Adhoc Unit I
Adhoc Unit I
By
Y.INDIRA PRIYADARSHINI
Assistant Professor
Department of CSE
Baseband protocol:
• Responsible for channel coding and decoding
Link controller:
• Responsible for establishing and maintaining
the links between Bluetooth units
Host controller Interface:
• It defines uniform methods for accessing and
controlling the lower layers of the protocol
stack
Logical link control and Adaption
protocol(L2CAP) :
• Responsible for establishing connections
• Repackaging the data packets it recieves from
the higher layers into the form expected by
the lower layers.
Service discovery protocol:
Defines procedures for
• Discovering services of other devices.
• Determining the characteristics of those
services
Advantages
• Eliminates wires
• Offers formation of Ad hoc networks
• Free of charge
• Easy to use
• Low power consumes battery less
Disadvantages
• Relatively short range
• Less secure
• Bluetooth internet connection gets slow some
times.
6.Home RF:
By
Y.INDIRA PRIYADARSHINI
Assistant Professor
Department of CSE
By
Y.INDIRA PRIYADARSHINI
Assistant Professor
Department of CSE
2009/11/
2
1.Wireless Internet:
• Wireless Internet refers to the extension of
the services offered by the Internet to
mobile users
• The major issues to be considered for
wireless internet are the following:
– Address mobility
– Inefficiency of transport layer protocols
– Inefficiency of application layer protocols
2009/11/
2
Application Layer Application Layer
(HTTP, TELNET, SMTP, etc.) (HTTP, TELNET, SMTP, etc.)
Wireless AP
Intern
Mobile node that can
connected to a et
be connected to any
AP running WLAN subnet of the
protocol Internet
Wireless part of wireless Internet Traditional wired Internet
2009/11/
2
32
bits
Subnet address Host address
(a) IP address
format
Subnet A Subnet B Subnet A Subnet B
10.6.6.x 10.6.15.x 10.6.6.x 10.6.15.x
WirelessAP
WirelessAP WirelessAP
WirelessAP
Packets Packets
addressed addressed
to 10.6.6.1 to 10.6.6.1
IP address 10.6.6.1
Network identifier in 10.6.6.1 is
IP address 10.6.6.1 different from the subnet address
(b) (c
Figure
4.2. )
2009/11/
2
Inefficiency of Transport Layer Protocols (TCPs)
• TCP is very important in the Internet:
– maintaining end-to-end connections
– reliable end-to-end delivery of data packets
– flow control and congestion control
• Congestion control will reduce the size of the
congestion window with every successive packet loss
• Link error or collision may lead to very low
throughput in wireless network
• Wireless application protocol (WAP) is used to solve
the inefficiency of wireless applications
2009/11/
2
2.Mobile IP:
• Each computer has a unique IP address
– Identification the computer
– Help data routing
• Important issue for Mobile IP
– Compatibility: compatible to wired
Internet
– Scalability
– Transparency
2009/11/
2
Outer Header Encapsulated
Packet
s = HA
d = COA
Foreign
Network
Home M
Path N
Network
HA Ⅱ 130.103.202.200
130.103.202.050 The
Internet F
Path A
130.111.111.111
Ⅰ Path
C Rout
Ⅲ
N er
S= Tunn
CN el
D= Inner Header Inner Data Figure 4.3. Routing in
MN MobileIP.
2009/11/
2
MobileIP Protocol
• COA: Care of Address
– Foreign agent-based COA: address of current
FA
• The FA decapsulates the packet and forwards it
to MN
– Co-located COA: another address of MN
• MN decapsulates the packet
• Registration: MN registers to the HA when
it moves to a new location
– Authorization
– Authentication
2009/11/
2
Reverse Tunneling
2009/11/
2
Simultaneous Binding
• and
Simultaneous binding: Route
HA allows an MN to
register more than one COA at the same
time Optimization
– To improve the reliability of data transmission
• Optimization route: (CN to MN bypassing HA)
– Binding cache: CN can keep the mapping of MN’s
IP and COA in a cache
– Binding request and binding update: find the
binding from HA by using a binding request
– Binding warning (handoff case): old FA sends a
binding warning to HA, which in turn to informs the
CN to use a new binding
2009/11/
55
2
MobileIP Variations- The 4 x 4 Approach
• 4 x 4 Approach : There are four strategies for
packets from MN to CN (OUT approaches)
and four strategies for packets from CN to
MN (IN approach)
• S and D represent the inner source and
destination of the packet while s and d
represent the outer source and destination
in the encapsulated packet
2009/11/
2
Handoffs
• When MN is moving away from the FA
is connected to
• Decisions regarding where and when
to handoff and establish a new
connection breaking the old one
2009/11/
2
H F
A A
Wired
Network
CN
BS/A BS/A
P P
M
N
2009/11/
2
Fast
• Handoffs
The handoff delay including:
– Delay in detection of a need for a handoff
– Layer 2 handoff: a data link connection need to
be established between the new FA and MN
– Layer 3 handoff or registration with HA
• Pre- and post- registration handoffs
are employed to reduce the layer 3
delay
2009/11/
60
2
IPv6 Advancement
• IPv6 has a built-in support for mobility
– Route optimization
– IPv6 has fields for new COA and home IP so
reverse tunneling problem can be avoided
– The problem of ingress filtering is also solved due to
the above
– Control packet can be piggy-backed onto data
packet
– Detection of black hole
– IPv6 avoids overheads due to encapsulation
2009/11/
2
3.TCP in Wireless Domain:
• The wireless domain is not only plagued by the mobility
problem, but also by high error rates and low BW
• Traditional TCP: provides a connected-oriented, reliable, and
byte stream service
• TCP functions: flow-control (controlled by sliding window),
congestion-control (congestion window), data segmentation,
retransmission, and recovery
• Slow Start: resets the congestion window (CW) size to one
and let threshold to half of the current CW size
– Double the CW on every successful transmission until the CW
reach threshold and after that increases the CW by one for each
successful transmission
2009/11/
2
TCP Over Wireless
2009/11/
2
Snoop TCP
• Snoop TCP: buffer the data as close to MN as
possible to minimize the time for
retransmission
– The BS just snoops the packets being transmitted in
both directions and recognizes the Ack
– If BS get a DUPACK or no ACK for quite some time,
it retransmits from the buffer after discarding
DUPACK
– When the data transmission is from MN to CN, if the BS
detects a gap in the sequence numbers acknowledged
by the CN, it send a NACK to the MN to indicate loss
over the wireless link
2009/11/
2
Indirect TCP
• Indirect TCP: splits the TCP connection into two
distinct connections, one is MN and BS and
another is BS and CN
– The AP acts as a proxy for MN
– The AP acknowledges CN for the data sent to MN and
buffers this data until it is successfully transmitted to
MN
– Handoff may take a longer time as all the data
acknowledged by AP and not transmitted to MN must
be buffered at the new AP
2009/11/
2
Wireles Wired
s link Domai
n
M A C
N P N
(Acts as
proxy)
2009/11/
2
Explicit Loss Notification
2009/11/
2
Impact of Mobility
• Handoffs occur in wireless domains when an MN
moves into a new BS’s domain
• The result of the packet loss during handoff is slow
start
– The solution involves artificially forcing the sender to go
into fast retransmission mode immediately, by sending
DUPACK after the handoff, instead of go into slow start
• Using multicast: the MN is required to define a group
of BSs that it is likely to visit in the near future
– Reduce the handoff latency: Only one BS is in contact with the
MN and the others buffer the packets addressed to the
multicast address
2009/11/
68
2
4. Wireless Application Protocol:
• WAP becomes a standard for providing data
and voice services to wireless hand-held
devices
• Main objective of WAP is to overcome the
shortages of wireless medium and handheld
devices such as:
– Low BW, high latency, low connection stability, and
high transmission cost per bit
– Small display, low memory, limited battery power,
and limited CPU
2009/11/
69
2
The WAP Model
• WAP adopts a client-server approach: a proxy
server acts as an interface between the wireless
domain and core wired network
• The gateway receives WAP request from the
hand- held devices, and converted to HTTP
request to be sent to the original server
• The filter between the server and gateway to
convert the HTML content into WAP-
compatible WML content
2009/11/
70
2
Gatew
ay Origin
Encoded
Clie Request Reques Server
s ts CGI Scripts,
nt Content
WAE Encoded etc.
Response Encoders Respons
User es
s and
Agent (Content Conte
Decoders
) nt
HTML
WML Content Content
Filter
2009/11/
71
2
The WAP Protocol Stack
• Wireless Application Environment (WAE): provides an
addressing model for accessing both the WWW URLs and
other resources using uniform resources identifiers
• Wireless Session Protocol (WSP): establishes a
reliable session between the client and server
• Wireless Transaction Protocol (WTP): 3 services
– Class 0: unreliable send with no ACK
– Class 1: reliable push services (receiver send data as ack)
– Class 2: request-data-ACK providing a two-way reliable services
2009/11/
2
WW 1.Addressing model
W WAE (Application 2.WML standards
HTML 3.Wireless
JavaScript Layer) telephony
1. Session
WSP (Session
establishment and
Layer) disconnection
HTTP
2.Binary form of HTTP
WTP (Transaction 3.Asynchronous push
Layer) mechanism
1.Lightweight TCP
TLS WTLS (Security 2.Three classes of
SSL service
Layer)
1.Date integrity
WDP (Transport 2.Authentication
1.UDP or TCP
3.Optimizations for
functionality 2.WCMP
TCP/IP Layer) low
bandwidth medium
SMS USSD CSD Bearer
CDMA networks
Figure 4.9. The WAP protocol
stack
2009/11/
73
2
HTTP Drawbacks
• High connection overhead
– A new TCP socket is opened for every new HTML object
– Redundant capabilities transmission( information
regarding the browser capabilities is included in every
HTTP request
• The WebExpress system suggests that an Intercept
model be applied for Web access over wireless
interface
– The CSI appears as a local Web proxy
– The communication between the CSI and SSI is the only
interaction over the wireless network and this uses a
reduced HTTP
2009/11/
74
2
2009/11/
75
2
5.Optimizing Web Over Wireless:
• Caching: cache data across the browser sessions,
as this increase cache hit ratio
• Differencing: only send the different stream
• Protocol reduction: reducing the overhead of
repeated setup and tear-down of TCP/IP
connection for each Web-object to be transmitted
• Header reduction
2009/11/
76
2