Mobile Computing Quantum
Mobile Computing Quantum
,., CONTENTS ,
OD s t i n g environment
a}1tke tbae.
: It zs EAeOszzozu:oegt
t]jg
of zn• tbe exazople ofzaobiJe cTouJ • Des4 m bSli@ : Uaer aheold be deriee to
. while e citys. Jdo'bñe e•zoai\ ehle to anot2mr and or the aazus service.
allows
p e-jttg¡j itbout ever
actesaiag
fl„ Bâa¢ mofsMty:'g'/se user deeice cao ei¢}zer be a
real estate btiaine a8, for example,
yospective homebuyers to eTfazst or ae¥ver- IO caae of'1zoat zoobtlTty the mobñTty oEZP oeeds
a uaer initietei to be tabezt caze oB.
eatel1itoepp. E •w w e
zaote 8erver
Bad
the niobi}pdevice
ueed out in tit
and co8tfoI ’Ibid is the important aspect ofmobile computing. but there are °°
^ challenges that, it h•s to face, theae are :
field
its en9irunment. Ifence, it hua to configure ita•lr > tbe
gpd even for preaentati ^ environment Gantt time.
c tâ›n ag•in due to toobiiity m a t i o n ent
wpuld be one of the m becomes a eiiallange. Aa the following Casks H8 t8 dun
in order to° X°*
is available for
' • ' If ttf9da%a uaer's position and/or data)
m yguâ ea AAgc%m ote l e m e t ” ’
pp eeveral mpbile devices or even PCs at }m:ne. ’” ty is aleo a challenge.
„„,bite tb••^• tbe ’”*’ a'obi!°
tbe
L
Qg pp er
zestrw6
and noiae levela. ü tbe raoge fros
acity. Tht
th (ezBaP!*
e „, Boe ¢oAoestt«Ïty betweaa zneläÏs d••Ice •••a w*r*l*** 1oc•!
**e•
gise of fipgers and
fqgg. to a gewxa a e
Compare the theoe generations of wirele•a t eP °ne »aw•e•*a•a •**u•••••e-=z'—'
ceiegezy
epataxa oa Ake baais of Keefazee, tacba g$r uaed aad BPP ”’”
t°
pt the
g TheTD
tbe edel. ’f'eIepboae Eeryiee) bagt§
ple jt-g9 aod CDMA-2000
e. F•r exa
OtOCO
Neéia Gateway COOtrnl {
b. It i8
tbe a aigos\.
c. Fpr exa jilple : a
@ tal*bit
i;,ree kinds of q p d u l a t i o n tche ieo : Amplitude
tran e Of
any DtediD= for the
electro •gnetii waves.. ace aad
a.
that a cazciez oxo‹t z\ated te\eoozaot'aoicatioDair ”e
over certain propagation media.
e
c. A fading channel ia. a communication chpnpel that esM* i e
17 fIT-8) I
CeBulnr ayetem :
1. Cellular system for iziobile communication implements SDM tspace
Diviaipn 2ttultiplea3ng) where each transmitter, typically called a base
station, covcro a certain area, called a cell.
R Iñ.‹rt1wr words, *A cellular system is high capacity land mobile
Byetem In wlticJs aeeilgble frequency spectrum is partitioned ioto
discrete
”' cégzapbt« ceryt•e azea (aeA). 3'be dts•zete cbaooels are
ex p el s ofbo4ng rouand in differont colla, within the mercies area.”
B›t :J&øpf4 øtplø feøllalar øjratøm isto divide s large geographical
RU4}c with diameter from 2 km to bO km, each of
srâihhJfli e ted a number of Radio frequency (RP) channele.
g j•y,gj ,y
F by Mobile Computing
acb
intently Beparated.
4.
i power than the current New Matts. But energy i» a serious problem for
n each adjacent mobile handheld devices.
9pJq{ °W • Witb small celle, mobile stations, and
on )› base stations only have to deal with ‘l0caJ’ interference.
di wbicb iB called a •
q cientl§ far euee
6. however intsrferen‹›e. tm aBai ^t o!^iogTe ¢0zapo•eat. If one aateooa Nabla, tJzia
on)y
without when the group of„ iIIf]UeDCe8of0Oj jI£1t1QjCg@gj$
$py Te Drawbacks email cell: $yjy/\{Q g g gg'
of mque0 4•.
1. rence
ca0 interference.
to connect all base stations. This jncludes many antennas. ewitrhes for call
ent cells
forwarding, location registers to find a mobile station etc., Winch makB8
the whole ajrstem qttite .
overoeeded:TbemAbdestatieubsetopeflbmoabsnd0ver
R trap called aize Of
f calle the other and the Public when changing from one cell to another. Depending on the cell size and the
•» d e speed of movement, thin can happen quite of
fivi
S• Frequency planzxing: To avoid interference between
On the one hand, interference ahnuld be avoided, on the other, only
Telephone i'ietw tranamiHeri
(Id5CJ a limited nuinlmr of frequencies is available.
stem Should a between cello.
tbe mobile
HLR HLR
OR
to other
HbCe
8 >
s. one
leo»transmitter is farja›wer:
trunamisgion awed frnm°nother *^-•
The power anpeM
°*t°ide
for baae stations, they are indeed proble mobile sett
range, it can reuse the
*'* same
°* frequencies.
,.;, °›, r,.r.. --.r.›
•»°'•‘•
If we uae
ezt i
t s '.
.
tbe
Bteza operatoE'^ d e o e t o a a
’“’*&
H o m e full of uuera,
onen.
vide
miles Of
øunh øn eay diøg
for
j,ø., channel encoding and deck' æ A calłar eateza a 10-dtgit eode (pbooe ouzałær) aaé
pzesaee tke
b. Thø 2dS ocans the band ta øølœt a £ree channel and øendø a
oWong signøl to øønd the numbør entørød.
« Tbø BS reløpø thø numbør to the HSC.
‹L The C$C in turn dispatches tJfø roąuøat to all thø Haaa atatinn
in
e. Thø mubile idøntifioation numbør (MI2't) iø then broadcøøt
over nil thø foræørd control ‹äiannela tbeoughaut tbø eøllulør
øyatem,
channsi.
intlM
b. Tbs BLtt øtores •pennanent" ® * * inforiØätl0
ge
station, ä Mebile Coæputłng
current
gøe ss
c
.
that beth aig•ali & 8uppoxt fOr a rao8e ofBew eewtœa agî¥}
ppidered a eemnd f9CAitiea.
7. IgDN oompatibility.
unication was ea8y to bud d,
of OSld permita the iDtegration of different voim and date aervieœ and the
OpBpg{¡j ’ ( b0
d'or cuatoæeza.
TekeæmAoæ
} p ppgæncy number.
b. p¡t data'
b. A GSM system cnnsisto of three aub-systems; the radio cub-
JjP0tOTOl8 OF lhye systems I t8S), the network and asritchiog aib-ejratsny 9fSE), rind the
er operation aub-syetema (OSS).
adoption arid flow control.
for interwor Radio mili•eyetoms (R88) : The RS8 Contains a11rad¡o gpecific
data networks entities, Le., the mobile station (MB) and the bane station aub-
system (BSiS). The BSS is connected to Ngg by tse 'A' interface
Synchronous with and oss by ‘o’ interface. RS8 basically contains three entities:
e. ® **•”q * ** *®
gQd 9.6 k
(t.2,2.4, &.8 300t‹ i A GS3I network comprises many BSS, each
p
controlled by a
qq¡ pg¡gpted tele aervicea. TAeB88perAmmssllfrmfloswoe‹ewmY1o
tdoreflo
cqzmectiooa to aé dB (eodiag/deoodtag ofeoieeJ.
anel°g itL Besides a BSC, BSS coztta?aa ee9erél Bg'9e.
P by c S M i• tbe emergency nuntbtt i A BTS comprises all radioequipments, in., antennas,
gyt providers end free of aignal processing amplifiers neeeaaary for radio
¡s Short message service (SMsi trannmiasion.
e. o t h e r u»eM • g J c e of G SMchafgt,
aaage of upto 180 A BTS can firm a radio cell, or several cells (uoin8 aeet
rized antennas) and ia connected to Up interface and to
0cterG,chunnele. the B£iC
ty signaling
q dard data channels of GSM é The main function of BSS is to look carer a certain number
@ of BI’S to eoeure propar operation.
It taheacare ofbaadaBbaot ooe ITS to aootbez aod oza*ot^
telephony aerviors. *a appropriate power lerels of the aignal.
aL The BSC also multiplexer the radio channels onto the fixed
network connections at the A interface.
$f ongoing
calla. of two main aaaential compenpnta lcneWn as Mobile Equipment
Module i8IM). Any M8 can b« identified bx m iI tlnt
nat*onal
6xptaio tke wozktag of f?8bg (gtobol ejra6ez• €or -ob
e*. aa li4ted hmm :
I• A Furnpnâld4fazitlty Humher (PINt : The PM ' ® *sed
to
' &gk the SIM, in sunts cauea the PUK *" neede
to
7aubecñber tsidentKad by t Number.
a.
G8u network era c a p tu re d as a hierarchical, Durifl8
etton this number ia transmitted river 8ir.
Mobile Computing
jzrerent
, - ^ mveml BTS's in a geographicai region.
goinnbe ite œaj o r job ia
itor
it tlty) : lt ia , r°gi®tration, handœiarfl, autbenticatipn, rnuting
ueed aod haadovers alcalin to æove f'roæ one hts to another.
6. A gateway MDC (oMfiC) ia need to connect other tixed
networks such ac P8TN and I8DN.
IM. v i e i ‹ o r I o a a t ‹ o « R e Btœwzs):
L VU iB a datab8Ee tbat c0nt&in8 tempo try
information allnut eubocribers that is oeeded by the
bti5C M8C.
each in order to
ö. When a mobile station marne into a nsw W£SC area,
the VLR connected to the USG will reQueat data about
the mobile station from the HLR Later, if the mobile
srtatinn (2tf8) makes a call, the VLR will have the
, lBg information needed for the ealt aetup without
NMær ü Ba mNcb* ®t*°**dD•*
gpn{Aobîl*8œHoxzInterosWo••4 *e disturbing the HLR
B
. x t orLwitb
«ztdcount ry code as well as national code.
8æitehi•a s • b • W « • - (Non) : @ ŒBzLa.Ëi¥« Î6e « 0 c 0 e s s c y Ï'«0Cti0AS Exr IletWOFk OjÆEatTOaS
ii. The basa station can initiate a calluaing the Paging Channel
dat». It i» specified by GSM anig: rb slow Aseo*iated Control Channel (SAGCH) is mainly
used
. for meooage to maintain a link.
ggp3 dp for alj manufartm°*®-
A : Tbe interface
® ’ aei3QccnJrut hasmure data capacitor. This is particularly
which is s t a n d > GSM. The A interface uat$
n between!4f('c ,pegdad whenever the mobile mâkes a handmrer from one
8B
BSC. The fi interface 8ll0ws provider
aswitching equipment made by different oia•uf *• 5. The baae elation can aceeaimndate these logical channels onto radio
l
. Channels.
2. Logical channels carry user apeech or data _
'
,kg, Page 36d, Llait.t,
gefer
QBM : GSM seetjj•ity i Mobil'C mput'ng St t1T-81
7. The 8REi$ ganeratsd I
j2ocW’fition ’ compared witb the $RE8 generated br the AuC,
wateri and is
ey,
"
wel1••iotbeSIM. x 9. Note
AutAMt
fl0°
resides.
l0. Now a znøjor problem with this approach is høndolfdeciaion, i.e., the
received signølø of both bøsa atøtinn oftmi ßectuate.
BT BTS 11. When a mobile exist between the base stations, the effect ia ho c a s e
ß thextiobilø te widely avritch linkø with any of thø łæse station.
BSC BB The baøø station bounces thø link with the x obîle back ønd forth. Thia
G phenomenon iø called "Ping-Ponging".
Anateen
Various multiple aeceaa protccola worked on media acteae control layer are
as follows :
1. a SDMA :
Space Division Multiple Acceas (SDMAI ia used for allocating a
separated space tn uaers in wireless networks.
b. A typical application involvea assigning an
optimal baae station to a mobile phone user.
DtecttgeCDIWA 41m•xxsam
r og OR
multiple aceeae p
peqppib e the foIl0 p.
^
O.
T'DMA
Mnbile Computing
960
MHz a. Codea with certain charaeteriaticseau be applied to the °^ to
095.2 ensble fihp use of*code div3aion midtiplexing tCDM)"•
200 KHz
MHs
Code dimaion multiple acees8 fCDMA) eyetenis uae exactly thèse
codes to separate different uaere in code space Grid tO 9nö lP•
access to a sbared medium without interference.
t. The main problem is how to find geparate
“good" codea and hop the signal from noiae * and the
generated by othe8 8*f8 ens ironmenf.
The code directly controls the clipping sequence. A ends fOF
£t certain user should have a good aut p q p p]atipn azid should be
ortMgooaJ to other codea.
à. Time Dfvisi0n Multiple •• (COMA) oRers a e. We tan demonstrate the orthogonal br taking an example
tPCÖnO]ôg'Îe8 t}igt g]) g{p of a ayatem of coordinate a and vectors starting at origin (D, 0, 0)
titrie elota for comQiunÏcation, i.e , control ›ns TDM then two vectors are called orthogonal if their inner product is 0
b. as is the case for the two vectors i2, S, 0) and t0, 0, 17) : (Z, Si,
a certain freqtiency is
l'tot f+fiCe 8ariry, Oi* IO, 0,
c.
r e c e i v e r east kay at the sam e frequency the whole time. L'AI -- O + O + D -- D
f. Now for auto-correlation, for example : the Barker code t e l , - 1 ,
+l,+1, -1, +1, +l, +l, —1, —1, -1) has a good auto-correlation,
tening to diffCP nt frequericiea at i.e„ the inner product with iLself is large, the reault is 11. This
code is uaed for ISDN and IEEE 808.11.
flthieved in the time
e. ieehaniam. Compare the SDbtA, T D M A , F D M n a n d C D M n
dong by usin8 ä e d pattern similar ri FDHA
uaîag a <°< MA› WMAi PDbIA and GDbIn in terme of
transmission technique, signal separation, advantagea,
The aimplest disudv unta g p s ä n d
g THM i« ai¡••ti22g tifrie
alots for appLoeGoam
h,
’edd•T*Y
one*
the aame i• I d e A : Se gme nt spa ¡ttt9 ce]Jg/g @yg
" ' O°l I one t°rminal can be active in otie cqll/one aector.
* * r I o8 : cell structure dir @d antqqn
' ’ ‘° M : Very simple, iacreaae capasity per
L GRT9iepBmihewd
SIGSX, ta)ces care Mobile Computing
muéA& kaodover azzd IP
gggigtttttent. a The HlJt or Home Location Register is a
to the GRPS devine. database that • subscriber information, when a device
b’ e 'f;fiN W a logic cp2jj3getS to t12e D8 * their HSISD2'1 number
C an example, Ml on a longjourn9y ie aameiated with aerrices, account information, preferences and
0
t on a cese device, you wiJ] p3gg anxnetimeo IP addresses.
a. A mobile device ia programmed with one or ttiore Acceoo
Names which ar• commonly referred to as the API'*.
¡g {jj gijfe the T£tBD8Cti0zl is
Qtte j0b of 1 8 b Aa APt'f coosiata of' a I' tip gua1i0ed DXB aP1e'
p0{
* * guaotuzopage.co.izu
g The t;gp «ork» Out whicb BSC In ‘ ate” your connection
the BG8N does a DN8loukup and re-free the
BeBz@
1.4.
Data gg
e
' " ' ‘, * ° „ ; ° c ° = r ° ' aJ•••
I•ART- 1 'os'"°”
'°' "
t°• Ind »
\g a
bM stati
'nfrgte
IEEE B02.11, Blmtaoth, Nirelesc Multip distributed method tF
and usually pj•pyi
wider internet.
b.
• Wireless network refers to any type of computer network t§
is wirele2g gyd i8 commoaly 8s8'oC-iatedwith at a
This provides ustt the
coverage area ao# atill
telecot1jjjjt@y{jpg network.
• ,q pireleps LAN is linking of two or more c, For example :
oomputt›t u5ipg 8pread spectrum or picked up by adi
OFDM modulation. or mobile homes. o °*#
• Bluetooth is open wireless technology standard for exehang¡qg Fixed wirelesa d•‹• : It a t
’
data ovet short distapya froos fixed or mobile devite creating PAN extend or
with high levels of security. share g, ${firelesa MAN :
g
Wireless hletropoli ^t='orL
b. For example, 9fi-b{ a a tr cry
evered
g Wireless Widewirel
Area Network (WPfJ)
typically coveress
l8rge outdoor artgt.
b
¢
as a public internet access system
c. They are usually deployed On 2,{$ d,
A tyDital syate°i c°°tains base 8tatlon gateways, access points
ink wireless bridging relays.
e ilxplain the usea, proc and tona of wireless network
Wireless network: What 8z’e the advantages and disadvantages °f '* 8 a •••
1. Wireless network refers toany type of computer network that is tmneniiasion as compared to a fiber °r wire a•® i°ai°n
and is common]y associated with a telecommunication network
wireless
whose interconnectipn between nodes are implemented without
the use of
e
2 Wireless telecommunication netwprka are generally implemented
Ueea of
with SOmP txt of remote information transmission ayatem 1. With theireleaa networklnfl:
help of wirele6s
q0rkb,¡ofor°iation c° ld“ ^ “ ” ” “ “
that me8 el•ctromagnetie
implernenbatipp waves, aucb as radio wavee for the ff0t with efficiency and more
pdjjy takea place at physical layer of network.
carrier and IN 2. reliability.
Efficient cervixes such 8B the P° ^ ’ .
ragi8
a A Wireless Personal Area Networks (WPANJ interconnect devi«e® 3. Another impo
within a relatively bmal{yeg way to b'0 COflDected *°
•
Wireless Netwoçyøg
Mobile Computing 68 (Z'I'-B) J
Pros: 2. Installation difficulties :
ø¡gy t o set u p as °*>°. as a. Because wireless network øre øo commonly uøed, you may find
e d n
that other wireless nete'orkø øetup inyour medical building
ithe netwOTk•
interfere Frith your wirelese signal.
b. need t0 IU es and users cøn move around b. There are a limited number ofchannele and if the incorrect channel
@thża the gig0al ^+V at tht•İr discretion. is used, you osay end up with inconsistent networh
connection or no network connectivity at all.
Mobiie devices enemyøs phones and* ¡j t;;tgøøj øtøtt¡jjj;y ,
Coverage • a. Users cam experience black epots within the coverage range
j where the wireless signal has ‹hffieulty passing through eertairi
ø. øgø teiøøjfnology
Though coverage > limited, wireless høs improved
available within a specified• building materials or if the area has sigxiificant radio
the past detade and gO8d Cry
interference.
can be used if wider b. Users may need to do some experimenting to obtnin optimal
b. Beyond tha t, Extender and range boosters
coverage is required. A signal
Speed:
Unlimited øaers: a. While wireless networks øre føster than dial-up connection, the
a Wired routers will typically •me with three or fuur connection port average speed tends tn be slower than as ethernet
and require a switch fOl' additional expansion.
b. With a wireleßø network you can add øiore uøera without the
coruiection as an issue to be ceneidered if you or your
organization will be relyiisg solely on a wireless
need to change hardware, throughbandwidth and speed may become an network.
issue if there are too many users.
Cnnuenienee, flexibility øod efficiency: Give the bràet diseusøinn on wireless LAT. t h a t are the
a A wireless network can be invaluable for companies that hot
desk or have other office-sharing practices.
Wiraleøe LAN :
b. If you need mobility around the workplace, a wireless network
2. A wireless LAN is linking of two or more computer or devices
help you move around without worrying about access points or
mines. using spread spectrum or OFDM modulation.
2. WLAN are typically restricted in their diameter to buildings,
Coøt :
college campus, single rooms etc. and are operated by individuals,
a. Wirełees routers have become very affordable in the past few years not a large- scale network providers.
so Sfte costs a•aocïated vrfth setting up a wireless network will not 3. The global goal of N's is to replace oifice cabling, to enable access
necessarily be prohibitive. to the internet ønd, to introduce a higher flexibility for adhoc
b. communication in public places and group meetings.
It zrtay even cheaper tn jystall a wireleaß network
'°”' in some situations. 4. The wireless LAN technology is based on 1' EE 802.11 standard.
L Security :
5. It is a member of IEEE 802 fømily, which is a series ct specification
8 Wireless networl;ø are more d
networks, ifficult to secure than wired local for LAN technologies.
6. The primary component of a WLAN is the wireless interface card that
b. As a reault, they are more vulnerabl to haø an antenna.
users. e attack by unautjaorized 7.
c. This interface card can be connected to the mobile unit øs well as to íìxed
a ÏOCff tİOn near the network.
PïHtjT t¡9i j•¡g M i n i n g software to identify 8
available
. There are mønr pt ducts Which used unlicensed IBM bands along with
9.
WLAN, for Example microwave over cordless phone etc.
therefore›
mechan;gq of cpÏli8iofis that he
mize the
occur5, gpd
g teredehveredBnccessfuhy
(j l ) sensu oultip]e
gy p with collision detection (Cg
, p e p ccess cont‹O1 i•y r Contr0l8 medium access through
A
. It also •r» ¢ j p g , authentication and power eonservat¡py medium if, a c4llision occurs it atops t 85 ffW lt lieten into the'.
3. p c of
’Fhe basis aervicea ppoVided by the MAC layer are the m•ndato he
wireless network, t¡gnal
4. strength decreases p
The syn 8p wice f'acket and 8, jpw when the aender would apply CS
(Carri•* Sen ei and cD fC llision
ppteetion) if a eollision occurs at the receiver it Cht be the case thgt
aender cannot ‘bear" the collisiori due weakening ofa the mgnals,
1. The MAC 81$0* used in wired netxeork often fail Wirelee# cD does not furtfier move, CS might not work if,i.e.,
for example,a terminal
network due to rome reaaons- ¡g Ndden". Collision detcction in ertreless is a difficult taak as the
2. O» of the ‹x›mmoniy p agnitude of the signai varies with distante.
gtgpJthm for wired networks ia es which worhs »c followa : If a jin context to eellular network, diaeugy the
eender Wanta to •end aomething, it aepdaq 8eon as the medium
i8free, ä libteD iOtO thB ïDedium if a t0lliaipn pag it atnps zending following : i Cell aplittine
¡y }steuz• and far problem
3. end sends
1"fow, a jainioing
in case aignal.
ofwireleo network thia echeme faila, 8s in wireIe8s
netqot$ the stgnal strength decreases proportional to the square o*the ¡¡¡. BidAen terminal problem
4. d¡atgn
Now when the eendef wpuld apply CS lCarrier Sense) and CD
tcollispn Detection) ifa colliaion oceurs at the reeeiver it might bB the
case that a sender cannot ”hear" the collision due to weakening of the
eigngl, i. •„ CD doen not further inove, CS mlght not werk. For
example, a terminai
are three
the i•
see thai Ranges.
$ isaion range of A reached g •t tf0t
grea,hesbQthL
$pp that bothq d 5 want to transmit to B then the {pp i, csv •enses the state of tbe e v e r ••i •t ‹ t ,»i ,
g Lead to hidden node problem.
yppleoi occurs :
g , 2, pa not iiae carrier sensing.
A aends to cannot receive A as it is not in the tr
range of A. Y,. Node a start tranamittirtg after a random },typqjy
N•w, c a x i s tn aend t0 B,
b. 3 j\4nCA usea RTS and CTS tO 0V£rrcome hidñen nod• problems
it cannot detect A- node problems.
.
g Node which only hears CTS tbut no R'’S8, stop from transmitting
A is hiddpp for C. thidden node).
b. Node which only heara RTS (but no TT8), is traflgmit
(expoapd node).
9. RTS and GTS carry the expected duration of data
4. trammisaion.
When there is a collision, it us'es binary exponential backotf
tBEBl before retrying.
B where RTC standa for request to send
ñ.OF. Hidden node probletii. CTS stands for clear to send.
Pa cket tranemieaion in MACA : The packet transnisaion in MACA
4. 3uch temñaals like A aod 0 are called hidden terminals n• t „,
is shovm in Pig. 2 10.1
terminate cau89 collisiozt. Neighbour Sender Receiver
5.
An0ther effects ia there Neighbour RTS - ItTS
iuinecessary delay.
6. ’’’’ CTS
The situation i8 as
.-’
follows :
another termipgJ tn send data tn seem
ange of A and Inot A or B) wJ Ch ie outside tlte interferenit
b. B. Pig. 8.i0.i• Pa•k•t CTS DATA NN
C senice the channel but finds it busy
( d i e bo B'e transmission),so A-ppjQpn }iidjjpn tel-@J@ TiAin8 MAIN: MAMA 8VttitlS the
9roblelD8°8°^® '
of hidden terminals ’’’’•
But A j9 0tlt8ide the radjo 2• acrid to B.
necessaj;y. ange of C, therefore, waiting is not 1. Suppose A I'd
2. A
W&Rt gay started the transmi86i8A but is hidden for C, C also starta
COl lisio n at B.
exposed” to B. in
o. win c c x , ñdoe8 not 6tart its transmission at once, but sends a BT8
n
° ° • = d exposed node p bleeii 4. B receives !@g RTS tbgthe
contains the nnme of sender and receiver, as
future transmission.
g g s . I I etaxt - Tbe WÏAî'f
p t
g i n e thé yes Of bender (Ap) and defined bytheŒEE
g,gg.1t pt dgrde. There are c u n e ° t I y f°ur camions in
7. C he r8 receivet the le
agi p i got ajlowed to send anything for t},t
got dy$m at B It uses the 2.4 GHS ISM band }g ¡f¿g1udes ipfrar co $qunicatiop
durin8 all
ptx›b}em is solved. it usee either frequency PP spread (pjjgs) qt
diq,•t
sequence spread spectrum fDSSfi),
g.
upto 54 Mbps in the S GHz band.
b. a02 1l• >•• - orthogo° tfrequem di i en mulaplen•g
CT9 ‹OPDMi eneoding echeme.
The r'rotocol also supports dits rates of 6, g, 12, l8, 24, 36 and 48
PUP preamble
r¡g. g.iz8, Poimat of PUP preamble PLCP header
IEEE r i g . s.2B.a Formai Of t a i n 8 0 s a1 PaYe’«m• ñßi•i oØsS•
pøøi;tioao of frøme :
1, Synohmnizøtion :
p£ łP
æ preazable :
Syn«hronigation : The PLCP preamble øtartp œ The firøt 128 bits are ueed for synchronization, for gain setting,
tb 80 for energy detection Ifor the CCA) and frequency offaet
bit pattern. Thia pattern ie used atlernate0s' az›d1s' (0j0Țof
0j compensation.
receivers
for and signal detection by the b. The synchroniaation field consists Of strings of 1's which are
CCL
Staz”t E‘zaase De1iœiŁer (6FD):‘l'tie fôłlowtpg y6 b›g scrambled.
Stsrt Fraæe De limiter ISPDI : This 16 bit field iß ueed for
start Of the frame and provide frnme aynchrø tips, The synchronization at the beginning of a frame apd consists of the
i6 bit p«tternŒzxl11õo1011i101aodit pattern jt11Œi1J10200000.
d
P£ PLCP_PDU
a. P Re•óer : Length Word ïPL& : The field specifies
the kapLg a. Two values have been defined f0r the fiełd to indicate the data rate of the
of the PSDL in octets and is used bytheMAC
payload. The binary value in this field is equal to the data
rate multiplied by 100 kbit/8.
b.
LCP Signaling Field (PßF) : Tbiß 4 bit field iziôicates the 4 A Service: This field is reserved for future uße.
TØA OÎ payload.
rate off dhiŁ/s.All bitø sets to zero (000o) í»dicat the l o p„ t S. length : 16 bits are used for length indication of the payload
Øeader Bzzor CsÎeck I C I : T h i s field conłõinß the resuJtø p{ø
in microseconds. The MAC layer uses this field to determine the epd
of the frame.
CklClzlated frame check sequence front the sending station.
& ReadezRmorChec¥(HEC):
a. Signal, service and Ïength fields are protected by this
a- checksum using the ITU-z cRc-i6 tankard
The spectrum is separated by code but not by frequency.
b. polynomial.
IEEE 802 11 DSSSp uß6s 2.4 GHz ISO l jjqd and offers beth 1 b. The CitC-16 algorithm is represented by the following poljmomiai
:
e dßtĄtTØØgnti6fiiort is control br the DSSS p i I D øpØ țøy;-.
bitø of information from the a The PHA layer based on infrared uses visible light at 850 9S0
pmtocolhči PMU
data unittakeg the b
(PPDUi PbtjP rim.
^'W Brrier It does not require LOS between the sender and receiver ,but
b. should alSO W0fk with diffuse light.
e. oioclulation.
The PDU +r8o e co Bistg or a
preamble, PLCP header, • °*• *° point-to-multipoint communication.
MAC P°otoco] d ata''it Mr'D I›. °
and
d. The infrared PHY operation is restricted to kdoor enviroozaents
and PLCP header øre alwøyø trønømittefi at within the range of 10 m.
lMbps. ítød hiPDU
Prame of IEEE 802.11 PHY freme using infrared : It i9 sbown in
Fratce of IEEE go ii oss .„ø, .-«Fi,. rig. 2.12.5.
Z.12.4.
'?7 ‹IT'-
bi p B)
3. Uw pewer that the d e v i s
2. JQt be facingeach other, and it Ù ni8°
possible to pat trnnafers xehen beth the devices are in separaR
Characteristics of btuetooth : rooma.
n r a t t n a t this i• hn•iogy requires no cables and e g Q@Bt
1. 3. £ •
@
Bluetooth operates in unliceosed GSM band at 2.4 GHz l2d00-2dg3 5
that has made it°° p°Puiar.
8. The range of bluetootli device is power elasa depen:dent l raettt the maximum ra•g• int i‹ • •> ** me*rs, but this range i° n‘t
10 meter, 100 njeter. thé aame for all simil £•<'°
3. Devicea coueected using blueteeth fiequeney link f • - ^ • p'oonet. lt• deperids o• th'• t ofthe devises and Ue *•rsion that they operate
Cl888e8 of bluetootb :
6. The processing pewer and bstt£•J gO P ttlat it requires in order to
operate is very low.
this maâ-es it mi ideal to'£i1for so many electronic devicce, as the
technology tan be implemented P > much anysrhere.
z. One jqt g,jvantege is ils aiæplicity of use. Anyone
Clas» 3 l mW f0 dBi ) - l meter
can figure out how to set up a cenneftion Tnd sync te o deuiœs with
ease.
Moreover, the technology is completely i'ree to use and requires no
1. Wireless control and communication between a mobile phone and a ehazgea to be paid to any service provider.
1. Though the transfer speeds are impressive at around 1 Mbps, certain
handa-free headaet.
other technologies like infrared can offer speeda upto 4 Mbpe.
2. Wireless communication between PC'a input and output devises. For
2. Even though the security is good, it is even better on infrared.
exemple mouae, keyboard and printer.
3. T'rensfer of files between deviœs with O B m . 3. This is because ot the comparatively larger range of bluetooth and also
the lack of a line of sight.
4. Replacement of traditional wired serial communication in
the test equipment, GPS receivers, medical equipment, barcode 4.
Someone who knowa hoer to heck sueh networks can do so eventually.
scanner and traffic control devices. 5.
Tbe ba€tery usage Burùog a single transfer is negligible, but there are
S. OiaÎ-up internet acceas on personai computers or PDA*a usùig a data• some people Who leave the device switcbed on in their devices.
capable mobile pbone as a æodem. Que 8.1s. | Explairi bluetooth a r c h i t e c t e .
6. Wireless bridge between two iædtistrial ethernet networks.
OR
7. Allowing a DECT pbone to ring and anawer calls on behalf of a
nearby cellpbone. Bxplai• theer* Cf bhiet otln system. Wïxat wilt be the im
on pieonet " " ” " ’ d e ce° gwe °°- e "Ced Co
8. For low bandwidth applications where higher USB bandwidth is œobî]
nOl
reguiced and cable-Free coooectioa deeired.
Bluetooth œ'ekjtect
Oiecuee tbo advaatagoa aod ÎiaziCa€iooa oi‘ ,
The arrhitNture of a bluetooth device
Îz10etoo8h• is d0H£›bed by the two terminology :
P!8°n •t and 8catternet.
A piconet
Advanfieges of bluetooth : fashion. is a collection of bluetnoth devices conneetcd in ari pd pt
1. Bluetooth does not require a clear line of sight between the gyn88d b. One device
devises. >e pieonet act as master (M) and all ot1›er devises
80nnected *° the °'•stcr act ce staves (g).
Wirele8s Networking {,
az\et,
c. Each piconet has exactly one maater and •P to seven aimultaneou¢ jJ a device acta
ela•ea, i.e., a meeter bluetooth devi*° ° °° "® with upto aynchronize with
aeven devices. g.
join.
The master determinea the hopping pattf•rn in the piconet and the "’ P* net.
slavea has to syjiehrorùze to this pattern. h. Before leasing one pitOnet, aa]p e
M=M=er
5 =Sgve
SB = Standby
i8 u8ed by the remote control profîle to *8tiafer t;atîpn deaigners and vendons tan impleaient aim8 from the
over an L2CAP channel. ey p t pgy9 tt ing different cooiponen
BNEP ‹Bluetooth Network Eneapeulatipp
h $api g l a c e s ,
i. BNEP is used to transfer another pr t••ol 3. 'T'a tpvide coIB ätlbilitr among tbe devises offering t e £i
pblueto0th 6 p e c n n rofiles in addition to the core pptftocola.
L2CAP channel. Q§Q@y p a J e t e r 8 bluetooth <8Nd make
;tsptyt t]jt proflles turers
i£ Ils main purpose is the transmis g. y i y
personal area networking profite. pgroperation between devîcea from diffe rent
possible. Q6t
Telephnny control prntoeol : Telephonycon certain usage model.
lTCP-BDf) is the äit oriented proto‹x›l @pfiles repreaent default solutions for a t;g8is for
sigoaling for the establishtrient of voice and8data
defineathe tgj{ 5. ey e Q gg] ion of protocole and par9meter aet to f o r t
bluetcioth devices. ¡jiteroperabilitY
6. ri t • i• be been a8 horizontal layers
Object Rechange Protocol fOBEX) : Sessio nlayer ptq sliœa.
the exchange ofoJ:jeeta, providing a model for ob'e >
repreaentation, bdj;it profiles have been spffifi& : generic aœess, s working,
h eadset, d i t - " P net
L'ogica1i.ànk Control and Adaptation Protoeol y cordlesgtelephony, iflt0I't° i ^8* & '
f àcceas, generis object exchange,
object push, file tiansfer and
a(L2C The bluetooth L2CAP layer provides
connection-oriented data eervites to upper layer prof «i. files are : ad*8fKBd äUai• distribution,
8 extended servite disœ very,
b. It also supports pp
. control, basit printing, basic
reasaembly of packets, (QoS)
h•nds-free and hardcopy cable replacement.
c. communication. q 9.
This layer does not provide any reliability and usee Each profite aeleets a set of protocole.
SDP, LMP, and
the 10. For ezample, the serial port profîle needs N O N ,
à MCAP transmite and receives L2CAP
ensuredata
reliability. L2GAP. Basebaxidand radio are alwaya requiN•d.
patkets upto 64 Mbitd length. Applications
e. L2CAP proñdea three different types of local thannel9 ;
E Conneetionleas : Theee unidirectional channels are
typ¡ used for broadcast from master to its slaves.
ik Co n n e c t i o n - or ie n te d : Eaeh channel of thi8 type
is bidirettional and supports Qo£i flow specifications for
eacli
iii. Signaling :'Ibis type of logical channel is uaed for
exclnnging signaling meaaagea between L2CAP entities.
What is bluetooth ? What are the functions ct diffe*e°
layer bluetooth protocol etsek? Also, discuss the concept of bluetm> Write ehort note ou wireless riiultiple an°°°* P ' °
Seheduled aœesa
Statit Demand Repeat random ygti
assignanenl assÎgnment suceaa random g
48VHe1îons•Amanver
e
<°ng ^^°° < M and 88edluoi Anewer Type
Que•tioas
Jpøeeø :
øørried by wireless nied¡ø ø„
ce from other ai e
5.
Performance of TCP over w'ireleaa network : Refer Q. 2.20,
Page 86‹I, Unit-2.
8 r each AcK that it receivee, the cwnd is nc aaed Different approaohes for TCP improve tent : The vari0us models
'n°*°asin&by one for proposed to improve TCPs performance over mreless networks are es
Ind over round trips. follows :
8
• 1. æ Indirect
WithTI-TCP
C P : a transport layer connection between a mobile host
TCP uses another variable asthreah,
indicatee thethe
right wi8doJ 9ize dpptpd¡jj$ g and fixed host is establiahed as two aeparate corme9tiona:
88W€'Ttt Network )oad.
i. One over the wirelesa Ïink and
10. e
a10w 9tart ph£iar continues as long a• cwnd il i ,gé t5 ü. The other over the wired link with a “mobile support routes”
l1. serving as the center point.
88 46 it
12. In congestionCrosees sethresh, IP goee int0
avoidance, for eaeh ACK COOgeetion avoidaoct
b. Packets from the sender are buffered at the mobiie support router
! mnd segments. received, cqqd " '. .^sed by until tmnsniitted acr0ss the wireless coonection.
13 • '• °PP*0x matelr esu:valant to c. A handoffmechanism is proposed to handle the situation when
plan additive increase), if eqvan cwnd
ps bye ne the wireless host moves across different cells.
e t
¡$p d A consequence of using I-TCP is that the TC'PAHKs ere not cad -
" TCP aender assures congestion to-
f i n ( c w n d L. g, g§)) end thereby violaling the end-to-end semantics of TCP.
°
W out Of order segment the
Indirect TCP or I-T C P segments the cormectiortwith no changes to
back ri duplicace ACK (d0 8Ck) to the sender. TCP prototol for hosts connected to the wired internet, millions
of computers use (variants of) thia protocol.
"’ ”he ' ' re f ransm j al gorit hm uses t
h««e 8' lt usesin
Hosto anthe
optimized
reed pu TCP protocol
of the net dofor mobile
not noticehost .
the characteristics of
the wireles8 part.
17 fi.
U n e acnder receives dupack6 it o a s e u••and retransmits the {opt
Segment , •
*• aiting for the retranamit tlrrier to gO Off.
!t aiso updates »stlueah.
!8
f'art retovory keeps tra‹k er the number of dtl9ncks receivpd
and trice
o retimate Ute •zn0unt of’oUtstanding üata in
the network
20s l@ Ç/0t0s cwnd f by one scxnent)
(or each 8lipack received, thiis
n*aintaining the ow of traître. 8 One of the drtiwbacks
6O IûtnA WhOBE
TCP connection r›f the si•gie
esulted ' 1065
'heduPlcateACKeixoct,0wlodg,¿ b.
then deflatns the •iRdow by returning it t0 s8f1tpes h, gnd enters g8loser the original end to end TCP
semantic.
congestion aYoidance phaae. *'
Rn0O9*ng TCP works trangparently and hence dppt
not lose end to
on"1 TCP not perf°rm w'ell in wireless
‘’ The moi£l pp@pjqt
ûf08B tO the fuDction pf the
mobile host p
tu perr•rm !8 9ffering Of packets
e faat
0 15 Si 0_ Lost pec ket a on the wire leBs link t beth dit•ctionai will
bc
retranamitted immediately by the mobile holt or foreigïi agent,
respectively (ao called “loca)” retransmission) the fo 6jgn agent,
t]sere f o r k , ”*8oops” t he pacÎtet
directions.
f. Data tyøp5J e j• ¿ pfeßerves end toend se iønrics, preserves t6e sender
t0 the mobile hoat İn apøøpiøg t e
8 place timeout eøtimata baaed on the whole round trip time, and
(FA) bÆerødata untit it receiv handles mobility of the hoßt with minimal ßtate transformation,
°f the •p{jp
while ed
Power eøø•iønøtion :
b. Ske9'ed dißk
Mobite host has limited power and smaller processing
*ompared to baøe stations, which tend I° introduce q,
the network,
5 e Ay B md e i» ø tyele.
8. Solutions that takø power consumption into account bac
after ønother.
k a ciear. Multi
Cut advantage over the otherwise designed y{qti ø &fnOllDt of
, Every bleak M transmitted for an eqns
[' e sender time.
block
&^^ • '.xplain data broadcasting. 6 repeats the three
The average Waiting time for receBiving is søme for A, B and C.
than others
often
da*ß b l u distribute b1•cks that are repeated rnore
Multi-disks
Anøwer evenly over the cyclİc pattern.
@ @ access. For example, blockA.
io. m• minimizes tA
hedelay
B CJø Ause*B^ C
1. Broadcast systems are claßaified as
unídirectíoR£tl distribution These are considered as a A. Flat diskdisk
Skewed
2. aøymeietric communication systøøtø. B. Multi disk
The reason for being aaymaietric íø bandwidth ljmifiätíons, differences ø C A A B
3. in tranøoiisaion power and cost factors. Explain mobile IP. Liet the entities of mobile IP.
A C
Symmetrical communicaCion system provides communication in
both directions. e
4. the channel characteristics sutb as bandwidth and delay from Mobile IP : A
A tc B is same as B to A. 1. Mobile IP for IP mobility) is standard communication protocol that
5. For example, symixietrical communication .system is the is designed to allow mobile device users to move from one
telephone line in v'hich the bandwidth is same for the subscriber network to
and receiver, 2. 0t 8° hİ18 m8intainíng a permanent IP address.
6. Asymmetric communication syßbent provides one way The mobile IP protocol was developed by the Mobile-IP Internet
communication. 3. Enginee g’8ask Porce tlETFJ workíng group.
7. Examples are pagers, radio system etc., in which device or the user This protocol allows location-ifidependent routing Of IP datagram's on the
4. internet.
can only receive iriformation.
8. A special case ofasymmetrita) communication systems are Each mobile node iS identified by its hoirie address disregarding of its
5. current location in the ihternet.
unidirectional broadcast system there high bandwidth exìsta
One important døue of unidirectional broadcasting is cyclic rcpetiti0nof data.
10. from one œnder to manf receivers. While away from its home network, a mobile node ís associated with a care-of-
Brpadcaøt systems are claaaified into two categories: addresswhich identifies its current location axed its home address is
9. fior example, client/ærver environment.
ûS9ociated with the local end point of a tunnel to its home agent.
Wi:rz•leos Networ/pg
j obile Ge putiria
8 I•tnbile IP epecifiea hna' a mobi)e node rcgtater• 2 ’l‘o make the size and t@ •
with iL8 home agent zm§ No+• The keme age»L zoutea detagzam to the
raohiJe oode through t
8. Mobiie IP pmvides an effizient, ecalable niechertium Vor roami•a thin
the Internet. 4. Toavoüdooludoostbat*eQuüeg q gig gg
8 tIsing mobile IP, nodes may chenge their
point-of-attaehment to tqg internet without ctmnging tjioir home fP
adzfress. the connection oF a dev¡y to ty ¿,
S Thfu a1loß'a them to wiaintein transport and higher layer corinectippg
10. Code mobility ls realized without the need to prepagate hoat•speygg 8. They are unique in the aentt that
one connection te the internet.
11. Mobile IP is a protocol which provided TP mobility to tufiure devices.
4. T'wo devicea on ibe internet cao
1i'.ntlt1es of mobile I P i Following are the important entities of mobile Ip . aa<ne tizzte.
5. On the other band,
connectiorio to
1. Moblle oode (ñgNy : A ayatom Anode) thac can chango the point of
connection to tt›e network without ckeziging ita IP addreae.
ñ Home agent fttAl: A system in tha home network of the MN, typically OR
n rrvte›r rrgistera the mention of the MN, tumiels IP datagrema tu the Liat töte ezttitieu oF zoobi\e IP eod dea<zibe data tzaaa£ez fzozs • zaob\
COA. Ie
d. Foreign eg•ait IFC) : A syateai in the cunent foreign network of the \s•de to a Fsxed oode aodwioe-s'ezea Wby aod sebeee i• eacapsatatioa
MN, typically a router. It forwards the tunneled datagrcrna H tho MN,
typicelly alao the default router Vor the }yfJ I.
4• £Iare•of-oddreas fCOAf: Address of the current turret end-poi•t ter
the MN let f"A or MN) ectual location of the MN from en IP pnint of uiew, E • i t t i • s of mot›ile IP : Refer Q. z . u . P•ge 9zJ, Unt-2.
it cen h'u chosen, for example, via DHCP.
Working of mobile IP pr paoltet drliueey >° •
1. ¢ q@nt nodel Giants t dato
A8 ahoWn in Fig. 2.27.1GN ‹•
> to MN (mobile node1, the follo & • H• "
'
dleousu tha fe itures of iPv4.
b.
AN docs not Know whother MN i8 *8 8^ ° e
4. 8iuce, ü\e WOP pcoLocoLs provîde acoœœo0-interfacefa Lhe u9pcr \ sgg Refer Ç{.
2.1.
a protomls the security, session and application layers are abh to
q ind•r•ndently of the underlying i Ce1)spüWiog
1. The WAP pro terola are designed to operate over e variety of di8ereet ii. Near and tar pr°ble°
wirelesa network.
Jgj•pt yryicgg, tnc]uding ghort rAû8S8$b, Cifittiit•8Wikb6d dAt6, FAd üi. Bidden teræind p °b!e-
packet datft. Asg Refer Ç!. 2.9.
104(IT#8)•
Wireleas Network
I
Q. 3. What is bluetooth ? Defioe tecboicaJ Big@^tÉicatIo
bluetoeth. Describe the bluetooth stack ope t{
Refer @. 2.16.
Q. 6. Diseugs wireleas
applieatàon protoool
arehiteeture.
Refer Q. 2.31.
Data Management >suee 10'f fI'f-8)
Mobile GO P< t '°$
jf fft of attachment
b. The lot;tttion of mobile elements and therefore ement
CA
Wireless medium to the {'ixed n e t °
s e c t i o n management
‹L Portability of mobile b. Where t4 BtOT pcation inform
devices p should be respottsible for
• Data replication generates and maziage8 multiple copies of data
ia
at one or more sites. nf¡guration of a sys>< ‹act a l lu d e s o1obiIe e\eaent
4mtñbuted
maF have to re ¥
b tgnee, ouMoo"s"”’”e client
. ’vit
pfferod reliable
In mobile com utin , « • • i i m bile technplogy support broadcast data ofdei‹ ®
tbe arid
load at
°
A 8rver broadcast information to all mohile clients in ita cell.
iv. Wireless °
Theae
° two
different ° •8mt8 introdu
er hand, ce ngOnly
clients acceas datfl when data
w mechanism management
needed.
for traditional client leas reliable
server distributeddatabase 8yg@
Data Management laauea
Mobile Computing
e. -Ëved træsactżone due to æobîîtt
The mobile
;ø,¡ş, data ædusers æid e• e tO frequent diaconiiectiooa.
O gppport æid hæidle concurrency
f The
. øgve,q„ą¡8COæectio d æ^ ual consistency of replicated data
n 1. Mobile transactions are, in general, distributed tranaactiooa
where some actions are performed in mobile computers æid
otbese lv fixed hoate.
2. It follows tbe ACID propezżiæ, be., atoozioțy, conaîatezu r, żsołaŁioo
æ Who is the attacker ? æd durability.
M«t are the vulnerabilities ? What are the weak linl£ø in the These properties are hard to enforce, especially when the mobile
gygt
coæputexB are disconnected.
What could be the possible exploitationn of theee vulnerabilities by
4. In the disconnected case, techniques like two phaae Iøćkipg øod
the resulting attack ? two phaøe commit may seriously affect the availability of the
What need special protection? database system.
e. To prote c t ouz aeseta front a t t a č k h o w æ u c b d o e s t b e sectLrÎty
S. for example, when a disconnected mobile computer ownø a lock
over datøbaøe itemø or if other are waiting for the mobile
8
aysteæ cost żo tezœs of æooey resources and t î œ e ?
computer to know ifàt ia ready to perform a commit or not.
When security øystem is deployed, to what extent will it affect the 6. Therefore, it ia necessary tø provide transaction support for mobile
openness and add to inconvenience ? environments.
a. Is prevention better than cure ? If prevention is expensive or Thua, trønøaction management is a core component of modern
impractical, what iø the strategy to recover from the loss following database øyatems.
attack ?
& Isøues relatżny to Quality of Sen•eżce . h. Data dźøøe atiozn :
a- Quality of Service (QoS) in a mobile network is affected due to 1. Cienerally data dissemination is done by using broadcasting.
network cooziectivity. 2. Broadcasting consists of the delivery of data from a sezver
b. POS toolø measures the bandwidth availability, which controls data to a large set of c•lienR.
traziefer rates, connection reliability and data-loss risks. Soæetiæes, It ie slso called push based. Îa pusb kased, tžte sewer
avoids żatezzzzptiooa caused by zequeats o€cheota tbe
e
’
c. Mobile device applications adapt TO POS. POS is impurtæit
›zse oftžze baødwidtÎz żo tbe upstzeaœ dżrectźoo.
consideration in distributed multimedia atreamø.
4. The main aa ts of the broadeøsting system are the clients
d• QoS iø importæit for adaption of visual dísplaysonsœøHscreento need and whether to send the data peNodically or aperiodicølly.
a certain sustainable level in caae of loss ofeounectìvity and lone of
5. Periodic push meøne allowing clients to discoiniect for certain periods
and Ttill not miss out items.
"'" of æo ice ^•æputžoB ozs tz•aoaactźoo Aperiodic dissemination means effective way of uaing hazidwidth
available.
tžte OR
processing. &WBtÏCØBtiØQ Chi be achieved by using multicast addreasea.
m Query eoeeaaiwg :
1.
Q12er¡y prOcesaiog iø affected when mobility is considered.
Data
kid
ri meth h ob
@ H h n io m iz e CPU, i n pufoutput att Mobile Computing
pli
3. 2. The client and server have wireless connections.
z a mobile dixtributed environment, the COM
m a c h more dilficult to e s t i m a t e because the &Obile hoats
e Bld 3. A cache is maintained to ho]d frequent data and transactions so that
suited in different locations. they are not lost due to connection failure.
4. The work related to query processing in mobile 4. A database is a structured way to organize information.
lh 5. This could be a list of contacts, price information or distance traveled.
how to deal with guerres with location constr , r.e.,
involve the individuel locations of users. •int
6. In mobile databaee, user would requise to aeœse and update
5. Berause the location of users is not exact information from filea in the home directories on a server or customer
more dynami0- records from a database.
& CaekJ•g • 7. This type of access and workload generated by such uners is
different from the traditional workload seen in client server systems of
1. Cachñig is a widely
today.
used mechanism performance and
8. With the advent of mobile database, usera can load up th•.ir amart
2. availability. phonee or PDA with mobile database to exchange data remotelywitliout
The fozmer
main difference between
occure after caehing and
tbe retrievaJ nnd nue of the date worrying about time or distance.
latter in a priori way.
3. replicatioq WeedInformation
9. for mobilecan be synchronized with a aerver database at a later time.
databases:
Especiatly in a wireless mobite environment, eachin@ 0 freq tI3
f uen 1. Mobile users must be able to work without a wireless connection due to
aeeessed data in a mobile node's local Storage cp reduce eoergy poor or even non-existent connections.
and bande'idth COnsumption es weli as queeg de7ayg, #bü
same time increasing the system's the S. Applications must provide significant interactivity.
e 0/
4. lfowever, a fundamental issue when considerin caehing P°8Ôes R Applicatioris must be able to access local device/vehicle hardware such
data oonsistency. g as printers, barcode acannera or GPS units.
5. @
 clieot æuat aJa'ays ezzsure Abat data la ice 4. Bandwidth must be conserved.
cache is up-@-dätt y
order to be able to provide valid responses in submitted queriea. 5. Ueers do not require access to truly live data. but only recently modified
• Data
liL8ti0n generates and copiea of data gtp
fr more sites, whieh allowt an e nterp rise
°*8nziization. to 8 h a r e corporate data
2. It provides• back» ' J ‘ O t
cQBe of 8x8tg2fj failure
that iflitf8lly used in traditional
nvironment R increase availability and tu improva
4.
the Oharacterized b •d infra tru tur»
P°manentyl ••nnect d In the network. whenresources and are
t h ä t Î2jkve suflicient
mobile environments.
• fr devicea such
7
. z preven pt athe
œ , ba*>w power and processor capacité.
ri t P +8Ôo£t Bystezzt from creating and
he uaer device.
g sponsible for the creation a td plã‹;ø $g$ Mobile Computing l l ' 7 UT-ßł I
e. Aløo, a large nu mber of messages re q u i re d t o coordinate
5 synchronization.
te• pe forrøs these er locates Phc-forreaĄ” ’ ” ” M
ensures replica y b2
6 a. Asynchronous replication isa technique for replicating data
. and update message after each svri£e resp) between databases (or fíleø systems) where the øystem being
conßict6-
replicated does not wait for the data to have been recorded on
2. The dupłicatf sj'StOfD before proceeding.
appJİCźtti» interface and iøt b. Here the target database is updated after the source database
$. tion they store this change in
Next
respectively.
required context they n0tify different modules C Alsp, the delay in regaining consistency may range from few seconds
tion . to several hours or even days.
freplica Pla n n e r,
tOCa] consistency nsønager) of this Aøynełironous replication has the advantage of speed, a I the
Change. iiicreased riøk of the data loss during communication or duplicate
q. To improve the performance and øystezzi failure.
e. It ia ttie latest technology to provide fault tolerance for server
11. 'the systeæ state ment tor parameters and network storage.
e t,
and notifies the replic£t pt consistency 9bOD bese f. Unlike previously used replications technology,
Țpø
12. manager of this cbangø. asynchronous replication technology works by cept uring changes
tiœe d O¥¥t It in files at the operating syøfem level Ibyte level).
applieatiø* deplo • t
. g. As previous technology like iàQL transaction, replication works
the within applications or at hardware layer.
the btPfltegy jØanager ehooe single updsfer forzzi of replication where only the publishing sites
aø°
C•Onsiøtency PIGmentøet the adapted bitrat egy, ensurøø
cha upda te tbe da ta ) axed n e a r re a l t i m e re p l i c a t i o n s c b e æ e s .
same or øJj
b.
Ön&pSItot data repÍicatiQns @ leØt suited tp applicatioj2ø i n c h are
In t i n i i ee d of current data.
appIieaÒons are found iii data wørøhousing pr dsta minizig
eeZ ^s -r e a l **œ• ecżsżoa suppoz”t ByGtOŒ S.
A '•&P real tim e replication employø triøøers that are stored at each
fOr °'* Rd combin ations. There are local ttatahase and executed each time a part of replicated database
mtunly t h r e e s y p y
is updated, P"OPb^üngtAecAœigeaMtheotberreœoœ
databases iS a e
. M datø are to update Wnnnparently and rudeprudent
theaodusere.
the data Avebeen the system g zeplieated dœ8 he P
zecprded o„ tile dupy cø øyø@ø f. tit ORpush
procedures stPãtOØ3f, the BOurce d a t a c o n t r q t ø the data replication
scbeæes, the \ocat
to aM a e determine the replication processes.
*Pdateø are applied g.
The d a t a b l e rep repJiøøtjqp••py$t,p push replication, a publisher SltR COntPOl5 when replication is tn
pli ept ' ‘ state ° øYncbronization.
are that hold replicas wisżi 'npuüfrepÜratiogCgesøb pp sites determin when they
Whfle e
9
a
e
â
Ë
e
8
i Tune in broadcast, obtain pthe te ppral offset of tlae ne eontrol index
. be'+ct ••d go to nose mode.
«¿«p«m»t ihe tu»e »Cih°•Pe‹°e«W mA*.0ear
target data zd.
wbetfier
mns,ou ‹he
to : #.
tbe requested data bad already paeaed oyer, go
q@g mode again un tfi the be g of the next broadeMt And proceed
Data Management Issues
Mobile Computing
Applications areas of clustering:
• C]ustering is a process of organizing data Objects into 1. Biology: Gasaificationofplantsand according to their
groupe whoae members are similar in spme manner. features.
• Adaptive Clustering works on wireless network infrastructure, which 2. Library: Ordering of books.
is fast and deployable. 3. Mariceting: Finding groups of customers with similar behaviour
• The CODA (Constant Data Availability) file system helps to given p ]arge database of customer data containing their properties
maximize the client/server ratip. and past buying records.
Jity•PIgnming: Identifying groupa of houses according to their
house type, value and geographical location.
QueaÖonsAoswers WWW : Classification of documenta and clustering the web data to
discover groups ot similar access patterns.
Lung Answer Type and Medium Answer Type Questions
Wbat do
is used for æobxle you
eee uzsderataad
seizet ztetworlce 7 by cJuatezîog 7ITow clustPxtog
Discues.
B
D
3. DifiPovering clusters with arbitFlt Pxshape.
4. Mabitity. î 2” 4 6
P•ig. 8.9.1. Conventional cellular networks (single-hop).
5. Dealing with dÏfferent types of attribuées.
g.
In the Fig. 3.9.1, a mobile node is only one hop away fri3fFla base StHtiOD.
6. InterpFetabilitÿ and usabÎlity.
D a t a M a o a g e z a e nt Iasue Mobile Computing
otobtle n o d ee t o u a t b e t b z o u g b f t x e t Page 11. The system topology is divided into clusters with independent control.
12. A good ctusterTag echezae wdl tend to preserve its structure wbezs a few
in ed backbone.
nodea are moving and the topology is slowly changing-
situation.
a mobile node may not be a b l e to acceee tbe wired 13.
ll. If a base •t^+ ••wetg¡jt,
ng.3/l2ghO tbe za\aft Og Otherwise, high processing and communications overheads will be U
oetworRi°# giagte-bop. 14. to re-construct clusters.
.8
B wi t i ›? a a c l u s t e r, it s b o u l d b e e a s y t o s c h e d u l e paclcet traoeaziBsioW
. ', ' D to allocate the bandwidth to real time traffic.
15.
Across clusters, the spatial reuse of codes must be exploited.
16.
Since there ia no notion of clusterhead, each node within a clusttf
iH is permits us to avoid vulnerable centers and hot spots of packet
17. qtreated equally.
traffic dow.
physical layer for mutual location and identification of radio G : the set pf ID's of my one-hope neighbours
nodes.
c. A8 : Network topology does not change during the algorithm
A2 : A message sent by a node is receiving correctly within a finite if Amy id == simon›
execution.
time by all its l-hop neighbours.
9. We can find trem this algorithm that each node only broadcasts one
cluster message before the algorithm stops, and the time complexity is my_cid = my_id;
Ot | V I) where V is the se* of nodes. broadcast cluster (my id, my_cid);
l0. The clustering algorithm converges very rapidly. r -- r — fmy_id);
11. In the worst case, the convergence is linear in the total number of
nodes. Consider the topology in Fig. 3.11.1.
y¿ I3
1
14
f
1 1•i on reeeiving cliistered (id, cid)
t0 6 1
4 2
19 18 6 7 set the cluster ID of node id to cid;
if(id == aid and (my_cid == UNKNOWN or my_cid > cidl i
tab System
topoiogy my_cid > cid;
r = r — tidi;
C3 14 15
iflmy_id == maintU))
1
10 66 1
4 20 if(my_cid == UNKNOWN) my_cîd = my_id;
î9 5 7
18 broadcast cluster (my_id, my_cidJ;
8 9 G = G — ]my_id};
Ib) Cluster formation
Pig. 8•ll.1.
12. After clustering in Fig. 3.11.1(b), eve CitR field Six clusters in the system, if(r --o›
which are fl, 21, (3, 4, 11), (5, 6, 7, a, 9|, (10, 12, 13|, (14, 15, 16. 17Î, lt8,
19,20} stop,
13.
To prove the correctness of the algoElthITt we have to show
that :
a.
Every node eventtially determines its cluster ••a OI2I2 One
cluster.
D • t a Man agem e n t lasues Mobile Computing l<> f -
13. Like Venus, a file server runs as a user-level process. lu addition, tru6te8
; g ; 3 3 r ] W h . t Was „i. m o t i v a t i o n f o r d e • i g n i » « ‘*•• CODA Vice machines are allowed to run an authentication aerver. Finally.
update proceseea are used to keep meta information on the file system
gBtem t piscu«s CoDA file syutem in detail.
consistent at each Vice server.
14. CODA appears to its users as a traditional UNIX-baaed file system , lt
supports most of the operations that form part of the VFS 8peCifîC£tt1OO•
OR
15. Unlike NFS, SODA provides a globally ahared name space t h at is
Expla in CODA file Bystem. maintained by the Vice servers. Clients have acceas tn thia
namesp ace by means of a special subdirectory in their local
namespace.
1. CODA was designed to be a scalable, eecure, and higMy available 16. Whenever a client looks up a name in this subdirectory, Venus ensures
distributed file eystem. that the appropriate part of the shared namespace is mounted locally.
2 Mobile client
An important goal was to achieve a high degree of namin g Bfid locatloil
. Application Cache Ste e
tranaparency so that the system would appear to its uaers very similar
to a pure locnl file aystem.
3. By also taking high availability into account, the designers of CODA
have also tried to reach a high degree of failure transparency.
4. CODA is a descendant of version 2 of the Andrew file system (AFS), and
inherits many of ite architectural features.
S. CODA follows the Bame organisation as APS.
6. Every Virtue workstation hosts a user-level process called Venua, whose
7. rale is similar to that of an NFS client.
A Venus Process in responsible for providing access tt, the files that are
8. maintained by the Vice file servers.
In CODA, venus is also responsible for allowing the client to continue
9 operation even if accees to the file servers is (temporarily) impossible.
. This additional role ia a major difference with the approach followed in
10. The important iasue ia t h a t Venus PtjnB as a user-level process.
11. AgBI•, there is a eepazaLe Virtual EJle ¿ g y m gag) layer that intercepts
all celle from client applications, and forwards t h è s e calls e i t h e r to the
local fde ayatem or to Venus .This organisation with VFS ia the same ac in
NPE. e D1B42UBB the co mmunica tio n of CODA file Bystem.
12. Venus, in
°› °° 88b9s With Vice file oervera using a user- level
System. The RPC system ie constructed on top of UDP datagrams
and provides at-must-once aemantics. There are three different server-
side promesses. The great majority of the work ia done by the actuel Communication in CODA te done through remote procedure call (RPCJ
Vice file servers, which areres$onsible for maifttaining a local 8nd RPC2 systeme.
of files. coliection
2. In the call, each time a remote procedure called then RPC2 client code
starta a new thread that sends an invocation request to the server and
get8 block until receives an answer.
$ y g) I ssues
Mobile Coniputing 199tEY-8) J
t Data u anagerne n
3. £i a n d s e rver
Jn this case r e q u e s t i n g process stay take arbftr8Pÿ 8i
sends message tu cl ont reful ® rlY
4. Reply
nrc Applieatipn-epecific File Identifiers : T h e collection of shared files are replicated and
distributed across multiple vice servers. CODE contains physical as well
effect as logical volume. A logical volume contains replicated physical volume
i nfe ct and replicated volume identifier (RVID). Each physical volume has its
owm volume identifier I VID). CODA aasigns 96-bit file identifier to the
RPC tlient file 8ystem.
Stub RPC server
stub
y D•scczes tbe seo= iw in CODA• A1ao, exptaizs tbe feat«res
11.
A• important de8ign issue in CODA is t h a t 8erver keepg track of which
clients h av e a local cfipy pÇ ¿t j5jg.
12. Whezi file is modified, a server invalidates Generally, the security in CODA is divided into t wo parts :
•• a1 copies by notifyjng the
8*ppropri -tte clients through an RPC. 1• A u t h e • i t i c a t i o n a n d s e c u r e c o n n e c t i o n : I n this case, RPC2 package
13. If a server can notify only one client at a time, i n v a J d a Jg works. This package has a mechanism for security authenticating clients
nsay talte some time i t all clients to Berver and vice-versa.
ta F'ïg. 3.13.Spa).
14. shnwn
Henee the problem is •au•8d by the fact th&t A c c e s s c o n t r p l a n d p ro t ect i o n Database : The directory access
Bn RPC may fail. To
overco me this problem , the server rendu Control list protects the files on coda aerver.
invalidation m essag e tu all
clients in parallel as shown ioFig.S1l2fbt
Data Management IBsuee
Mobile Computing
F'eatures of CODE :
6. The CODA
1g1 (FP-B) J namespace ia mapped to individual fde servers at the
t. It ia freely available under a liberal license. granularity of sub-trees called volumes.
2 Server replication. At
7. each client, a cache manager (venus) dyna3nically obtaina and cachee
volume mapping.
S. 5ieeurity model for authentication, encryption, azid acceaa control.
4. Well defined semazitics of sharing, even in the presence of 8. CODA uses two &ietinet zaechaos
izoe to achieve bigh avatIabi1ity-
networà friture. 9. The 6rBt ¥lteckardsza is aerver replication, wbich a1IowB veTuzaea to have
5. Goed scalability. read-write replicate at more th an one server.
ii.
Th e set of replication sites for a volume is known as volume storage
group fVSG).
The aubaet of a V8G that is eurreotly accessible is a client's accessible
, t he clients in C O D A 7 Tfow -
in CODA †
fil"oonnected operationa p e r fo r ni e d
01
VSG (AVSG).
The second high availability mechanism used by CODA, takea effect
when the AVSG becomes empty.
l While disconnected, venus services file syatem requests by relying solely
on the contentB of its cache.
cOÔ8 AÏe ByfiÈe¥Œ: RÆjez' @, a.12, Pgge \g , jyty- 14. Since cache zniasea cannot be serviced or m asked , t h e y a p p e a r a s failures to
g replication programs and users.
Disoooaected
1. Oisconnect edoperatiozsa
operations isizs coq.Æ
a mode :
ofoperationa t h a t enablea a client to When disconnection ends, venus propagates modifications and reverts
Continue acceesing critieal date during tempor toserver replication.
y failures of ahared
data repoeitory.
ü Desig n the CODA file s y s t e m a n d ex p l a i n the
2. lt is a teæporary deviatioa froæ ooztoaj operation as a client ofa ahared
different s t a t e s • Dz‘Bw t5ze atBte t z a o s i t î o o d i a aæ
3- aztô diacozszteeted
operation in C O D A file aystem. U P T U S0k4-ïfi, M a r k s 1 0
Disconnected operation in a file sy stem is indeed feasible, efHcie nt and
usable.
OR
4. The central idea behind tliis is t h a t t h e caehing of d a t a , widely used tu E a p l a i n t h e variouB venus states for diaooonected operations.
improve Performance, can a18o be exploited to enfance avaüability.
Clients in C O D E :
1. CODA contairie a far
Be uOCtiOl3 Of‘ïîTttrusted £I]{ Y clients ao d a szgalÏ
C o l a file system and its states : Refer Q. 3.12, Page 126J and Q. 3.13,
° u m b e r of t r u s t e d UNfX file servers.
2. Page l27J; Unit-3.
Each CODA euent has With the aervera
Dis0onriected operations : Refer Q. 8. l5, Page l30J, Unit-3.
over a high bandWidth network.
Ve n ua sta tes :
At certain times, a client may temporariJy unable to eommunicate
or al l
CS b£ty be due to a serv i r o r network fritur e, or due to the detachment Ofä
some of the servers. 1. Hoarding, e m u l a t i o n anA r e - i n t e g r a t i o n a r e t h r e e s t a t e s i n th e
4. disconnected operation in the CODA file system.
portable client from the network.
2.
These three atates co n e under venus states o r i n other words it also comes
Clients view CODA as e 8ingle, location-trang under discoruiected operation in CODA file syatem.
system. parent s h a r e d UNIX file
Data Management Iøøues
Mobile Computing
L Boarding :
a to this stat•, venus hoardø the uøeful data in anticİpatİon
It o2&HSBB lts cache in such a way that balances the needs of
VERYIMPORTAWTØ g o
b.
cpnnected and disconnected operation. EofoMfiMf gØa M # H o o a Ø r e u e y £ nqŒwfo o € 7 7 m a e qmieafźoøm
zzs•т 6e aeAed ›z y o u - s B S s i O W x z л a a x eżż a
c. Many factors complicate the implenientatinn of hoarding:
i. Disconnections and reconnections are often unpredictable.
Activity at other clients muøt be accounted for, so that the
latest version of an object iø in the cache at disconnection.
1. What are the various data management iøømeø 7
Since cøche øpaœ iø finite, the availability ofless critical ofjecta Refer Q. 3.1.
may have to be BBcrifieed in favor of more critical objects.
Ø. 2. Oiemxas Łbe zseed o£ æobżže database.
œ It is a trønøitory state through which venuø paaøes in changing Refer Q. 3.3.
roles b•om pseudo-eerver to cache manager.
Q. ß. Write short note on døta replication.
b. Re-integration is performed a volume at a time with all update
Refer Q. 3.4.
activity in the volume suspended until completion.
c. During re-integration, conflicts are detected and, where possible, Q.4. ĄRatdoyoumeæobyoluetering?
automatically resolved. ŒWn ReferØ.38.
Q. 5. Det'ine multicluster architecture.
ø. When the number of eerverø in the clients AVSG(Accessible Volume
Storage Group) drop to zero, bringing in into an emulation state, mmn ReferØ.110.
the behaviour of server for the volume will have to be emulated on QE. jilain C O D A life system ølong wàth ita operations in
the client's machine. 8. disconnected moAe.
b. It meønø that øll file requests will be directly serviced uøinø the Refer Q. 8.12 and Q. 3.15.
locally cached copy of the ο.
e. When a client ia in itø emulation øtøte, it møy
still be able tn contact servers to mønage other volumes.
Venuø statøs ønd tranøitiona are shown in Fig. ß. t6.1.
Hoarding
Logical
reconnection
Disconnected
R e-íategra-
Emulation tion
Physical
reconnection
MGbíIe A g e n t
c i•ttpu
ø bije agent is a comp Mobżłe C'oæputżag
5
e a b l e t o move frt› m o n e cp m p t t ț p tp
. £
3. Mobile agent toolø ø2íu men ønd may have security' bugy and s. Dispatch : An agent travels to nexv hoat.
vuinerahilitiee thøt are yet unJrnown. g, Gleaning: A twin agent fø bor» and the current øtate of
the original iø duplicated in the clone.
4. Network teøt øuiteo tend to be relatİvely large. 6lønaging many líøht deactivation : AZi øgent iø bmugÒt back from a p@ ]jj3g{ øjø
wit]q
5. weigbt agents introduced additional communication and coptøp]
Mnłrile agentø are not a mature technology and moøt øgent development itø state to the øource møchżne.
overhead.
loose are alpka or beta vereion.
Dłøpoøøl: An øgent iø terminated ønd itø atøte iø loøt forever.
Bxpłaio tbe æorłcîzsg aa 1žf'eeycfe of' a æobiJe ageztt. C;omtaiunication : Notifies the agent to handle meøøages incoming
from other agents, which is the primary means of inter-agent
correspondence.
1. The mobile agent iø created in the home machine. Diøeusø the vøeiouø mobile øgent øyøtpmø,
2. The mobile agent iø dispatched to the hoøt machine ‘A’ for execution
3. The agent ezecuteø on hoøt machine ‘A’. MobHesgeotsyete-:
4, After execution the agent ia cloned to create two The following øyatemø are the moøt prevalent øyatemø which are currently
copies, one copy iø c a t c h e d to hØßt machine Band the other iø øvøiløble :
diøpøtched to hoøt iøø
g Høøt Agent TCL, a product of Dartmouth Coßege, prnvideø an agent
execution environment that allowß agents implemented in secure
machine language like Safe-TCL and java to trønøport themselves over the
M.A MA network and communicate with local azid remote agentø.
b. The agent TCL øyøtem iø a model of øuppurtingtranaportable sgent.
MA c. The architecture of agent TCL iß based upon the øerver
model which cunaistø of four levels øs shown in Fig. 4.4.1.
Hoot machine A Mobile agentø
O° % TCPflP E-mA
Host machine B
Host machine C
Mobile agent : All the services that øre available within the
system are provided by øgents, transportable or stationary.
B
Thø cloned copiea execute •» their respective hoøta. $n'teryr Lør : The execution of agents is handled by an
. interpreter that ia appropriate to the øource language of the
B Î20ßt ïMachinø B and C send the mobile agentreceived mobile agent.
by them back to the home tjqachine.
.
7. Server : It handlee the management of locøl øgents and
The home møchif2ø interactø With the agents ønd
thø aøents is analyzed. the d a ta brought by izscoming agents. The server alao provides mechanism for
enforcing security, providing ahierørehieal namespace in which
A £Dobile a g e n t experienceø the fo agents cøn be referenced ønd allowing agents to address each
llowing eventa in itø life cycle :
!• C r o a t i a n : A brsnd nøW agent is bom and its other locally.
t«R ia initialized.
MobûeAgeotCODiputin Mobile Coniputing 141 HT-8) J
iiL
File cahinete : F'ile cabinets are local storage units 8sSociated
p. : Thèse are fiie
wluch agent each o t h e r. Agents move with a place. By this way, agents can ppmmljj jpate with other
agents that are not yet at that place. For example - agents
between aitea in st ate-orie nted faahion by i s s u l n g t h e xu•bility
implementing a divide and conquer algorithm can mark places
gpmmands lik e agsnt_jump. The a g e n t a e x e c u t e i n the already visited by leaving a folder in a file cabinet at that place.
înterprete P8 and os e the ÿgpilities provided by the setv e r t p
th c. 'I'he TACOMA system uses a firewall type mechanism between the
q ¡ g r a t e from machine to machine and to communicat t l
agent execution and the host system to protect the host from malicious
other agents. agent a. In this marmer agents do not need tn be implemented in a safe
2. TACOMA : language.
Connell Moving Agenta) is
wi 4 Discute Une requirenienta for the deBigzi of mobile
b. T COMA syatem ofdefines agent
developed by University Tromosoanand agent based system with
Connell.
The abstraction s of agents, places, briefcases, folders a n d ñ ie C£tbinets.
ù Poldera : Poiders are named objects th at
cpntain a Qt p¿ element in raw data form.
ii. Briefease : Briefcase are containers that 1, There are many tecbnical challenges to Amplement mobile agent systems.
each agent owns Briefcaae contains folders and is need for 2. Most ofthese problems are izi the structure of the oomputational medium,
the environment the agents operate in.
comm unication . Fo2’ ezample - an ageal h i g h t zzieet another 3. S e r v e r s must be designed, implemented, aad deployed t h a t n o t only
agent by p resen tJg that agent with a briefcase. The briefcase in allow mobile agenta to run, but allow them te run safely.
thia example might contain a message for the other agent. a. Portability :
é Mobile agent cnde itself must be portable; when an agent arrives
at a server the server needs to be able to execute that agent.
ii. Most mobile agent sxstems under development now rely, at
least in part on virtual machines to standardize the ezecurion
environment.
Ofsecurity are p o s s ib le I n Prnteet servera from ii- These denial of service attacks caxi be launched intentionally
by running attack scripts te exploit ayste vulnerabilities, or
glpinctioninä and hostile a g e n t s : physical
8OÖ S O C I O .
unintentionally through programming errora.
1. Physical se•u•*‹y refers tO b ¥l din g server s for agents in
am agents ca 23OOÊharm the server. iii. As a mobile computing paradigm requires 8n ngent platform to
awayt%attbe
s using aocial ££ccept and execute an ag e n t whose code may haut &e
to s r v r s e Co r i t y i
›'v second approach e e
developed outaide ita organisation.
eement mec haHl92OS tp pixnish the creator s of
enfor
p agents. iv. Tbia type of agent may carry malicious code t t W ed
m Agent si P disrupt the services offered by the agent platform, degrade the
performance of the platform, or extract tutor i anos for which it
•
The complement of server security is agent security; whether has no authorization to access.
the agent con bust the aerver on wÏiiChit is executing.
O fätÎo¥l SNCF
ii. A m o b i l e a g e n t migl2t COntf1ÎH e pe t
CS
proprietary dBt8 algorithm*. i. In this, an agent can obtain access to sensitive data y exp1°itin8
security weakness.
i. If economic control BOd incentive are going to be factors in tL Applying the proper acceas control mechanism requires the
netwide reaource, use some mechanism tO account for the platform or ngent to first authenticate a mobile agent's identity
resources that an agent uses and a way for receiving payment for before it is instantiated on the platform.
those resources is neceBsary. iii. An agent that has access to platform and its services without
Wh£kt IB m o b i l e a g e n t 7 seusa the server a r c h i t e c t u r e having the proper authorization can harzn other agents and
&2a tO & ZZkOO platform iteelf.
w i t h t h e h e l p o f diagram. Also, list the seeu ty t
lB R Agent-to-Agent: Agent-to-Agent category represents the eetofthreats
ag e nt aystem. 1 • . in which agents exploit security weakness of other agents or launch
attacks against other agents. This set of threats includes the foMowing:
œ Masqoerade.
Mohile agent : Refer Q. 4.1, Page l35J, Unit-4.
Server architecture : Refer Q. 4.4, Page l39J, Uzrit-4. i. Agent-to-Agent communication can take place directly between
two agents or may require the participation of the underlying
Security threats :
platform rind the agent services it provides.
1. Agezit-to-Platform : The agent-to-platform category represents the
set of threats in which agenta exploit security weakness of an agent In either case, an agent may attempt to disguise its identity in
platform or launch attacks against an agent platform. an effort to deceive the agent with which it is communicating.
Following are the act of threats : For example, an agent may pose as a well-known vendor of
m Masquerading . goods and services, and try to convince another unsuspecting
i. When an unauthorized agent claims the identity of another agent to provide it with credit card numbers, bank account
agent it is said to be masquerading. information and digital cash or other private information.
ii- The masquerading agent may pose as an authorized agent in an fe. DezziaÎ oC
aezwîce
i. : Agents can also launch denial of service attacks against other
effort to gain access to services and resources to which it is
not entitled. ageztts.
iii. The
masquerading agent m ay also pose as a n o t h e r For example, repeatedly sending messages to another agent,
unauthOriZ¡ed agent in an effort to shiff the blame for any
fiCtionsi fOP which it does not want to be held accountable. or spamm ing agents with messages, may place undue burden on the
Ïz. DezzîaÎ o€ sezwîce . message handling routines of the recipient.
i-
In thia, an agent may attempt to consume or corrupt a host AgontS that are being spammed may choose to Stock messages from
resource to preclude other agentn from accessing the host'a
serviœs. unauthorized agents, but even this task requires some
processing by the agent or its communication proxy.
Mobile Agent Computin$
Re p u d ia tio n occurs when an a g e n t , p a r t i c i p a t i n g i n a äi. Since the platforœ has accesg to the agent'a code, s t a t e aOd
tranaactiOn or commuxñcation, later claims that the transaction
data, the visiting agent must be wary of the fact that it m B J b9
or communication never took place. exposing proprietary al g o r it hm s , t r a d e s ecret s , negotiati on
strategies o r other sensitive information.
Whetber the cause for repudintion is deliberate or accidentel, @ozz
information, the platform may be ahle to îofer æeaoîo
i d e n t i t y s eocf rtethe
repudiation cao lead to verrous disputes that may not be easily the types
iv. Even thoughof services requested
the agent may notand be from the exposing
directly t
agents with which it communicates•
resolved imless the proper couuter measures are in place.
L If he agent
t platform he weak or no control mechanisms in
place, æi agent eau directly interfere with another agent by i. When an agent arrives at an a g e n t platform it is exposin& &
invokiog its public methods (for exemple, attempt buffer code, state æid data to the platform-
overflow, res et to in it i al s t a t e e t c . ) , o r b y a c c e s s i n g and iL Sioce an agent may visit several platforms uiider cartons
R Platform-to-Agent the. agent'a
The platform-to-agent
data or code. category represents the
set of threats in which platform compromise the security of agents. This security domains throughout its.lifetime, mechnniaZ£tBZODBt
set of threats includes the following : be in place to eoeure the integrity of azi agent's code, s t a t e and
œ NBœquerade: iiL A compromised or malicious platform muet be prevented from
modifying an ogent's code, atate or data without being detected-
i. One agent platform can masquerade as another platform in
effort te deceive a mobile agent as to its t r u e destination iv. Modification of agent's code, and t hus t he subsequent
and eorresponding security domain. behaviour of the agent on other platforms, can be detected by
having the original author digitally sign the agent's code.
ii- An agent platform masquerading as trusted third party may
& able to cheat unsuspecting agents to the platform and Otfiemto-Ageznt : The other-to-agent platform category
extract sensitive information from these agents. representethe set of threats, in which external entities, including ogents
and agent platforms, threaten the security of an agent platform. This
The
iii. masquerading platform may f o r m both the visiting agent
set of threats includes the following:
and the platform whose identity it has assumed.
m Maaqoerade :
b. Dexrinl of service .
L Agents can request platform services both remotely and locally.
i. When a n agent ar r ives at æi agent platform, it expeets the iL An agent on a remote platform can masquerade another
platforni to execute the agent's request faithfu lly, provide fair agent and request services and resources for which it is not
authorized.
allocation of resources and abide by the quality of service
agreements. Agenta masquerading as other agents may act in conjunction
A UO p l ä t f o r m however may ignore ag en t service
ejqt with a malicious platform to help deceive another remote
requests, introduce unacceptable delays for critical tasks such platform or they may act alone.
CS àQÎQg m
k e t O r d er s in a etocîi market, simply not exeeute .
tbe agent’s code or even terminate the a g e n t w ith o u t lY. A remote platform can also masquerade as another platform
Notification. and mislead unsuspecting platforms or agents about its true
m identity.
Æavesdropping; ñ Îs• Îzzazzt€tozîzeÔ a c c e a a :
The ea ves‹iropping threat involves
monitoring of aecret communication». the nterception
i L Remote users, processes, and agents may
In and
ea veadropping , agent request resources for which they are not authorized.
coiztniunications, but ® C Remote access to the platform and thR host machine itself
ID D Î t 2’ o e2•y instructio n
executed by thep agent, a l l the unenc
b ingn to the latform, 8Od 811 Ue rypted must be carefully protected, since conventional attack scripts
or public data it
on the platform. subsequent d a t a generated freely available on the internet can be used to subvert the
operating system and directly gain control of all resources.
Mobile Agent Compute
Mobile Computing 14Y (IT-8) I
¡¡y q p t e administrati on of the platform's attributes
poucy may be desirable for gn administrator that ia responsible 3. Increased use of wireless communications further increases the cMnxs
for s e v e r a l d i s t r i b u t e d platforms, but allowing remote of eaveedmpping and Of compromising tire integrity of information
transferred between sources and destinations.
pd;ti¡ni*tration may make the system ad miniS tFfttOP‘Sa «unt 4. Whil£• it in possible to tap a wired connection also, wireless corrections
are easier tn intercept by using 8imple antennas.
c. Denial of sa the target
or session • of an £ttt8ck.
both s. while the Wi-Fi systems are quite p o p u l a r, many
£ Ag nt platform services can be accessed For example,
e remotely end ofWi-Fi have been well documented.
vulnerabilities
Ioca1ty.
The agent services offered by the platform and inter-platform
sru ted by common denial of service
attacks.
Agent platforms are also suscepiible to all the conventional
tyrequyrementsiomobHee8
denial of 8ervice attacks aimed at the underlying operating security
e°t
gjrStpt¥t or c o m m u n i c a t i o n J3FOtOCOIB. 1. The users of networked computer system have fo u l I2iain
iv. These attacks are tracked by organizations 8uch as the requirtiments : confidentiality, integrity, accountability and av8ilabiLty.
Computer Emergency Response Team (CERTS at the Carnegie The users of agent and mobile agent frameworks also ha'ife these same
MeHon University and the Federal Computer Incident Response security requirements.
Capability (FedCmC). 3 This section provides a brief overview of these securi
ty requirements
Wby aemzxñty cozscezma ?zz txad?¢iooBf ByBteoss aze aizople . and how th ey apply to agent ff8££tBWOF
6 u» s»<h es the statua ofthe progf n counter a n d f r a m e otack iii. TheBe agents mpjjjtor the aodgatber
°' of ezchanging mesaagea.
. is currently offlijjfjts for java p r ° &
7. t mobile agents poase9s • the friture of the home plofforzn or b MmoagerAgeo* ,
wellio disoonnected that °P°* °
the ®agents rely OU £t ° * f research projecta, £ ThïBremdeaattAel g ç¡ç e;and controle the agents during
° university of West Fl orida ar8 u8ing modified ÎÊ {t OBD LOf2’C'•late different lneaJ e v e n t s from v¿tpip monitppgd
auch as NDfDads at the
Java v irtu a l J p c h i n e s t o capture tïze fï aœe stack, to provide Becurity hoeta in time.
s £ i ry} C e s tha t pgj3 ge ptisly teduce m Alert Agent tAL4d :
Even a mobile agent can becoxne more fault tolerant
thoughmachine, by moving
to another the mobile agent's reliance on the safe operation of i. It in made up ofmany blocks like time stamps that include
g q ti p p e or t e d platforin places restrictio ns o n it g the alert message creation time, threshold event detection
q fuZiC,t*OOR1ig3f.
joe ers of mobile agent platforms are time, aJert case of aDy faizit and alarm infprziiation es
8lsofaœd with trade-off between Security and fault toler8oCe. TPell.
l0. For example, in order to addreau the security risks involved in “multi- ii. But this works under the MaM.
hop” agent mobility, come agezit arehitectureB have been built on
centralized client-serx er models requiring agenta to return to a central
aerver before mqving on to another host machine.
11. Clearly, addressing the security riakg in this manner renders all the
mobile agents vulnerable to a failure of the central server aDd raises
• A mobile transaction is a distributed transaction where aome
parta of the computation are executed on mobile hoat and some
1. A prediction mechanism ie built to identify critical 1 pama on non-mobile hosts.
host agents so aa to prevent failure. • Transaction proceaoingie information proceaaing tnat in divided
Therefore, updatizig of information in the system can be done in a
2 intn individual and invisible operations called transaction.
constatent fashion.
3 H°",dâsmedmofiæioNudest6eweigRMgMsWaCooie{bewéghn
. Of&oataœecooMdered.
4. The mobile agents which aet au monitoring agenta detect the unexpected
situations and then help in recovery.
5. Further the host dependence calculation ta proposed by the use of an
W Qto1 to Update weigbtB.
I Ot
2’WDPff$ critically oflioet8 in mobile system is heJng tgJpttJgtgd
7
. the boat agents are mo tored dyttamically which will result in
improvement of reaponae of 8ystem. Œ¥£BBCttOEt :
8.
Hence, proposedmonitoring mechanism bas the 1. The transaction is a mod8eling ° ' ¡ ° ° that &°uf'a 'u tiPle datsbsse
follOwing eomponente : accessea es an atomic unit fpr the purpose ofrecovezy, concurre»cyamd
i. In the whole modul
é of m»tYitOfîDg, thèse are at the lower const tency.
level i.e., they reaide
x Tbesa service 2.
A mobile transaction ia a distributed tr8n Bction where some parta of
o/dog Cables oats keep a record of i n f •=n tJOO in the form the computation are executed on mobile host rind some parts on non-
mobile hosto.
Mob*øAgeDtC° P
etezs•y øn tiiem.
records when multiple
L Rapid-spoose:
' uøerذ° procesmMM pgøjpple, database on different
gg-tø aocees af dißtríbuted ¡ø cølled a t r ø n • 8 f t i O O fOF
4 tnbuted
9rithin distributed traDB8ØtİOO b. B ażaeaa c a ø n o t • ï ' f • • d t o h ave euøto ierø w r i t i n g f o r a T P S
. the
’nate via “ eco oomüt protoCo1ł2PC)* (Tranßaction Proceaøing Syatøjjjj ø ppppond, the turnaround time
t Ą K
g’ oŒez's the poBBtbilżty zô tÏse pzoductîozt for tbe output
s. gprocesB
Reżźabžżity :
OODØpOÌt € state ofs øpxnputing deviceB g ț t g @ LIB Ț8Ț¥ÈO@B,
6. At Present, œ Many organizationB rely heavily on their TPS; a breakdown will
’tøJ øøsietant (PDA) øre available. ® Tyre powerÏ'uI. disrupt operations or even øtop the buaineøB.
7. mobile oevàces b. For a TPS to be effective, itø failure rate muøt bø very low.
e-
gspeedgodlODgeF#peratî g *› c. Y8'IP9doesf
f o r work proceBBíag
9. ypbile coØiptltina devi
®
theAquirkœmdemcsrat,ereooverymuetbe
tivity.
eqjjipments in every die <
of the g. I n f l e x i b i le.
ity:
10. Combinìog œ i t b tbe ezpa o Ą.speednetworkGke tbe
d.
a. Thia A T PmakeB wellevery
S wants designed backup and
transaction to recovery pppeeÕureØ
be processed eøgentiaL
izi the same way
in tern et, æoJaûe
regardlesB of the u s e r, t h e cuatoa ier or the t i m e f o r day.
b. If a TPS were flexible, there would be too many opportunities for
proceøsin łİtfŁt is ttivided into non-standard operations,
1. Transaction processin8 i» :•r orniation
y d j y d ø ø ț ønd mvisible øpoFźttions cølled transacti°-
s. Trønsaction processing iø deBigned tnœ taindetabaeeshoal° a. Tbe processżag ża aPPE æuet aupgozt aa ozgaożzaÒazt’a operatżoœ-
consistent state, by ensuring tha t any operatioo carried out on the b. For example, iføn organization allocates rxiles and responsibilities,
, all øpmpleted successfully
d£ftybøg£p'• t ei tttøpdependent and either
th ey muøt be able tø procesB and accomplish it.
or all caocelÏed successfully.
m u l t i p l e individual operations o n a Øtż Deacz•i6e Isoæ tz•aoeactśozs pzxzceøeîog oazs be doxse la
automatically aø a single, individual
OR
4 PJjøøtød t øn the conventional tranaat:tion Dżacuea tbe aebeæeB
Mnbile transac£iOEtİS m8 <° OF æobżłe tzaoøømtø• œaoag¥•æezzt.
states. OR
. in both tlïe design and execution
5. When mobile host moves from one t2
ø jj t ø ø n o t h e r cell, m a n y computirig
activities like e8tablish ing new epmmunicatio n channel, forwarding the vazžotse æobżłe traoaactiozs æoğeja. OU U
atøte of transaction to new mobile support station are involved.
but aløo ï e
6. The execution of mobile tran8BCtİon in not only u
Øj3redictable
location dependent. Oolžae tmmaactioo pzX¥eagaíng ;
Coordinator Participant
1. Online
Can_‹ximmit ? transaction proces•ina, •r OLTP, refers tc a class ofsystenis that
facilitate and manage trønøac tion-oriented applicøtip
Phaøe 1 : , typically for data
en try a n d retrieval tra nsaction prnceøsing.
Voting
in ease of 2
OLTP has also been used to refer to processing in which the syøtem
failure .
Ante responds immediately to user requests. An automatic teller machine
datato Rollback
øJ1 votes = DO_C t per- fATM) for bank is an example of a commercial transaction prnceesing
œœment 3. O n l i n e t r a n s a c t i n n processing increasingly requires support for
yes 0 t r a n s a c t i o n s that spøn a network and may include more than one
storage
4. For this reason, new OLTP software uses elient/øerver processing and
Phase 2 : brokering software that allows trønsactiooe to run on different computer
e
Ha_v
commited completion platforms in a network.
a8 participants sent 5 In large applications, efficient OLTP may depend on sophisticated
Have_eømmitted . transaction management software (such as CICS) ønd/or database
forget transaction optimization tactics to facilitate the proceeøing of lørge numbers nf
concurrent updates to an OLTP-oriented database.
6. For even more demanding decentralized database systems, OLTP
7. Some of the techniques developed in conventional transaction such as brokering programs can distribute transaction proceseing among
two phasø eømmit ‹SPC) protocol, are a1eo apply in mobile multiple computers on a network.
transaction. OLTP iø often integrated into OA serVice-Oriented arcÒitectl 'e fund
8. For committing the result in a distributed transaction, the peerø web services.
involved in a trønøaction usually communicate via the 2PC protocol.
8. Because there is a need for tranßøctions you wit{need online prœessing.
æ i. •žrøt pbaBe : ofa trønsøction takes the role o íth e coordinator,
The initiator 9. Online trønøaction processing has two key benefits: simplicity and
wlxích in the firat phaøe collects the votee about the røøult of ef'ficiency.
transaction from different partners. 10 Reduced pøpef trøilø and the føster,
. and expenßea are both examples of how OU makes things simpler for
businesses.
COmQlnt y p b i l e ØeœpuGog 181
M•bile s e n t
iv. and are
Upon loca]ofa
initiation to a bdØe station.
r a stable orgøjqiZãtion because a JT for its eaecution.
DHä, base øtøtion
11. creates
of the timely uW* ' v.
of a l l o t øppøumer the choice of
ø A KT, when initiate by a MU (mobile unitl, the initial BS dbase
uch pior t • e n t r y tcmøke station) immediately created a JT with a unique identity and
become responsible for ita execution.
broadens the consumer baøe
Bfiother cell, the BS of this cell
1S. & ’ent because and it’B HVøiløble
takes control of the execution pt thiø tranøøetiøq
vii. Wheii a MU encounterø
thuø the mobility of ét MU is captured by splitting ø Ky.
1, ,q qøbije trønaaction is a iüøtributed trønøaetion where some partø of O ż e c u e e tbe g c b e æ e a of'æob{ł e trø øøøtjqg øtø ø g ą m Egt,
g øjjt,ød 022 mobile host and øonte pørtø on non-
the computation are £• e
Mobile
hoøtø. medium and the mobilit2f If d a ta consumers ønd
Tt›.. uøe of wireleøa
producerø øjȚøøt trønøøction proce8ain8 * ° ^ ® ways.
that af'Feet jj;øøqøø various issues whieh øre related to tZ’øØ8£t On QrØ4•
Location ønd time of fØobile hoøt øre the two major facto••
mobile transaction processing. BBÎDØ
aø follows :
Two mobile trønøaetion modelø are available ;p mobile computing. UPTU s011-l2, s0l2•i3, Markø lo
é The execution model is mainly for Processing aggregate data Mobile twanøftction Bchemes : Refer Q. 4.14, Page l5Rl, Unit-4.
stored in a dftta warehouse which resides in mobile units.
ä. Is ø ue s o f transaction procesBiog izi mobile computing ezivironment:
Since the data warehouse resides in mobile urits, HiCoMo 1. Mobile environments can be considered to be øiœüar tø
trønsactipns are alwayø initiated on mobile unit where they hig envirofijnents in many respects.
are processed in a disconnected model. 2. But unlike in distributed environments, locations ofsome hoste are not
iiL Aø a result transaction commitments are quite fast. permanent in mobile environments.
iv. The baße database resides on the fixed network. This along with the low communication bandwidth, frequent
disconnections ønd high vulnerability throws up manjr challenges to
v. The structure of HiCo Mo transaction is based on nested reBearchera.
transaction model.
ø. D a t ø consistency ancl concurrency control :
vi. It ia manipulated by transaction called base or source
tranøactiona. é In mobile environments, data could be replicated on a number
vií. To install updates These transactions
of HiCoMo initiated
transaction at must
they the feed
be nf servers throughout the network.
network. to source transactions.
coriverted
vüi. This conversion is done by a transaction transformation Some of t h e y servers could be MUe. Moreover, a MH might
function. operate on cached data while being diemnnected from the
k Kangaroo mobile trønaaetion model : fixed network.
The data oorif1icts arising in mobile environments could partly
i. It captured bøth data and the movement of mobile unit. be due to the locality of the users acceaeing the data.
iv.
ii. The modøl baøed on a øplit tranßäCtion and enforces the ACID The execution of a mobile transani8 øøJd aløo be distributed
properties.
iíL A global or parent Kangaroo tranaacGon,K' and relocated among fixed hosts 8Ød the mobile nodes.
ígcomposedofa
number of øubtransactions. Each øubtrans» ti» is «i»iiiar to
»r «æ ønd Thenoodeters:únistíc lifetime of a mobile transaction ønd the
an ACID transaction, which İS composed of • at
ønøaction (âT) low bandwidth »f»•mmunieation links arø other factors that affèct
writes. These subtransaetiona are called JØpy concurreficy HtttFol ønd ca•æ =øfjagement.
Mobile Agent Comp
mobile Cor iputing
izoportaat tÏzat jt b. In mobile networks, however, • **°8e >^ °ceurs more frequently.
-” i • pJoypÖ îa tbe reaj
. Foxsmymo#° t. For exemple, if the sender 8 fflceiver n›oves out of scope, if the
reseaz'ch Î8 8 • d
moved from the channel suffers from ¡£iterference, if Ob8tacles hamper the
transmissiOn,
battery drains suddenly
in place, it duringznessgge
in plaœ.
required for h• ving a mobile to t he movezuept O f partigipant8 occurs
Netwo rk partitlofiiDg due
Th e e e respurces
in mobile environment more fpeqjjejqtly t}iajq in fzxed -wired
eeositive servic e access t o mechanisms for optimized q
netwoFks, in which this ement i9 Very sg{dp .
zaazsageœeot id t p n t rolled query release mechanisms. ;g, Me ssa g e reception model:
a. fn mobile adhoc networks, a dge that is sent is not pnly
,ommunication by the destined recipient. received
'' b. Each participant that ie cloae to the sender can hear the message.
is one of the maj#,
E1'ficient u t i l i • • t j • n of b an d wid t h iS thus an important facbtt c. When a routing strategy ie uaed, participants those are
‹»t evaluating
on • i n o inmobile environments.
a tFaFiS£tfltfOO model• located close to the path that the message takes will get the
# y message.
DevicecootnM*b1uty:
awo»œecbœüamœoduserPrnf#ea•
i Mobile agents are promesses or set of promesses th at perfprtt a, Distributed databaaeg in fiaed-wired networks are usually used for
an aetivity on the fïxed network on behalf of the MU. performance and availability reasons.
ü. T h è s e a ge nts will typiC8lljf bU ÎfBOS8CtiOO DfÉiEÎ ät a C C J
b. Thus, there is often a single database owner that eontrols atl of rte
several databasea and report some results to the mobile not,
databascs.
iiL Relocation of transaction execution or mobile agents c. In mobile networks, however, eaeh user nwns and controls
ii necessary to improve reaponae t i m e s i n mobile environments
only a single device.
iv. Performance can atiII be improved if the user profiles or user
directives can be used to effect anticipatory relocation or b In case of wireless network, we cannot guarantee that alt individual
avoid unnecessary relocations usera cooperate and do not move away, since there is no central
inaranee that controls the devices.
e ScMxbJ•ty:
i. As mohile computinggrnwa to be more affordable and popii]af, Compensation applieability :
the numher of MUs handled by every base station could te a. Tr an sact io n processing models th at apply the
large. concept of compensation, explicitly allow databases to run intn
ü Hence, it is very important that a mobile a possibly iztconsistent etate that ie compensated later.
transaction model scale up effîciently. b. However, the models using compensation assume that
databases are somehow connected to a single site th at
e D i a o u a s tbe c b a t l o a g e s i l s t r a o a a c t i o o p ro ressing . controls the compensation.
W tab azw the ooaatez"zaeaBaz:t'es to seozu• ty tfzz•eat la coznputîog c. T h u s , participants having inconsistent states wilt not per-ticipate in
e nv i ro n me n t 7 proceeding transactions with different participants as Jongas their
inconsistent states have not been compensated.
C a p a b i l i t i e s : The mobile devices had limjted pspab'ilities litre memory,
processing, and storage constraints.
CAæHeo8eaiotrxosaclfooproceswing:
I n p u t mechanisoifa) :
l. Eohæg€e#Ésüuremode1: built-
a. Compared to flxed-wïr ed networks, mobile environments suf a. The moat sommon input mechanisms for mobile devices are
in keypads, pens d tpiich screen interfaces.
from a variety £'s : Message loss occurs in fixed wif b.
netivorksdue 88 f8iltl
° P ob ° libe buffer over-flows or data pack Usually, PDAe contain software keyboard s, some PDAs may also
support +zteroaJ ïreyboards-
t°F
164 LIT-8) I Mobile Agent Coippqt
Network stack
M e a s u r e s to s e c u r i t y t h r e a t s i n c o m p u t i n g e n v i r °nment ; ¿
. 4.‹I, Page 142J, Unit-4. ”
VERYIMPORTANTQUESTIONS
• DSD s9proacdyedistgnrevedorreuCingpmMo 4.
o. A WMN ia a s
coonecbvi
communication network orgonised
in a irieah topo]ogy. acazeft
B£ Code
b. WMN ofien tonsist of neah clients, D
me8h roiatere and gqtegp$g F
devises while aieah routers forward traffit j;q gd q9p the gapp
c. may eorinett
whithiriesh
The to the
clients are internet.
often laptops, tell Bea80y 8 de **’!'PoiutreÏay
phone gltd tbej.
Rooter R, -• _
e. A wireless mesh network oflen h8s a more p l u s
and may be deployed to provide dynami9 ^^4 coet effective
conrieetivity over a certain geographic area. Hand-helfi ^ e station
ri ode OTgg{,y,gç -----
f. Mesh networks may involve either fixed or mobilt• de p,t9¢, '' àtobiie node
p portant possible application for wireles2
mfl8h uetworlu ii Baae station Pouter
h. By using a quality of service echeme, the B
^•eh may support
]ocal telephone calls to be routed through
wirele8a
R aieeh.Sensor Network (W8N) :
Wireless
a. WSN conaiata of spatially distributed autonomous ¢en#pr Description :
tq cooperatively monitor physical moti0n or conditions 1.
such
i. ae, temperature of wireless sector network was motivated by D,E,FædO
Tag.5.fl.ldeœo
military applications auch as battle field swveillante and 2, It showa that each mobile device or sensor functi0Q8 aS a •ode with a
art, switch or rooter.
ü. now uaed in many in3ostrial and civi]ian application 3. i port nt characteristic of adhoc network srtbitecture is that its
1. industrial process trionitoring and control, machine areas, org8ni8ation can change due to moveelent of a device or sensor.
4. In other words, the adhoc networks ate self-organizing.
2. health monitoring environment and habitat
monitoring 5, The folloeririg points illustrate how MâETa are established and
how the *e
3. health care application aetheReetvta
a. The network organisation wili change if D and Eeieve away
4. house automation and from eathother aich that they reath out of the °!
5. tramc control. b. ! *
Que fi&. JWhat dO you under8tand by Pfobile Adhoe Two neie adhoc networlts will then be form°8 W !i) A, C a°d . *
j letworhs
'}') 2 Depcribe gpyg gj @ egjnariQg wh9r'f• Et 0Bfn be @ j, p• jed E. The devises on te'o networks W 2 @ t tO B&b
V8ed•
Real lite zother
cenej•i0•
through thé COmmOn O0de A
i Comider ¢ bluetooth-en8bled mobile devite, a blt1etootb•enabled
, œnnettionat Rome.
computer, and @@JBt W’ith 9'
2, There i6 8 blUfltooih-ennbled col£iputerconn9n!"
i.
MANE'f i• a seF configuration wireleS9adhoc network ofmobile node? »rl aso to c›*ent prï•te'Bt° '°
home
2. 3 When thg user e ^g tire and
3. The node has
Each union a router or atsswitch
of connections connefttdIQJlogy.
in an arbitl’8J by the wireless . handbeld PD mobile devis oæe aa adhoc
the
4. connecti•8in function indepondently or connect to internet IPV4 0! network
Networlt c
C h o c NetworL¢
b.
Table Driv+n
reflect these changes, Hybñd
- e Hrbrid lPro•aetive/Yeaet¡ve)
Adfioc Netu/otg
’ °#" #'°
*°steвœoooвùüemвbteøono-t
MHZ 3. tøøtøjjque wæi ueeA to ceduce the size oFiníí›rmstion requir*›d to
eye of a fish cøPtueee with' high detail of the pixeÍa near the focal
poipt.
edetmü decreesesaethedisteDceheœtbefeczüpDiotiocreese*
p p p t i n g , t h e F l a t e ye approach translates to maintain, the
ggø øtø diøtønce and pøth quality information about the immediate
gp jgpt,øurhoodø of •0de. W th progressively less detaźl as the
di9 ¢-s i n t o
6.
y j q ¢ d $røtø neiøtsbouring nodea, æiò periodically exchange ït with
Łheir long ĘØighbour8 rich.
.q406_SfH, T00l ïidH *’ S Ptrt_ßDj,
s ing_uYL, To0i_BiH 1 Pte 1_MH, 7 y ş everyup-to-dateœeesæge‹keenotœnUûnñüonoaõooebeut
g gj; ,g„ggg ip the netveopR. łłere tbe üoforooatïon e6out eloser
node is j•t,mged æore fzeqzzeotly Łha• ›t is éone about úu•ttrec uodes,
Lizs
t ç . ą øtag tbe update æeøaage size.
bIHĘ hDI, 9*28_Ntl1, 2 PTr]_bt
TOO2_MIH, 9 Pp* Tt•te centze aode kaø œosL up-to-date iof‘orœøtioa about aL tbe nodes in
ßO5O_MH, îoaer circîe anA tbe xcmaacy ofiiofôzœBÒoa deoeases as tke dietaoœ
TOO2_ØH, * &,oœnodeùorreaaes.
mmd sway Ø•eni others eøpeeiøjIy í ASH }. T'tie new i iterøal p -oœAere ot clividing rietworh into differeiit scope levels is done at
MØ theas a p p e a r s n e e h o - z s I- T'abye s . I t . g . $o. pen
epch node if a æeøxxiog
xyoAe Aces not
that it base accurate i:øforixiation
iø independent a£'out
on the neutral far •^ay
entity.
nodes, time packets wiLt Inn routed cor-rectly becauee tfi mute *•°
becomes more anA more accurate •° the pac t geŁ* cŁe*°t *° ' °
destination.
11. When network nice grovrø lexge, the updatø æeesaCt• 8 °*
cor aiderable nrvioumt of bandwidth, ^hie depends °° * *W P"* •
M* S884 _MH TYt0l MH 12. ïn orcler tø reAuce the aize oropdate e eges without'*eriousl af ecti ¢
EH, G890 afH 'T'0O1 routing accuracy. FSR uses Łhe Pin eye techr'iq"e.
_łdSt
TOOS fi4H 13. Fig . 5 ,12. t illustrates Łhe application of Fisheye in • Iriobiłe, wireless
84. The nunabør o£ tøvels ønd the radiuø of each $ e o J Will @@pend on Îh8
y tø;ing different
15. ’l'he red uctiol of’routizig update oyerhead to o
*' ° • •••• f i v e tŁ•e øAvæitegeø
exehœogcperigdsto,dîAere°tent esie
*° e
jg•»iJe Co"'P” i8s ‹y'z aja
r the
“
king tequest id” to
requesLg geaerated by the zaobile hoaŁ.
eaehe°.
8.
7. Eaehgnode
oetwork.
Tbe
g. It does not append its address to the route record of the packnt and
orwards the paciret to its rieighbours.
h. To limit the number of reute requesta propegated, a node
age l76d,
processea tile route request packet ooly init has aot already seen
° ° *-* *• m. the pac/ret 8ztd ita addreea as aot present ia the route record of
: vi1. Lhe paclcet.
° A route reply iRREP) ia generated when either the destination or
a• intermediate node with current information about the
destinat'on receives the route request packet.
! 'the route repły is generated by the deeŁinst‹oo th• 'I6•res th•
k.
°oute record £zoaz route requesŁ packot into tbe rouŁe repfy peckeL.
On the other hand, if the node generating the route reply te an
the roue remrd fi zouM guet P^k*t * Pu8 that
iqy qg epy pmkeC sbœm in ÏNg. S 14 2 AODYmiÆmiæeŒm
f. 'ro send tite ro'ne rep/r P AODY ta desi$ned to imProve q n t1t¢ ¢
°>*› > ce •
rocte to the source. If it has a route to the source in psDY in tbe creation and u• of
rte roue
The pHmnW °@&tiYT8Of AODV }
b, o di8t ingcliùh between tocel c••ne‹tivi ty æenagevient
(neigfi boiu'hœd detecti0Dl and general toppJ ttqgpq
0 h
_
AODV u»s ›roadcm t e discovery mechanism.
1. precess is initiated whene a node requises to communicate with a nid,
Palm
for whicb it has no route by br'tt a route request
(RREQ)jp
ttt ing the sourte addreas, courte sequence number, broadcut
lo
degt¡nat¡p• address, destination seQtierice number, trop count. tp jtt
2, }{op Mount ie initially 0 and is incremented by each node aa it
forw the RRSQ to'vards the destination. - - - - -r Reptesents tr missi0n t{p9yQ
P. An intemediste node upon receiving a RREQ first checks that
RPM was received oter a bidireftionai link.
4. Ifit hactben it tbecks ifit han alteady pruceased a similarRRaQp c
ri and ifit has tben the RREQ packet is diacarded.
5. Otherwise, the node checks if it hes a route entry for the
destination. If it has a routing Able e«trjr for the destination then
it replies to the source ooly if the destruction sequence number in
RREQ is greater than the destination sequent pumber in its route
tuNe ntheruñse it rebroadcasts the RREQ packet.
6. Reverse path is established as the nRSQ traverses t0wards the
7. Tbe üestioation or tfre interzoerfiaLe aode responüs to RREQ pacltet Repre8eats links ou reverse patb
sritb aroute reply(RREP) packet ftavîog giorîJar fîglde a4 tüa¢ 0I°RRgQ
packet, RREP travels back to the aource using the reverse paths.
Reverse peth aetop in<ODV '
Ttoute request in AODv:
jr¢ gre aetup when R R E P rave
Repreeentu a link on the forp a1ong the rever e path.
pg@
t
H
OR
eeržžse x”oute dšecoveW 8zsd woute zztačoteoaooe zaecžsazriazo
of
e
A O D V : Hefer Q. 5 16, Page l86J, Unit-5.
f0,1J
i. Hybrid routing protocols combines the advantages of both table- th• ••»ting devioe whicb dynamimly ltarn netr t2
driven and on-demand routing. deatinät1O and bow to get to them and also advertLse tbost
2. In this the distance vector routing(DVR) works by sh8f'ing its definjti#ns
LnoWledgg of entire network with its neighbours and link 8tate tn other router*
Eis
routing (LSR) ltd every routar on the network about its closest adv8rtisement funeti0n allows all the routers to learn alout all
neighbours so it ia the combination of both DVfi and LSR. the d e stin a t i o n netw0r& th8t exist.
9 tpiiting vrill learn the routes to all
3. A rg uter tt8if g dyp
3. Hybrid routingprotocols use distance vectors for more accurate metrics to networks
eonnected to tbe
that are directly devite.
determine the best paths to destination networks and report routing frons Other routers that run the same
information only when there is a change in the topology of the 4 e
p utey will learn mutes
network. . rput¡ng protocol tR!P. RI1'z, BGP etc.1.
5. Each router will then sort through
its list of routers and select one or
4. Hybrid routingatiows forrapid convergence but requires lesa § destination thg j-ouifï k.AO 8
Someprocessing
examples ofpower
hybridand
routing protocols
memory as compared to link atate routing.
are : a. EIGRP(Enhanced Interior Gateway Routing Protocol), 6 djsfrjbute this ‘best 8°°
. inforDjatfon to other routers rim8!°8
developed by GISCO. n¢tworä exist and
thereby exteRding the
*
b. ZRP(2one Routing Protocol). reached.
7. This grves dynapic routing
jl Explain with example :
network to9O1Og'f c}\aztges, equip
é Praaetive routing and reactive routing pratoeole the fly.
tl• Stata aDd dynamio routing Source routing : Refer Q. s.13, Page 18 tUnit•5
Refer Q. 5.1.