transmit simultaneously to B. The signal
strength received from D is much higher than that from A
Use this
chart to compare the major differences among WLANs, WMANs, WPANs and WWANs.
3. Wireless PAN
Wireless personal area networks cover a very limited area -- typically a maximum of 100 meters for most
applications -- using protocols like Bluetooth and Zigbee. Bluetooth enables hands-free phone calls,
connects a phone to earpieces or transmits signals between smart devices. Zigbee connects stations along
an IoT network. Infrared technology is limited to line of sight, such as connecting TV remotes to
televisions.
Wireless developers have constantly improved technology by discovering new ways to transmit signals to
users. These advances enable higher data rates and increasing range for each of these wireless
technologies.
4. Wireless WAN
Wireless WANs use cellular technology to provide access outside the range of a wireless LAN or
metropolitan network. These networks enable users to make phone calls to others. WANs can support
either speech or data transfer using the same technology. Users can also connect to the internet to access
websites or server-based applications.
IEEE 802.11 Standards For WLAN
IEEE is basically used for WLAN i.e wireless local area network. It provides time bounded and
asynchronous services for different downloading and uploading speed with time limitation. This is
the standard protocol used all over the world. 802.11 comes under the most popular IEEE specification
for wireless LAN. It covers the physical and data link layers. This post includes Wireless
Communication Notes on IEEE 802.11 Standards for WLAN for the students to provide a help for
Communication students to perform well in their exams and interviews.
802.x belongs to different families of IEEE protocol where x denotes types of services. Different
protocols used for different services are
802.15 is used for bluetooth.
802.16 is used for Wi-Max.
IEEE 802.11 defines two types of services which are
1) Basic Service Set (BSS)
2) Extended Service Set (ESS)
Basic Service Set (BSS): IEEE 802.11 has defined the BSS as the basic building block of wireless LAN.
A BSS is made of stationary or moving wireless stations and a central base station called as the access
point (AP).
BSS can exist with and without AP. BSS without access point cannot send data to another BSS. So, it is
known as a stand alone network or ad hoc architecture. In this type of architecture stations can form a
network without using AP.
Extended Service Set (ESS): An extended service set consists of two or more BSSs with access points.
The BSS in this system are connected to each other via a distribution system which is generally a wired
LAN. The distribution system connects the access points to each other. The distribution system can be
any type LAN such as Ethernet. thus ESS contains two types of station:
Mobile Stations
Stationary of non-moving stations
Out of these, the non-moving stations are the access points which are a part of the wired LAN whereas
the mobile stations are those contained in the BSS. The BSSs are connected to each other to form a
network called infrastructure network. In such networks the station close to each other can communicate
taking help of access points.
But if two stations are located in two different BSS wish to communicate with each other, than they have
to do do through access points. This type of communication is very similar to that in the cellular
communication. The BSS acts as a cell and AP as base station.
Types of Stations in ESS are as follow:
There are three types of stations are defined by IEEE 802.11 depending on their mobility in the wireless
LAN as
1) No transition Mobility : It is defined as a station which is non-moving (stationary) or moving only
inside a BSS.
2) BSS Transition Mobility : A station having BSS transition mobility is the one which can move from
BSS to another but does not move outside one ESS.
3) ESS transition Mobility : A station having ESS transition mobility is the one which can move from
one ESS to another. But IEEE 802.11 does not guarantee communication when the station is moving.
IEEE 802.11 Architecture
The components of an IEEE 802.11 architecture are as follows −
Stations (STA) − Stations comprises of all devices and equipment that are connected to the wireless
LAN. A station can be of two types−
o Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless
routers that form the base stations or access.
o Client. Clients are workstations, computers, laptops, printers, smartphones, etc.
Each station has a wireless network interface controller.
Basic Service Set (BSS) − A basic service set is a group of stations communicating at the physical
layer level. BSS can be of two categories depending upon the mode of operation−
o Infrastructure BSS − Here, the devices communicate with other devices through access points.
o Independent BSS − Here, the devices communicate in a peer-to-peer basis in an ad hoc manner.
Extended Service Set (ESS) − It is a set of all connected BSS.
Distribution System (DS) − It connects access points in ESS.
Frame Format of IEEE 802.11
The main fields of a frame of wireless LANs as laid down by IEEE 802.11 are −
Frame Control − It is a 2 bytes starting field composed of 11 subfields. It contains control
information of the frame.
Duration − It is a 2-byte field that specifies the time period for which the frame and its
acknowledgment occupy the channel.
Address fields − There are three 6-byte address fields containing addresses of source, immediate
destination, and final endpoint respectively.
Sequence − It a 2 bytes field that stores the frame numbers.
Data − This is a variable-sized field that carries the data from the upper layers. The maximum size
of the data field is 2312 bytes.
Check Sequence − It is a 4-byte field containing error detection information.
field.
Frame Control(FC) – It is 2 bytes long field which defines type of frame and some control
information. Various fields present in FC are:
1. Version: It is a 2 bit long field which indicates the current protocol version which is fixed to be 0
for now.
2. Type: It is a 2 bit long field which determines the function of frame i.e management(00),
control(01) or data(10). The value 11 is reserved.
3. Subtype: It is a 4 bit long field which indicates sub-type of the frame like 0000 for association
request, 1000 for beacon.
4. To DS: It is a 1 bit long field which when set indicates that destination frame is for DS(distribution
system).
5. From DS: It is a 1 bit long field which when set indicates frame coming from DS.
6. More frag (More fragments): It is 1 bit long field which when set to 1 means frame is followed by
other fragments.
7. Retry: It is 1-bit long field, if the current frame is a retransmission of an earlier frame, this bit is set
to 1.
8. Power Mgmt (Power management): It is 1-bit long field that indicates the mode of a station after
successful transmission of a frame. Set to 1 the field indicates that the station goes into power-save
mode. If the field is set to 0, the station stays active.
9. More data: It is 1-bit long field that is used to indicate receiver that a sender has more data to send
than the current frame. This can be used by an access point to indicate to a station in power-save
mode that more packets are buffered or it can be used by a station to indicate to an access point after
being polled that more polling is necessary as the station has more data ready to transmit.
10. WEP: It is 1 bit long field which indicates that the standard security mechanism of 802.11 is
applied.
11. Order: It is 1 bit long field, if this bit is set to 1 the received frames must be processed in strict
order.
Duration/ID – It is 4 bytes long field which contains the value indicating the period of time in which
the medium is occupied(in µs).
Address 1 to 4 – These are 6 bytes long fields which contain standard IEEE 802 MAC addresses (48
bit each). The meaning of each address depends on the DS bits in the frame control field.
SC (Sequence control) – It is 16 bits long field which consists of 2 sub-fields, i.e., Sequence number
(12 bits) and Fragment number (4 bits). Since acknowledgement mechanism frames may be duplicated
hence, a sequence number is used to filter duplicate frames.
Data – It is a variable length field which contain information specific to individual frames which is
transferred transparently from a sender to the receiver(s).
CRC (Cyclic redundancy check) – It is 4 bytes long field which contains a 32 bit CRC error detection
sequence to ensure error free frame.
features of the IEEE 802.11 MAC frame:
Frame Control Field: The frame control field contains information about the type of frame, the data rate,
and the power management status.
Duration Field: The duration field specifies the length of time that the channel will be occupied by the
transmission.
Address Fields: The address fields specify the source and destination MAC addresses of the Wi-Fi
devices involved in the communication.
Sequence Control Field: The sequence control field is used to identify and manage the transmission
sequence of the frames.
Frame Body: The frame body contains the actual data being transmitted between Wi-Fi devices, such as
IP packets, TCP segments, or UDP datagrams.
Frame Check Sequence: The frame check sequence (FCS) is used to check the integrity of the data
transmitted in the frame and to detect any transmission errors.
Management, Control, and Data Frames: The IEEE 802.11 MAC frame defines three types of frames:
management frames, control frames, and data frames. Management frames are used for network
management, control frames are used for coordination between Wi-Fi devices, and data frames are used
for the transmission of actual data.
Fragmentation: The IEEE 802.11 MAC frame supports fragmentation, which allows large data packets
to be divided into smaller fragments for transmission.
Acknowledgments: The IEEE 802.11 MAC frame uses acknowledgments to confirm the successful
transmission of frames and to request the retransmission of any frames that were not successfully
received.
• All communication is between master and a slave. Salve-slave communication is not possible.
• In addition to seven active slave station, a piconet can have up to 255 parked nodes. These parked
nodes are secondary or slave stations and cannot take part in communication until it is moved from
parked state to active state.
2.Scatternet
1. Access Code: It is 72 bit field that contains synchronization bits. It identifies the master.
2. Header: This is 54-bit field. It contain 18 bit pattern that is repeated for 3 time.
The header field contains following sub-fields:
(i) Address: This 3 bit field can define up to seven slaves (1 to 7). If the address is zero, it is used for
broadcast communication from primary to all secondaries.
(ii)Type: This 4 bit field identifies the type of data coming from upper layers.
(iii) F: This flow bit is used for flow control. When set to 1, it means the device is unable to receive
more frames.
(iv) A: This bit is used for acknowledgement.
(v) S: This bit contains a sequence number of the frame to detect re-transmission. As stop and wait
protocol is used, one bit is sufficient.
(vi) Checksum: This 8 bit field contains checksum to detect errors in header.
3. Data: This field can be 0 to 2744 bits long. It contains data or control information coming from upper
layers
the types of multiple access protocol that is subdivided into the different process as:
A. Random Access Protocol
In this protocol, all the station has the equal priority to send the data over a channel. In random access
protocol, one or more stations cannot depend on another station nor any station control another station.
Depending on the channel's state (idle or busy), each station transmits the data frame. However, if more
than one station sends the data over a channel, there may be a collision or data conflict. Due to the
collision, the data frame packets may be lost or changed. And hence, it does not receive by the receiver
end.
Following are the different methods of random-access protocols for broadcasting frames on the channel.
o Aloha
o CSMA
o CSMA/CD
o CSMA/CA
ALOHA Random Access Protocol
It is designed for wireless LAN (Local Area Network) but can also be used in a shared medium to
transmit data. Using this method, any station can transmit data across a network simultaneously when a
data frameset is available for transmission.
Aloha Rules
1. Any station can transmit data to a channel at any time.
2. It does not require any carrier sensing.
3. Collision and data frames may be lost during the transmission of data through multiple stations.
4. Acknowledgment of the frames exists in Aloha. Hence, there is no collision detection.
5. It requires retransmission of data after some random amount of time.
Pure Aloha
Whenever data is available for sending over a channel at stations, we use Pure Aloha. In pure Aloha,
when each station transmits data to a channel without checking whether the channel is idle or not, the
chances of collision may occur, and the data frame can be lost. When any station transmits the data frame
to a channel, the pure Aloha waits for the receiver's acknowledgment. If it does not acknowledge the
receiver end within the specified time, the station waits for a random amount of time, called the backoff
time (Tb). And the station may assume the frame has been lost or destroyed. Therefore, it retransmits the
frame until all the data are successfully transmitted to the receiver.
1. The total vulnerable time of pure Aloha is 2 * Tfr.
2. Maximum throughput occurs when G = 1/ 2 that is 18.4%.
3. Successful transmission of data frame is S = G * e ^ - 2 G.
As we can see in the figure above, there are four stations for accessing a shared channel and transmitting
data frames. Some frames collide because most stations send their frames at the same time. Only two
frames, frame 1.1 and frame 2.2, are successfully transmitted to the receiver end. At the same time, other
frames are lost or destroyed. Whenever two frames fall on a shared channel simultaneously, collisions can
occur, and both will suffer damage. If the new frame's first bit enters the channel before finishing the last
bit of the second frame. Both frames are completely finished, and both stations must retransmit the data
frame.
Slotted Aloha
The slotted Aloha is designed to overcome the pure Aloha's efficiency because pure Aloha has a very
high possibility of frame hitting. In slotted Aloha, the shared channel is divided into a fixed time interval
called slots. So that, if a station wants to send a frame to a shared channel, the frame can only be sent at
the beginning of the slot, and only one frame is allowed to be sent to each slot. And if the stations are
unable to send data to the beginning of the slot, the station will have to wait until the beginning of the slot
for the next time. However, the possibility of a collision remains when trying to send a frame at the
beginning of two or more station time slot.
1. Maximum throughput occurs in the slotted Aloha when G = 1 that is 37%.
2. The probability of successfully transmitting the data frame in the slotted Aloha is S = G * e ^ - 2
G.
3. The total vulnerable time required in slotted Aloha is Tfr.
CSMA/ CD
It is a carrier sense multiple access/ collision detection network protocol to transmit data frames. The
CSMA/CD protocol works with a medium access control layer. Therefore, it first senses the shared
channel before broadcasting the frames, and if the channel is idle, it transmits a frame to check whether
the transmission was successful. If the frame is successfully received, the station sends another frame. If
any collision is detected in the CSMA/CD, the station sends a jam/ stop signal to the shared channel to
terminate data transmission. After that, it waits for a random time before sending a frame to a channel.
CSMA/ CA
It is a carrier sense multiple access/collision avoidance network protocol for carrier transmission of
data frames. It is a protocol that works with a medium access control layer. When a data frame is sent to a
channel, it receives an acknowledgment to check whether the channel is clear. If the station receives only
a single (own) acknowledgments, that means the data frame has been successfully transmitted to the
receiver. But if it gets two signals (its own and one more in which the collision of frames), a collision of
the frame occurs in the shared channel. Detects the collision of the frame when a sender receives an
acknowledgment signal.
Following are the methods used in the CSMA/ CA to avoid the collision:
Interframe space: In this method, the station waits for the channel to become idle, and if it gets the
channel is idle, it does not immediately send the data. Instead of this, it waits for some time, and this time
period is called the Interframe space or IFS. However, the IFS time is often used to define the priority of
the station.
Contention window: In the Contention window, the total time is divided into different slots. When the
station/ sender is ready to transmit the data frame, it chooses a random slot number of slots as wait time.
If the channel is still busy, it does not restart the entire process, except that it restarts the timer only to
send data packets when the channel is inactive.
Acknowledgment: In the acknowledgment method, the sender station sends the data frame to the shared
channel if the acknowledgment is not received ahead of time.
B. Controlled Access Protocol
It is a method of reducing data frame collision on a shared channel. In the controlled access method, each
station interacts and decides to send a data frame by a particular station approved by all other stations. It
means that a single station cannot send the data frames unless all other stations are not approved. It has
three types of controlled access: Reservation, Polling, and Token Passing.
C. Channelization Protocols
It is a channelization protocol that allows the total usable bandwidth in a shared channel to be shared
across multiple stations based on their time, distance and codes. It can access all the stations at the same
time to send the data frames to the channel.
Following are the various methods to access the channel based on their time, distance and codes:
1. FDMA (Frequency Division Multiple Access)
2. TDMA (Time Division Multiple Access)
3. CDMA (Code Division Multiple Access)
FDMA
It is a frequency division multiple access (FDMA) method used to divide the available bandwidth into
equal bands so that multiple users can send data through a different frequency to the subchannel. Each
station is reserved with a particular band to prevent the crosstalk between the channels and interferences
of stations.
TDMA
Time Division Multiple Access (TDMA) is a channel access method. It allows the same frequency
bandwidth to be shared across multiple stations. And to avoid collisions in the shared channel, it divides
the channel into different frequency slots that allocate stations to transmit the data frames. The
same frequency bandwidth into the shared channel by dividing the signal into various time slots to
transmit it. However, TDMA has an overhead of synchronization that specifies each station's time slot by
adding synchronization bits to each slot.
CDMA
The code division multiple access (CDMA) is a channel access method. In CDMA, all stations can
simultaneously send the data over the same channel. It means that it allows each station to transmit the
data frames with full frequency on the shared channel at all times. It does not require the division of
bandwidth on a shared channel based on time slots. If multiple stations send data to a channel
simultaneously, their data frames are separated by a unique code sequence. Each station has a different
unique code for transmitting the data over a shared channel. For example, there are multiple users in a
room that are continuously speaking. Data is received by the users if only two-person interact with each
other using the same language. Similarly, in the network, if different stations communicate with each
other simultaneously with different code language.
Layers in the TCP/IP Suite
The four layers of the TCP/IP model are the host-to-network layer, internet/network layer, transport layer
and the application layer. The purpose of each layer in the TCP/IP protocol suite is detailed below.
Emergency
Following services can be provided during emergencies:
o Video communication: Responders often need to share vital information. The transmission of
real time situations of video could be necessary. A typical scenario includes the transmission of
live video footage from a disaster area to the nearest fire department, to the police station or to the
near NGOs etc.
o Push To Talk (PTT): PTT is a technology which allows half duplex communication between
two users where switching from voice reception mode to the transmit mode takes place with the
use of a dedicated momentary button. It is similar to walkie-talkie.
o Audio/Voice Communication: This communication service provides full duplex audio channels
unlike PTT. Public safety communication requires novel full duplex speech transmission services
for emergency response.
o Real Time Text Messaging (RTT): Text messaging (RTT) is an effective and quick solution for
sending alerts in case of emergencies. Types of text messaging can be email, SMS and instant
message.
Business
Travelling Salesman
o Directly access to customer files stored in a central location.
o Consistent databases for all agents
o Mobile office
o To enable the company to keep track of all the activities of their travelling employees.
In Office
o Wi-Fi wireless technology saves businesses or companies a considerable amount of money on
installations costs.
o There is no need to physically setup wires throughout an office building, warehouse or store.
o Bluetooth is also a wireless technology especially used for short range that acts as a complement
to Wi-Fi. It is used to transfer data between computers or cellphones.
Transportation Industries
o In transportation industries, GPS technology is used to find efficient routes and tracking vehicles.
Replacement of Wired Network
o Wireless network can also be used to replace wired network. Due to economic reasons it is often
impossible to wire remote sensors for weather forecasts, earthquake detection, or to provide
environmental information, wireless connections via satellite, can help in this situation.
o Tradeshows need a highly dynamic infrastructure, since cabling takes a long time and frequently
proves to be too inflexible.
o Many computers fairs use WLANs as a replacement for cabling.
o Other cases for wireless networks are computers, sensors, or information displays in historical
buildings, where excess cabling may destroy valuable walls or floors.
Location dependent service
It is important for an application to know something about the location because the user might need
location information for further activities. Several services that might depend on the actual location can
be described below:
Follow-on Services:
o Location aware services: To know about what services (e.g. fax, printer, server, phone, printer
etc.) exist in the local environment.
o Privacy: We can set the privacy like who should get knowledge about the location.
o Information Services: We can know about the special offers in the supermarket. Nearest hotel,
rooms, cabs etc.
Infotainment: (Entertainment and Education)
o Wireless networks can provide information at any appropriate location.
o Outdoor internet access.
o You may choose a seat for movie, pay via electronic cash, and send this information to a service
provider.
o Ad-hoc network is used for multiuser games and entertainment.
Mobile and Wireless devices
Even though many mobile and wireless devices are available, there will be many more devices in the
future. There is no precise classification of such devices, by sizes, shape, weight, or computing power.
The following list of given examples of mobile and wireless devices graded by increasing performance
(CPU, memory, display, input devices, etc.)
Sensor: Wireless device is represented by a sensor transmitting state information. 1 example could be a
switch, sensing the office door. If the door is closed, the switch transmits this information to the mobile
phone inside the office which will not accept incoming calls without user interaction; the semantics of a
closed door is applied to phone calls.
Embedded Controller: Many applications already contain a simple or sometimes more complex
controller. Keyboards, mouse, headsets, washing machines, coffee machines, hair dryers and TV sets are
just some examples.
Pager: As a very simple receiver, a pager can only display short text messages, has a tiny display, and
cannot send any messages.
Personal Digital Assistant: PDAs typically accompany a user and offer simple versions of office
software (calendar, notepad, mail). The typically input device is a pen, with built-in character recognition
translating handwriting into characters. Web browsers and many other packages are available for these
devices.
Pocket computer: The next steps towards full computers are pocket computers offering tiny keyboards,
color displays, and simple versions of programs found on desktop computers (text processing,
spreadsheets etc.)
Notebook/laptop: Laptops offer more or less the same performance as standard desktop computers; they
use the same software - the only technical difference being size, weight, and the ability to run on a
battery. If operated mainly via a sensitive display (touch sensitive or electromagnetic), the device are also
known as notepads or tablet PCs.
Broadcasting in computer network is a group communication, where a sender sends data to receivers
simultaneously. This is an all − to − all communication model where each sending device transmits data
to all other devices in the network domain.
The ways of operation of broadcasting may be −
A high level operation in a program, like broadcasting in Message Passing Interface.
A low level networking operation, like broadcasting on Ethernet.
Broadcasting is shown in the following figure −
Advantages of Broadcasting
Broadcast helps to attain economies of scale when a common data stream needs to be delivered to all, by
minimizing the communication and processing overhead. It ensures better utilization of resources and
faster delivery in comparison to several unicast communication.
Disadvantages of Broadcasting
Broadcasting cannot accommodate a very large amount of devices. Also it does not allow personalisation
of the messages according to the individual preferences of the devices.
Mobile IP
This is an IETF (Internet Engineering Task Force) standard communications protocol designed to
allow mobile devices' (such as laptop, PDA, mobile phone, etc.) users to move from one network to
another while maintaining their permanent IP (Internet Protocol) address.
Defined in RFC (Request for Comments) 2002, mobile IP is an enhancement of the internet protocol (IP)
that adds mechanisms for forwarding internet traffic to mobile devices (known as mobile nodes) when
they are connecting through other than their home network.
The following case shows how a datagram moves from one point to another within the Mobile IP
framework.
o First of all, the internet host sends a datagram to the mobile node using the mobile node's home
address (normal IP routing process).
o If the mobile node (MN) is on its home network, the datagram is delivered through the normal IP
(Internet Protocol) process to the mobile node. Otherwise the home agent picks up the datagram.
o If the mobile node (MN) is on foreign network, the home agent (HA) forwards the datagram to
the foreign agent.
o The foreign agent (FA) delivers the datagram to the mobile node.
o Datagrams from the MN to the Internet host are sent using normal IP routing procedures. If the
mobile node is on a foreign network, the packets are delivered to the foreign agent. The FA
forwards the datagram to the Internet host.
In the case of wireless communications, the above illustrations depict the use of wireless transceivers to
transmit the datagrams to the mobile node. Also, all datagrams between the Internet host and the MN use
the mobile node's home address regardless of whether the mobile node is on a home or foreign network.
The care-of address (COA) is used only for communication with mobility agents and is never seen by the
Internet host.
Components of Mobile IP
The mobile IP has following three components as follows:
1. Mobile Node (MN)
The mobile node is an end system or device such as a cell phone, PDA (Personal Digital assistant), or
laptop whose software enables network roaming capabilities.
2. Home Agent (HA)
The home agent provides several services for the mobile node and is located in the home network. The
tunnel for packets towards the mobile node starts at home agent. The home agent maintains a location
registry, i.e. it is informed of the mobile node's location by the current COA (care of address). Following
alternatives for the implementation of an HA exist.
o Home agent can be implemented on a router that is responsible for the home network. This is
obviously the best position, because without optimization to mobile IP, all packets for the MN
have to go through the router anyway.
o If changing the router's software is not possible, the home agent could also be implemented on
an arbitrary node in the subset. One biggest disadvantage of this solution is the double crossing
of the router by the packet if the MN is in a foreign network. A packet for the mobile node comes
in via the router; the HA sends it through the tunnel which again crosses the router.
3. Foreign Agent (FA)
The foreign agent can provide several services to the mobile node during its visit to the foreign network.
The FA can have the COA (care or address) acting as a tunnel endpoint and forwarding packets to the
MN. The foreign agent can be the default router for the MN.
Foreign agent can also provide security services because they belong to the foreign network as opposed to
the MN which is only visiting.
In short, FA is a router that may function as the point of attachment for the mobile node when it roams to
a foreign network delivers packets from the home agent to the mobile node.
4. Care of Address (COA)
The Care- of- address defines the current location of the mobile node from an IP point of view. All IP
packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet
delivery toward the mobile node is done using a tunnel. To be more precise, the COA marks the endpoint
of the tunnel, i.e. the address where packets exit the tunnel.
There are two different possibilities for the location of the care of address:
1. Foreign Agent COA: The COA could be located at the foreign agent, i.e. the COA is an IP
address of the foreign agent. The foreign agent is the tunnel endpoint and forwards packets to the
MN. Many MN using the FA can share this COA as common COA.
2. Co-located COA: The COA is co-located if the MN temporarily acquired an additional IP
address which acts as a COA. This address is now topologically correct, and the tunnel endpoint
is at the mobile node. Co-located address can be acquired using services such as DHCP. One
problem associated with this approach is need for additional addresses if MNs request a COA.
This is not always a good idea considering the scarcity of IPv4 addresses.
5. Correspondent Node (CN)
At least one partner is needed for communication. The correspondent node represents this partner for the
MN. The correspondent node can be a fixed or mobile node.
6. Home Network
The home network is the subset the MN belongs to with respect to its IP address. No mobile IP support is
needed within this network.
7. Foreign network
The foreign network is the current subset the MN visits and which is not the home network.
Process of Mobile IP
The mobile IP process has following three main phases, which are:
1. Agent Discovery
During the agent discovery phase the HA and FA advertise their services on the network by using the
ICMP router discovery protocol (IROP).
Mobile IP defines two methods: agent advertisement and agent solicitation which are in fact router
discovery methods plus extensions.
o Agent advertisement: For the first method, FA and HA advertise their presence periodically
using special agent advertisement messages. These messages advertisement can be seen as a
beacon broadcast into the subnet. For this advertisement internet control message protocol
(ICMP) messages according to RFC 1256, are used with some mobility extensions.
o Agent solicitation: If no agent advertisements are present or the inter arrival time is too high, and
an MN has not received a COA, the mobile node must send agent solicitations. These
solicitations are again bases on RFC 1256 for router solicitations.
2. Registration
The main purpose of the registration is to inform the home agent of the current location for correct
forwarding of packets.
Registration can be done in two ways depending on the location of the COA.
o If the COA is at the FA, the MN sends its registration request containing the COA to the FA
which is forwarding the request to the HA. The HA now set up a mobility binding containing the
mobile node's home IP address and the current COA.
Additionally, the mobility biding contains the lifetime of the registration which is negotiated during the
registration process. Registration expires automatically after the lifetime and is deleted; so a mobile node
should register before expiration. After setting up the mobility binding, the HA send a reply message back
to the FA which forwards it to the MN.
o If the COA is co-located, registration can be very simpler. The mobile node may send the
request directly to the HA and vice versa. This by the way is also the registration procedure for
MNs returning to their home network.
3. Tunneling
A tunnel is used to establish a virtual pipe for data packets between a tunnel entry and a tunnel endpoint.
Packets which are entering in a tunnel are forwarded inside the tunnel and leave the tunnel unchanged.
Tunneling, i.e., sending a packet through a tunnel is achieved with the help of encapsulation.
Tunneling is also known as "port forwarding" is the transmission and data intended for use only within a
private, usually corporate network through a public network.
Wireless Application Protocol (WAP) in Mobile Computing
Wireless Application Protocol or WAP is a programming model or an application environment and set of
communication protocols based on the concept of the World Wide Web (WWW), and its hierarchical
design is very much similar to TCP/IP protocol stack design. See the most prominent features of Wireless
Application Protocol or WAP in Mobile Computing:
o WAP is a De-Facto standard or a protocol designed for micro-browsers, and it enables the mobile
devices to interact, exchange and transmit information over the Internet.
o WAP is based upon the concept of the World Wide Web (WWW), and the backend functioning
also remains similar to WWW, but it uses the markup language Wireless Markup Language
(WML) to access the WAP services while WWW uses HTML as a markup language. WML is
defined as XML 1.0 application.
o In 1998, some giant IT companies such as Ericson, Motorola, Nokia and Unwired Planet founded
the WAP Forum to standardize the various wireless technologies via protocols.
o After developing the WAP model, it was accepted as a wireless protocol globally capable of
working on multiple wireless technologies such as mobile, printers, pagers, etc.
o In 2002, by the joint efforts of the various members of the WAP Forum, it was merged with
various other forums of the industry and formed an alliance known as Open Mobile Alliance
(OMA).
o WAP was opted as a De-Facto standard because of its ability to create web applications for
mobile devices.
Working of Wireless Application Protocol or WAP Model
The following steps define the working of Wireless Application Protocol or WAP Model:
o The WAP model consists of 3 levels known as Client, Gateway and Origin Server.
o When a user opens the browser in his/her mobile device and selects a website that he/she wants to
view, the mobile device sends the URL encoded request via a network to a WAP gateway using
WAP protocol.
o The request he/she sends via mobile to WAP gateway is called as encoding request.
o The sent encoding request is translated through WAP gateway and then forwarded in the form of
a conventional HTTP URL request over the Internet.
o When the request reaches a specified Web server, the server processes the request just as it would
handle any other request and sends the response back to the mobile device through WAP
gateway.
o Now, the WML file's final response can be seen in the browser of the mobile users.
As shown in the image above (Protocol Stack Architecture), a protocol stack is created by dividing a
protocol into n-multiple layers. In each layer, two entities communicate with each other using the
appropriate protocol for that layer. They do this by exchanging data units through a channel that connects
them.
Each of the protocols fulfills a portion of the overall Protocol’s functionality.
Peer-to-Peer Protocol
Protocols in a protocol stack are said to be peer-to-peer protocols.
This means that the protocol operates between two entities that are peers, at each layer.
For example, a protocol entity in the nth layer can only exchange data units with its peer entity at the
same level, according to the protocol of that layer.
Virtual Channels + 1 Real channel
As can be seen in the image below (Application Data Transfer through a Protocol Stack), the protocol
entities in the lowest level communicate with each other using a real channel. This channel is also called a
physical channel. The channels of the higher layers are virtual channels.
Since the higher layer’s channels are virtual, their messages (PDUs) must be transferred from a higher
layer to the one beneath it until the PDUs reach the physical layer. The physical layer will then be able to
transmit the messages through the real/physical channel.
User Data Transfer Through A Protocol Stack
The highest layer in the protocol stack is called the application layer because it interacts with the user,
while the lowest layer is called the physical layer because it has a real channel as opposed to virtual
channels used by higher layers.
The journey of the user data from device A to device B begins as follows:
1. The user of device A(also called an initiator) uses the application on that device to ask the n-th layer
protocol entity to transfer data to the application at the recipient side.
2. The n-th layer protocol entity adds its control information (PCI) to the data and passes the n-PDU
message to the next layer down.
3. The (n-1)th layer entity executes a similar action…
4. Data that were generated by the application at the initiator side are thus passed down from one layer to
the next lower layer, while each layer adds its own control information to the data.
5. When the data and control information added by all the layers reach the physical layer, it is all
transferred through the physical channel to the recipient side.
6. On the recipient side, data flows up from one layer to the next higher layer. The protocol entity in each
layer analyzes control information that was generated by its peer at the transmitting side. If everything
goes well, the protocol entity passes user data it sees to the entity in the next higher layer.
7. This process is repeated until the data originally sent by the initiating application arrives at the
application on the recipient side.
WAP - Environment
Wireless Application Environment (WAE), the uppermost layer in the WAP stack, provides an
environment that enables a wide range of applications to be used on the wireless devices. We have earlier
discussed about the WAP WAE programming model. In this chapter, we will focus on the various
components of WAE.
Components of WAE
Addressing Model
A syntax suitable for naming resources stored on servers. WAP use the same addressing model as the one
used on the Internet that is Uniform Resource Locators (URL).
Wireless Markup Language (WML)
A lightweight markup language designed to meet the constraints of a wireless environment with low
bandwidth and small handheld devices. The Wireless Markup Language is WAP's analogy to HTML used
on the WWW. WML is based on the Extensible Markup Language (XML).
WMLScript
A lightweight scripting language. WMLScript is based on ECMAScript, the same scripting language that
JavaScript is based on. It can be used for enhancing services written in WML in the way that it to some
extent adds intelligence to the services; for example, procedural logic, loops, conditional expressions, and
computational functions.
Wireless Telephony Application (WTA, WTAI)
A framework and programming interface for telephony services. The Wireless Telephony Application
(WTA) environment provides a means to create telephony services using WAP.
Hardware and Software Requirement
At minimum developing WAP applications requires a web server and a WAP simulator. Using simulator
software while developing a WAP application is convenient as all the required software can be installed
on the development PC.
Although, software simulators are good in their own right, no WAP application should go into production
without testing it with actual hardware. The following list gives a quick overview of the necessary
hardware and software to test and develop WAP applications −
A web server with connection to the Internet
A WML to develop WAP application
A WAP simulator to test WAP application
A WAP gateway
A WAP phone for final testing.
Microsoft IIS or Apache on Windows or Linux can be used as the web server and Nokia WAP Toolkit
version 2.0 as the WinWAP simulator.
Please have look at WAP - Useful Resources to find out all the above components.
Configure Web Server for WAP
In the WAP architecture, the web server communicates with the WAP gateway, accepting HTTP requests
and returning WML code to the gateway. The HTTP protocol mandates that each reply must include
something called a Multi-Purpose Internet Mail Extensions (MIME) type.
In normal web applications, this MIME type is set to text/html, designating normal HTML code. Images
on the other hand could be specified as image/gif or image/jpeg for instance. With this content type
specification, the web browser knows the data type that the web server returns.
In WAP applications a new set of MIME types must be used, as shown in the following table −
File type MIME type
WML (.wml) text/vnd.wap.wml
WMLScript (.wmls) text/vmd.wap.wmlscript
WBMP (.wbmp) image/vnd.wap.wbmp
In dynamic applications, the MIME type must be set on the fly, whereas in static WAP applications, the
web server must be configured appropriately.