MC - Unit 1 To 5
MC - Unit 1 To 5
These ers work together to provide a complete applica on structure. Here’s a simple
breakdown of what each er does:
1. Presenta on Tier (User Interface)
Role: This is the topmost layer of the applica on, responsible for the user
interface (UI).
Func on: It allows users to interact with the applica on by providing bu ons,
forms, text boxes, etc., for them to input data and view results.
Technology: This layer typically includes web browsers or custom client
programs that run on the user's device.
Example: When you open a mobile app or a website, the screen you see, with
bu ons and menus, is part of the Presenta on Tier.
2. Applica on Tier (Processing Layer)
Role: This middle layer handles the business logic of the applica on. It
processes user inputs, performs calcula ons, and decides what to do next with
the data.
Func on: It acts like the “engine” of a car. Just as an engine powers the car, the
Applica on Tier powers the ac ons that happen in the app.
Technology: The logic in this layer is o en implemented using technologies like
Java, .NET, or ColdFusion.
Example: If you input some data in an app, the Applica on Tier calculates or
processes that data and determines the next steps, like fetching relevant data
from the database.
3. Data Tier (Database/Storage)
Role: This layer is responsible for storing and managing the data used by the
applica on.
Func on: It stores informa on that the applica on needs to func on and
ensures that data is easily accessed and modified. This could be done using a
database or, in some cases, a file system.
Technology: The Data Tier is typically implemented on a server where the
database resides.
Example: When an app stores your profile informa on or your preferences,
that data is saved in the Data Tier, which may involve storing it in a database
like MySQL or in files.
How These Tiers Work Together:
1. Presenta on Tier: Displays the user interface and allows users to input data.
2. Applica on Tier: Processes the data, makes decisions, and interacts with the
Data Tier to retrieve or store informa on.
3. Data Tier: Stores the data and ensures it's available when needed.
This three- er architecture helps separate concerns, making it easier to manage and scale
mobile compu ng applica ons.
Now, if both Node A and Node C try to send data to Node B at the same me, the signals
will overlap and cause interference at Node B, making the data unreadable. The issue is that
Node A and Node C are "hidden" from each other. This means when Node A starts
transmi ng, it cannot sense that Node C is also transmi ng, and vice versa. As a result,
their data collides, and the MAC protocol must find a way to handle this situa on efficiently.
2. The Exposed Terminal Problem
The exposed terminal problem occurs when a node unnecessarily stops transmi ng
because it detects another transmission that does not actually interfere with its
communica on. For example:
Node A is within the transmission range of Node B.
Node B is transmi ng data to Node C.
Node A also wants to send data, but it can’t, because it senses Node B’s
transmission and assumes it would cause interference.
However, if Node A were to transmit to a different node, say Node D, that communica on
would not interfere with Node B’s transmission to Node C. Node A is unnecessarily blocked
from transmi ng because it is exposed to Node B’s signal, even though there’s no actual
risk of collision. This leads to inefficient use of the wireless spectrum and delays in
transmission.
Key Features:
All users use the same channel but transmit in turns.
Time slots are fixed in a round-robin manner.
Wastage occurs if me slots remain unused.
Example: Think of a classroom where students take turns speaking. Even if one student
doesn’t speak, their turn is skipped, and me is wasted.
How it Works:
1. Each sender uses a unique PN code to encode their data.
2. All users transmit simultaneously using the en re bandwidth.
3. At the receiver's end, the signal is decoded using the same PN code.
For example, if User X and User Y are transmi ng:
User X uses PN code (010011) (autocorrelated as -1, +1, -1, -1, +1, +1).
User Y uses PN code (110101) (autocorrelated as +1, +1, -1, +1, -1, +1).
The receiver receives a combined signal. To decode X’s data, the receiver
mul plies the combined signal with X’s code.
The decoded result determines the original bit.
If the result is posi ve, the bit is 1.
If the result is nega ve, the bit is 0.
Key Features:
No scheduling of me or frequency.
Uses unique PN codes for signal separa on.
Supports simultaneous transmission by mul ple users.
Example: Imagine mul ple people talking at the same me in different languages. A listener
who knows a specific language can tune in to that conversa on while ignoring others.
Comparison of Techniques
FDMA Frequency bands Low (idle me wasted) Highway lanes for vehicles.
TDMA Time slots Moderate ( me slots wasted) Classroom with students taking turns.
These fixed assignment schemes form the backbone of communica on systems, enabling
efficient data transmission in networks like cellular systems and the internet.
1. ALOHA Scheme
The ALOHA scheme is one of the simplest and earliest methods of communica on, originally
developed at the University of Hawaii. It includes two main types: Pure ALOHA and Slo ed
ALOHA.
Pure ALOHA
How it Works:
o When a node has data to send, it starts transmi ng immediately without
checking if the channel is already in use.
o If the data (frame) is successfully received, the next frame is sent. If not,
the frame is retransmi ed.
Advantages:
o Simple and easy to implement.
o Works well in networks with a small number of users and low traffic.
Disadvantages:
o High collision rates, especially as the number of users increases.
o Efficiency is low; at most, only 18.4% of the total transmission capacity is
u lized effec vely.
Slo ed ALOHA
Improvement Over Pure ALOHA:
o Time is divided into fixed slots, with each slot capable of holding one
data packet.
o Nodes can only start transmi ng at the beginning of a slot.
How it Works:
o Beacon signals are sent at precise intervals to mark the start of each me
slot.
o If a collision occurs, the node waits for the next slot to retransmit.
Advantages:
o Reduces collision rates compared to Pure ALOHA.
o Efficiency increases to about 36.8% of the transmission capacity.
Disadvantages:
o Requires synchroniza on among nodes to align with the me slots.
o Collisions can s ll occur if mul ple nodes a empt to transmit at the start
of the same slot.
2. CSMA Scheme
Carrier Sense Mul ple Access (CSMA) improves over ALOHA by introducing a mechanism
where nodes sense the medium before transmi ng.
Basic CSMA
How it Works:
o A node checks if the channel is free before star ng transmission.
o If the channel is busy, the node waits un l it becomes free.
Advantages:
o Reduces unnecessary collisions.
o More efficient than ALOHA in high-traffic scenarios.
Disadvantages:
o Collisions can s ll occur if two or more nodes sense the channel as free
simultaneously.
Collision Handling Retransmit a er collision Slot-based retransmission Sense before transmit Detect and stop Avoid collisions through random delays
Efficiency Low (18.4%) Moderate (36.8%) Higher than ALOHA High in wired networks High in wireless networks
Suitability Low-traffic networks Moderate-traffic networks Wired or wireless Wired networks Wireless networks
Conclusion
Random assignment schemes like ALOHA and CSMA are cri cal in designing MAC protocols
for efficient data transmission.
ALOHA schemes are simple but struggle with high collisions.
CSMA schemes are more advanced, focusing on reducing or avoiding collisions,
making them be er suited for modern networks.
Understanding the strengths and limita ons of these schemes helps in choosing
the right MAC protocol for specific network environments.
Overview of Mobile IP
Mobile IP enables devices to maintain connec vity and receive data efficiently, even when
they move across different networks. It ensures seamless communica on without packet
loss or disrup ons, similar to how mail is forwarded when someone changes loca ons.
Steps in Mobile IP
1. Step 1: A sender sends data to the mobile node (device) using its home
address.
o Example: Mail is sent to Delhi (home address).
2. Step 2: The home agent (Delhi post office) intercepts the data and encapsulates
it in a new packet.
o Example: Mail is packed and forwarded to the foreign agent in Singapore.
3. Step 3: The foreign agent (Singapore post office) delivers the packet to the
mobile device using its care-of address.
o Example: The Singapore post office delivers the mail to the person.
Advantages of Mobile IP
1. Transparency: Senders do not need to know the device’s current loca on.
2. Simplicity: The home agent handles forwarding, making it user-friendly.
3. Seamless Communica on: Ensures uninterrupted data flow even when the
device moves between networks.
Security in Mobile IP
Security is essen al because wireless links are prone to a acks.
During registra on, the home agent needs to verify the authen city of requests
from mobile nodes.
Security associa ons (e.g., encryp on or authen ca on) between the home
agent and mobile node help ensure secure communica on.
Binding in Mobile IP
The associa on between the mobile node's permanent home address and its temporary
care-of address (current loca on) is called binding.
Messages in Op mized Mobile IP
The Mobile IP protocol uses the following four key messages for route op miza on:
Message Type Descrip on
1. Binding Request Sent by a node (e.g., CN) to the HA to ask for the current loca on (care-of address) of the mobile node.
2. Binding Acknowledgement Sent by the HA in response to the binding request. It confirms that the care-of address of the MN is successfully updated.
3. Binding Update Sent by the HA to the CN to inform it of the MN's current loca on. It includes the fixed IP address and care-of address.
4. Binding Warning Sent by a node if it decapsulates a packet intended for an MN but realizes it is not the correct Foreign Agent (FA).
Important Terminology
Messages: Handled by the Applica on Layer.
Segments: Handled by the Transport Layer.
Packets: Handled by the Internet Layer.
Frames: Handled by the Network Interface Layer.
2. Transport Layer
What it does:
o Ensures reliable delivery of data between applica ons (end-to-end).
o Iden fies which applica on on a computer should receive the data using
port numbers.
o Handles two types of communica on:
1. Connec on-oriented (TCP): Reliable and guarantees data delivery.
2. Connec onless (UDP): Faster but doesn’t guarantee delivery.
o Example: If you’re streaming a video, UDP might be used for speed, while
downloading a file might use TCP for accuracy.
3. Internet Layer
What it does:
o Breaks data into smaller pieces called IP datagrams and a aches IP
addresses (source and des na on) for delivery.
o Handles rou ng, which ensures the data finds the best path to its
des na on.
o Uses protocols like:
IP (Internet Protocol): Main protocol for data delivery.
ICMP: Helps diagnose network issues (e.g., ping command).
ARP: Maps IP addresses to physical hardware addresses (like
MAC).
Network Access Preparing data for transmission over physical media Ethernet, Wi-Fi
1. Slow Start
What is it?
o The slow-start mechanism determines the op mal transmission window
size when a TCP session begins. Instead of star ng with a fixed window
size, the size starts at its smallest value and increases gradually.
How does it work?
1. The sender begins with a transmission window size of 1 segment.
2. A er successfully receiving an acknowledgement (ACK) for the first segment,
the sender doubles the window size.
3. This process con nues exponen ally (1 → 2 → 4 → 8, etc.) a er every Round
Trip Time (RTT) un l a conges on threshold is reached.
4. If conges on is detected (via duplicate ACKs), the window size is reduced to
half, and the conges on avoidance phase starts.
Why exponen al growth?
o It’s like a trial-and-error process to find the maximum network capacity
without causing conges on.
2. Conges on Avoidance
What is it?
o A er the conges on threshold is reached during slow start, the window
size increases more cau ously to avoid overloading the network.
How does it work?
1. The window size increases linearly a er receiving ACKs (instead of doubling like
in slow start).
2. If conges on occurs, the window size is reduced to half.
Key takeaway:
o This phase is less aggressive and helps TCP stabilize the data transfer rate
by slowly finding the op mal transmission window size.
Advantages:
No changes needed to the standard TCP protocol.
Errors in the wireless link don't affect the fixed network, improving efficiency.
Disadvantages:
Breaks the end-to-end reliability of TCP because FH gets an acknowledgment
before MH actually receives the data.
Fast Retransmission
Proposed by Caceres et al., this method helps reduce delays caused by mobile host
disconnec ons (e.g., during handoffs).
When a mobile host reconnects a er a short disconnec on, it sends duplicate
acknowledgments to the fixed host.
The fixed host interprets these acknowledgments as a sign of a live connec on
and packet loss, triggering a quick retransmission without entering slow-start
mode.
Advantages:
Reduces reconnec on me.
Improves performance during short disrup ons.
Disadvantages:
Doesn’t address wireless network-specific errors.
Freeze-TCP
This method pauses the sender’s TCP stream before a disconnec on.
The mobile host sends a "Zero Window Adver sement" to the sender,
indica ng it cannot receive data.
Once reconnected, the mobile host sends the actual window size to resume
communica on.
Advantages:
Prevents slow-start delays a er reconnec on.
Works well with encrypted payloads (e.g., VPNs).
Disadvantages:
Requires MH to predict disconnec ons, which may not always be possible.
TCP in Mul -hop Wireless Networks (TCP-F Protocol)
In mul -hop wireless networks, such as mobile ad hoc networks (MANETs), communica on
between devices (called Mobile Hosts or MHs) happens through other MHs ac ng as
intermediate nodes. However, since these MHs can move freely, the network topology o en
changes in unpredictable ways. This poses a challenge for standard TCP protocols. Here's
why:
Benefits of TCP-F
Reduces unnecessary retransmissions.
Prevents incorrect triggering of conges on control mechanisms.
Improves overall transmission efficiency in dynamic mul -hop wireless
networks.
Unit - 3
1. Bearer Services
These services allow users to send and receive data to/from other devices like computers or
mobile phones.
What it Offers:
o SMS (text messages), email, voice mailbox access, and internet usage.
o Supports remote applica ons like controlling devices from a distance.
Data Transmission:
o Speed: Up to 9.6 kbps.
o Compa ble with networks like PSTN (Public Switched Telephone
Network) and ISDN (Integrated Services Digital Network).
Modes of Data Transmission:
o Transparent Mode: Uses physical layer protocols for data transfer.
Provides constant speed and delay, assuming no errors.
Uses FEC (Forward Error Correc on) to improve transmission
quality.
o Non-Transparent Mode: Adds error correc on and flow control using
higher-layer protocols like Radio Link Protocol (RLP).
2. Teleservices
These services focus on communica on between users and include both voice and non-
voice op ons.
Voice-Oriented Services:
o Telephony: Provides high-quality digital voice calls.
Special codecs are used to compress and transmit voice efficiently.
o Emergency Numbers: Free service that connects users to the nearest
emergency center automa cally.
Non-Voice Services:
o Short Message Service (SMS):
Sends text messages up to 160 characters.
Uses signaling channels for quick and reliable delivery.
o Fax Services:
Sends fax data digitally over analog networks using standard
protocols.
3. Supplementary Services
These are extra services to enhance user experience and provide more func onality.
Key Features:
o User Iden fica on: Ensures secure and personalized access to the
network.
o Call Redirec on and Forwarding: Redirects ongoing calls to another
number or device.
o Mul party Calls: Enables group calling for mul ple par cipants.
o Close User Groups (CUG): A feature where specific users can call only
within a defined group.
1. Authen ca on
Authen ca on in GSM is all about verifying the iden ty of the user to ensure only
authorized individuals can access the network. This helps prevent fraud and ensures that no
one can impersonate someone else on the network.
How it works:
o GSM networks use a process where the mobile network operator checks
the iden ty of the user before allowing access.
o This is usually done through a unique key or code.
o One of the simplest methods of authen ca on is the use of a Personal
Iden fica on Number (PIN). However, this method is not the most
secure, as an a acker could poten ally intercept the PIN and misuse it.
The goal of authen ca on is to make sure that only authorized users can access the
network, reducing the risk of fraud or unauthorized usage.
2. Confiden ality
Confiden ality in GSM is about keeping communica on secure and preven ng anyone from
listening in on private conversa ons, messages, or other sensi ve data. This is especially
important in mobile networks, where informa on is sent wirelessly and is vulnerable to
intercep on.
How it works:
o GSM uses encryp on to protect the data that travels between the
mobile device (Mobile Equipment or ME) and the base sta on (BTS).
o Encryp on ensures that any informa on sent over the air, such as your
voice during a call or the digits you dial, is scrambled in such a way that
only the intended recipient can decode it and understand the message.
o This prevents eavesdroppers from gaining access to sensi ve informa on
during transmission.
3. Anonymity
Anonymity in GSM refers to protec ng a user’s privacy by preven ng anyone from tracking
their loca on or iden fying who they are calling or receiving calls from. This is especially
important to prevent unwanted surveillance or tracking of individuals.
How it works:
o Instead of using permanent iden fiers (like a user’s phone number or
SIM card number), GSM networks assign a Temporary Mobile Subscriber
Iden ty (TMSI).
o The TMSI helps keep the user’s iden ty anonymous, especially during
communica on or when moving from one loca on to another.
o This prevents third par es from easily iden fying the user or tracking
their movements based on their phone ac vity.
GSM Security
Security in GSM (Global System for Mobile Communica ons) is crucial for protec ng both
the network and the users. It ensures that communica on is private, users' iden es are
safe, and services are used properly. GSM security is supported at three main levels:
1. Operator’s Level
2. Customer’s Level
3. System Level
These levels work together to provide security against threats like fraud, unauthorized
access, and eavesdropping, ensuring the overall safety of communica on. Let’s break down
the important security features in GSM networks:
1. Authen ca on
Authen ca on in GSM is all about verifying the iden ty of the user to ensure only
authorized individuals can access the network. This helps prevent fraud and ensures that no
one can impersonate someone else on the network.
How it works:
o GSM networks use a process where the mobile network operator checks
the iden ty of the user before allowing access.
o This is usually done through a unique key or code.
o One of the simplest methods of authen ca on is the use of a Personal
Iden fica on Number (PIN). However, this method is not the most
secure, as an a acker could poten ally intercept the PIN and misuse it.
The goal of authen ca on is to make sure that only authorized users can access the
network, reducing the risk of fraud or unauthorized usage.
2. Confiden ality
Confiden ality in GSM is about keeping communica on secure and preven ng anyone from
listening in on private conversa ons, messages, or other sensi ve data. This is especially
important in mobile networks, where informa on is sent wirelessly and is vulnerable to
intercep on.
How it works:
o GSM uses encryp on to protect the data that travels between the
mobile device (Mobile Equipment or ME) and the base sta on (BTS).
o Encryp on ensures that any informa on sent over the air, such as your
voice during a call or the digits you dial, is scrambled in such a way that
only the intended recipient can decode it and understand the message.
o This prevents eavesdroppers from gaining access to sensi ve informa on
during transmission.
3. Anonymity
Anonymity in GSM refers to protec ng a user’s privacy by preven ng anyone from tracking
their loca on or iden fying who they are calling or receiving calls from. This is especially
important to prevent unwanted surveillance or tracking of individuals.
How it works:
o Instead of using permanent iden fiers (like a user’s phone number or
SIM card number), GSM networks assign a Temporary Mobile Subscriber
Iden ty (TMSI).
o The TMSI helps keep the user’s iden ty anonymous, especially during
communica on or when moving from one loca on to another.
o This prevents third par es from easily iden fying the user or tracking
their movements based on their phone ac vity.
Symbian OS
Symbian OS was a mobile opera ng system developed by Nokia, Ericsson, Panasonic, and
Samsung. It was widely used in smartphones, par cularly by Nokia, but its market share
declined over me due to internal conflicts and compe on from Android.
Key Features:
Real- me mul tasking: Symbian could run mul ple tasks at once, priori zing
the most important ones.
Microkernel-based design: A lightweight and efficient system.
Low-power mode: The system saved ba ery by switching to low power when
idle.
Two main versions:
o Series 60: Popular for Nokia devices with large color screens and
mul media support.
o UIQ: A user interface layer that made app development easier.
Networking support: Includes protocols like Bluetooth, USB, and Wi-Fi.
Event-based programming: Apps respond to events like user ac ons.
Op mized for low power and memory: Efficient use of device resources.
iOS
iOS is the opera ng system developed by Apple for its devices like the iPhone, iPod touch,
iPad, and Apple TV. Ini ally known as iPhone OS, it was later renamed to iOS. iOS is a closed
and proprietary system, meaning Apple owns and controls it completely, and it cannot be
used by other mobile phone brands.
Key Features:
Gestures: iOS allows user interac ons through gestures like swipe, tap, pinch,
and reverse pinch. These gestures are unique to the system.
Accelerometer: iOS uses internal sensors, like the accelerometer, which allows
features like shaking the device to undo ac ons and rota ng the device to
switch display modes (portrait to landscape).
iOS has become extremely popular, mainly because of the iPhone, and it is known for its
sleek design and innova ve features. However, Apple does not allow iOS to be installed on
third-party hardware.
iOS
iOS is the opera ng system developed by Apple for its devices like the iPhone, iPod touch,
iPad, and Apple TV. Ini ally known as iPhone OS, it was later renamed to iOS. iOS is a closed
and proprietary system, meaning Apple owns and controls it completely, and it cannot be
used by other mobile phone brands.
Key Features:
Gestures: iOS allows user interac ons through gestures like swipe, tap, pinch,
and reverse pinch. These gestures are unique to the system.
Accelerometer: iOS uses internal sensors, like the accelerometer, which allows
features like shaking the device to undo ac ons and rota ng the device to
switch display modes (portrait to landscape).
iOS has become extremely popular, mainly because of the iPhone, and it is known for its
sleek design and innova ve features. However, Apple does not allow iOS to be installed on
third-party hardware.