0% found this document useful (0 votes)
5 views76 pages

Adhoc Unit I

The document discusses Wireless Local Area Networks (WLANs) and Wireless Personal Area Networks (WPANs), detailing their fundamentals, standards like IEEE 802.11, and technologies such as Bluetooth and HIPERLAN. It also covers the challenges of Wireless Internet, including address mobility and inefficiencies of transport layer protocols, and introduces Mobile IP as a solution for maintaining connectivity. Additionally, it addresses TCP performance in wireless domains and various strategies to optimize data transmission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views76 pages

Adhoc Unit I

The document discusses Wireless Local Area Networks (WLANs) and Wireless Personal Area Networks (WPANs), detailing their fundamentals, standards like IEEE 802.11, and technologies such as Bluetooth and HIPERLAN. It also covers the challenges of Wireless Internet, including address mobility and inefficiencies of transport layer protocols, and introduces Mobile IP as a solution for maintaining connectivity. Additionally, it addresses TCP performance in wireless domains and various strategies to optimize data transmission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

UNIT – I

Part – I : Wireless LANS and PANS

By

Y.INDIRA PRIYADARSHINI
Assistant Professor
Department of CSE

Ravindra College of Engineering for Women


Kurnool – 518452, Andhra Pradesh, India
Contents:
1.Introduction.
2.Fundamentals of WLANS.
3.IEEE 802.11 Standards.
4.HIPERLAN Standard.
5.Bluetooth.
6.Home RF.
1.Introduction:
•The field of computer networks has grown significantly in the last three
decades.
•Wireless personal area networks (WPANs) are the next step down from
WLANs, covering smaller areas with low power transmission, for
networking of portable and mobile computing devices such as PCs,
personal digital assistants (PDAs), which are essentially very small
computers designed to consume as little power as possible so as to
increase the lifetime of their batteries, cell phones, printers, speakers,
microphones, and other consumer electronics.
2.Fundamentals of WLANS:
•The terms "node," "station," and "terminal" are used
interchangeably. While both portable terminals and mobile terminals
can move from one place to another, portable terminals are accessed
only when they are stationary.
•Mobile terminals (MTs), on the other hand, are more powerful, and
can be accessed when they are in motion. WLANs aim to support
truly mobile work stations.
Technical Issues
• The differences between wireless and wired networks, the use of
WLANs, and the design goals for WLANs.
Differences Between Wireless and Wired
Transmission:
• Address is not equivalent to physical location.
• Dynamic topology and restricted connectivity.
• Medium boundaries are not well-defined
• Error-prone medium
Uses of WLANs:
•Users would be able to surf the Internet, check e-mail, and receive
Instant Messages on the move.
• In areas affected by earthquakes or other such disasters, no suitable
infrastructure may be available on the site. WLANs are handy in such
locations to set up networks on the fly.
• There are many historic buildings where there has been a need to
set up computer networks. In such places, wiring may not be
permitted or the building design may not be conducive to efficient
wiring. WLANs are very good solutions in such places.
Network Architecture:
3.IEEE 802.11 Standards
4.HIPERLAN Standard:

• HIPERLAN stands for High performance Radio


local area networks.
• While all of the previous technologies have
been designed specifically for an adhoc
environment
• HiperLAN is derived from traditional LAN
environments and can support multimedia
data
• HiperLAN does not necessarily require any
type of access point infrastructure for its
operation.
• HiperLAN/1 is specifically designed to support
adhoc computing for multimedia systems,
where there is no requirement to deploy a
centralized infrastructure
Goals of Hyperlan
• QoS
• Strong security
• Ease of use, deployment and maintenance
• Affordability
• scalability
5.Bluetooth:
Bluetooth protocols
Radio protocol:
• Responsible for the modulation and
demodulation of data into RF signals

Baseband protocol:
• Responsible for channel coding and decoding
Link controller:
• Responsible for establishing and maintaining
the links between Bluetooth units
Host controller Interface:
• It defines uniform methods for accessing and
controlling the lower layers of the protocol
stack
Logical link control and Adaption
protocol(L2CAP) :
• Responsible for establishing connections
• Repackaging the data packets it recieves from
the higher layers into the form expected by
the lower layers.
Service discovery protocol:
Defines procedures for
• Discovering services of other devices.
• Determining the characteristics of those
services
Advantages
• Eliminates wires
• Offers formation of Ad hoc networks
• Free of charge
• Easy to use
• Low power consumes battery less
Disadvantages
• Relatively short range
• Less secure
• Bluetooth internet connection gets slow some
times.
6.Home RF:

• As the technologies are rapidly advancing that


affects the human daily lives more flexible,
particularly in controlling home appliances.
• Electrical installations are the heart of every
building ,therefore every intelligent building
control absolutely ensures the safety and
efficient control and eventually saves the
electrical power consumption and human
energy
• Home automation systems does the
operations like lighting control and regulation
,regulating HVAC(Heating, ventilation and Air
conditioning)
UNIT – I
Part – II : Wireless Internet

By

Y.INDIRA PRIYADARSHINI
Assistant Professor
Department of CSE

Ravindra College of Engineering for Women


Kurnool – 518452, Andhra Pradesh, India
UNIT – I
Part – II : Wireless Internet

By

Y.INDIRA PRIYADARSHINI
Assistant Professor
Department of CSE

Ravindra College of Engineering for Women


Kurnool – 518452, Andhra Pradesh, India
Contents:
1.Wireless Internet.
2.Mobile IP.
3.TCP in Wireless Domain.
4.WAP.
5.Optimizing Web over Wireless.
Introduction:
• Internet has caused a revolutionary change
in the use of computers and search for
information
• Wireless Internet enables the users to
access information and data irrespective of
their location
• Some protocols work well in wired
network but perform very poor in the
wireless networks such as TCP

2009/11/
2
1.Wireless Internet:
• Wireless Internet refers to the extension of
the services offered by the Internet to
mobile users
• The major issues to be considered for
wireless internet are the following:
– Address mobility
– Inefficiency of transport layer protocols
– Inefficiency of application layer protocols

2009/11/
2
Application Layer Application Layer
(HTTP, TELNET, SMTP, etc.) (HTTP, TELNET, SMTP, etc.)

Transport Transport Layer


Layer (TCP/UDP)
(TCP/UDP)
Network Network Layer Network Layer
Layer (IPv4/IPv6) (IPv4/IPv6)
(IPv4/IPv6)
802.11 802.3/802.4/802.5
802.11/HIPERLAN 802.3/802.4/802.5
HIPERLAN

Wireless AP
Intern
Mobile node that can
connected to a et
be connected to any
AP running WLAN subnet of the
protocol Internet
Wireless part of wireless Internet Traditional wired Internet

Flow of an IP packet from the wired Internet to a mobile


node
Transceiver
2009/11/ Figure 4
2
antenna
4.1.
Address Mobility

• The network layer protocol used in the IP was designed for


wired networks with fixed nodes
• IP employs a hierarchical addressing with a globally
unique 32-bit address: network id + host id
• The addressing scheme was used to reduce the routing table
size in the core routers of the internet
• This addressing scheme may not work directly in the
wireless Internet
• Mobile IP is a solution for the mobility problem

2009/11/
2
32
bits
Subnet address Host address

(a) IP address
format
Subnet A Subnet B Subnet A Subnet B
10.6.6.x 10.6.15.x 10.6.6.x 10.6.15.x

WirelessAP
WirelessAP WirelessAP
WirelessAP
Packets Packets
addressed addressed
to 10.6.6.1 to 10.6.6.1

IP address 10.6.6.1
Network identifier in 10.6.6.1 is
IP address 10.6.6.1 different from the subnet address

(b) (c
Figure
4.2. )

2009/11/
2
Inefficiency of Transport Layer Protocols (TCPs)
• TCP is very important in the Internet:
– maintaining end-to-end connections
– reliable end-to-end delivery of data packets
– flow control and congestion control
• Congestion control will reduce the size of the
congestion window with every successive packet loss
• Link error or collision may lead to very low
throughput in wireless network
• Wireless application protocol (WAP) is used to solve
the inefficiency of wireless applications

2009/11/
2
2.Mobile IP:
• Each computer has a unique IP address
– Identification the computer
– Help data routing
• Important issue for Mobile IP
– Compatibility: compatible to wired
Internet
– Scalability
– Transparency

2009/11/
2
Outer Header Encapsulated
Packet

s = HA

d = COA
Foreign
Network
Home M
Path N
Network
HA Ⅱ 130.103.202.200

130.103.202.050 The
Internet F
Path A
130.111.111.111
Ⅰ Path
C Rout

N er
S= Tunn
CN el
D= Inner Header Inner Data Figure 4.3. Routing in
MN MobileIP.

2009/11/
2
MobileIP Protocol
• COA: Care of Address
– Foreign agent-based COA: address of current
FA
• The FA decapsulates the packet and forwards it
to MN
– Co-located COA: another address of MN
• MN decapsulates the packet
• Registration: MN registers to the HA when
it moves to a new location
– Authorization
– Authentication

2009/11/
2
Reverse Tunneling

• Possible problems for sending packet from


MN to CN following path III
– Ingress filtering: some routers may filter the
packets going out the network if the source IP is
not the subnet’s IP
– Firewalls: filter and drop packets that originate
from outside but have a source address belongs to
the local network
– Time to live (TTL)
• Solution: the routing of packet from MN to
CN via HA (reverse tunneling)

2009/11/
2
Simultaneous Binding
• and
Simultaneous binding: Route
HA allows an MN to
register more than one COA at the same
time Optimization
– To improve the reliability of data transmission
• Optimization route: (CN to MN bypassing HA)
– Binding cache: CN can keep the mapping of MN’s
IP and COA in a cache
– Binding request and binding update: find the
binding from HA by using a binding request
– Binding warning (handoff case): old FA sends a
binding warning to HA, which in turn to informs the
CN to use a new binding
2009/11/
55
2
MobileIP Variations- The 4 x 4 Approach
• 4 x 4 Approach : There are four strategies for
packets from MN to CN (OUT approaches)
and four strategies for packets from CN to
MN (IN approach)
• S and D represent the inner source and
destination of the packet while s and d
represent the outer source and destination
in the encapsulated packet

2009/11/
2
Handoffs
• When MN is moving away from the FA
is connected to
• Decisions regarding where and when
to handoff and establish a new
connection breaking the old one

2009/11/
2
H F
A A
Wired
Network

CN

BS/A BS/A
P P

M
N

Figure 4.4. Entities in wireless Internet handoff


scenario
2009/11/
58
2
Classification of Handoffs
• Mobile initiated handoff: MN measures the SS, decides
the new BS and triggers the handoff
• Mobile evaluated handoff: the decision on handoff
lies within the network, such as BS
• Network initiated handoff: the BS decides where the MN
should be handed over
• Mobile assisted handoff: MN assists to measure the down
link SS that avoids black hole scenario
– Black hole: Wireless channel is asymmetric

2009/11/
2
Fast
• Handoffs
The handoff delay including:
– Delay in detection of a need for a handoff
– Layer 2 handoff: a data link connection need to
be established between the new FA and MN
– Layer 3 handoff or registration with HA
• Pre- and post- registration handoffs
are employed to reduce the layer 3
delay

2009/11/
60
2
IPv6 Advancement
• IPv6 has a built-in support for mobility
– Route optimization
– IPv6 has fields for new COA and home IP so
reverse tunneling problem can be avoided
– The problem of ingress filtering is also solved due to
the above
– Control packet can be piggy-backed onto data
packet
– Detection of black hole
– IPv6 avoids overheads due to encapsulation

2009/11/
2
3.TCP in Wireless Domain:
• The wireless domain is not only plagued by the mobility
problem, but also by high error rates and low BW
• Traditional TCP: provides a connected-oriented, reliable, and
byte stream service
• TCP functions: flow-control (controlled by sliding window),
congestion-control (congestion window), data segmentation,
retransmission, and recovery
• Slow Start: resets the congestion window (CW) size to one
and let threshold to half of the current CW size
– Double the CW on every successful transmission until the CW
reach threshold and after that increases the CW by one for each
successful transmission

2009/11/
2
TCP Over Wireless

• Earliest suggested alternatives: Forward


error correction (FEC)
• Link layer solutions: Snoop TCP and TCP-unaware
link layer
• Split approach based solutions: ITCP and M-TCP
• End-to-end solutions: ELN, WTCP, TCP SACK and
TTCP

2009/11/
2
Snoop TCP
• Snoop TCP: buffer the data as close to MN as
possible to minimize the time for
retransmission
– The BS just snoops the packets being transmitted in
both directions and recognizes the Ack
– If BS get a DUPACK or no ACK for quite some time,
it retransmits from the buffer after discarding
DUPACK
– When the data transmission is from MN to CN, if the BS
detects a gap in the sequence numbers acknowledged
by the CN, it send a NACK to the MN to indicate loss
over the wireless link

2009/11/
2
Indirect TCP
• Indirect TCP: splits the TCP connection into two
distinct connections, one is MN and BS and
another is BS and CN
– The AP acts as a proxy for MN
– The AP acknowledges CN for the data sent to MN and
buffers this data until it is successfully transmitted to
MN
– Handoff may take a longer time as all the data
acknowledged by AP and not transmitted to MN must
be buffered at the new AP

2009/11/
2
Wireles Wired
s link Domai
n
M A C
N P N
(Acts as
proxy)

Figure 4.7. Indirect TCP.

2009/11/
2
Explicit Loss Notification

• Explicit Loss Notification: the MAC layer can sends


an (ELN) to sender if packet loss is not caused by
congestion
– The sender does not reduce window size on receiving
the ELN as this message implies that there was an error
and not congestion

2009/11/
2
Impact of Mobility
• Handoffs occur in wireless domains when an MN
moves into a new BS’s domain
• The result of the packet loss during handoff is slow
start
– The solution involves artificially forcing the sender to go
into fast retransmission mode immediately, by sending
DUPACK after the handoff, instead of go into slow start
• Using multicast: the MN is required to define a group
of BSs that it is likely to visit in the near future
– Reduce the handoff latency: Only one BS is in contact with the
MN and the others buffer the packets addressed to the
multicast address
2009/11/
68
2
4. Wireless Application Protocol:
• WAP becomes a standard for providing data
and voice services to wireless hand-held
devices
• Main objective of WAP is to overcome the
shortages of wireless medium and handheld
devices such as:
– Low BW, high latency, low connection stability, and
high transmission cost per bit
– Small display, low memory, limited battery power,
and limited CPU

2009/11/
69
2
The WAP Model
• WAP adopts a client-server approach: a proxy
server acts as an interface between the wireless
domain and core wired network
• The gateway receives WAP request from the
hand- held devices, and converted to HTTP
request to be sent to the original server
• The filter between the server and gateway to
convert the HTML content into WAP-
compatible WML content

2009/11/
70
2
Gatew
ay Origin
Encoded
Clie Request Reques Server
s ts CGI Scripts,
nt Content
WAE Encoded etc.
Response Encoders Respons
User es
s and
Agent (Content Conte
Decoders
) nt

HTML
WML Content Content
Filter

Figure 4.8. The WAP client-server


model

2009/11/
71
2
The WAP Protocol Stack
• Wireless Application Environment (WAE): provides an
addressing model for accessing both the WWW URLs and
other resources using uniform resources identifiers
• Wireless Session Protocol (WSP): establishes a
reliable session between the client and server
• Wireless Transaction Protocol (WTP): 3 services
– Class 0: unreliable send with no ACK
– Class 1: reliable push services (receiver send data as ack)
– Class 2: request-data-ACK providing a two-way reliable services

2009/11/
2
WW 1.Addressing model
W WAE (Application 2.WML standards
HTML 3.Wireless
JavaScript Layer) telephony
1. Session
WSP (Session
establishment and
Layer) disconnection
HTTP
2.Binary form of HTTP
WTP (Transaction 3.Asynchronous push
Layer) mechanism
1.Lightweight TCP
TLS WTLS (Security 2.Three classes of
SSL service
Layer)
1.Date integrity
WDP (Transport 2.Authentication
1.UDP or TCP
3.Optimizations for
functionality 2.WCMP
TCP/IP Layer) low
bandwidth medium
SMS USSD CSD Bearer
CDMA networks
Figure 4.9. The WAP protocol
stack
2009/11/
73
2
HTTP Drawbacks
• High connection overhead
– A new TCP socket is opened for every new HTML object
– Redundant capabilities transmission( information
regarding the browser capabilities is included in every
HTTP request
• The WebExpress system suggests that an Intercept
model be applied for Web access over wireless
interface
– The CSI appears as a local Web proxy
– The communication between the CSI and SSI is the only
interaction over the wireless network and this uses a
reduced HTTP

2009/11/
74
2
2009/11/
75
2
5.Optimizing Web Over Wireless:
• Caching: cache data across the browser sessions,
as this increase cache hit ratio
• Differencing: only send the different stream
• Protocol reduction: reducing the overhead of
repeated setup and tear-down of TCP/IP
connection for each Web-object to be transmitted
• Header reduction

2009/11/
76
2

You might also like