Paavai Institutions Department of IT

195
Paavai Institutions Department of IT UNIT-1 1. 1 UNIT 1 INTRODUCTION www.Vidyarthiplus.com www.Vidyarthiplus.com

Transcript of Paavai Institutions Department of IT

Paavai Institutions Department of IT

UNIT-1 1. 1

UNIT 1

INTRODUCTION

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 2

CONTENTS

1.1Mobile Communication

1.1.1 Guided Transmission

1.1.2 Unguided Wireless Transmission

1.1.3 Antennae

1.1.4 Modulation of wireless signals:

1.1.5 Multiplexing

1.1.6 Introduction to 2G and 3G Data Communication Standards

1.1.7 Introduction to WPANs and WLANs

1.2 Mobile computing

1.2.1 Ubiquitous computing

1.2.2 Pervasive Computing

1.2.3 Limitations to mobile computing

1.3 Mobile Computing Architecture

1.3.1 Functions of Operating System

1.3.2 Middleware for Mobile Systems

1.3.3 Mobile Computing Architectural Layer

1.3.4 Protocols

1.3.5 Mobile Computing system Layers

1.4 Mobile Devices

1.5 Mobile System Networks

1.6 Data Dissemination

1.6.1 Data Synchronization Example

1.7 Mo bility Management

1.8 Security

1.8.1 Cryptography

1.9 Introduction to Cellular systems

1.9.1 Cellular systems: technologies & subscribers

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 3

1.10 GSM: Global System for Mobile Communication

1.10.1 GSM Architecture

1.10.2 GSM Services

1.10.3 GSM: Radio Technology

1.11 GPRS: General Packet Radio Service

1.11.1 GPRS – Architecture

1.11.2 GPRS: Channel Coding and Multiplexing

1.11.3 GPRS architecture and interfaces

1.11.4 GPRS Core Network Functions

1.11.5 GPRS: Protocol Stack

1.11.6 GPRS: Obtaining IP Connectivity

1.12 Question Bank

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 4

TECHNICAL TERMS

1. Mobile Communication entails transmission of data to and from handheld devices. Two

or more communicating devices at least one is handheld or mobile. Location of the

device can vary either locally or globally.

2. Antennae are devices that transmit and receive electromagnetic signals.

3. Attenuation is the gradual loss in intensity of any kind of flux through a medium.

4. Co-channel Interference is, if two transmissions overlap in time.

5. Frequency division multiplexing (FDM) describes schemes to subdivide the frequency

dimension into several non-overlapping frequency bands

6. Guard Space is the space between the interference ranges.

7. Modulation is the process of varying one signal, called carrier, according to the pattern

provided by another signal

8. Multiplexing describes how several users can share a medium with minimum or no

interference.

9. Signals from a system transmit through a fiber, wire, or wireless medium. According to

defined regulations, recommended standards and protocols.

10. Code division multiple Access (CDMA) is an access method in which multiple users are

allotted different codes to access the same spread spectrum (set of frequencies) for

transmitting the symbols.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 5

1. INTRODUCTION

1.1 Mobile Communication Communication is a two-way transmission and reception of data streams. Signals for

Voice, data, or multimedia streams are transmitted. Signals are received by a receiver.

Signals from a system transmit through a fiber, wire, or wireless medium, according to

defined regulations, recommended standards and protocols.

Mobile Communication entails transmission of data to and from handheld devices. Two

or more communicating devices at least one is handheld or mobile. Location of the device can

vary either locally or globally. Communication takes place through a wireless, distributed, or

diversified network.

1.1.1 Guided Transmission

Metal wires and optical fibers are guided or wired transmission of data. Guided

transmission of electrical signals takes place using four types of cables are

1. Optical fiber for pulses of wavelength 1.35–1.5 µm

2. Coaxial cable for electrical signals of frequencies up to 500 MHz and up to a range of

about 40 m.

3. Twisted wire pairs ─ for conventional (without coding) electrical signals of up to 100

KHz and up to a range of 2 km, or for coded signals of frequencies up to 200 MHz and

a range of about 100 m.

4. Power lines, a relatively recent advent in communication technology─ used for long

range transmission of frequencies between 10 kHz and 525 kHz.

Guided Transmission Advantages

Here the transmission is along a directed path from one point to another. There is

practically no interference in transmission from any external source or path. Using multiplexing

and coding, a large number of signal-sources simultaneously transmitted along an optical fiber, a

coaxial cable, or a twisted-pair cable.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 6

Guided Transmission Disadvantages

Signal transmitter and receiver are fixed (immobile). Hence there is no mobility of

transmission and reception points. The number of transmitter and receiver systems limits the

total number of interconnections possible.

1.1.2 Unguided─ Wireless Transmission

Electrical signals transmitted by converting them into electromagnetic radiation.

Radiation transmitted via antennae that radiate electromagnetic signals. The electromagnetic

radiation are related by the classical formula

f = c/λ = (300/ λ) MHz [λ in meter].

The frequencies and wavelengths of transmitters for various ranges are as follows:

Long-wavelength radio, very low frequency (LW): 30 kHz to 1 MHz (10,000 to 300m)

Medium-wavelength radio, medium frequency (MW): 0.5 to 2 MHz (600 to 150m)

Short-wavelength radio, high frequency (SW): 6 to 30 MHz (50 to 10m)

FM Radio band frequency (FM): 87.5 to 108 MHz (3.4 to 2.8m)

Very high frequency (VHF): 50 to 250 MHz (6 to 1.2m)

Ultra high frequency (UHF): 200 to ~2000MHz (1.5 to 0.15m)

Super high microwave frequency (SHF): 2 to 40 GHz (~15 to 0.75cm)

Extreme High frequency (EHF): Above 40 GHz to 1014 Hz (0.75cm to 3 µm)

Far Infrared: Optical wavelengths between 1.0 µm to 2.0 µm and [(1.5 to 3) X 1014 Hz

(0.15-0.3 THz)]

Infrared: 0.90 µm to 0.85 µm in wavelength and ~(3.3 to 3.5) X 1014Hz [350 to 330

THz].

Visible Light: 0.70 µm to 0.40 µm in wavelength and ~ (4.3 to 7.5) X 1014 Hz (~430 to

750 THZ).

Ultraviolet: <0.40 µm in wavelength (>750 THz).

1.1.2.1 Advantages and Disadvantages of VHF and UHF

The Advantages and Disadvantages of VHF and UHF are listed below.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 7

1.1.3 Antennae

Antennae are devices that transmit and receive electromagnetic signals. Most function

efficiently for relatively narrow frequency ranges. If not properly tuned to the frequency band in

which the transmitting system connected to it operates, the transmitted or received signals may

be impaired. The forms of antennae are chiefly determined by the frequency ranges they operate

in and can vary from a single piece of wire to a parabolic dish.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 8

1.1.3.1 Radiation Pattern of Antenna:

The important feature of an antenna is

Signal amplitude at an instant is identical along the pattern.

Circular pattern means that radiated energy, and thus signal strength, is equally

distributed in all directions in the plane.

A pattern in which the signal strength is directed along a specific direction in the

plane.

/2 Dipole Antenna /4 Dipole Antenna

/4 Radiation pattern in y-z and x-z planes Directed Transmission Antenna Radiation

pattern in z-y and z-z planes

Same Antenna Radiation pattern in x-y Planes

Figure 1.1 Antenna Radiation Pattern in Planes

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 9

1.1.3.2 Propagation of signals

The Wireless propagation of signals faces many complications. Mobile

communication renders reliable wireless transmission much more difficult than

communication between fixed antennae. The antenna height and size at mobile terminals

are generally quite small. The obstacles in the vicinity of the antenna have a significant

influence on the propagated signal. The propagation properties vary with place and, for a

mobile terminal, with time. Attenuation is the gradual loss in intensity of any kind of

flux through a medium. For instance, sunlight is attenuated by dark glasses, X-rays are

attenuated by lead, and light and sound are attenuated by water.

1.1.3.2.1 Ranges for transmission, detection, and interference of signals

Transmission range:

Within a certain radius of the sender transmission is possible, i.e., a receiver

receives the signals with an error rate low enough to be able to communicate and can also

act as sender.

Detection range:

Within a second radius, detection of the transmission is possible, i.e., the

transmitted power is large enough to differ from background noise. However, the error

rate is too high to establish communication.

Interference range:

Within a third even larger radius, the sender may interfere with other transmission

by adding to the background noise. A receiver will not be able to detect the signals, but

the signals may disturb other signals.

Figure 1.2 Ranges for transmission, detection, and interference of signals

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 10

The Signal strength

1. Decrease due to attenuation

2. When obstacles in the path of the signal greater in size than the wavelength of the

signal.

The propagation of signals is

Line of Sight is the transmission of signals without refraction, diffraction, or scattering in

between the transmitter and receiver.

Shadowing

Reflection at large obstacles

Refraction depending on the density of a medium

Scattering at small obstacles

Diffraction at edges

Figure 1.3 Propagation of signals

1.1.3.2.2 Multi-path Propagation

Signal can take many different paths between sender and receiver due to Reflection,

scattering, and diffraction

Time dispersion: signal is dispersed over time

Interference with “neighbor” symbols, Inter Symbol Interference (ISI)

The signal reaches a receiver directly and phase shifted

Distorted signal depending on the phases of the different parts

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 11

Figure 1.3 Multi-path Propagation

1.1.4 Modulation of wireless signals:

The Sizes of antennae required for wireless transmission inversely proportional to the

frequencies. Voice signals frequencies between 0.1 kHz to 8 kHz and Music-signal frequencies

lie between 0.1 kHz to 16 kHz. These ranges are unsuitable for any kind of wireless

transmission. This is due to the requirement of abnormally large sized antennae as well as much

less radiated energy. Moreover, due to the signal properties medium (air or vacuum) such that

ultra low frequency signals cannot be transmitted across long distances.

Modulation:

The process of varying one signal, called carrier, according to the pattern provided by

another signal (modulating signal)

The carrier usually an analog signal selected to match the characteristics of a particular

transmission system.

The amplitude, frequency, or phase angle of a carrier wave is varied in proportion to the

variation in the amplitude variation of the modulating wave (message signal).

Makes wireless transmission practical

Increases the compatibility of transmitted signal and transmission medium

Equation for signal amplitude at an instant t, s(t)

s(t)=s0 sin [( ] where

s0 is the peak amplitude (amplitude varies between s0 and –s0)

is phase angle of the signal at t = 0 (a reference point with respect to

t is considered)

f is the signal frequency

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 12

The Modulation of the voice or data signal is a technique by which fc or a set of carrier

frequencies used for wireless transmission such that peak amplitude, sc0, frequency, fc, Phase

angle varies with t in proportion to the peak amplitude of the modulating signal s(t). The

modulation is called Amplitude modulation (AM) if amplitude of carrier varied or Frequency

modulation (FM) if frequency varied or Phase modulation if phase angle varied.

Figure 1.4 Modulation in a transmitter

1.1.5 Multiplexing

Multiplexing is not only a fundamental mechanism in communication systems but also

in everyday life. Multiplexing describes how several users can share a medium with minimum or

no interference. One example is highways with several lanes. Many users (car drivers) use the

same medium (the highways) with hopefully no interference (i.e., accidents). This is possible due

to the provision of several lanes (space division multiplexing) separating the traffic.

1.1.5.1 Space division multiplexing

For wireless communication, multiplexing can be carried out in four dimensions: space,

time, frequency, and code. In this field, the task of multiplexing is to assign space, time,

frequency, and code to each communication channel with a minimum of interference and a

maximum of medium utilization. The term communication channel here only refers to an

association of sender(s) and receiver(s) who want to exchange data.

The figure 1.5 shows six channels ki and introduces a three dimensional coordinates

system. This system shows the dimensions of code c, time t and frequency f. For this first type of

multiplexing, space division multiplexing (SDM), the (three dimensional) space si is also

shown. Here space is represented via circles indicating the interference range as introduced in

figure 1.5.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 13

Figure 1.5 Space division multiplexing (SDM)

How is the separation of the different channels achieved? The channels k1 to k3 can

be mapped onto the three ‘spaces’ s1 to s3 which clearly separate the channels and prevent the

interference ranges from overlapping. The space between the interference ranges is sometimes

called guard space. Such a guard space is needed in all four multiplexing schemes presented.

For the remaining channels (k4 to k6) three additional spaces would be needed. In our

highway example this would imply that each driver had his or her own lane. Although this

procedure clearly represents a waste of space, this is exactly the principle used by the old analog

telephone system: each subscriber is given a separate pair of copper wires to the local exchange.

1.1.5.2 Frequency division multiplexing

Frequency division multiplexing (FDM) describes schemes to subdivide the frequency

dimension into several non-overlapping frequency bands as shown in figure 1.6. Each channel ki

is now allotted its own frequency band as indicated. Senders using a certain frequency band can

use this band continuously. Again, guard spaces are needed to avoid frequency band

overlapping (also called adjacent channel interference). This scheme is used for radio stations

within the same region, where each radio station has its own frequency. This very simple

multiplexing scheme does not need complex coordination between sender and receiver: the

receiver only has to tune in to the specific sender.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 14

Figure 1.6 Frequency division multiplexing (FDM)

However, this scheme also has disadvantages. While radio stations broadcast 24 hours a

day, mobile communication typically takes place for only a few minutes at a time. Assigning a

separate frequency for each possible communication scenario would be a tremendous waste of

(scarce) frequency resources. Additionally, the fixed assignment of a frequency to a sender

makes the scheme very inflexible and limits the number of senders.

1.1.5.3 Time division multiplexing

A more flexible multiplexing scheme for typical mobile communications is time division

multiplexing (TDM). Here a channel ki is given the whole bandwidth for a certain amount of

time, i.e., all senders use the same frequency but at different points in time (see figure 1.7).

Again, guard spaces, which now represent time gaps, have to separate the different periods

when the senders use the medium. In our highway example, this would refer to the gap between

two cars. If two transmissions overlap in time, this is called co-channel interference.

To avoid this type of interference, precise synchronization between different senders is

necessary. This is clearly a disadvantage, as all senders need precise clocks or, alternatively, a

way has to be found to distribute a synchronization signal to all senders. For a receiver tuning in

to a sender this does not just involve adjusting the frequency, but involves listening at exactly the

right point in time. However, this scheme is quite flexible as one can assign more sending time to

senders with a heavy load and less to those with a light load.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 15

Figure 1.7 Time division multiplexing (TDM)

Frequency and time division multiplexing can be combined, i.e., a channel ki can use a

certain frequency band for a certain amount of time as shown in figure 1.8. Now guard spaces

are needed both in the time and in the frequency dimension. This scheme is more robust against

frequency selective interference, i.e., interference in a certain small frequency band.

A channel may use this band only for a short period of time. Additionally, this scheme

provides some (weak) protection against tapping, as in this case the sequence of frequencies a

sender must be known to listen in to a channel. The mobile phone standard GSM uses this

combination of frequency and time division multiplexing for transmission between a mobile

phone and a so-called base station.

Figure 1.8 Frequency and time division multiplexing combined

A disadvantage of this scheme is again the necessary coordination between different

senders. One has to control the sequence of frequencies and the time of changing to another

frequency. Two senders will interfere as soon as they select the same frequency at the same time.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 16

However, if the frequency change (also called frequency hopping) is fast enough, the periods of

interference may be so small that, depending on the coding of data into signals, a receiver can

still recover the original data.

1.1.5.4 Code division multiplexing (CDM)

Code division multiplexing is by using a wide range of frequencies, called spread

spectrum. Spread spectrum has distinct set of equally separated frequencies. Different source

transmitting signals along identical path in the same time slices transmits using spread spectrum

frequencies using distinct codes.

Figure 1.9 Code division multiplexing (CDM)

Figure 1.9 shows how all channels ki use the same frequency at the same time for

transmission. Separation is now achieved by assigning each channel its own ‘code’, guard

spaces are realized by using codes with the necessary ‘distance’ in code space, e.g., orthogonal

codes. The typical everyday example of CDM is a party with many participants from different

countries around the world, who establish communication channels, i.e., they talk to each other,

using the same frequency range at the same time. If everybody speaks the same language, SDM

is needed to be able to communicate. But as soon as another code, i.e., another language, is used,

one can tune in to this language and clearly separate communication in this language from all the

other languages.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 17

The main advantage of CDM for wireless transmission is that it gives good protection

against interference and tapping. Different codes have to be assigned, but code space is huge

compared to the frequency space.

The main disadvantage of this scheme is the relatively high complexity of the receiver.

A receiver has to know the code and must separate the channel with user data from the

background noise composed of other signals and environmental noise. Additionally, a receiver

must be precisely synchronized with the transmitter to apply the decoding correctly. The voice

example also gives a hint to another problem of CDM receivers. All signals should reach a

receiver with almost equal strength; otherwise some signals could drain others.

1.1.6 Introduction to 2G and 3G Data Communication Standards

First generation wireless devices only voice signals

Second generation (2G) devices communicate voice as well as data signals have

data rates of up to 14.4 kbps

The 2.5G and 2.5G+ are enhancements of the second generation and sport data

rates up to 100 kbps

Third generation (3G) mobile devices communication.

Higher data rates than 2G and support voice, data, and multimedia streams.

Facilitates data rates of 2 Mbps.

Higher for short distances.

384 kbps for long distance transmissions.

Enable transfer of video clips and faster multimedia communication

1.1.6.1 GSM and CDMA based Standards

The GSM and CDMA based Standards are mentioned in the below figure.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 18

Figure 1.10 GSM and CDMA based Standards

1.1.6.2 GSM standards

A set of standards and protocols for mobile telecommunication.

A global system for mobile (GSM) was developed by the Groupe Spéciale Mobile

(GSM)

Founded in Europe in 1982

Support cellular networks

1.1.6.3 GSM 900

GMSK modulation

FDMA for 124 up channels and 124 down channels

890-915 MHz for uplink and 935-960MHz

Channel of bandwidth 200 kHz

8 radio-carrier analog-signals TDMA for user access in each deployed channel

Users time-slices of 577 µs each

Data rates are up to 14.4 kbps

1.1.6.4 EGSM (Extended Global System for Mobile communication)

An additional spectrum of 10 MHz on both uplink and downlink channels

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 19

1.1.6.5 EGSM 900/1800/1900 MHz tri-band

An additional spectrum of 10 MHz on both uplink and downlink channels

GSM 1800 1710–1785 MHz for uplink and 1805–1880 MHz for downlink

GSM 1900 1850–1910 MHz for uplink and 1930–1990 MHz for downlink

1.1.6.6 GPRS (General Packet Radio Service) ─GSM 2G+ (2.5G)

Packet-oriented service for data communication of mobile devices

Utilizes the unused channels in the TDMA mode in a GSM network

1.1.6.7 EDGE (Enhanced Data rates for GSM Evolution)

An enhancement GSM Phase 2.5G+]

8 PSK communication to achieve higher rates of up to 48 kbps per 200 kHz channel

High compares to up to 14.4 kbps in GSM.

Using coding techniques the rate can be enhanced to 384 kbps for the same 200 kHz

channel.

1.1.6.8 EGPRS and HSCSD

EGPRS is enhanced general packet radio service is an extension of GPRS using 8PSK

(phase shift keying) modulation

Enhances the data rate EGPRS based on EDGE

Used for HSCSD (high speed circuit switched data)

1.1.6.9 CDMA

Evolution of CDMA from 2.5G in 1991 as CDMAOne (IS-95)

CDMA supports high data rates in 3G.

Voice as well as data and multimedia streams.

CDMA 2000, IMT-2000, WCDMA and UMTS and support cellular networks

1.1.6.10 CDMAOne

Founded in 1991,QUALCOM, USA

Belongs to 2G+IS-95 (interim standards 95) and operates at 824–849 MHz and 869–

894MHz.

CDMA channel transmits analog signals from multiple sources and users

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 20

1.1.6.11 WCDMA

Supports asynchronous operations

10 ms frame length with 15 slices.

Smaller end-to-end delay in the 10 ms frame as compared to 20, 40, or 80 ms frames

Each frame length is modulated by QPSK both for uplink and downlink

1.1.6.12 WCDMA

DSSS CDMA

Supports a 3.84 Mbps chipping rate

Both short and long scrambling codes are supported, but for uplink only

3G partnership project (3GPP)

1.1.6.13 CDMA2000 and CDMA 2000 1x (3GPP2)

For voice communication, Circuit as well as packet switched communication.

Packet transmission uses Internet protocol (IP) for transmitting Multimedia and real time

multimedia applications

1.1.6.14 UMTS (Universal Mobile Telecommunication System)

Supports both 3GPP (3G partnership project) and 3GPP2

Communicates at data rates of 100 kbps to 2 Mbps

1.1.6.15 CDMA2000 and CDMA 2000 1x

Chipping rates are in multiples of fs = 1.2288 Mbps

3G IMT 2000 carrier frequency fc0 = 2GHz

Included in UMTS

CDMA 2000 1x fs = 1.2288 Mbps

Also backward compatible to 2.5G CDMAOne IS-95

1.1.7 Introduction to WPANs and WLANs

Wireless personal area network using Bluetooth, ZigBee, or IrDA protocols

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 21

Figure 1.11 WPAN

1.1.7.1 Bluetooth IEEE 802.15.1

WPAN standard operates at a frequency of 2.4 GHz radio spectrum which is identical to

that of the IEEE 802.11b WLAN standard.

Bluetooth provides short distance (1 m to 100 m range as per the radio spectrum) mobile

communication

Data rates between the wireless electronic devices are up to 1 Mbps.

Works between the mobile phone handset and headset for hands-free talking

Works between the computer and printer, or Computer and mobile phone handset.

Enables user mobility in a short space with other Bluetooth enabled devices or computers

in the vicinity

Uses FHSS (frequency hopping spread spectrum)

Facilitates object exchanges

Object can be a file, address book, or presentation

1.1.7.2 ZigBee WPAN standard IEEE 802.15.4

Lower stack size (28 KB) in the protocol

Lower network-joining latency when compared to Bluetooth (250 KB).

For Low transmitting power systems

Interoperable standard based on RF wireless communication

Expected to provide large-scale automation and the remote controls up to a range of 70 m

Data rates of 250 kbps, 40 kbps, and 20 kbps at the spectra of 2.4 GHz, 902 MHz to 928

MHz, and 868 MHz to 870 MHz, respectively

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 22

Uses DSSS

Designed for robotic control, industrial, home, and monitoring applications.

Some of the Applications are

ZigBee enabled electric meter communicates electricity consumption data to the

mobile meter reader

A ZigBee enabled home security system alerts the mobile user of any security

breach at the home.

1.1.7.3 IrDA (infrared Data Association) 1.0

Protocol for data rates up to 115 kbps

IrDA 1.1 supports data rates of 1.152 Mbps to 4 Mbps

1.1.7.4 WLAN and Internet Access

IEEE 802.11a, 802.11b, and 802.11g standards

WLAN also called Wi-Fi (Wireless Fidelity).

Mobile communication using an 802.11 WLAN standard

Figure 1.12 WLAN

1.1.7.4.1 IEEE 802.11 based standards for WLANs

802.11a─ MAC layer operations such that multiple physical layers in 5 GHz (infrared,

two 2.4 GHz physical layers)

Infrastructure based architecture as well as Mobile ad hoc network (MANET) based

architecture.

Modulation is OFDM at data rates of 6 Mbps, 9 Mbps.

Data rates supported are from 54 kbps to a few Mbps.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 23

In 802.11a, MAC layer operations such that multiple physical layers in 5 GHz (infrared,

two 2.4 GHz physical layers)

Infrastructure based architecture as well as Mobile ad hoc network (MANET) based

architecture.

802.11a

o OFDM at data rates of 6 Mbps, 9 Mbps

o Data rates supported are from 54 kbps to a few Mbps

802.11b

o 54 Mbps and at 2.4 GHz.

o Modulation DSSS /FHSS

o Supports short-distance wireless networks using Bluetooth (IEEE 802.15.1) based

applications and the HIPERLAN2 (HIPERformance LAN 2)

o OFDMA physical layer

o Provides protected Wi-Fi access.

o The data rates are 1 Mbps (Bluetooth), 2Mbps, 5.5 Mbps, 11 Mbps, and 54 Mbps

(HIPERLAN 2).

802.11g

o Operates at 54 Mbps and at 2.4 GHz

o Used for many new Bluetooth applications

o Compatible to 802.11b

o Uses DSSS in place of OFDMA

802.11i

o Provides the AES and DES security standards

WiMax (worldwide interoperability for microwave access) IEEE 802.16

o New generation innovative technology

o Delivers high-speed, broadband, fixed, and mobile services wirelessly to large

areas with much less infrastructure.

WAP (wireless application protocol)

o Provides the web contents to small-area display devices in mobile phones

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 24

o Service providers format contents in the WAP format

I-Mode (internet in mobile mode)

o Developed by NTT Do Como, Japan

o Very popular wireless Internet service for mobile phones

1.2 Mobile computing The process of computation on a mobile device

In mobile computing, a set of distributed computing systems or service provider servers

participate, connect, and synchronize through mobile communication protocols.

Mobile computing as a generic term describing ability to use the technology to wirelessly

connect to and use centrally located information and/or application software through the

application of small, portable, and wireless computing and communication devices.

Provides decentralized (distributed) computations on diversified devices, systems, and

networks, which are mobile, synchronized, and interconnected via mobile communication

standards and protocols.

Mobile device does not restrict itself to just one application, such as, voice

communication.

Offers mobility with computing power.

Facilitates a large number of applications on a single device

1.2.1 Ubiquitous computing

Refers to the blending of computing devices with environmental objects

A term that describes integration of computers into practically all objects in our everyday

environment, endowing them with computing abilities

Based on pervasive computing

1.2.2 Pervasive Computing

Pervasive means ‘existing in all parts of a place or thing’.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 25

Pervasive computing─ The next generation of computing which takes into account the

environment in which information and communication technology is used everywhere,

by everyone, and at all times.

Assumes information and communication technology to be an integrated part of all facets

of our environment, such as toys, computers, cars, homes, factories, and work-areas

Takes into account the use of the integrated processors, sensors, and actuators connected

through high-speed networks and combined with new devices for viewing and display.

Mobile Computing is also called pervasive computing when a set of computing devices,

systems, or networks have the characteristics of transparency, application-aware

adaptation, and have an environment sensing ability

Pervasive computing devices are not PCs, are handheld, very tiny, or even invisible

devices which are either mobile or embedded in almost any type of object.

1.2.3 Limitations to mobile computing

Resource constraints: Battery

Interference: the quality of service (QoS)

Bandwidth: connection latency

Dynamic changes in communication environment: variations in signal power within a

region, thus link delays and connection losses

Network Issues: discovery of the connection-service to destination and connection

stability

Interoperability issues: the varying protocol standards

Security constraints: Protocols conserving privacy of communication

1.3 Mobile Computing Architecture Programming languages used for mobile system software. Operating system functions to

run the software components onto the hardware. Middleware components deployment Layered

structure arrangement of mobile computing components. Protocols and layers used for

transmission and reception.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 26

Some of the Programming Languages are Java, J2SE, J2ME (Java2 Micro edition), Java

Card (Java for smart card. The Java enterprise edition (J2EE) used for web and enterprise server

based applications of mobile services C and C++, Visual C++, Visual Basic.

1.3.1 Functions of Operating System

Operating Systems are Symbian OS, Window CE, Mac OS. It offers the user to run an

application without considering the hardware specifications and functionalities. It provides

functions which are used for scheduling the multiple tasks in a system. It provides the functions

required for the synchronization of multiple tasks in the system and multiple threads

synchronization and priority allocation.

Management functions (such as creation, activation, deletion, suspension, and delay) for

tasks and memory. It provides Interfaces for communication between software components at the

application layer, middleware layers, and hardware devices. It facilitates execution of software

components on diversified hardware. It provides Configurable libraries for the GUI (graphic user

interface) in the device. It Provides User application’s GUIs, VUI (voice user interface)

components, and phone API.

1.3.2 Middleware for Mobile Systems

Middleware are the software components that link the application components with the

network-distributed components.

Examples of Middleware Applications are:

To discover the nearby device such as Bluetooth

To discover the nearby hot spot.

To achieving device synchronization with the server or an enterprise server

For retrieving data (which may be in Oracle or DB2) from a network database

For service discovery at network

For adaptation of the application to the platform and service availability

1.3.3 Mobile Computing Architectural Layer

The Mobile Computing Architectural Layer is illustrated in the figure below.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 27

Figure 1.13 Mobile Computing Architectural Layer

1.3.4 Protocols

Some of the protocols are WAP, GSM 900, GSM900/1800/1900, UMTS, and I-Mode.

Some of the WPAN protocols are Bluetooth, IrDA, and Zigbee. Some of the WLAN protocols

802.11a and 802.11b.

1.3.5 Mobile Computing system Layers

1. Physical for sending and receiving signals (for example, TDMA or CDMA coding)

2. Data-link (for example, multiplexing)

3. Networking (for linking to the destination)

4. Wireless transport layer security (for establishing end-to-end connectivity)

5. Wireless transaction protocol

6. Wireless session protocol

7. Wireless application environment (Running a web application, for e.g., mobile e-

business).

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 28

1.5 Mobile Devices

A mobile device (also known as a handheld device, handheld computer or simply

handheld) is a small, hand-held computing device, typically having a display screen with touch

input and/or a miniature keyboard and weighing less than 2 pounds (0.91 kg). Apple, HTC, LG,

Motorola, Research in Motion (RIM), and Samsung are just a few examples of the many

manufacturers that produce these types of devices.

A handheld computing device has an operating system (OS), and can run various types of

application software, known as apps. Most hand held devices can also be equipped with WI-FI,

Bluetooth and GPS capabilities that can allow connections to the Internet and other Bluetooth

capable devices such as an automobile or a microphone headset. A camera or media player

feature for video or music files can also be typically found on these devices along with a stable

battery power source such as a lithium battery.

Early pocket sized ones were joined in the late 2000s by larger but otherwise similar

tablet computers. As in a personal digital assistant (PDA), the input and output are often

combined into a touch-screen interface.

Smart phones and PDAs are popular amongst those who wish to use some of the powers

of a conventional computer in environments where carrying one would not be practical.

Enterprise digital assistants can further extend the available functionality for the business user by

offering integrated data capture devices like barcode, RFID and smart card readers

1.5 Mobile System Networks • Cellular networks

A cell is the coverage area of a base station, connected to other stations via wire

or fiber or wirelessly through switching centers. Each cell base station functions as an

access point for the mobile service. Each mobile device connects to the base station of the

cell which covers the current location of the device. All the mobile devices within the

range of a given base station communicate with each other through that base station only.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 29

Figure 1.14 Cellular Networks

• WLAN networks and Mobile IP:

For connectivity between the Internets, two LANs, mobile devices, and computers

are needed. Mobile device connects to an access point, called a hot spot. The access

point, in turn, connects to a host LAN which links up to the Internet through a router.

Mobile IP is an open standard based on the IP (internet protocol). Mobile IP network

provides the mobile IP service using home agents and foreign agents.

Figure 1.15 Communication between mobile devices using a WLAN network through hot-

spots.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 30

• Ad Hoc Networks:

The nodes, mobile nodes, and sensor nodes communicate among themselves

using a base station. The base stations function as gateways. The ad hoc networks

deployed for routing, target detection, service discovery, and other needs in a mobile

environment.

Figure 1.16 Communication of mobile nodes and Sensor nodes using a base station as a

gateway.

1.6 Data Dissemination Mobile phone also acts as a data access device for obtaining information from the service

provider’s server. Smart phones in enterprise networks work as enterprise data access devices.

An enterprise server disseminating the data to the enterprise mobile device iPhone is a data

access device for accessing music or video. The data links up to download files which can then

be saved and played. Students also use the iPhone for replaying faculty lectures and retrieving e-

learning material disseminated from University server.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 31

Figure 1.17 Data dissemination by servers through base stations and access points

1.6.1 Data Synchronization Example

A new popular ringtone added to one of the servers of a mobile service provider. Data

synchronization means that all the servers of the service provider get identical sets of ringtones.

All the devices connected to the server should be updated about the availability of any new data.

Ringtone databases available to all the mobile phones include a copy of the title of that tone.

Some of the Data Synchronization is One to One Synchronization, One to Many

Synchronization, Many to Many Synchronization. Data synchronization paths in a mobile

network in illustrated in the figure 1.18.

1.7 Mobility Management Mobility Management means maintaining uninterrupted (seamless) signal connectivity

when a mobile device changes location from within a cell Ci or network Ni to a cell Cj or

network Nj in figure 1.19. The Infrastructure management for installation and maintenance of the

infrastructure that connects cell Ci to Cj or network Ni to Nj. Location management and

registration management by handoff for cell transfer when a mobile device’s connection with the

ith cell is transferred.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 32

Figure 1.18 Data synchronization paths in a mobile network

Figure 1.19 Mobility Management

1.8 Security Security is important for maintaining privacy and for mobile e-business transactions.

Wireless security mechanisms for providing security of the data transmitted from one end point

to another. It provides for wire-equivalent privacy and non-repudiation when some data sent to

an end-point. No denial of service to authenticated object(s). A serving station authenticated

before it can provide service to mobile devices.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 33

Figure 1.20 Authentication method of security in case of GSM

1.8.1 Cryptography

Cryptography is to keep private information from getting into the hands of unauthorized

agents. Encryption is the transformation of data into coded formats. Encrypted data decrypted

(transformed back to an intelligible form) at its destination.

1.8.1.1 Cryptography Algorithms

It is used for encryption and decryption of transmitted data. It enables the receiver and the

sender to authenticate data. Discover if data security has been compromised during transmission

Use a secret key, to encrypt data into secret codes for transmission. RSA (Rivest, Shamir, and

Adleman) algorithm is a cryptography algorithm used for private key generation. Cryptography

Algorithms is classified into two categories; symmetric and asymmetric. It is used to create a

hash of the message or a MAC (message authentication).

1.8.1.2 Hash function

Hash function is used to create a small digital fingerprint of the data to be transmitted.

Fingerprint is called the hash value, hash sum, or, simply, hash. Hash of the message is a set of

bits obtained after applying the hash algorithm (or function). This set of bits alters in case the

data is modifies during transmission code) Message authentication codes (MAC). It is also used

to authenticate messages during transmission.

The MAC of a message created using a cryptographic MAC function which is similar to

the hash function but has different security requirements. The receiver reviews the hash or the

MAC of the received message and returns it to the sender. Exchange enables the sender and the

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 34

receiver to find out if the message has been tampered with and thus helps verify message

integrity and authenticity.

1.8.1.3 Data encryption standard (DES)

DES uses 56-bits for a key plus 8 bits for parity. Block length 64 bit. [Maximum block

size = 264 bits

1.8.1.4 Triple DES

Triple DES an enhance version of DES. Multiple encryptions or encryption-decryption-

encryption steps in the cryptic message are a different key at each step for cryptic message

creation.

1.8.1.5 Advanced encryption standard (AES)

There are nine possible combinations of key lengths and block lengths. The key-length

can be 128, 192, or 256 bits. The block lengths can also be 128, 192, or 256 bits. Block length of

128 bits means maximum block length = 2128 bits.

1.8.1.6 RSA─ The Asymmetric key based standard

The RSA (Rivest, Shamir, Alderman) algorithm uses 128, 256, 512, or 1024 bit prime

numbers for encryption

1.8.1.7 DSA (digital signature algorithm)

DSA is used to sign a record before transmitting. DSA provides for a variable key length

of maximum 512 or 1024 bits

1.8.1.8 DSS (digital signature standard)

DSS is based on the DSA. Signature enables identification of the sender, identifies the

origin of the message, and checks the message integrity.

1.8.1.9 Digital certificate

An electronic certificate used to establish the credentials of a data set. Issued by a

certification authority and contains the certificate holder's name, a copy of the certificate holder's

public key, a serial number, and expiration dates. It includes the digital signature of the

certificate-issuing authority for verification of the authenticity of the certificate. The certification

authority distributes a digital certificate, which binds a public key to a specific sender.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 35

1.9 Introduction to Cellular systems: Geographic region is subdivided in radio cells. Base Station provides radio connectivity

to Mobile Station within cell. Handover to neighboring base station when necessary. Base

Stations connected by some networking infrastructure.

Figure 1.21 Cellular Networks

1.9.1 Cellular systems: technologies & subscribers

The usage of cellular systems is represented in graph as shown below.

Figure 1.22 Cellular systems: technologies & subscribers

1.10 GSM: Global System for Mobile Communication GSM is a set of standards and protocols for mobile telecommunication. A global system for

mobile (GSM) was developed by the Groupe Spéciale Mobile (GSM) and it was founded in

Europe in 1982. It supports cellular networks.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 36

History:

• 2nd Generation of Mobile Telephony Networks

• 1982: Groupe Spèciale Mobile (GSM) founded

• 1987: First Standards defined

• 1991: Global System for Mobile Communication, Standardization by ETSI (European

Telecommunications Standardization Institute) - First European Standard

• 1995: Fully in Operation

Today:

• Deployed in more than 184 countries in Asia, Africa, Europe, Australia, America)

• More than 747 million subscribers

• More than 70% of all digital mobile phones use GSM

• Over 10 billion SMS per month in Germany, > 360 billion/year worldwide

1.10.1 GSM Architecture:

Components:

• BTS: Base Transceiver Station

• BSC: Base Station Controller

• MSC: Mobile Switching Center

• HLR/VLR: Home/Visitor Location Register

• AuC: Authentication Center

• EIR: Equipment Identity Register

• OMC: Operation and Maintenance Center

Transmission:

• Circuit switched transfer

• Radio link capacity: 9.6 kb/s (FDMA/TDMA)

• Duration based charging

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 37

Figure 1.23 GSM Architecture

1.10.2 GSM Services

‘Traditional’ voice services

voice telephony:

The primary goal of GSM was to enable mobile telephony offering the traditional

bandwidth of 3.1 kHz

Emergency number:

Common number throughout Europe (112); mandatory for all service providers;

free of charge; connection with the highest priority (preemption of other connections

possible)

Multi-numbering:

Several ISDN phone numbers per user possible

Voice mailbox (implemented in the fixed network supporting the mobile terminals)

Supplementary services, e.g.: identification, call forwarding, number suppression,

conferencing

‘Non-Voice’ Services (examples)

• Fax Transmissions

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 38

• Electronic mail (MHS, Message Handling System, implemented in the fixed network)

• Short Message Service (SMS):

Alphanumeric data transmission to/from the mobile terminal using the signaling

channel, thus allowing simultaneous use of basic services and SMS.

1.10.3 GSM: Radio Technology

Cellular Concept:

The segmentation of geographical area into divided cells. Cell sizes vary from some 100

m up to 35 km depending on user density, geography, transceiver power etc. The hexagonal

shape of cells is idealized (cells overlap, shapes depend on geography). The use of several carrier

frequencies avoids same frequency in adjoining cells. If a mobile user changes cells, handover of

the connection to the neighbor cell takes place.

1.11 GPRS: General Packet Radio Service GRS is Packet Switched Extension of GSM. In 1996, new standard developed by ETSI

Components are integrated in GSM architecture.

Some of the Improvements are:

Packet-switched transmission

Higher transmission rates on radio link (multiple time-slots)

Volume based charging ‚Always ON‘ mode possible

Operation started in 2001 (Germany)

1.11.1 GPRS – Architecture

Components:

• CCU: Channel Coding Unit

• PCU: Packet Control Unit

• SGSN: Serving GPRS Support Node

• GGSN: Gateway GPRS Support Node

• GR: GPRS Register

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 39

Transmission:

• Packet Based Transmission

• Radio link:

Radio transmission identical to GSM

Different coding schemes (CS1-4)

Use of Multiple Time Slots

On-demand allocation of time-slots

• Volume Based Charging

Figure 1.24 GPRS – Architecture

1.11.2 GPRS: Channel Coding and Multiplexing

Figure 1.25 GPRS: Channel Coding and Multiplexing

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 40

1.11.3 GPRS architecture and interfaces

Figure 1.26 GPRS architecture and interfaces

1.11.4 GPRS Core Network Functions

The GPRS Core Network Functions are shown in the figure below.

Figure 1.27 GPRS Core Network Functions

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 41

1.11.5 GPRS: Protocol Stack

The Protocol Stack of GRRS is illustrated below.

Figure 1.28 GPRS: Protocol Stack

1.11.6 GPRS: Obtaining IP Connectivity

The IP Connectivity process in GPRS is shown in the below diagram.

Figure 1.29 GPRS: Obtaining IP Connectivity

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 42

1.12 QUESTION BANK PART – A (2MARKS)

1 .What is the 3 fundamental propagation behaviors depending on their frequency?

2. What is multipath propagation?

3. What is guard space?

4. What are all the different basic schemes in analog modulation?

5. What is the use of Phase Lock Loop (PLL)?

6. What is hopping sequence?

7. What is dwell time?

8. What are the advantages of cellular systems?

9. What is browsing channel allocation and fixed channel allocation?

10. What are the disadvantages of cellular systems?

11. What is digital sense multiple access?

12. What is Network and Switching subsystem?

13. What is authentication centre?

14. What is called burst and normal burst?

15. What are the basic groups of logical channels?

16. Define traffic multiframe and control multiframe?

17. What is OVSF?

18. Specify the steps perform during the search for a cell after power on?

19. Explain about transparent mode?

20. What are the basic classes of handovers?

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-1 1. 43

PART – B (16 MARKS)

1. Discuss briefly the multiplexing techniques.

2. Explain about the signal propagation.

3. Discuss about the cellular system.

4. List the difference between S/T/F/CDMA.

5. What is spread spectrum with its types.

6. Explain about the TDMA.

7. Why CDMA is needed and explain it with an example?

8. Why do MAC scheme in wired network fail in wireless networks and how does the multiple

access with collision avoidance (MACA) scheme work.

9. Define modulation and explain the method for analog modulation techniques in details.

10. Discuss briefly the code division multiplexing techniques.

11. Discuss briefly the advanced phase shift keying.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 1

UNIT 2

WIRELESS MEDIUM ACCESS CONTROL

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 2

CONTENTS

2.1 Interference in cellular system

2.2 Frequency management

2.3 Channel Assignment

2.4 Location management in cellular networks

2.4.1 Mobility Management

2.5 Medium Access Control (MAC)

2.5.1 Preamble

2.5.2 Header

2.5.3 CRC

2.5.4 Inter Frame Gap

2.5.5 Byte Order

2.5.6 CSMA /CD

2.5.7 Receiver Processing Algorithm

2.5.8 Runt Frame

2.5.9 Giant Frame

2.5.10 Jumbo Frame

2.5.11 Misaligned Frame

2.5.12 Other Issues

2.6 Introduction to CDMA based systems

2.6.1 Spread Spectrum in CDMA systems

2.6.2 Three Types of Spread Spectrum Communications

2.6.3 Direct Sequence Spread Spectrum

2.7 Coding Methods in CDMA

2.7.1 Input data

2.7.2 Generating Pseudo-Random Codes

2.7.3 Pseudo-Noise Spreading

2.7.4 Transmitting Data

2.7.5 Working with Complex Data

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 3

2.7.6 Summing Many Channels Together

2.7.7 Receiving Data

2.8 Question Bank

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 4

TECHNICAL TERMS

1. Cellular System: In a Cellular System, a cell is the coverage area of a base station,

connected to other stations via wire or fiber or wirelessly through switching centers.

2. Interference is anything which alters, modifies, or disrupts a signal as it travels along a

channel between a source and a receiver.

3. Interface is a tool and concept that refers to a point of interaction between components,

and is applicable at the level of both hardware and software.

4. Beacon contains a timestamp and other management information used for power

management and roaming. e.g., identification of the base station subsystem (BSS)

5. Frequency Management The requesting, recording, deconfliction of and issuance of

authorization to use frequencies (operate electromagnetic spectrum dependent systems)

coupled with monitoring and interference resolution processes.

6. Mobile terminals (MT) are platforms that allow the broadcasting of television programs

with their multimedia content and for the digital transmission of data and communication

based on Internet Protocol. These include cellular phones, portable digital players,

computer tablets, wireless game consoles, etc. They are by definition digital since they

are used to send and receive data

7. Location Management locates MTs with the main purposes to deliver incoming calls to

them at a reasonable cost.

8. Handover: The term handover or handoff refers to the process of transferring an ongoing

call or data session from one channel connected to the core network to another.

9. Handoff or Handover Management transfers ongoing calls to adjacent cells as a MT

moves from one access point in the network to another

10. Medium Access Control (MAC): data communication protocol is a sub layer of the data

link layer, which itself is layer 2. The MAC sub layer provides addressing and channel

access control mechanisms that make it possible for several terminals or network nodes

to communicate within a multiple access network that incorporates a shared medium,

e.g. Ethernet. It is also referred to as a medium access controller.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 5

11. Polling Cycle is the process which is done by the network when a call arrives to a MT,

The network send Polling signal to target cell in the Residing area and wait for response.

12. Spread Spectrum has distinct set of equally separated frequencies.

13. Subscriber is the term used to refer to a person that has an account with a mobile

network carrier. They are called such because they subscribe to the carrier's mobile phone

services.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 6

2. WIRELESS MEDIUM ACCESS CONTROL

2.1 Interference in cellular system As wireless systems proliferate worldwide, the number one enemy of wireless systems

designers and service providers is signal interference. Interference hampers coverage and

capacity, and limits the effectiveness of both new and existing systems. It is an unavoidable fact

that wireless communications systems must coexist in extremely complicated signal

environments. These environments are comprised of multiple operating wireless networks

ranging from mobile communication services to specialized mobile radio and paging/broadcast

systems. At the same time, wireless local area networks (WLANs) and digital video broadcasting

are introducing new technologies and signal sources that further threaten to disrupt wireless

communications service.

Compounding the problem are regulatory and environmental restrictions which have

effectively limited the number of suitable new base station transceiver sites that can be put in

place. Hence, many wireless service providers are now faced with co-location issues further

contributing to the potential for signal interference as more antennae are placed on individual cell

towers. This application note presents the subject of interference and its degrading effects on the

performance of wireless networks. It provides a brief theory of operation of communications

receivers and antennae, as well as instructions on how to locate and identify an interfering signal.

It also reviews the operating principles of the Anritsu Spectrum Master MS2711B and some of

its functional routines which make it an ideal interference troubleshooting tool.

Interference:

Interference is, anything which alters, modifies, or disrupts a message as it travels along a channel

Electromagnetic interference (EMI)

Co-channel interference (CCI), also known as crosstalk

Adjacent-channel interference (ACI), interference caused by extraneous power from a signal

in an adjacent channel

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 7

Intersymbol interference (ISI), distortion of a signal in which one symbol interferes with

subsequent symbols

Inter-carrier interference (ICI), caused by doppler shift in OFDM modulation

2.2 Frequency management Unlike a traditional client-server network, a mobile computing environment has a

very limited bandwidth in a wireless link.

Thus, one design goal of caching management in a mobile computing

environment is to reduce the use of wireless links.

Quota data and private data mechanisms are used in our design so that an MU

user is able to query and update data from the local DBMS without cache

coherence problems.

The effect of the two mechanisms is to increase the hit ratio. An agent on an MU

along with a program on a base station are used to handle the caching

management, including prefetching/hoarding, cache use, cache replacement, and

cache-miss handling.

The simulation results clearly indicate that our approaches are improvements to

the previous research.

2.3 Channel Assignment

Frequency allocation should be carefully planned to avoid degradation caused by

co-channel interference

Fixed channel assignment, dynamic channel assignment, and hybrid channel

assignment are the types of channel assignment.

Classification of channel assignment are

1. Fixed Channel Assignment

2. Dynamic Channel Assignment

3. Hybrid Channel Assignment

4. FCA with Borrowing

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 8

5. Directed Retry

6. Load Sharing

Figure 2.1 Interference among cells

Figure 2.2 Interference of neighboring radio channels.

2.4 Location management in cellular networks 2.4.1 Mobility Management

In wireless networks, efficient management of mobility is a crucial issue to support

mobile users. The Mobile Internet Protocol (MIP) has been proposed to support global mobility

in IP networks. Several mobility management strategies have been proposed which aim reducing

the signaling traffic related to the Mobile Terminals (MTs) registration with the Home Agents

(HAs) whenever their Care-of-Addresses (CoAs) change. They use different Foreign Agents

(FAs) and Gateway FAs (GFAs) hierarchies to concentrate the registration processes.

For high-mobility MTs, the Hierarchical MIP (HMIP) and Dynamic HMIP (DHMIP)

strategies localize the registration in FAs and GFAs, yielding to high-mobility signaling. The

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 9

Multicast HMIP strategy limits the registration processes in the GFAs. For high-mobility MTs, it

provides lowest mobility signaling delay compared to the HMIP and DHMIP approaches.

However, it is resource consuming strategy unless for frequent MT mobility.

Mobility Management allows locating roaming MTs at any time to deliver its services

and to maintain connections as the MT moves from one service area to another. Mobility

management consists of two components.

Location Management:

It locates MTs with the main purposes to deliver incoming calls to them at a

reasonable cost.

Handoff or Handover Management:

It transfers ongoing calls to adjacent cells as a MT moves from one access point

in the network to another

Figure 2.3 Location Management

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 10

Figure 2.4 Hand off or Handover Management

Location Update schemes

Location Update (LU) schemes are classified in two main groups:

Static or global schemes:

LU is triggered based on the topology of the network.

Dynamic or local schemes:

An MT sends a LU message according to the time elapsed (time-based method), the

number of cells visited (movement-based method), or the distance -in terms of cells-

travelled (distance-based method) to the node in the cellular network.

Movement Based LU Schemes

In Movement Based Schemes:

Each MT only keeps a counter of the number of cells visited

A location update is performed when this counter exceeds a predefined threshold

value

Center Cell is the cell where the last location update occurred

Residing Area of the MT is the area in which the mobile can be located and this area is

within a maximum distance of d - 1 from the center cell

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 11

Figure 2.5 Location Update schemes

Polling Cycle

The process which is done by the network when a call arrives to a MT, The

network send Polling signal to target cell in the residing area and wait for

response

Movement Based Location Update

The movement based LU is performed by a mobile terminal when the number of

cell boundary crossings since the last location registration equals a threshold

value.

2.5 Medium Access Control (MAC) MAC is a data communication protocol. It is a sub layer of the data link layer, which

itself is layer 2. The MAC sub layer provides addressing and channel access control mechanisms

that make it possible for several terminals or network nodes to communicate within a multiple

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 12

access network that incorporates a shared medium, e.g. Ethernet. It is also referred to as

a medium access controller. 2.5.1 Preamble

The purpose of the idle time before transmission starts is to allow a small time interval

for the receiver electronics in each of the nodes to settle after completion of the previous frame.

A node starts transmission by sending an 8 byte (64 bit) preamble sequence. This consists of 62

alternating 1's and 0's followed by the pattern 11. Strictly speaking the last byte which finished

with the '11' is known as the "Start of Frame Delimiter". When encoded using Manchester

encoding, at 10 Mbps, the 62 alternating bits produce a 10 MHz square wave (one complete

cycle each bit period).

Figure 2.6 Preamble in Medium Access Control

The purpose of the preamble is to allow time for the receiver in each node to achieve lock

of the receiver digital phase lock loop which is used to synchronize the receiver data clock to the

transmitter data clock. At the point when the first bit of the preamble is received, each receiver

may be in an arbitrary state (i.e. have an arbitrary phase for its local clock).

During the course of the preamble it learns the correct phase, but in so doing it may miss

(or gain) a number of bits. A special pattern (11) is therefore used to mark the last two bits of the

preamble. When this is received, the ethernet receiver interface starts collecting the bits into

bytes for processing by the MAC layer. It also confirms the polarity of the transition representing

a '1' bit to the receiver (as a check in case this has been inverted).

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 13

2.5.2 Header

Figure 2.7 MAC encapsulation of a packet of data

The header consists of three parts:

A 6-byte destination address, which specifies either a single recipient node (unicast

mode), a group of recipient nodes (multicast mode), or the set of all recipient nodes

(broadcast mode).

A 6-byte source address, which is set to the sender's globally unique node address.

This may be used by the network layer protocol to identify the sender, but usually other

mechanisms are used (e.g. ARP).

Its main function is to allow address learning which may be used to configure the filter

tables in a bridge.

A 2-byte type field, which provides a Service Access Point (SAP) to identify the type of

protocol being carried (e.g. the values 0x0800 is used to identify the IP network protocol,

other values are used to indicate other network layer protocols).

In the case of IEEE 802.3 LLC, this may also be used to indicate the length of the data

part.

The type field is also be used to indicate when a tag field is added to a frame.

2.5.3 CRC

The final field in an ethernet MAC frame is called a Cyclic Redundancy Check

(sometimes also known as a Frame Check Sequence). A 32-bit CRC provides error detection in

the case where line errors (or transmission collisions in Ethernet) result in corruption of the

MAC frame. Any frame with an invalid CRC is discarded by the MAC receiver without further

processing. The MAC protocol does not provide any indication that a frame has been discarded

due to an invalid CRC.

The link layer CRC therefore protects the frame from corruption while being transmitted

over the physical medium (cable). A new CRC is added if the packet is forwarded by the router

on another ethernet link. While the packet is being processed by the router the packet data is not

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 14

protected by the CRC. Router processing errors must be detected by network or transport-layer

checksums.

2.5.4 Inter Frame Gap

After transmission of each frame, a transmitter must wait for a period of 9.6

microseconds (at 10 Mbps) to allow the signal to propagate through the receiver electronics at

the destination. This period of time is known as the Inter-Frame Gap (IFG). While every

transmitter must wait for this time between sending frames, receivers do not necessarily see a

"silent" period of 9.6 microseconds. The way in which repeaters operate is such that they may

reduce the IFG between the frames which they regenerate.

2.5.5 Byte Order

It is important to realize that nearly all serial communications systems transmit the least

significant bit of each byte first at the physical layer. Ethernet supports broadcast, unicast, and

multicast addresses. The appearance of a multicast address on the cable (in this case an IP

multicast address, with group set to the bit pattern 0xxx xxxx xxxx xxxx xxxx xxxx) is therefore

as shown below (bits transmitted from left to right):

0 23 IP Multicast Address Group 47

| | <--------------------------->|

1000 0000 0000 0000 0111 1010 xxxx xxx0 xxxx xxxx xxxx xxxx

| |

Multicast Bit 0 = Internet Multicast 1 = Assigned for other uses

When the same frame is stored in the memory of a computer, the bits are ordered such

that the least significant bit of each byte is stored in the right most position (the bits are

transmitted right-to-left within bytes, bytes transmitted left-to-right):

0 23 47

| | |

0000 0001 0000 0000 0101 1110 0xxx xxxx xxxx xxxx xxxx xxxx

| <--------------------------->

Multicast Bit IP Multicast Address Group

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 15

2.5.6 CSMA /CD

The Carrier Sense Multiple Access (CSMA) with Collision Detection (CD) protocol is

used to control access to the shared ethernet medium. A switched network (e.g. Fast Ethernet)

may use a full duplex mode giving access to the full link speed when used between directly

connected two NICs, Switch to NIC cables, or Switch to Switch cables.

2.5.7 Receiver Processing Algorithm

The receiver processing algorithm is illustrated below

Figure 2.8 Receiver Processing Algorithm

2.5.8 Runt Frame

Any frame which is received and which is less than 64 bytes is illegal, and is called a

"runt". In most cases, such frames arise from a collision, and while they indicate an illegal

reception, they may be observed on correctly functioning networks. A receiver must discard all

runt frames.

2.5.9 Giant Frame

Any frame which is received and which is greater than the maximum frame size is called

a "giant". In theory, the jabber control circuit in the transceiver should prevent any node from

generating such a frame, but certain failures in the physical layer may also give rise to over-sized

Ethernet frames. Like runts, giants are discarded by an ethernet receiver.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 16

2.5.10 Jumbo Frame

Some modern Gigabit Ethernet NICs support frames that are larger than the traditional

1500 bytes specified by the IEEE. This new mode requires support by both ends of the link to

support Jumbo Frames. Path MTU Discovery is required for a router to utilize this feature, since

there is no other way for a router to determine that all systems on the end-to-end path will

support these larger sized frames.

2.5.11 Misaligned Frame

Any frame which does not contain an integral number of received bytes (bytes) is also

illegal. A receiver has no way of knowing which bits are legal, and how to compute the CRC-32

of the frame. Such frames are therefore also discarded by the ethernet receiver.

2.5.12 Other Issues

The ethernet standard dictates a minimum size of frame, which requires at least 46 bytes

of data to be present in every MAC frame. If the network layer wishes to send less than 46 bytes

of data the MAC protocol adds sufficient number of zero bytes (0x00, is also known as null

padding characters) to satisfy this requirement. The maximum size of data which may be carried

in a MAC frame using Ethernet is 1500 bytes (this is known as the MTU in IP).

2.6 Introduction to CDMA based systems 2.6.1 Spread Spectrum in CDMA systems

CDMA is a form of Direct Sequence Spread Spectrum communications. In general,

Spread Spectrum communications is distinguished by three key elements:

1. The signal occupies a bandwidth much greater than that which is necessary to send the

information.

2. This results in many benefits, such as immunity to interference and jamming and multi-

user access, which we’ll discuss later on.

3. The bandwidth is spread by means of a code which is independent of the data.

4. The independence of the code distinguishes this from standard modulation schemes in

which the data modulation will always spread the spectrum.

5. The receiver synchronizes to the code to recover the data.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 17

6. The use of an independent code and synchronous reception allows multiple users to

access the same frequency band at the same time.

Figure 2.9 Direct Sequence Spread Spectrum System

In order to protect the signal, the code used is pseudo-random. It appears random, but is

actually deterministic, so that the receiver can reconstruct the code for synchronous detection.

This pseudo-random code is also called pseudo-noise (PN).

2.6.2 Three Types of Spread Spectrum Communications

There are three ways to spread the bandwidth of the signal:

Frequency hopping. The signal is rapidly switched between different frequencies within

the hopping bandwidth pseudo-randomly, and the receiver knows beforehand where to

find the signal at any given time.

Time hopping. The signal is transmitted in short bursts pseudo-randomly, and the

receiver knows beforehand when to expect the burst.

Direct sequence. The digital data is directly coded at a much higher frequency.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 18

The code is generated pseudo-randomly, the receiver knows how to generate the same

code, and correlates the received signal with that code to extract the data.

2.6.3 Direct Sequence Spread Spectrum

CDMA is a Direct Sequence Spread Spectrum system. The CDMA system works directly

on 64 kb/sec digital signals. These signals can be digitized voice, ISDN channels, modem data,

etc. Figure 2.9 shows a simplified Direct Sequence Spread Spectrum system. For clarity, the

figure shows one channel operating in one direction only.

Signal transmission consists of the following steps:

1. A pseudo-random code is generated, different for each channel and each successive

connection.

2. The Information data modulates the pseudo-random code (the Information data is

“spread”).

3. The resulting signal modulates a carrier.

4. The modulated carrier is amplified and broadcast.

Signal reception consists of the following steps:

The carrier is received and amplified.

The received signal is mixed with a local carrier to recover the spread digital signal.

A pseudo-random code is generated, matching the anticipated signal.

The receiver acquires the received code and phase locks its own code to it.

The received signal is correlated with the generated code, extracting the information data.

2.7 Coding Methods in CDMA The following sections describe how a system might implement the steps illustrated in

figure 2.9

2.7.1 Input data

CDMA works on information data from several possible sources, such as digitized voice

or ISDN channels. Data rates can vary, here are some examples:

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 19

Data Source Data Rate

Voice Pulse Code Modulation (PCM) 64 kBits/sec

Adaptive Differential Pulse Code Modulation (ADPCM) 32 kBits/sec

Low Delay Code Excited Linear Prediction (LD-CELP) 16 kBits/sec

ISDN Bearer Channel (B-Channel) 64 kBits/sec

Data Channel (D-Channel) 16 kBits/sec

The system works with 64 kBits/sec data, but can accept input rates of 8, 16, 32, or 64

kBits/sec. Inputs of less than 64 kBits/sec are padded with extra bits to bring them up to 64

kBits/sec. For inputs of 8, 16, 32, or 64 kBits/sec, the system applies Forward Error Correction

(FEC) coding, which doubles the bit rate, up to 128 kbits/sec. The complex modulation scheme

(which we’ll discuss in more detail later), transmits two bits at a time, in two bit symbols. For

inputs of less than 64 kbits/sec, each symbol is repeated to bring the transmission rate up to 64

kilosymbols/sec. Each component of the complex signal carries one bit of the two bit symbol, at

64 kBits/sec, as shown below.

Figure 2.10 Complex Signal carries one bit of the two bit symbol

2.7.2 Generating Pseudo-Random Codes

For each channel the base station generates a unique code that changes for every

connection. The base station adds together all the coded transmissions for every subscriber. The

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 20

subscriber unit correctly generates its own matching code and uses it to extract the appropriate

signals. Note that each subscriber uses several independent channels.

In order for all this to occur, the pseudo-random code must have the following properties:

1. It must be deterministic. The subscriber station must be able to independently generate

the code that matches the base station code.

2. It must appear random to a listener without prior knowledge of the code (i.e. it has the

statistical properties of sampled white noise).

3. The cross-correlation between any two codes must be small (see below for more

information on code correlation).

4. The code must have a long period (i.e. a long time before the code repeats itself).

Code Correlation

In this context, correlation has a specific mathematical meaning. In general the correlation

function has these properties:

It equals 1 if the two codes are identical

It equals 0 of the two codes have nothing in common

Intermediate values indicate how much the codes have in common. The more they have in

common, the harder it is for the receiver to extract the appropriate signal.

There are two correlation functions:

Cross-Correlation: The correlation of two different codes. As we’ve said, this should be

as small as possible.

Auto-Correlation: The correlation of a code with a time-delayed version of itself. In order

to reject multi-path interference, this function should equal 0 for any time delay other

than zero.

The receiver uses cross-correlation to separate the appropriate signal from signals meant for

other receivers, and auto-correlation to reject multi-path interference.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 21

Figure 2.11 Pseudo-Noise Spreading

Figure 2.12 Frequency Spreading

2.7.3 Pseudo-Noise (PN) Spreading

The Forward Error Correction (FEC) coded information data modulates the pseudo-random

code, as shown in figure 2.11. Some terminology related to the pseudo-random code:

Chipping Frequency (fc): the bit rate of the PN code.

Information rate (fi): the bit rate of the digital data.

Chip: One bit of the PN code.

Epoch: The length of time before the code starts repeating itself with PN (the period of

the code). The epoch must be longer than the round trip propagation delay (The epoch is

on the order of several seconds).

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 22

Figure 2.12 shows the process of frequency spreading. In general, the bandwidth of a digital

signal is twice its bit rate. The bandwidths of the information data (fi) and the PN code are shown

together. The bandwidth is the combination of the two for fc>fi and fc<fi and it can be

approximated by the bandwidth of the PN code.

Processing Gain

An important concept relating to the bandwidth is the processing gain (Gp). This is a

theoretical system gain that reflects the relative advantage that frequency spreading provides.

The processing gain is equal to the ratio of the chipping frequency to the data frequency:

i

cp f

fG

There are two major benefits from high processing gain:

Interference rejection: the ability of the system to reject interference is directly

proportional to Gp.

System capacity: the capacity of the system is directly proportional to Gp.

So higher the PN code bit rate (the wider the CDMA bandwidth), better the system

performance.

Figure 2.13 Complex Modulator

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 23

Figure 2.14 Complex Modulation

2.7.4 Transmitting Data

The resultant coded signal next modulates an RF carrier for transmission using

Quadrature Phase Shift Keying (QPSK). QPSK uses four different states to encode each symbol.

The four states are phase shifts of the carrier spaced 90 degrees apart. By convention, the phase

shifts are 45, 135, 225, and 315 degrees. Since there are four possible states used to encode

binary information, each state represents two bits. This two bit “word” is called a symbol.

Complex modulation in general, applying it to a single channel with no PN-coding. Then

we’ll discuss how we apply it to a multi-channel, PN-coded, system. Algebraically, a carrier

wave with an applied phase shift, A (t), can be expressed as a sum of two components, a cosine

wave and a sine wave, as:

I(t) is called the real, or In-phase, component of the data, and Q(t) is called the imaginary,

or quadrature-phase, component of the data. We end up with two Binary PSK waves

superimposed. These are easier to modulate and later demodulate.

This is not only an algebraic identity, but also forms the basis for the actual

modulation/demodulation scheme. The transmitter generates two carrier waves of the same

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 24

frequency, a sine and cosine. I(t) and Q(t) are binary, modulating each component by phase

shifting it either 0 or 180 degrees. Both components are then summed together. Since I(t) and

Q(t) are binary, we’ll refer to them as simply I and Q.

The receiver generates the two reference waves, and demodulates each component. It is

easier to detect 180 degrees phase shifts than 90 degrees phase shifts. The following table

summarizes this modulation scheme. Note that I and Q are normalized to 1.

Symbol I Q Phase shift

00 +1 +1 45

01 +1 -1 315

10 -1 +1 135

11 -1 -1 225

For Digital Signal Processing, the two-bit symbols are considered to be complex

numbers, I +jQ.

2.7.5 Working with Complex Data

In order to make full use of the efficiency of digital signal processing, the conversion of

the information data into complex symbols occurs before the modulation. The system generates

complex PN codes made up of 2 independent components, PNi +jPNq. To spread the

Information data the system performs complex multiplication between the complex PN codes

and the complex data.

2.7.6 Summing Many Channels Together

Many channels are added together and transmitted simultaneously. This addition happens

digitally at the chip rate. Remember, there are millions of chips in each symbol. For clarity, let’s

say each chip is represented by an 8 bit word (it’s slightly more complicated than that, but those

details are beyond the scope of this discussion).

At the Chip Rate

Information data is converted to two bit symbols.

The first bit of the symbol is placed in the I data stream, the second bit is placed in the Q

data stream.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 25

The complex PN code is generated. The complex PN code has two independently

generated components, an I component and a Q component.

The complex Information data and complex PN code are multiplied together.

For each component (I or Q):

Each chip is represented by an 8 bit word. However, since one chip is either a one or a

zero, the 8 bit word equals either 1 or -1.

When many channels are added together, the 8-bit word, as the sum of all the chips, can

take on values from between -128 to +128.

The 8-bit word then goes through a Digital to Analog Converter, resulting in an analog

level proportional to the value of the 8-bit word.

This value then modulates the amplitude of the carrier (the I component modulates the

Cosine, the Q component modulates the Sine)

The modulated carriers are added together.

2.7.7 Receiving Data

The receiver performs the following steps to extract the Information:

Demodulation

Code acquisition and lock

Correlation of code with signal

Decoding of Information data

Demodulation

The receiver generates two reference waves, a cosine wave and a sine wave. Separately

mixing each with the received carrier, the receiver extracts I(t) and Q(t). Analog to Digital

converters restore the 8-bit words representing the I and Q chips.

Code Acquisition and Lock

The receiver, as described earlier, generates its own complex PN code that matches the

code generated by the transmitter. However, the local code must be phase-locked to the encoded

data. The RCS and FSU each have different ways of acquiring and locking onto the other’s

transmitted code. Each method will be covered in more detail in later sections.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 26

Correlation and Data Despreading

Once the PN code is phase-locked to the pilot, the received signal is sent to a correlator

that multiplies it with the complex PN code, extracting the I and Q data meant for that receiver.

The receiver reconstructs the information data from the I and Q data.

Automatic Power Control

The RCS gets bombarded by signals from many FSUs. Some of these FSUs are close and

their signals are much stronger than FSUs farther away. This results in the Near/Far problem

inherent in CDMA communications. System Capacity is also dependant on signal power. For

these reasons, both the RCS and FSU measure the received power and send signals to control the

others transmit power.

Near/Far Problem

The near-far problem is a condition in which a receiver captures a strong signal and

thereby makes it impossible for the receiver to detect a weaker signal.

Interference Rejection

CDMA technology is inherently resistant to interference and jamming. A common

problem with urban communications is multi-path interference. Multi-path interference is caused

by the broadcast signal traveling over different paths to reach the receiver. The receiver then has

to recover the signal combined with echoes of varying amplitude and phase. This results in two

types of interference:

Inter-chip interference: The reflected signals are delayed long enough that successive bits

(or chips, in this case) in the demodulated signals overlap, creating uncertainty in the

data.

Selective fading: The reflected signals are delayed long enough that they are randomly

out of phase, and add destructively to the desired signal, causing it to fade.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 27

Figure 2.15 Multi-Path Interference Rejection

Combating Interference

Two methods are commonly used to combat multi-path interference:

Rake filter: Correlators are set up at appropriate time intervals to extract all the echoes.

The relative amplitude and phase of each echo is measured, and each echo signal is phase

corrected and added to the signal.

Adaptive Matched Filter: This filter is “matched” to the transfer function (i.e. the

propagation characteristics) of the signal path. It phase shifts the echo signals and adds

them to maximize the received signal.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 28

System Operation

The following sections describe a hypothetical implementation of CDMA technology. A

connection can be one of many types of data, but for simplicity we will refer to any connection

as a “call”.

These sections cover the following system states:

System Idle: System operation when there is no call in progress.

Call Setup: The steps to setup a connection.

Call Processing: The processing and transmission of the digital data once a connection is

established.

Call Teardown: The steps taken once a call is finished to free system resources.

But first, in order to understand system operation, you must understand the Pilot codes and

communication channels the system uses.

Pilot Codes

At each phase of operation, the system broadcasts pilot signals. These pilot signals are the

unmodulated PN codes associated with each channel, used to synchronize and track the locally

generated PN codes for despreading. The system uses the following pilot signals.

Global Pilot: Broadcast by the RCS. All FSUs use the Global Pilot for all received

channels.

Short Access Pilot: Broadcast by FSU. Monitored by the RCS for an incoming access

attempt by an FSU. Alerts the RCS that an FSU is requesting access.

Long Access Pilot: Broadcast by the FSU. Allows the RCS to synchronize to the FSU to

setup a call.

Assigned Pilot: Broadcast by FSU. Unmodulated PN code of the assigned channel.

Allows RCS to synchronize to and track the PN codes of the FSU assigned channels for

despreading.

Communication Channels

In order to understand system operation, we need to introduce the system communication

channels. The system has the following channel groups:

The Broadcast Channel group: Channels continuously broadcasted by the RCS.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 29

Call Setup Channel group: Channels used to setup a call. There are four sets of these

channels; up to 4 FSUs can request access at one time.

Assigned Channel group: Channels used for the call.

Each logical channel in each group is realized by assigning a unique PN code to it.

Table 2.1 Channel group and Name description

Channel

Group

Channel

Name

Direction Number of

Channels

Description

Broadcast Global Pilot F One An unmodulated PN code that the FSU can

synchronize to.

Fast

Broadcast

Channel

F One A single message indicating which services

and access channels are available. This

information may change rapidly.

Slow

Broadcast

Channel

F One Paging messages and other system

information that does not need to be

updated rapidly.

Call Setup Short Pilot R Four Alerts the RCS that an FSU is requesting

access.

Long Pilot Four Allows the RCS to synchronize to the FSU

to setup a call.

Access

Channel

R Four Used by the FSUs to access an RCS and

get assigned channels.

Control

Channel

F Four Used by the RCS to reply to access

attempts from FSUs.

Control

Channel APC

F Four Controls FSU power during initial access.

Assigned Assigned R One per FSU An unmodulated PN code that the RCS can

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 30

Pilot synchronize to.

APC Channel F One per FSU Controls FSU power during call.

R Controls RCS power of assigned FSU

channels.

Traffic

Channels

F Up to 3 per

FSU

Signal data from RCS to FSU.

R Signal data from FSU to RCS.

Order wire F One per FSU Control signals: CDMA and Telco

messages.

R

Note on Direction: F - Forward - From RCS to FSU

R - Reverse - From FSU to RCS

Pilot Ramp Up

When the FSU transmits its Short and Long Access Pilots, it ramps the power up to

determine what power level it should transmit. When the RCS detects the Short Access Pilot, it

acknowledges over the Fast Broadcast Channel. The FSU then knows that it is being received,

and switches to the Long Access Pilot code. The Long Access Pilot code ramps up more slowly,

until the RCS locks and starts transmitting Automatic Power Control signals.

System Idle

On startup, the RCS places one of its modems in broadcast mode, in which state it broadcasts

the following Global Channels continuously:

Global Pilot

Slow Broadcast Channel

Fast Broadcast Channel

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 31

Paging Groups and Sleep Cycles

The RCS divides all the FSUs associated with it into paging groups. The RCS assigns

each paging group a particular time slot on its Slow Broadcast Channel (the first time slot is

reserved for general Slow Broadcast information).

The Slow Broadcast Channel cycles through all the paging groups. The cycle takes

approximately one second to complete. When the Slow Broadcast Channel reaches the time slot

of the FSU’s paging group, the FSU powers up, synchronizes to the Global Pilot, and checks for

its address in the paging group.

Figure 2.16 Call Setup

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 32

Call Setup

Two events can initiate a call:

The FSU receives a page from the RCS. This is called a terminating call.

The FSU generates an off-hook signal in response to subscriber equipment.

The FSU locks on to the Global Pilot. This is called an originating call.

Once either of these events occurs, call setup proceeds as follows:

1. FSU requests access.

FSU transmits Short Access Pilot Code.

RCS detects transmission and acknowledges. Flags Call Setup Channel as busy.

FSU transmits Long Access Pilot Code.

RCS synchronizes to the FSU and confirms sync over Control Channel.

RCS measures received power and starts transmitting APC signal on APC Control

Channel.

RCS and FSU exchange messages on Access and Control Channels.

Type of service and types of traffic channels are specified.

2. RCS assigns channel group to FSU.

RCS designates assigned code on Control Channel

FSU generates complex PN codes for all channels in its assigned group.

Both FSU and RCS synchronously switch to the assigned channel groups.

The call is connected.

The RCS flags the Call Setup Channel as available, and assigns it to the next available

modem.

Note that the RCS now tracks the Assigned Pilot; the FSU continues to track the Global Pilot.

Call Processing

Call processing puts together everything we’ve covered so far. There are slight

differences in the way the RCS and FSU process calls, so we will cover both the Forward link

(RCS to FSU) and Reverse link (FSU to RCS). Note that the system uses Frequency Division

Duplexing for the Forward and Reverse links: they transmit over different frequencies.

In the forward direction, the RCS:

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 33

1. Generates CDMA data signal for each traffic channel:

FEC codes the Information data, and converts the data to two-bit symbols.

Converts the symbols to I and Q data, and pads each data stream to 64 kbits/sec.

Generates the Complex PN code for each channel.

Multiplies the Complex Information data and the Complex PN code together.

Reads APC data from FSU, digitally scales channels accordingly.

2. Generates other signal channels:

Calculates APC signal

Converts it to I data only

Multiplies it with its own Complex PN code

3. Adds all signals together:

Traffic channels

APC channel

Order Wire channel

Global Pilot

4. Adds together the signals for all currently active FSUs.

5. Modulates and transmits carriers

I and Q data modulate Cosine and Sine carriers.

Carriers are combined, amplified, and broadcast.

The FSU:

1. Extracts the I and Q data:

Receives and amplifies the modulated carriers.

Demodulates the signal and extracts the I and Q data.

2. Filters the I and Q data:

Extracts multi-path information from the Pilot Rake filter and supplies it to the Adaptive

Matched Filter.

Removes multi-path interference from I and Q data using the Adaptive Matched Filter.

Performs Automatic Gain Control on received signal

3. Extracts the CDMA data signal for each traffic channel:

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 34

Generates the Complex PN code for each channel.

Multiplies the Complex signal and the Complex PN code together.

Converts the I and Q data to symbols.

Decodes the symbols for error correction.

Extracts the signal data.

In the reverse direction, the FSU:

1. Generates CDMA data signal for each traffic channel:

FEC codes the Information data, and converts the data to two-bit symbols.

Converts the symbols to I and Q data, and pads each data stream to 64 kbits/sec.

Generates the Complex PN code for each channel.

Multiplies the Complex signal and the Complex PN code together.

Reads APC data from FSU, digitally scales channels accordingly.

2. Generates other signal channels:

Calculates APC signal

Converts it to I data only

Multiplies it with its own Complex PN code

3. Adds all signals together:

Traffic channels

APC channel

Order Wire channel

Global Pilot

4. Passes the signal through a pulse shaping digital filter.

5. Modulates and transmits carriers

I and Q data modulate Cosine and Sine carriers.

Carriers are combined, amplified, and broadcast.

The RCS:

1. Extracts the I and Q data:

Receives and amplifies the modulated carriers and demodulates the signal and extracts

the I and Q data.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 35

2. Filters the I and Q data:

Extracts multi-path information from the Pilot Rake filter and supplies it to the Adaptive

Matched Filter and removes multi-path interference from I and Q data using the Adaptive

Matched Filter. It Performs Automatic Gain Control on the received signal

3. Extracts the CDMA data signal for each traffic channel, for each subscriber connection:

Generates the Complex PN code for each channel.

Multiplies the Complex signal and the Complex PN code together.

Converts the I and Q data to symbols and decodes the symbols for error correction.

Extracts the Information data.

Call Teardown

An on-hook signal causes the RCS to release the resources, and the FSU returns to its idle

state.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 36

2.8 QUESTION BANK

PART-A

1. What is meant by cellular system?

2. What is meant by Frequency management?

3. What is the interference in cellular system?

4. What is Interference in Cellular Systems?

5. What is Channel Assignment?

6. What is Location management in cellular networks?

7. Define Medium Access Control.

8. Define CDMA based systems.

9. What is Spread Spectrum in CDMA systems?

10. Define Coding Methods.

11. What are the basic groups of logical channels?

12. What are the categories of Mobile services?

13. What are the basic groups of logical channels?

14. What are the disadvantages of cellular systems?

15. What are subsystems in GSM system?

16. What are the control channel groups in GSM?

17. What are the four types of handover available in GSM?

18. What are types of Handover?

19. What are the services provided by supplementary services?

20. What is authentication centre (AuC)?

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-2 2. 37

PART-B (16 Marks)

1. Explain with diagram the Hidden terminal and exposed terminal problem in CSMA.

2. Explain with diagram the Near-Far terminal problem in CSMA.

3. Explain Location Management in cellular network?

4. Explain Channel Assignment in cellular network?

5. Explain in detail about Coding Methods

6. Explain in detail about Spectrum in CDMA systems.

7. Explain the different types of transport modes and the channel used to carry packets in

Digital Audio Broadcasting.

8. Explain in detail about Digital Audio Broadcasting.

9. Explain in detail about Digital Video Broadcasting.

10. What are different interleaving and repetition schemes applied by DAB to objects and

segments?

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 1

UNIT 3

MOBILE IP NETWORK LAYER

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 2

CONTENTS

3.1 Mobile IP Protocol Overview

3.1.1 Requirements for the evolution of the new mobile IP protocol

3.1.2 Need for upgrading capacity of Routers, and Data-link and Physical layers

3.1.3 Security Needs

3.1.4 Need for Non-Transparency from higher layers

3.1.5 Reestablishment problems due to Non-Transparency from higher layers

3.1.6 Need of Non-Transparency from higher layers

3.1.7 Examples of Non-Transparency from higher layers

3.1.8 Routing table problems

3.1.9 Reestablishment Problems

3.1.10 Working of Mobile IP

3.1.11Use of HAs and FAs

3.1.12 Mobile IP network employing home and foreign agents

3.1.13 Switching Center home agent (HA)

3.1.14 Paging area

3.1.15 Switching centre foreign agent for a foreign network of visiting MNs

3.1.16 Different paging areas interconnected through gateway routers

3.2 Route optimization

3.2.1 CN (MNk) corresponding with visiting MNI

3.2.2 Mobile IP network employing home and foreign agents FAk and FAj

3.3 Mobility support for IPV6

3.3.1 IP micro-mobility support

3.3.2 Cellular IP

3.4 Connectivity with 3G Networks

3.5 Packet Delivery and Handover Management

3.6 Location Management

3.6.1 Handover Management protocols

3.6.2 Location Management Protocols

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 3

3.6.3 Agent Discovery

3.6.4 Agent advertisements

3.6.5 Header extension

3.6.6 Co-located COA

3.6.7 Flags

3.6.8 Agent solicitation

3.7 Registration

3.7.1 Function of HA after registration

3.7.2 Registration steps

3.7.3 Registration

3.7.4 Registration Request

3.7.5 8 flag bits

3.7.6 Registration Reply

3.7.7 New database entry fields after registration at the HA

3.8 Tunneling and Encapsulation

3.8.1Tunneling

3.8.2 IP header-in-IP header Method of encapsulation

3.8.3 Format of Encapsulated data

3.8.4 IP header-in-IP header encapsulation Format of Encapsulated data

3.8.5 Redundancy in IP header-in-IP header method

3.8.6 Minimum Encapsulation (ME) method by IP header of an IP Packet

3.8.7 Deficiencies in the IP header-in-IP header and ME methods

3.8.8 Generic Routing Encapsulation (GRE) by IP header of an IP Packet

3.8.9 Tunnel characteristics

3.8.10 GRE by IP header of an IP Packet

3.8.11 GRE (GRE) Header(s)

3.8.12 IP Header and IP Packet data

3.8.13 Source routing

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 4

3.9 Route Optimization

3.9.1 Triangular route

3.9.2 Optimization of route for the triangular routing example

3.9.3 Mobility binding Steps in the calling network

3.9.4 Warning sent to HAl of MNl

3.9.5 Smooth handover in Mobile IP protocol method of optimization

3.9.6 Reverse Tunnel

3.9.7 Advantage of reverse tunneling

3.9.8 Time-to-live for forward and reverse tunneling

3.9.9 Reverse tunneling

3.10 Dynamic Host Configuration Protocol

3.11 Question Bank

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 5

TECHNICAL TERMS

1. Home Agent (HA) is a host in the home network of the MN, typically a router. It

registers the location of the MN, tunnels IP packets to the COA

2. Mobility Binding: The Mobile Node sends its registration request to the Home Agent.

The HA sets up a mobility binding containing the mobile node’s home IP address and the

current COA.

3. Tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel

endpoint. Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel

unchanged.

4. Encapsulation is the mechanism of taking a packet consisting of packet header and data

putting it into the data part of a new packet.

5. De capsulation is the reverse operation, taking a packet out of the data part of another

packet

6. Cellular IP provides local handovers without renewed registration by installing a single

cellular IP gateway for each domain, which acts to the outside world as a foreign agent.

7. Routing table is maintained and regularly updated by the router

8. Broadcasting is the Message or packet transmits to all the IP addresses which are set for

listening

9. Mobile Node (MN) is node that moves across networks without changing its IP address

10. Correspondent Node (CN) is a host with which MN is “corresponding” (TCP)

11. Foreign Agent (FA) is a host in the current foreign network of the MN, typically a

router. It forwards tunneled packets to the MN, typically the default router for MN

12. Care-of Address (COA) is a address of the current tunnel end-point for the MN (at FA

or MN). The actual location of the MN from an IP point of view

13. Tunneling is an encapsulating IP packet including a path and an original IP packet.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 6

3. MOBILE IP NETWORK LAYER

3.1 Mobile IP Protocol Overview Defined by the Internet Engineering Task Force (IETF)

Described in the IETF RFC 3344

A protocol developed to allow internetwork mobility for wireless nodes without them

having to change their IP addresses by the Internet Engineering Task Force (IETF)

3.1.1 Requirements for the evolution of the new mobile IP protocol

Need for Enhancing IP Network capacity─ Use of the existing IP protocol by large

number of Mobile nodes (MNs) will lead to a decrease in the network.

3.1.2 Need for upgrading capacity of Routers, and Data-link and Physical layers

IP network protocols support 48-bit MAC addresses

But when the number of MNs is large, then other interfaces and lower level protocols

are required

For mobile nodes to move from one place to another while using the existing IP protocol,

new protocols are required at the data-link and physical layer.

3.1.3 Security Needs

The mobility of the called MN must be hidden from the calling MN

When a new IP address allocates at the new hosting subnet of the existing IP based

infrastructure, the identity of the mobile node is not hidden from another host

The MN exposes and lacks security when using the existing IP protocol.

3.1.4 Need for Non-Transparency from higher layers

The transport layer establishes a connection between a given port at a given IP address

(called socket) with a another port at another IP address

The connection, once established by the transport layers between the sockets, is broken as

soon as the new address is assigned.

3.1.5 Reestablishment problems due to Non-Transparency from higher layers

(a) Reestablishment of the connection takes time which means loss of data during that

interval

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 7

(b) Reestablishment process has to share the same network and the given transmission rate.

3.1.6 Need of Non-Transparency from higher layers

Any movement of the MN will be transparent to the TCP and to L7 in case the TCP layer

re-establishes the connection when the IP protocol used by the MN

There is, therefore, a need for non-transparency of the MN to distant ports.

3.1.7 Examples of Non-Transparency from higher layers

Assume a distant router is sending data packets for an IP address, presently assigned to a

mobile terminal using another router

When the terminal moves from one service area to another, the routing tables on the route

need to be updated

Till this is done the packets will not reach their new destination.

3.1.8 Routing table problems

The reconfiguration messages for updating the routing tables have to share the same

network and the given transmission rate.

3.1.9 Reestablishment Problems

Reestablishment of the connection takes time and this means loss of data during that

interval

Any movement on the part of the MN transparent and, thus, not secure from the distant

hosts on the network of distant routers.

3.1.10 Working of Mobile IP

A router has a home agent (HA) for a set of home networked MNs, as well as a foreign

agent (FA) for the visiting MNs

An agent ─ software employed at a router or the host serviced by a router.

An MN can access Internet services using the mobile IP protocol

The MN can change its service router when visiting another location (which is serviced

by a different router)

The HA and the FA play a location management role similar to that of the HLR and the

VLR in a GSM system.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 8

3.1.11 Use of HAs and FAs

The same software can function as both the HA and the FA at different instants of time

An MN can also have software which functions as an FA instead of the FA at the router.

3.1.12 Mobile IP network employing home and foreign agents

The Mobile IP network employing home and foreign agents are shown in the figure

below.

Figure 3.1 Mobile IP network employing home and foreign agents

3.1.13 Switching Center Home Agent (HA)

Provides services to an MN at the registered home network including transmitting and

receiving packets from the Internet

A home agent assigns MNs to routers which support the MNs

A home network is a mobile radio subsystems network within an area, called paging area

The home network is like a subnet

Just like a subnet has a number of IP hosts, a home network has the MNs

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 9

3.1.14 Paging area

Area in which the MNs of home as well as foreign networks can be approached through a

single MSC or a set of MSCs

Routing of packets through the routers performed when an MN moves within one paging

area

3.1.15 Switching centre foreign agent for a foreign network of visiting MNs

Foreign network─ another mobile radio subsystem network which the MNs of home

network visit within the paging area

Foreign agent─ a provider of the IP address and services, including transmitting and

receiving packets from the Internet, for MNs on visit to a foreign network

Foreign agent─ assigns MNs to a router, which supports the MNs of other home

networks

3.1.16 Different paging areas interconnected through gateway routers

Form a backbone network

Rerouting of the packets done through the gateway routers when an MN moves from one

paging area to another

3.2 Route optimization 3.2.1 CN (MNk) corresponding with visiting MNI

The route optimization is explained with CN (MNk) corresponding with visiting MNI

below in figure 3.2.

3.2.2 Mobile IP network employing home and foreign agents FAk and FAj

Packet delivers to and from the MNk at a foreign network with FAk and MNI at the

foreign network with FAj

Example

Assume that MNI visiting a foreign network which happens to be the home network of

CN2 is very close to CNI

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 10

Figure 3.2 CN (MNk) corresponding with visiting MNI

Triangular route

Triangular route without mobility binding between COAj and CNk

Also possible that FAk and FAj are identical

Optimization of route for the triangular routing example

Optimization of route for the triangular routing can be made in case the MN1 opts to

make its mobility known

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 11

Figure 3.3 Packets make a triangular trip to reach from CN2 to MNI

3.3 Mobility support for IPV6 While mobile IP was originally designed for IP version 4, IP version 6 (Deering, 1998)

makes life much easier. Several mechanisms that had to be specified separately for mobility

support come free in IPv6 (Perkins, 1996d), (Johnson, 2002b). One issue is security with regard

to authentication, which is now a required feature for all IPv6 nodes. No special mechanisms as

add-ons are needed for securing mobile IP registration. Every IPv6 node masters address auto-

configuration – the mechanisms for acquiring a COA are already built in.

Neighbor discovery as a mechanism mandatory for every node is also included in the

specification; special foreign agents are no longer needed to advertise services. Combining the

features of auto-configuration and neighbor discovery means that every mobile node is able to

create or obtain a topologically correct address for the current point of attachment. Every IPv6

node can send binding updates to another node, so the MN can send its current COA directly to

the CN and HA. These mechanisms are an integral part of IPv6. A soft handover is possible with

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 12

IPv6. The MN sends its new COA to the old router servicing the MN at the old COA, and the old

router encapsulates all incoming packets for the MN and forwards them to the new COA.

Altogether, mobile IP in IPv6 networks requires very few additional mechanisms of a

CN, MN, and HA. The FA is not needed any more. A CN only has to be able to process binding

updates, i.e., to create or to update an entry in the routing cache. The MN itself has to be able to

decapsulate packets, to detect when it needs a new COA, and to determine when to send binding

updates to the HA and CN. A HA must be able to encapsulate packets.

3.3.1 IP micro-mobility support

Mobile IP exhibits several problems regarding the duration of handover and the

scalability of the registration procedure. Assuming a large number of mobile devices changing

networks quite frequently, a high load on the home agents as well as on the networks is

generated by registration and binding update messages. IP micro-mobility protocols can

complement mobile IP by offering fast and almost seamless handover control in limited

geographical areas.

Consider a client arriving with his or her laptop at the customer’s premises. The home

agent only has to know an entry point to the customer’s network, not the details within this

network. The entry point acts as the current location. Changes in the location within the

customer’s network should be handled locally to minimize network traffic and to speed-up local

handover.

The basic underlying idea is the same for all micro-mobility protocols: Keep the frequent

updates generated by local changes of the points of attachment away from the home network and

only inform the home agent about major changes, i.e., changes of a region. In some sense all

micro-mobility protocols establish a hierarchy. However, the debate is still going on if micro-

mobility aspects should really be handled on the IP layer or if layer 2 is the better place for it.

Layer 2 mobility support would comprise, e.g., the inter access point protocol (IAPP) of 802.11

WLANs or the mobility support mechanisms of mobile phone systems.

The following presents three of the most prominent approaches, which should be seen

neither as standards nor as final solutions of the micro-mobility problems. Campbell (2002)

presents a comparison of the three approaches.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 13

3.3.2 Cellular IP

Cellular IP (Valko, 1999), (Campbell, 2000) provides local handovers without renewed

registration by installing a single cellular IP gateway (CIPGW) for each domain, which acts to

the outside world as a foreign agent. Inside the cellular IP domain, all nodes collect routing

information for accessing MNs based on the origin of packets sent by the MNs towards the

CIPGW. Soft handovers are achieved by allowing simultaneous forwarding of packets destined

for a mobile node along multiple paths. A mobile node moving between adjacent cells will

temporarily be able to receive packets via both old and new base stations (BS) if this is

supported by the lower protocol layers.

Concerning the manageability of cellular IP, it has to be noted that the approach has a

simple and elegant architecture and is mostly self-configuring. However, mobile IP tunnels could

be controlled more easily if the CIPGW was integrated into a firewall, but there are no detailed

specifications in (Campbell, 2000) regarding such integration. Cellular IP requires changes to the

basic mobile IP protocol and is not transparent to existing systems. The foreign network’s

routing tables are changed based on messages sent by mobile nodes. These should not be trusted

blindly even if they have been authenticated. This could be exploited by systems in the foreign

network for wiretapping packets.

Figure 3.5 Basic architecture of cellular IP

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 14

Advantage

● Manageability: Cellular IP is mostly self-configuring, and integration of the CIPGW

into a firewall would facilitate administration of mobility-related functionality. This is, however,

not explicitly specified in (Campbell, 2000).

Disadvantages

● Efficiency: Additional network load is induced by forwarding packets on multiple

paths.

● Transparency: Changes to MNs are required.

● Security: Routing tables are changed based on messages sent by mobile nodes.

Additionally, all systems in the network can easily obtain a copy of all packets destined

for an MN by sending packets with the MN’s source address to the CIPGW.

HAWAII (Handoff-Aware Wireless Access Internet Infrastructure, Ramjee, 1999) and

Hierarchical mobile IPv6 (HMIPv6) supports IPv6.

3.4 Connectivity with 3G Networks 3G or 3rd generation mobile telecommunications is a generation of standards for

mobile phones and mobile telecommunication services fulfilling the International Mobile

Telecommunications-2000 (IMT-2000) specifications by the International Telecommunication

Union. Application services include wide-area wireless voice telephone, mobile Internet access,

video calls and mobile TV, all in a mobile environment.

Several telecommunications companies market wireless mobile Internet services as 3G,

indicating that the advertised service is provided over a 3G wireless network. Services advertised

as 3G are required to meet IMT-2000 technical standards, including standards for reliability and

speed (data transfer rates). To meet the IMT-2000 standards, a system is required to provide peak

data rates of at least 200 kbit/s (about 0.2 Mbit/s).

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 15

Figure 3.4 Route optimization and path 1, 2, 3, 4, 5 after mobility binding of MN1 at COAj

with CNk

However, many services advertised as 3G provide higher speed than the minimum

technical requirements for a 3G service. Recent 3G releases, often denoted 3.5G and 3.75G, also

provide mobile broadband access of several Mbit/s to smartphones and mobile modems in laptop

computers. The following standards are typically branded 3G:

The UMTS system, first offered in 2001, standardized by 3GPP, used primarily in

Europe, Japan, China (however with a different radio interface) and other regions

predominated by GSM 2G system infrastructure. The cell phones are typically UMTS

and GSM hybrids. Several radio interfaces are offered, sharing the same infrastructure:

o The original and most widespread radio interface is called W-CDMA.

o The TD-SCDMA radio interface was commercialized in 2009 and is only offered

in China.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 16

o The latest UMTS release, HSPA+, can provide peak data rates up to 56 Mbit/s in

the downlink in theory (28 Mbit/s in existing services) and 22 Mbit/s in the

uplink.

The CDMA2000 system, first offered in 2002, standardized by 3GPP2, used especially in

North America and South Korea, sharing infrastructure with the IS-95 2G standard. The

cell phones are typically CDMA2000 and IS-95 hybrids. The latest release EVDO Rev B

offers peak rates of 14.7 Mbit/s downstream.

The above systems and radio interfaces are based on spread spectrum radio transmission

technology. While the GSM EDGE standard ("2.9G"), DECT cordless phones and Mobile

WiMAX standards formally also fulfill the IMT-2000 requirements and are approved as 3G

standards by ITU, these are typically not branded 3G, and are based on completely different

technologies.

A new generation of cellular standards has appeared approximately every tenth year since 1G

systems were introduced in 1981/1982. Each generation is characterized by new frequency

bands, higher data rates and non backwards compatible transmission technology. The first

release of the 3GPP Long Term Evolution (LTE) standard does not completely fulfill the ITU 4G

requirements called IMT-Advanced. First release LTE is not backwards compatible with 3G, but

is a pre-4G or 3.9G technology, however sometimes branded "4G" by the service providers. Its

evolution LTE Advanced is a 4G technology. WiMAX is another technology verging on or

marketed as 4G.

Applications of 3G

The bandwidth and location information available to 3G devices gives rise to applications not

previously available to mobile phone users. Some of the applications are:

Mobile TV

Video on demand

Videoconferencing

Telemedicine

Location-based services

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 17

3.5 Packet Delivery and Handover Management Correspondent node (CN) is an MN or a fixed IP host linked to a router, which

communicates IP packets to another MN in a home or foreign network (when on visit).

Case 1: CN a fixed node and MNl at the home network

• CN message transmits for connection establishment or a packet using the IP protocol

• HAl (the home agent for MNl) receives the message or packet and, using the information that

the destined MNl is at the home network itself, it delivers the message or packet to MNl

• Receives the response message or packet from MNl

• Delivers it to the CN using the IP protocol

Case 2: CN an MNk and MNl both at home networks with agents HAk and HAl

• MNk message for connection establishment or a packet using the IP protocol transmits through

HAk.

• Same way as in case 1

• The packet delivers to HAl and then to MNl

• MNl response like in case 1

• HAk and HAl deliver the packets from one end to another and vice versa by just forwarding the

packets to their respective MNs using the IP protocol

Case 3: CN a fixed node and MNl is at a foreign network

• CN transmits a message for connection establishment or a packet using the IP protocol

• As in case 1

• HAl receives the packets and uses the information that the destined mobile node MNl is not at

the home network and is presently visiting a foreign network and is reachable via a foreign agent

FAj.

• HAl encapsulates the received IP packet using a new header

• Care-of address (COA) at the new header over the IP packet sent by HAl

• Handover─ Packet encapsulated with the new header with COA transmits to FAj by tunneling

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 18

3.6 Location Management 3.6.1 Handover Management protocols

• Mobile node (MN) moves

• Visits foreign networks often

• Handover management─ managing the transfer of service availability to the new

location network

3.6.2 Location Management Protocols

• By the network for management of the MNs location

• Preparing for the services (packet receiving and packet transmitting) at the new network

• Agent discovery through agent advertisement

• Agent discovery and agent solicitation

Figure 3.5 FA discoveries by MN by receiving COA during advertisement

3.6.3 Agent Discovery

• MN must discover (find) a foreign agent (FA) when visiting a foreign network

• Agent discovery by a mobile node MNl─receiving the COA (care-of-address)

• COA enables FA to get messages for MNl

• Home agent (HA) of MNl transfers the messages from sender

• Uses COA

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 19

Steps 1 and 2 in the protocol for discovering an agent

1. Listen to an advertisement (ICMP message) from an agent

2. Proceed to step 3 if the advertisement is found, else solicit the agent from the routers

•If agent found, then proceed to step 3, else repeat the step Steps 3 and 4 in the

protocol for discovering an agent

3. If the COA discovered from the message is found to be the same as the previous COA,

go back to step 1, else proceed to step 4

4. If the discovered COA is the same as the home network, deregister at this network and

go back to step 1, else if the current COA is a new COA then register with the new COA

3.6.4 Agent advertisements

• Agent advertisements─ essentially ICMP messages

• Sent to a number of addresses ICMP message options and words

• Added mobility extension fields in the ICMP header

3.6.5 Header extension

• One 32-bit word format ─ First byte 00010000

• Second byte for length

• Length = 2 words + number of COAs specified in the extension to which the ICMP

message is to be sent + two bytes for the 16-bit sequence number (for the ICMP message

advertised

• Two-byte lifetime in second plus 8 bits for flags

• Remaining byte is not used ─ reserved for any future requirements of modifications or

specification expansion in ICMP

• Lifetime─ during which the MN can register with the new COA (step 4 in agent

discovery)

• For the COA addresses for the MN at that agent

3.6.6 Co-located COA

• COA when the MN acquires temporarily an additional IP address while on visit to a

new network

• Else the COA is the same IP address for that MN while on visit and when at home FA.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 20

• Obtains the co-located COA using the dynamic host configuration protocol (DHCP)

3.6.7 Flags

• Flag1─ whether the COA is a co-located COA

• Flag2─ whether the advertising agent is the HA

• Flag3─ whether the advertising agent is an FA

• Flag4─ specifies whether there is reverse tunneling support by the FA for encapsulation

and sending packets by tunneling to the HA

• Flag5─ specifies whether the encapsulation method is generic

• Flag6─ specifies whether the encapsulation method is a minimal mandatory method

• Flag7─specifies if the agent is busy and cannot register the visiting MN

3.6.8 Agent solicitation

• A method by which an MN visiting a network discovers the FA and the COA in case

COA not found from advertisements

• If an advertisement is not listened to, solicitation can be done three times at 1 s intervals

• Later this interval can be increased

3.7 Registration Registration after an MN discovering FA for service and finding a COA

• Needed for the service of receiving and transmitting of IP packets with the new agent

FA

• For creating a tunnel between HAl and FAj

3.7.1 Function of HA after registration

• To encapsulate the IP packets and transmit them to the discovered FA (through

tunneling), whenever a CN (corresponding node) communicates with the MN

Deregistration for the receiving and transmitting of IP packets

• Also needed with the HA (step 4 of agent discovery in the protocol)

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 21

3.7.2 Registration steps

• Requests and replies are made by the MN, FA, and HA using a UDP datagram • Let us

assume that the MN has IP address of the HA • If not, then the MN broadcasts the

registration request to a paging area

• The HAs then send the registration replies

• The MN requests one of the HAs (out of those which reply) for registration

Step 1 for registration at an agent

1. The MN sends a registration request to FA

• FA sends that request to the HA

• When the COA is a co-located COA, then the request sent directly to the HA

Step 2 for registration at an agent

2. The HA binds itself for mobility (binds itself for encapsulating and tunneling

the packets to the MN through a new FA)

• The binding period equals the lifetime of the COA

Step 3 for registration at an agent

3. The MN registers again before the binding period expires

• When it moves to another foreign network

• When it returns back to the home network

Step 4 for registration at an agent

4. The HA sends a registration reply to the FA and the FA to the MN

• The MN checks whether the reply shows successful registration

3.7.3 Registration

• Success─ mobility binding now exists from the HA to FA

• Failure ─ when there are too many tunnels created at the HA and the HA does not have

the resources to handle new requests or there is an authentication failure or the HA not

reachable to the FA

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 22

Figure 3.6 MNk after discovery of FAj seeking registration for creating tunnel between

HAl and FAj

3.7.4 Registration Request

• Next 32-bit word for the home agent IP address of the MN

• Next 32-bit word for the COA of the MN at the new agent

• Next 32-bit word for the identification of the MN

• Next─ A set of words for extensions MNk after discovery of FAj seeking registration

for creating tunnel between HAl and FAj

3.7.5 8 flag bits

• Flag1─ specifies whether the COA is a collocated COA

• Flag2─ whether the advertising agent is the HA 8 flag bits

• Flag3─ whether the advertising agent is the FA

• Flag4─specifies whether the MN requests previous mobility binding to be retained.

This permits both—the new and previous mobility bindings 8 flag bits

• Flag5─ specifies whether the encapsulation method is generic.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 23

• Flag6─ specifies whether the encapsulation method is a minimal mandatory method 8

flag bits

• Flag7─ specifies whether the MN wishes to receive broadcast (multicast) messages,

which the HA receives for tunneling to the new FA. If not, then the broadcast messages

are filtered at the HA

• Flag8─ specify if there is reverse tunneling support from the FA Words after UDP

header in the

3.7.6 Registration Reply

• 32-bit word with first byte = 00000011, 8 bits for a code specifying the result of

registration, and two bytes for the lifetime (in seconds)

• Next 32-bit word for the home IP address of the MN Words after UDP header in the

• Next 32-bit word for the home agent IP address of the MN

• Next 32-bit word for identification of the MN

• Next a set of words for extensions

3.7.7 New database entry fields after registration at the HA

1. ID for identification of MN

2. COA of the MN

3. Lifetime of binding to tunnel the packets to the MN’s COA

When the binding life expires the tunnel is not forwarding from the HA to the FA using

the COA. Database Entries in the fields at the FA after registration at the HA

(a) MN identification field

(b) Home IP address of the MN

(c) IP address of the HA

(d) MN link layer address for sending and receiving packets and messages to and from

the MN

(e) UDP source port of the registration request

(f) Received identification of the MN

(g) COA of the MN and lifetime of binding to tunnel the packets to the MN’s COA

(h) Remaining lifetime

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 24

3.8 Tunneling and Encapsulation FA has the COA (care-of address) of the MN

• The FA receives the IP packets, that were received at the home agent (HA) through a

tunnel from the HA to the FA─ from HA IP address to the COA IP address at the FA

• Packets received at the HA─ transmitted through the tunnel after encapsulation

3.8.1Tunneling

• Establishing of a pipe

• Pipe─ a data stream between two connected ends

• The data stream─ inserted from one end

• FIFO (first in first out) words from the other end.

Figure 3.7 Three ways of encapsulation

3.8.2 IP header-in-IP header Method of encapsulation

• Over the IP packet received at the HA

• Maximum 216-byte IP packet

• New IP header─ the IP address of the HA as the source and the IP address of the FA as

the destination.

• The three ways of encapsulation in the figure 3.7

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 25

Figure 3.8 Two tunnels Tlj and Tkk

Figure 3.9 A tunnel between the HA and FA to carry the encapsulated packet

3.8.3 Format of Encapsulated data

• First 32-bit word to specify the IP version (IPv4 or IPv6 for Internet or broadband

Internet), length of header (= 5 words), precedence of the packet, and total packet-length

(which is now 5 words more than that of IP packet received at the HA)

• Second 32-bit word, to specify the ID for the packet, flags, and fragment offset for the

same packet ID

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 26

• Third 32-bit word, to specify the time-to live (number of attempts to hop before expiry

of packets at the network), type of protocol, checksum of the header (for finding

transmission errors, if any)

• Fourth 32-bit word (four decimal numbers separated by dots and each less than 256) to

specify the IP address of the home agent

• Fifth 32-bit word (four decimal numbers separated by dots and each less than 256) to

specify the IP address of the destination COA (care-of address)

• sixth to tenth words are the IP header of 5 words with the fourth word as the IP address

of the correspondent node (CN), and the fifth word as the IP address of the MN

3.8.4 IP header-in-IP header encapsulation Format of Encapsulated data

IP Packet data received from the transport layer at the correspondent node, each

packet has a maximum of 216 bytes

3.8.5 Redundancy in IP header-in-IP header method

• First words in the new IP header (of five words) and the IP packet header (of five

words) are the same and are duplicating in case of IP-in-IP encapsulation

3.8.6 Minimum Encapsulation (ME) method by IP header of an IP Packet

• Combines header of 10 words specified into 7 or 8 words

• The 6th and 7th words in the 6th item of the new IP header are not present in ME as

both words are mere repetitions in ME method by IP header to an IP Packet

• The 8th word in the 6th item─ changed and now specifies the type of protocol, a one bit

flag, seven reserved bits, and a 16- bit checksum of the modified three-word IP header

(from the original five) for finding transmission error, if any.

• The 9th word in the 6th item─ changed and now specifies (instead of the CN IP

address) the MN IP address (which was earlier specified by the 10th word).

• The 10th word in the 6th item─ changed and now specifies (instead of the MN IP

address) the CN IP address in case the flag bit is set to 1 and the 10th word in the 6th

item is removed in case the flag bit is set to 0. Action by FA in case of ME method

• Reads the first five words in ME

• Transmits the packet to the MN using the COA

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 27

• The MN IP address is specified by the 7th or the 8th word, depending upon the flag bit.

3.8.7 Deficiencies in the IP header-in-IP header and ME methods

(a) Routing information for tunneling not given

(b) No provision for recursive encapsulations

• Recursive encapsulations needed when the tunnel transmits multiple pieces of

information for the MN and each piece of information encapsulates in one

protocol

(c) No provision for a key that can be used for authentication or encryption

3.8.8 Generic Routing Encapsulation (GRE) by IP header of an IP Packet

• One or more GRE headers depending on the number of recursions required to send

multiple pieces of information

3.8.9 Tunnel characteristics

• The tunnel does not need an extra hop (attempt) so time-to-live can be set to 1 • Tunnel

does not get blocked like routers due to external IP address transmissions

• Has fixed source and destination endpoints

3.8.10 GRE by IP header of an IP Packet

• Same as the 1st to 5th words in the 1st to 5th items of the new IP header

• Time-to-live is however set as 1

• Results in once-only forwarding to the FA by the HA

3.8.11 GRE (GRE) Header(s)

• The 6th 32-bit word in encapsulation and the 1st word of the first GRE header

• 16-bit flags─ bits to define the number of recursions, reserve bits, and version bits

• Next 16 bits─ specify the protocol for encapsulating the information sent with the GRE

header

• The 7th word─ specifies a 16-bit checksum and a 16-bit offset Both are optional as

indicated by the flag bits used to define these options

• The 8th word─ a 32-bit key

• Optional as indicated by the flag bit to used define the key-option

• The key at the GRE header─ enables authentication or encryption at the FA

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 28

• The 9th word─ specifies 32-bit sequence number information

• Optional as indicated by the flag bit used to define the sequencing-option

• Sequencing at the GRE header enables the FA to rearrange the packets sent by the HA

• The 10th word─ specifies 32-bit routing information

• Optional as indicated by the flag bit used to define the routing-option

• Routing at the GRE header enables use of routing information at the FA

• 11th word onwards─ , if number of recursions are defined in the first word of the GRE

header, then the next GRE header is inserted before the IP header and IP data sent by the

HA

• If number of recursions specified in the 11th word in the GRE header is two, then the

next two GRE headers are also inserted before the IP header and IP data sent by the HA

3.8.12 IP Header and IP Packet data

• This part remains the same as that in the un-encapsulated IP header and the data

received from the CN (correspondent node) IP packet at the HA. The first word has 5 flag

bits and three recursion-number-defining bits

• The five flag bits are—checksum option flag, sequence number field option flag, key-

option flag, and source-routing option flag

3.8.13 Source routing

• Source of a packet provides the route information

• Router uses the routing information word for routing a packet

3.9 Route Optimization Mobile IP network employing home and foreign agents FAk and FAj

• Packet delivers to and from the MNk at a foreign network with FAk and MN1 at

the foreign network with FAj is shown in figure 3.10.

Example

• Assume that MNl visiting a foreign network which happens to be the home

network of CN2 as shown in figure 3.11. CN2 is very close to CN.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 29

Figure 3.10 CN (MNk) corresponding with visiting MNl

3.9.1 Triangular route

• Triangular route without mobility binding between COAj and CNk

• Also possible that FAk and FAj are identical

3.9.2 Optimization of route for the triangular routing example

Route optimization and path 1, 2, 3, 4, 5 after mobility binding of MN1 at COAj with

CNk can be made in case the MNl opts to make its mobility known as shown in the figure 3.12.

3.9.3 Mobility binding Steps in the calling network

1. CNk (fixed) or MNk (mobile) network sends a mobility-binding request to HAl

2. HAl detects whether MNl (for which binding request is made) has blocked external

mobility binding requests

• If not, then HAl sends the update for the mobility-binding message to the CNk

network

• External─ does not include the visiting network FA

3. Mobility binding message has the IP address of MN1 and the present COA (COAj) of

MNl when on visit to a foreign network and registered with FAj

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 30

4. CNk issues an acknowledgement to HAl on receiving the binding message.

5. CN2 network decapsulates the IP packet (this decapsulation would have been

performed by FAj through HA1 if MN1 had blocked external binding requests) and sends

a warning for binding

Figure 3.11 Packets make a triangular trip to reach from CNk to MNl

3.9.4 Warning sent to HAl of MNl

• Serves a purpose─ HAl sending the binding update to CNk when MNl moves to visit

another foreign network or when it returns to the home network Warning for binding

• A message to the effect that the new IP addresses of MNl and CN2 will decapsulate the

encapsulated IP packets (from the moment that the warning is aired) instead of FAj

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 31

Figure 3.12 Route optimization and path 1, 2, 3, 4, 5 after mobility binding of MN1 at

COAj with CNk

3.9.5 Smooth handover in Mobile IP protocol method of optimization

• FAj sends a binding warning to CNk when MN1 deregisters with it

• Lets CNk initiate another binding request to HAl of MNl

• CNk gets the new binding and COAm address from HAl in the binding cache

3.9.6 Reverse Tunnel

• If a reverse tunnel is formed then another tunnel is present through the paths from 10 to

3 and reverse tunneling is from FA to HA

3.9.7 Advantage of reverse tunneling

• Multicasting needs bi-directional tunneling

• Reverse tunneling is required when a firewall is employed

3.9.8 Time-to-live for forward and reverse tunneling

• Time-to-live defines the number of attempts to hop before expiry of packets at the

network

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 32

• GRE header encapsulation during tunneling sets time-to-live = 1, so the packets are

forwarded only once

• The tunnel does not need extra hops, has fixed endpoints

• Results in once-only forwarding through the tunnel from the home agent (HA) to the

foreign agent (FA) when the mobile node (MN) visits a foreign network

• The tunnel does not need extra hops

• It has fixed endpoints Time-to-live for MNl on visit sending to CNk

• At the foreign agent, the time-to-live setting might be too low

• Therefore, when the MNl sends the response to the correspondent network (CNk), then

the time-to-live set at the FA may not be sufficient

• When the COA is used to send the response to the CN without reverse tunneling, then a

very low setting of timeto- live blocks the packets after a very small number of hops

(attempts) to the CN

3.9.8.1 Time-to-live for reverse tunneling

• Sets the time-to-live equal to 1 because IP packets need to be sent only once

• The tunnel does not need extra hop

• It has fixed source and destination endpoints

3.9.9 Reverse tunneling

• Facilitates guaranteed transmission of the IP packet responses through the tunnel to the

HA

• Now, the HA transmits the response to the CN

• A low value of time-to-live at the FA does not lead to packet expiries

3.10 Dynamic Host Configuration Protocol The dynamic host configuration protocol (DHCP, RFC 2131, Drohms, 1997) is mainly

used to simplify the installation and maintenance of networked computers. If a new computer is

connected to a network, DHCP can provide it with all the necessary information for full system

integration into the network, e.g., addresses of a DNS server and the default router, the subnet

mask, the domain name, and an IP address. Providing an IP address makes DHCP very attractive

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 33

for mobile IP as a source of care-of-addresses. While the basic DHCP mechanisms are quite

simple, many options are available as described in RFC 2132 (Alexander, 1997).

DHCP is based on a client/server model as shown in figure 3.13. DHCPclients send a

request to a server (DHCPDISCOVER in the example) to which the server responds. A client

sends requests using MAC broadcasts to reach all devices in the LAN. A DHCP relay might be

needed to forward requests across inter-working units to a DHCP server

Figure 3.13 Basic DHCP Configuration

Figure 3.14 Client initialization via DHCP

A typical initialization of a DHCP client is shown in figure. The figure shows one client

and two servers. As described above, the client broadcasts a DHCP DISCOVER into the subnet.

There might be a relay to forward this broadcast.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 34

In the case shown, two servers receive this broadcast and determine the configuration

they can offer to the client. One example for this could be the checking of available IP addresses

and choosing one for the client. Servers reply to the client’s request with DHCPOFFER and offer

a list of configuration parameters.

The client can now choose one of the configurations offered. The client in turn replies to

the servers, accepting one of the configurations and rejecting the others using DHCPREQUEST.

If a server receives a DHCPREQUEST with a rejection, it can free the reserved configuration for

other possible clients. The server with the configuration accepted by the client now confirms the

configuration with DHCPACK. This completes the initialization phase.

If a client leaves a subnet, it should release the configuration received by the server using

DHCPRELEASE. Now the server can free the context stored for the client and offer the

configuration again. The configuration a client gets from a server is only leased for a certain

amount of time, it has to be reconfirmed from time to time. Otherwise the server will free the

configuration. This timeout of configuration helps in the case of crashed nodes or nodes moved

away without releasing the context.

DHCP is a good candidate for supporting the acquisition of care-of addresses for mobile

nodes. The same holds for all other parameters needed, such as addresses of the default router,

DNS servers, the timeserver etc. A DHCP server should be located in the subnet of the access

point of the mobile node, or at least a DHCP relay should provide forwarding of the messages.

RFC 3118 specifies authentication for DHCP messages which is needed to protect mobile nodes

from malicious DHCP servers. Without authentication, the mobile node cannot trust a DHCP

server, and the DHCP server cannot trust the mobile node.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 35

3.11 Question Bank PART – A (2 MARKS)

1. What are the requirements of mobile IP?

2. Mention the different entities in a mobile IP.

3. What do you mean by mobility binding?

4. Define a tunnel.

5. What is encapsulation?

6. What is decapsulation?

7. Define an outer header

8. Define an inner header.

9. What is meant by generic routing encapsulation?

10. What is the use of network address translation?

11. Define triangular routing.

12. What is meant by a binding cache?

13. Define binding request.

14. What is known as Binding update?

15. Explain binding acknowledgement.

16. Define binding warning.

17. Explain cellular IP.

18. What are the advantages of cellular IP?

19. What is known as mobility anchor point?

20. Explain destination sequence distance vector routing.

21. What are the two things added to the distance vector algorithm?

22. How the dynamic source routing does divide the task of routing into two separate problems?

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-3 3. 36

PART – B (16 Marks)

1. What are the requirements of a mobile IP?

2. Describe Dynamic host configuration protocol.

3. Discuss the routing algorithm in ad-hoc network

4. What are the entities in mobile IP?

5. Discuss how optimization in achieved in mobile IP

6. Explain tunneling and encapsulation in mobile IP.

7. Explain how dynamic source routing protocols handles routing with an example.

8. How can DHCP be used for mobility and support of mobile IP?

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 1

UNIT 4

MOBILE TRANSPORT LAYER

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 2

CONTENTS 4.1 Classical TCP Improvements

4.2 Indirect TCP

4.3 Snooping TCP

4.4 Mobile TCP

4.5 Fast Retransmit/Fast Recovery

4.6 Transmission/Time-Out Freezing

4.7 Selective Retransmission

4.8 Transaction-Oriented TCP

4.9 Mobile Operating Systems

4.10 Palm OS

4.11 Windows CE

4.12 Symbion OS

4.13 Linux for Mobile Devices

4.14 Question Bank

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 3

TECHNICAL TERMS

1. TCP is Transmission Control Protocol. It provides reliable, ordered delivery of a stream

of bytes from a program on one computer to another program on another

computer.(Connection oriented)

2. Internet Protocol (IP) is the principal communications protocol used for

relaying datagram across an internetwork using the Internet Protocol Suite.

3. IP Addressing refers to how end hosts are assigned IP addresses and how sub networks

of IP host addresses are divided and grouped.

4. IP routing is performed by all hosts, but most importantly by routers, which typically use

either interior gateway protocols (IGPs) or external gateway protocols (EGPs) to decide

how to move datagram’s among networks.

5. Packets are the IP works by exchanging pieces of information called packets

6. UDP (User Datagram Protocol) is a communications protocol that offers a limited

amount of service when messages are exchanged between computers in a network that

uses the Internet Protocol (IP). (Connectionless protocol)

7. Snooping is unauthorized access to another person's or company's data.

8. Eavesdropping is the unauthorized real-time interception of a private communication,

such as a phone call, instant message, video conference or fax transmission.

9. Datagram is a basic transfer unit associated with a packet-switched network in which the

delivery, arrival time, and order of arrival are not guaranteed by the network service.

10. An operating system (OS) is a set of software that manages computer

hardware resources and provides common services for computer programs. The operating

system is a vital component of the system software in a computer system. Application

programs require an operating system to function.

11. Palm OS (also known as Garnet OS) is a mobile operating system initially developed

by Palm, Inc., for personal digital assistants (PDAs) in 1996. Palm OS is designed for

ease of use with a touch screen-based graphical user interface. It is provided with a suite

of basic applications for personal information management.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 4

4. MOBILE TRANSPORT LAYER

4.1 Conventional TCP/IP protocols Together with the introduction of WLANs in the mid-nineties several research projects

were started with the goal to increase TCP’s performance in wireless and mobile environments.

4.2 Indirect TCP

Two competing insights led to the development of indirect TCP (I-TCP) (Bakre, 1995).

One is that TCP performs poorly together with wireless links; the other is that TCP within the

fixed network cannot be changed. I-TCP segments a TCP connection into a fixed part and a

wireless part. Figure 4.1 shows an example with a mobile host connected via a wireless link and

an access point to the ‘wired’ internet where the correspondent host resides. The correspondent

node could also use wireless access. The following would then also be applied to the access link

of the correspondent host.

Standard TCP is used between the fixed computer and the access point. No computer in

the internet recognizes any changes to TCP. Instead of the mobile host, the access point now

terminates the standard TCP connection, acting as a proxy. This means that the access point is

now seen as the mobile host for the fixed host and as the fixed host for the mobile host. Between

the access point and the mobile host a special TCP, adapted to wireless links, is used. However,

changing TCP for the wireless link is not a requirement. Even an unchanged TCP can benefit

from the much shorter round trip time, starting retransmission much faster.

A good place for segmenting the connection between mobile host and correspondent host

is at the foreign agent of mobile IP. The foreign agent controls the mobility of the mobile host

anyway and can also hand over the connection to the next foreign agent when the mobile host

moves on.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 5

Figure 4.1 Indirect TCP segments a TCP connection into two parts

The correspondent host in the fixed network does not notice the wireless link or the

segmentation of the connection. The foreign agent acts as a proxy and relays all data in both

directions. If the correspondent host sends a packet, the foreign agent acknowledges this packet

and tries to forward the packet to the mobile host. If the mobile host receives the packet, it

acknowledges the packet. However, this acknowledgement is only used by the foreign agent. If a

packet is lost on the wireless link due to a transmission error, the correspondent host would not

notice this. In this case, the foreign agent tries to retransmit this packet locally to maintain

reliable data transport.

Similarly, if the mobile host sends a packet, the foreign agent acknowledges this packet

and tries to forward it to the correspondent host. If the packet is lost on the wireless link, the

mobile hosts notice this much faster due to the lower round trip time and can directly retransmit

the packet. Packet loss in the wired network is now handled by the foreign agent.

Figure 4.2 Socket and state migration after handover of a mobile host

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 6

There are several advantages with I-TCP:

I-TCP does not require any changes in the TCP protocol as used by the hosts in the fixed

network or other hosts in a wireless network that do not use this optimization. All current

optimizations for TCP still work between the foreign agent and the correspondent host.

Due to the strict partitioning into two connections, transmission errors on the wireless

link, i.e., lost packets, cannot propagate into the fixed network. Without partitioning,

retransmission of lost packets would take place between mobile host and correspondent host

across the whole network. Now only packets in sequence, without gaps leave the foreign agent.

It is always dangerous to introduce new mechanisms into a huge network such as the

internet without knowing exactly how they will behave. However, new mechanisms are needed

to improve TCP performance (e.g., disabling slow start under certain circumstances), but with I-

TCP only between the mobile host and the foreign agent. Different solutions can be tested or

used at the same time without jeopardizing the stability of the internet. Furthermore, optimizing

of these new mechanisms is quite simple because they only cover one single hop.

Assume that the short delay between the mobile host and foreign agent could be

determined and was independent of other traffic streams. An optimized TCP could use precise

time-outs to guarantee retransmission as fast as possible. Even standard TCP could benefit from

the short round trip time, so recovering faster from packet loss. Delay is much higher in a typical

wide area wireless network than in wired networks due to FEC and MAC. GSM has a delay of

up to 100 ms circuit switched, 200 ms and more packet switched (depending on packet size and

current traffic). This is even higher than the delay on transatlantic links.

Partitioning into two connections also allows the use of a different transport layer

protocol between the foreign agent and the mobile host or the use of compressed headers etc.

The foreign agent can now act as a gateway to translate between the different protocols.

But the idea of segmentation in I-TCP also comes with some disadvantages:

The loss of the end-to-end semantics of TCP might cause problems if the foreign agent

partitioning the TCP connection crashes. If a sender receives an acknowledgement, it assumes

that the receiver got the packet. Receiving an acknowledgement now only means (for the mobile

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 7

host and a correspondent host) that the foreign agent received the packet. The correspondent

node does not know anything about the partitioning, so a crashing access node may also crash

applications running on the correspondent node assuming reliable end-to-end delivery.

In practical use, increased handover latency may be much more problematic. All packets

sent by the correspondent host are buffered by the foreign agent besides forwarding them to the

mobile host (if the TCP connection is split at the foreign agent). The foreign agent removes a

packet from the buffer as soon as the appropriate acknowledgement arrives. If the mobile host

now performs a handover to another foreign agent, it takes a while before the old foreign agent

can forward the buffered data to the new foreign agent. During this time more packets may

arrive. All these packets have to be forwarded to the new foreign agent first, before it can start

forwarding the new packets redirected to it.

The foreign agent must be a trusted entity because the TCP connections end at this point.

If users apply end-to-end encryption, e.g., according to RFC 2401 (Kent, 1998a), the foreign

agent has to be integrated into all security mechanisms.

4.3 Snooping TCP One of the drawbacks of I-TCP is the segmentation of the single TCP connection into

two TCP connections. This loses the original end-to-end TCP semantic. The following TCP

enhancement works completely transparently and leaves the TCP end-to-end connection intact.

The main function of the enhancement is to buffer data close to the mobile host to perform fast

local retransmission in case of packet loss. A good place for the enhancement of TCP could be

the foreign agent in the Mobile IP context.

In this approach, the foreign agent buffers all packets with destination mobile host and

additionally ‘snoops’ the packet flow in both directions to recognize acknowledgements

(Balakrishnan, 1995), (Brewer, 1998). The reason for buffering packets toward the mobile node

is to enable the foreign agent to performa local retransmission in case of packet loss on the

wireless link. The foreign agent buffers every packet until it receives an acknowledgement from

the mobile host.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 8

If the foreign agent does not receive an acknowledgement from the mobile host within a

certain amount of time, either the packet or the acknowledgement has been lost. Alternatively,

the foreign agent could receive a duplicate ACK which also shows the loss of a packet. Now the

foreign agent retransmits the packet directly from the buffer, performing a much faster

retransmission compared to the correspondent host. The time out for acknowledgements can be

much shorter, because it reflects only the delay of one hop plus processing time.

Figure 4.3 Snooping TCP as a transparent TCP extension

To remain transparent, the foreign agent must not acknowledge data to the correspondent

host. This would make the correspondent host believe that the mobile host had received the data

and would violate the end-to-end semantic in case of a foreign agent failure. However, the

foreign agent can filter the duplicate acknowledgements to avoid unnecessary retransmissions of

data from the correspondent host. If the foreign agent now crashes, the time-out of the

correspondent host still works and triggers a retransmission. The foreign agent may discard

duplicates of packets already retransmitted locally and acknowledged by the mobile host. This

avoids unnecessary traffic on the wireless link.

Data transfer from the mobile host with destination correspondent host works as

follows. The foreign agent snoops into the packet stream to detect gaps in the sequence numbers

of TCP. As soon as the foreign agent detects a missing packet, it returns a negative

acknowledgement (NACK) to the mobile host. The mobile host can now retransmit the missing

packet immediately. Reordering of packets is done automatically at the correspondent host by

TCP. Extending the functions of a foreign agent with a ‘snooping’ TCP has several advantages:

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 9

The end-to-end TCP semantic is preserved. No matter at what time the foreign agent

crashes (if this is the location of the buffering and snooping mechanisms), neither the

correspondent host nor the mobile host have an inconsistent view of the TCP connection

as is possible with I-TCP. The approach automatically falls back to standard TCP if the

enhancements stop working.

The correspondent host does not need to be changed; most of the enhancements are in the

foreign agent. Supporting only the packet stream from the correspondent host to the

mobile host does not even require changes in the mobile host.

It does not need a handover of state as soon as the mobile host moves to another foreign

agent. Assume there might still be data in the buffer not transferred to the next foreign

agent. All that happens is a time-out at the correspondent host and retransmission of the

packets, possibly already to the new care-of address.

It does not matter if the next foreign agent uses the enhancement or not. If not, the

approach automatically falls back to the standard solution. This is one of the problems of

I-TCP, since the old foreign agent may have already signaled the correct receipt of data

via acknowledgements to the correspondent host and now has to transfer these packets to

the mobile host via the new foreign agent.

The simplicity of the scheme also results in some disadvantages:

Snooping TCP does not isolate the behavior of the wireless link as well as ITCP.

Assume, for example, that it takes some time until the foreign agent can successfully retransmit a

packet from its buffer due to problems on the wireless link (congestion, interference). Although

the time-out in the foreign agent may be much shorter than the one of the correspondent host,

after a while the time-out in the correspondent host triggers a retransmission.

The problems on the wireless link are now also visible for the correspondent host and not

fully isolated. The quality of the isolation, which snooping TCP offers, strongly depends on the

quality of the wireless link, time-out values, and further traffic characteristics. It is problematic

that the wireless link exhibits very high delays compared to the wired link due to error correction

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 10

on layer 2 (factor 10 and more higher). This is similar to ITCP. If this is the case, the timers in

the foreign agent and the correspondent host are almost equal and the approach is almost

ineffective.

Using negative acknowledgements between the foreign agent and the mobile host

assumes additional mechanisms on the mobile host. This approach is no longer transparent for

arbitrary mobile hosts.

All efforts for snooping and buffering data may be useless if certain encryption schemes

are applied end-to-end between the correspondent host and mobile host. Using IP encapsulation

security payload (RFC 2406, (Kent, 1998b)) the TCP protocol header will be encrypted –

snooping on the sequence numbers will no longer work. Retransmitting data from the foreign

agent may not work because many security schemes prevent replay attacks – retransmitting data

from the foreign agent may be misinterpreted as replay. Encrypting end-to-end is the way many

applications work so it is not clear how t his scheme could be used in the future. If encryption is

used above the transport layer (e.g., SSL/TLS) snooping TCP can be used.

4.4 Mobile TCP Dropping packets due to a handover or higher bit error rates is not the only phenomenon

of wireless links and mobility – the occurrence of lengthy and/or frequent disconnections is

another problem. Quite often mobile users cannot connect at all. One example is islands of

wireless LANs inside buildings but no coverage of the whole campus.

What happens to standard TCP in the case of disconnection?

A TCP sender tries to retransmit data controlled by a retransmission timer that

doubles with each unsuccessful retransmission attempt, up to a maximum of one minute

(the initial value depends on the round trip time). This means that the sender tries to

retransmit an unacknowledged packet every minute and will give up after 12

retransmissions.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 11

What happens if connectivity is back ear-lier than this?

No data is successfully transmitted for a period of one minute. The

retransmission time-out is still valid and the sender has to wait. The sender also goes into

slow-start because it assumes congestion.

What happens in the case of I-TCP if the mobile is disconnected?

The proxy has to buffer more and more data, so the longer the period of

disconnection, the more buffer is needed. If a handover follows the disconnection, which

is typical, even more state has to be transferred to the new proxy. The snooping approach

also suffers from being disconnected. The mobile will not be able to send ACKs so,

snooping cannot help in this situation.

The M-TCP (mobile TCP) approach has the same goals as I-TCP and snooping TCP: to

prevent the sender window from shrinking if bit errors or disconnection but not congestion cause

current problems. M-TCP wants to improve overall throughput, to lower the delay, to maintain

end-to-end semantics of TCP, and to provide a more efficient handover. Additionally, M-TCP is

especially adapted to the problems arising from lengthy or frequent disconnections.

M-TCP splits the TCP connection into two parts as I-TCP does. An unmodified TCP is

used on the standard host-supervisory host (SH) connection, while an optimized TCP is used on

the SH-MH connection. The supervisory host is responsible for exchanging data between both

parts similar to the proxy in). The M-TCP approach assumes a relatively low bit error rate on the

wireless link. Therefore, it does not perform caching/retransmission of data via the SH. If a

packet is lost on the wireless link, it has to be retransmitted by the original sender. This

maintains the TCP end-to-end semantics.

The SH monitors all packets sent to the Mobile Host (MH) and ACKs returned from the

MH. If the SH does not receive an ACK for some time, it assumes that the MH is disconnected.

It then chokes the sender by setting the sender’s window size to 0. Setting the window size to 0

forces the sender to go into persistent mode, i.e., the state of the sender will not change no

matter how long the receiver is disconnected. This means that the sender will not try to

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 12

retransmit data. As soon as the SH (either the old SH or a new SH) detects connectivity again, it

reopens the window of the sender to the old value. The sender can continue sending at full speed.

This mechanism does not require changes to the sender’s TCP.

The wireless side uses an adapted TCP that can recover from packet loss much faster.

This modified TCP does not use slow start, thus, M-TCP needs a bandwidth manager to

implement fair sharing over the wireless link.

The advantages of M-TCP are

It maintains the TCP end-to-end semantics. The SH does not send any ACK itself but

forwards the ACKs from the MH.

If the MH is disconnected, it avoids useless retransmissions, slow starts or breaking

connections by simply shrinking the sender’s window to 0.1 The reader should be aware

that mobile TCP does not have the same status as mobile IP, which is an internet RFC.

Since it does not buffer data in the SH as I-TCP does, it is not necessary to forward

buffers to a new SH. Lost packets will be automatically retransmitted to the new SH.

The lack of buffers and changing TCP on the wireless part also has some disadvantages:

As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due to bit

errors is propagated to the sender. M-TCP assumes low bit error rates, which is not

always a valid assumption.

A modified TCP on the wireless link not only requires modifications to the MH protocol

software but also new network elements like the bandwidth manager.

4.5 Fast Retransmit/Fast Recovery

TCP concludes congestion and goes into slow start, although there is no congestion. The

mechanisms of fast recovery/fast retransmit a host can use after receiving duplicate

acknowledgements, thus concluding a packet loss without congestion.

The idea presented by Caceres (1995) is to artificially force the fast retransmit behavior

on the mobile host and correspondent host side. As soon as the mobile host registers at a new

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 13

foreign agent using mobile IP, it starts sending duplicated acknowledgements to correspondent

hosts. The proposal is to send three duplicates. This forces the corresponding host to go into fast

retransmit mode and not to start slow start, i.e., the correspondent host continues to send with the

same rate it did before the mobile host moved to another foreign agent.

As the mobile host may also go into slow start after moving to a new foreign agent, this

approach additionally puts the mobile host into fast retransmit. The mobile host retransmits all

unacknowledged packets using the current congestion window size without going into slow start.

The advantage of this approach is its simplicity. Only minor changes in the mobile

host’s software already result in a performance increase. No foreign agent or correspondent host

has to be changed.

The main disadvantage of this scheme is the insufficient isolation of packet losses.

Forcing fast retransmission increases the efficiency, but retransmitted packets still have to cross

the whole network between correspondent host and mobile host. If the handover from one

foreign agent to another takes a longer time, the correspondent host will have already started

retransmission. The approach focuses on loss due to handover: packet loss due to problems on

the wireless link is not considered. This approach requires more cooperation between the mobile

IP and TCP layer making it harder to change one without influencing the other.

4.6 Transmission/Time-Out Freezing

While the approaches presented so far can handle short interruptions of the connection,

either due to handover or transmission errors on the wireless link, some were designed for longer

interruptions of transmission. Examples are the use of mobile hosts in a car driving into a tunnel,

which loses its connection to, e.g., a satellite (however, many tunnels and subways provide

connectivity via a mobile phone), or a user moving into a cell with no capacity left over. In this

case, the mobile phone system will interrupt the connection. The reaction of TCP, even with the

enhancements of above, would be a disconnection after a time out.

Quite often, the MAC layer has already noticed connection problems, before the

connection is actually interrupted from a TCP point of view. Additionally, the MAC layer knows

the real reason for the interruption and does not assume congestion, as TCP would. The MAC

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 14

layer can inform the TCP layer of an upcoming loss of connection or that the current interruption

is not caused by congestion. TCP can now stop sending and ‘freezes’ the current state of its

congestion window and further timers. If the MAC layer notices the upcoming interruption early

enough, both the mobile and correspondent host can be informed. With a fast interruption of the

wireless link, additional mechanisms in the access point are needed to inform the correspondent

host of the reason for interruption. Otherwise, the correspondent host goes into slow start

assuming congestion and finally breaks the connection.

As soon as the MAC layer detects connectivity again, it signals TCP that it can resume

operation at exactly the same point where it had been forced to stop. For TCP time simply does

not advance, so no timers expire.

The advantage of this approach is that it offers a way to resume TCP connections even

after longer interruptions of the connection. It is independent of any other TCP mechanism, such

as acknowledgements or sequence numbers, so it can be used together with encrypted data.

However, this scheme has some severe disadvantages. Not only does the software on the mobile

host have to be changed, to be more effective the correspondent host cannot remain unchanged.

All mechanisms rely on the capability of the MAC layer to detect future interruptions. Freezing

the state of TCP does not help in case of some encryption schemes that use time-dependent

random numbers. These schemes need resynchronization after interruption.

4.7 Selective Retransmission A very useful extension of TCP is the use of selective retransmission. TCP

acknowledgements are cumulative, i.e., they acknowledge in-order receipt of packets up to a

certain packet. If a single packet is lost, the sender has to retransmit everything starting from the

lost packet (go-back-n retransmission). This obviously wastes bandwidth, not just in the case of a

mobile network, but for any network (particularly those with a high path capacity, i.e.,

bandwidth delay- product).

Using RFC 2018 (Mathis, 1996), TCP can indirectly request a selective retransmission of

packets. The receiver can acknowledge single packets, not only trains of in-sequence packets.

The sender can now determine precisely which packet is needed and can retransmit it.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 15

The advantage of this approach is obvious: a sender retransmits only the lost packets.

This lowers bandwidth requirements and is extremely helpful in slow wireless links. The gain in

efficiency is not restricted to wireless links and mobile environments. Using selective

retransmission is also beneficial in all other networks. However, there might be the minor

disadvantage of more complex software on the receiver side, because now more buffer is

necessary to resequence data and to wait for gaps to be filled. But while memory sizes and CPU

performance permanently increase, the bandwidth of the air interface remains almost the same.

Therefore, the higher complexity is no real disadvantage any longer as it was in the early days of

TCP.

4.8 Transaction-Oriented TCP Assume an application running on the mobile host that sends a short request to a server

from time to time, which responds with a short message. If the application requires reliable

transport of the packets, it may use TCP.

Using TCP now requires several packets over the wireless link. First, TCP uses a three-

way handshake to establish the connection. At least one additional packet is usually needed for

transmission of the request, and requires three more packets to close the connection via a three-

way handshake. Assuming connections with a lot of traffic or with a long duration, this overhead

is minimal. But in an example of only one data packet, TCP may need seven packets altogether.

Web services are based on HTTP which requires a reliable transport system. In the internet, TCP

is used for this purpose. HTTP request can be transmitted the TCP connection has to be

established. This already requires three messages. If GPRS is used as wide area transport system,

one-way delays of 500 ms and more are quite common. The setup of a TCP connection already

takes far more than a second.

This led to the development of a transaction-oriented TCP (T/TCP, RFC 1644 (Braden,

1994)). T/TCP can combine packets for connection establishment and connection release with

user data packets. This can reduce the number of packets down to two instead of seven. Similar

considerations led to the development of a transaction service in WAP.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 16

Figure 4.4 Example TCP connection setup overhead

The obvious advantage for certain applications is the reduction in the overhead which

standard TCP has connection setup and connection release. However, T/TCP is not the original

TCP anymore, so it requires changes in the mobile host and all correspondent hosts, which is a

major disadvantage. This solution no longer hides mobility. Furthermore, T/TCP exhibits

several security problems. The table 4.1 shows the overview of classical enhancements to TCP

for mobility.

4.9 Mobile Operating Systems i) Operating system (OS):

The master control program.

Manages all software and hardware resources.

Controls, allocates, frees, and modifies the memory by increasing or decreasing it

Also manages files, disks, and security, provides device drivers and GUIs for desktop

or mobile computer, other functions, and applications.

Enables the assignment of priorities for requests to the system and controls IO

devices and network.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 17

Table 4.1 Overview of classical enhancements to TCP for mobility

ii) Device driver :

• As software component which enables the use of a device, port, or network by

configuring (for open, close, connect, or specifying a buffer size, mode, or control word)

and sends output or receives input

• Driver Functions─ create, delete, open, close, read, write, io_control, connect, bind,

listen and accept

• Has the utility programs, for example, file manager and configuration of OS (memory

and resource allocation and enabling and disabling the use of specific resources and

functions)

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 18

• Can be accompanied by a specific suite of applications, for example, Internet Explorer

and MS Office

iii) Process:

• A program unit which runs when scheduled to do so by OS and each state of which

is controlled by OS

• Can call a function (method) but cannot call another process directly.

States of a process :

• Can be in any of the states—

1. Created

2. Active

3. Running

4. Suspended

5. Pending for a specified time interval

Pending state of a process for a specific communication from other process

• Signal

• Semaphore

• Mailbox-message

• Queue-message

• Socket

iv) Task:

• An application process which runs according to its schedule set by the OS

• Each state of which is controlled by OS

• Can be a real-time task which has time constraints or maximum defined latency within

which it must run or finish.

v) Thread:

• An application process or a process subunit (when a process or task has multiple

threads)

• Runs as scheduled by the OS

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 19

• Each state controlled by OS

• Runs as a light-weight process

Light-weight:

• Does not depend on certain system resources, for example, memory management unit

(MMU), GUI functions provided by the OS, or the functions which need running of other

processes or threads for their implementation.

vi) Interrupt service routine (ISR) :

• A program unit (function, method, or subroutine) which runs when a hardware or

software event occurs.

• Running of which can be masked and can be prioritized by assigning a priority

• Higher priority than any other process or task or thread

vii) Interrupt service thread (IST):

• A special type of ISR or ISR unit (function, method, or subroutine) which initiates and

runs on an event or message from an high priority ISR

• ISTs can be prioritized by assigning a priority

• The type of IST depends on the specific OS

viii) Page :

• A unit of memory which can load from a program stored in a hard drive or from any

other storage device to the program memory, RAM, before the execution of a program

• A contiguous memory address block of 4 kB (in x86 processors), 2 kB, or 1 kB

ix) Page table :

• For address mapping

• Provides the mapping of fragmented physical memory pages with the pages of the

virtual addresses which are the memory addresses

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 20

• Pages of memory are spread over the memory-address space leading to fragmentation of

codes and data in physical memory space

x) MMU :

• Creates and maintains the page table and hence performs address mapping and

translation

• Program during execution first translates the accessed address (virtual address) into a

physical address using the page table at the MMU and then accesses the physical address

and fetches the code or data

xi) Priority inversion :

• Takes place when a process or thread which is to provide a waiting object to a higher

priority process or thread gets preempted by a middle priority process or thread and thus

the middle priority process or thread starts running on obtaining the object for which it

was waiting and higher priority process or thread keeps waiting for wait object.

xii) Pipe :

• A virtual device which sends the bytes from a thread to another thread.

Hardware events for interrupts

• Time-out of a timer (clock tick)

• Division by zero

• Overflow

• Underflow detection by hardware during computation

• Finishing of DMA (direct memory access by a peripheral) transfer

• Data abort

• External FIQ (fast interrupt request through a pin input)

• External IRQ (interrupt request through a pin input)

• A memory buffer becoming full

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 21

• Port, transmitter, receiver, or device buffer─ becoming half filled, buffer with at

least one memory address filled, and buffer becoming empty

• Buffer─ associated with the memory addresses for the LCD, printer, serial or USB port,

keypad, or modem.

Software related events for interrupts

• Exception─ software instruction for interrupt on detection of a certain condition during

computations or error while logging in

• Illegal operation code provided to CPU

4.10 PALM OS • An OS for handheld devices

• Designed for highly efficient running of small productivity programs for devices with a

few application tasks

• Offers high performance due to a special feature that it supports only one process which

controls all computations by the event handlers

PalmOS Features

• Single process (no multi-processing and multi-threading)

• Compiled for a specific set of hardware, performance very finely tuned

• Memory space partitioned into program memory and multiple storage heaps for data

and applications

• A file in format of a database

• IP-based network connectivity and Wi-Fi (in later version only)

• Integration to cellular GSM/CDMA phone

PalmOS

• No multi-processing or multi-tasking

• Simplifies the kernel of the OS─ there is an infinite waiting loop in the only process

that kernel runs

• The loop polls for an event

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 22

Polling for events at specific intervals

• Each polled event─ sends interrupt signal

• Handled by an event handler

• Functioning as non-maskable nonprioritized ISR

Example: Polling for the events

• For a request to run an application or sub-application

• For a search program request to process a query

• Notifications (like time-out alarm)

• GUI actions (such as touching or tapping the screen with stylus)

PalmOS Hardware Support

• Compiles for a specific set of hardware, its performance is very finely tuned

• Optimized to support a very specific range of hardware, CPU, controller chips, and

smaller screens of Palm OSbased devices

Display Screen Support

• Generally wide screen

• 160 × 160 pixels

• Optimized layout of desktop programs displayed on screen

• 256 colour touch screen

• Higher resolution support in new versions

PalmOS Memory Support

• 16 MB memory

• 256 MB internal flash (non-volatile ROM)

• 256 MB card consisting of flash memory which the user inserts into the device

PalmOS Memory Space Partitions

• Program memory dynamic heap─ for process stacks and global variables

• Multiple storage heaps─ for data and applications

PalmOS File Format

• Format of a database

• Multiple records

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 23

• Information fields about the file.

• Name, attributes, and version of the database for the application

PalmOS Connectivity

• IP-based network connectivity

• WiFi (in later version only)

• Wireless communication protocols

• Integration to cellular GSM/CDMA phone

PalmOS APIs

• Simple APIs compared to Windows CE

• Simple APIs for developing the GUIs ─ buttons, menus, scroll bar, dialogs, forms, and

tables

• Using HTML markup language

PalmOS Desktop and Desktop Programs

• Desktop for Windows and Mac both and other essential software

• SMS, Address, Card-Info, HotSync, To- Do-List, SMS, Security, Date Book/Calendar,

Calc, Welcome, and Clock

PalmOS PIM

• Address book

• Data book for task-to-do and organization

• Memo pad

• SMTP (simple mail transfer protocol) email download

PalmOS PIM

• Offline creation and sending of POP3 (post office protocol 3) email

• Internet browsing functions using Blazer (a browser for handhelds)

• Windows organizer

• PDA (personal digital assistant)

PalmOS Query Development Platform

• Query development support platform Palm query applications (PQA) written using

HTML and ported at Palm device

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 24

PalmOS Client side Applications

• GUI development support on C/C++ platform using Palm SDK

• For Java application using J2ME and advanced tools, for example, Metrowerk

CodeWarrior

• Multimedia applications such as playing music (Palm Tungsten)

PalmOS Ports

• Serial and infrared ports for communication with mobile phones and external modems

• Synchroniszing a PC personal area computer using HotSync after resolving the conflicts

in different versions of files during data exchange

Port Protocols

• IrDA or serial device

• System mounted on a cradle

• Connects to computer PCs through IR or serial port

• A cradle is an attachment on which the handheld device can rest near a PC and connects

to the PC via a USB or infrared

Device handling

• Assumed as a new flash drive of a PC

• HotSync facilitates drag and drop of files from device to PC and vice versa

Cards

• MMC (multimedia card)

• SD (secure digital) memory card

• SDIO (secure digital input/output) memory card

Third Party applications support

• Examples are games, travel and flight planner, calculator, graphic drawings, preparing

slide shows.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 25

Application layer in architectural layers of PalmOS:

The OS and hardware layer in architectural layers of PalmOS is shown below.

Figure 4.5 Application layer in architectural layers of PalmOS

Lowest level layer in OS

• Kernel

• Directly interfaces the assembler, firmware (software installed in the hardware

devices in the system), and hardware

• PalmOS has a micro-kernel

PalmOS 4.x

• Adds improved security

• Improved GUIs,VUIs, telephony libraries

• Standard interfaces for access to the external SD cards for the files

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 26

PalmOS 5.x

• Supports

(i) a standardized API for high resolution screen

(ii) dynamic input areas

(iii) Instead of persistent battery-backed RAM, a non-volatile file system using flash

memory─ saves the files and data in case the battery charge is draining out

(iv) ARM, the processor─ providing efficient code and an energy-efficient architecture

Advanced PalmOS Handheld

• Merged PDA and smart phones

• Feature to double as a hard drive using USB cable to PC

• Enables the drag and drop of files between the Palm and PC in a manner similar to the

drag and drop functions in a PC between C: and D: drives

Recent Developments

• Integration in Wndows CE

• A few Windows mobile handheld devices in use are Palm look-alikes

• But these do not deploy PalmOS platform but Windows CE

PalmOS Deficiencies

1. Instead of multi-tasking, PalmOS provides for running a sub-application from within

an application

2. Not an ideal platform for running multimedia applications because due to PalmOS is

not for designing real-time systems

3. Does not offer much expandability

4. Inability to adapt to different sorts of hardware may also be considered a limitation for

this operating system

PalmOS Memory Support

• Assumes that there is a 256 MB memorycard(s)

• The card─ RAM, ROM, and flash memories

• A memory card ─ logical hexadecimal addresses from 00000h to 3FFFFh

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 27

PalmOS Memory Support

• RAM─ for stacks of processes and for the global variables in the running processes of

the application(s)

• ROM or flash─ for permanent resident application programs and OS

• Flash─ used for storage of non-volatile data

Memory

• A dynamic heap (within 96 kB for PalmOS 3.x) of application process stacks (3kB)

• TCP/IP stack (32 kB)

• OS functions stack, applications and OS functions dynamic-memory spaces, system

global variables (2.5 kB

• Application global variables

Direct memory address spaces in card

• Used instead of allocated dynamic memory buffers for the I/O port devices (e.g., LCD

display, keypad input, and modem I/Os)

Execute-in-place system

• PalmOS 3.x and 4.x (not 5.x)

• Static allocation of the memory addresses for the application-installed programs and

data storage

File manager

• Manages each file as a database which has multiple records and information fields

• Each record attributes protected record, deleted record (similar to deleted file), locked

ecord (in use by application process or OS), and updated record • Deleted record attribute

helps in data recovery by a recovery program

The info fields of each record

• Record ID and record attributes

• Info fields about the file have (i) name, (ii) file attributes, (iii) version of application

database, (iv) modification number (number of times modified) and access counter for

number of times accessed), and (v) file local ID

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 28

File Local ID

• In place of several characters─ requiring several bytes

• The file local ID─ a number used to identify the file locally when an application is

running

File ID

• A local file sorting table uses the file local ID to sort the file in the required order

• For example, the ordering may also be based on the time and date of the last

modification made in the file

Communication APIs

• For serial, IrDA, and TCP/IP communication • Serial communication uses a cradle

Protocols

• Connection management (CM) protocol

• Modem manager (MM)

• Serial link protocol (SLP) interacts with SM to transmit the data to PC

• A device receives the data from the other end through serial manager and SLP, MM, or

CM

Communication Protocols

• MM for deploying a dial up-modem

• CM carries out exchanges for establishing connection, baud rate selection, and finding

version number

• SLP for packet communication on serial line

• A desktop link protocol (DLP) transmits data to PADP when serial device is sending

data to PC and receives data from PADP when serial device is receiving data from the PC

IrDA

• Asynchronous serial (115 kbps)

• Synchronous serial communication (1.152 or 4 Mbps)

• Exchange manager as session layer and IrDA library functions (for IrDA protocol

layers) at lower level

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 29

Exchange manager

• Enables data interchange directly without HotSync

• Exchange manager and application use a set of launch codes to generate appropriate

events

Network library functions

• TCP/IP network library functions (for UDP and TCP) to send stack to a net protocol

stack (NPS) and provides a socket API

• Berkeley Socket APIs also supported

• Uses HTTP/HTTPS net library for Internet connectivity

Application Development Method

• Corresponding to each event, there is an event handler

• Application development means defining additional events and coding for the

corresponding handlers

Application Development Method

• An application can be assumed to be divisible into sub-applications am to an−1 along

with the existing event handlers a0 to am−1

• Assume that ai runs on the events ei

• An event ei polled at a sleep interval of ti−1 in an infinite while loop

Application

• SMS

• Address

• Card-Info

• HotSync

• To-Do-List

• Security

• Date Book/Calendar

• Calc, Welcome, and Clock

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 30

Application Development Packages

• Supports development packages Palm SDK (software development kit) and CDK

(conduit development kit)

• A conduit is a path

4.11 Windows CE • A 32 bit OS from Microsoft

• Customized for each specific hardware and processor in order to fine-tune the

performance

• Compatible with a variety of processor architectures

• Compiled for a specific set of hardware, its performance is very finely tuned

• User─ personal-computer-like feel and Windows-like GUIs

• Large number of Windows-based applications available at the device

Windows CE 4.x

• Adds improved security, GUIs, VUIs, telephony libraries, and standard interfaces for

access to the external SD cards for the files

Windows CE 5.x

• Supports a non-volatile file system using flash memory

• Flash nowadays used instead of persistent battery-backed RAM

• Windows CE supports a new file system that supports larger file sizes, removable media

encryption, and larger storage media

• The flash file system saves the files and data in case the battery charge is draining out

Windows Embedded CE 6.0

• Open, scalable, 32-bit operating system (OS) with small-footprint and advanced

Windows technologies

• Provides hard real-time capabilities, with a redesigned kernel and embedded specific

development tools

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 31

Windows Embedded CE 6.0 devices

• For home as well as work places

• Provisions for media and shared presentations

• Connectivity to cellular networks

Windows Mobile 6 platform

• For mobile devices such as Pocket PC

• for managing Visual C# and Visual Basic .NET codes

• Based on Windows CE and hardware such as personal digital assistants (PDAs) and

smart phones

• Microsoft Visual Studio 2005

• Windows Mobile SDK for creating software for the platform

• The code developed in Visual C++

Thread

• Basic unit of computation

• A process─ any number of threads

• Threads run concurrently

Windows Mobile

• Deployed in (i) Smart phone, (ii) handheld Pocket PC which features the digitizer in the

human computer interface (HCI), and (iii) portable media player • PDA with Microsoft

Smartphone phone device, touch screen, touchpad, or directional pad Pocket PC

• Has digitization software which converts (i) analog signals to digital ones to enable

scanning of photos and video recordings for storage or transmission (ii) audio analog

sources into digital form to enable speech processing, voice, or music for creating records

and files which are stored or transmitted

Windows CE

• Kernel divided into two sub layers

• One sub layer consists of large part of the OS

• Then the OS is adjusted according to the device hardware by adding the remaining part

of the OS

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 32

• Second sub layer called hardware abstraction layer

• Shared source licensed with controlled access to full or limited parts of the source code

for a product

• Windows CE 5.x developers have the freedom to modify down to the kernel level

without the need to share their changes with Microsoft or competitors

• A component-based, embedded, real-time operating system with deterministic interrupt

latency

• Can be configured as a real-time operating system for handheld Smart phone, Pocket

PC, computers, and embedded systems

• Modular/componentized to provide the foundation of several classes of devices and

supports addition of features of other components for Windows, DCOM, and COM

• Data format─ database or object file

• File automatically compresses when stored and decompresses when loaded

• Visual C/C++ platform integrates use of web

• .NET XML parsing (trimmed version)

GUIs development support

• Using markup language as well as C/C++ language

• Embedded complex APIs

• Gives the user a PC-like feel and Windows-like GUIs (window resizing not provided)

VUIs development support

• Built-in microphone for voice recording

Display

• High resolution colour/ display

• Touch screen

• Stylus keypad with Windows layout of desktop programs displayed on colored touch

screen

Software

• Desktop for Windows

• Other essential software

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 33

• PIM

• Contacts

• Task-to-do

• Smart phone

• Multimedia applications such as playing music

Desktop Programs

• Owner

• Number of messages not read

• Tasks

• Present hour subject

• Button and tool bar for task start menu

• Today calendar, contacts, Internet explorer, messages, phone, pocket MSN, album,

MSN messenger, camera, programs, settings, and help], phone mode indicator (on/off),

signal strength status, speaker status (on/off), and time

Ports

• USB and infrared port support for communication of a device with mobile phones and

for synchronizing a PC using ActiveSync after resolving the conflicts due to different

versions of object files during data exchange.

• Bluetooth

• TCP/IP

• WiFi or Ethernet LAN interface . 30 ActiveSync

• Synchronization of mobile device data with PC using a USB, Bluetooth, and PC

infrared port Connectivity to other devices

• A cradle connects to PC

• USB 2.0 in Windows CE 5.0 PocketPC conform as the USB mass storage class, the

storage on device can be accessed, and drag and drop menu can be used from any USB

port of PC, which considers the handheld device just another flash drive

Window CE device three states

(i) ON with clock frequency lowered in idle state

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 34

(ii) Suspend with power to unused system units and port peripherals disconnected,

memory data persistent, CPU idle till next interrupt, and clock running

(iii) dead with power disconnected

Windows CE deficiencies

• Cooperative running of multi-threading does not support simultaneous multimodal user

interfaces (data by multiple modes, for example, text as well as speech) Poor Adaptability

• Adapts to different sorts of hardware limits mainly because of two reasons (i)

compiled for a specific set of hardware for very fine-tuned Windows CE performance,

(ii) large parts of OS offered in the form of source code first and then adjusted to the

hardware by the manufacturer

Figure 4.6 OS layer in Windows CE

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 35

Windows CE Memory Management

• Assumes 4 GB virtual memory

• RAM, ROM, and flash memories

• A memory has logical hexadecimal addresses from 000000000h to FFFFFFFFh

Windows CE Memory Management

• A ROM image─ the footprint of OS, data, and the applications at the permanently

installed ROM (or flash memory)

• An OS configured and customized for an embedded application(s)─ footprint is the

ROM image

• The customization reduces the OS footprint

Windows CE Memory Management

• Windows CE needs a minimum footprint of 350 kB

• Device applications optimized so that the devices need minimal storage below 1 MB

with no disk storage

• Windows CE footprint burned in ROM and configured as it does not allow end-user

extension

Memory manager

• Assigns contagious pages in virtual address space to one of the 32 memory slots

• Each slot of 32 MB

• Allocates a distinct slot to a distinct process among the maximum 32 concurrently

running processes

Memory manager

• Allocation of memory slots reduces fragmentation of pages to a significant extent as

pages of processes are at the contagious addresses in the slot. Fragmentation occurs only

when the memory needed by the process code and data is more than 32 MB

Dynamic heap in the program memory

• The Application process stacks, TCP/IP stack, OS functions stack, applications and OS

functions dynamic-memory spaces, system and application global variables, Bluetooth

stack, and WiFi stack

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 36

ROM and RAM

• OS and system functions in ROM

• An automotive PC with Windows CE 8 MB ROM and RAM each

• The Pocket PC 2–8 MB ROM and 8–32 MB RAM in storage memory

File manager

• Manages data as a database or object file

• A file system─ a root directory with which the file folders associate in a tree-like

structure

• Division of all files and folders into volumes

• A volume ─ unit which can be loaded from the device to the computer or can be stored

on the device from the computer

File Volume

• Each volume has a root directory which has directories and file folders • Each directory

can have further divisions into subdirectories and file folders

• Each subdirectory can have further divisions into files and subdirectories till the leaf

node which has a single file folder

Communication, Network, Device, and Peripheral Drivers

• Communication and network APIs for serial, IrDA, TCP/IP, Bluetooth stack, and WiFi

stack

• IP-based connectivity to the network and WiFi-based connectivity in later versions

• Window CE integrates Microsoft Smart phone software

• Enables the application of Windows CE device as cellular GSM/CDMA phone

Serial communication

• Uses a cradle

• A serial manager (SM) provides interface to the device on cradle with the RS232C

COM port of the PC

• Connection management (CM) by using the serial link interface protocol (SLIP) and

point to- point (PPP) protocol

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 37

• IrDA asynchronous serial (115 kbps) or synchronous serial communication (1.152 or 4

Mbps) uses ActiveSync

Network connectivity

• By radio transceiver and LAN adapter

• A NDIS (network driver interface specification) used for the drivers other than the

driver loaded at the hardware

Windows CE device drivers

• Device driver and peripheral driver functions for low-level drivers at the kernel

Windows CE

• USB connectivity provided for the peripherals

Event

• Sends interrupt signal which is checked for source, that is, whether the source is a

hardware event, software exception, user action- based event, or kernel event (e.g., a

kernel command, WM_HIBERNATE)

Event handler

• Separate for each event • Asynchronous events

• Event handler calls interrupt service thread (IST) in Windows CE device

Application Development tools

• Visual basic and Visual C++

• Platform Builder─ for developing a Windows CE application by carrying out OS image

creation and integration

• Platform Builder provides an integrated environment for customized operating system

designs based on Windows CE

4.12 SYMBION OS • OS for handheld Smart phones and mobile handhelds with phone and multi-modal

communication features

• Multi-modal means usage of different modes—text, image, video, or audio

• Multi-modal communication integrates and

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 38

Synchronizes multimedia (Video with text, audio with text …)

Symbian OS─ C/C++ as well as Java Support

• Supports application development in C/C++ as well as Java and many communication

protocols

• Java Phone

Symbian application architecture

• GUIs and VUIs─ APIs for the buttons, menus, advanced voice features such as a hands-

free speakerphone, and conference calling capability

• Application view

• Application engine

• Powerful development platforms and GUIs

Application development tools

• Personal Java and Symbian Everywhere

• Symbian C++ Software development kit (SDK)

• Symbian emulator for application development using Windows Metrowerk,

CodeWarrior

Synchronization

• SyncML synchronization

• Can also deploy C/C++-based synchronization software

Symbian OS

• Low boot time

• OS supports multi-processing or multitasking

• Multithreading

• Internet connectivity for Web browsing, IP-based network connectivity, and WiFi (in

later version only).

• Integration to cellular GSM/CDMA phone

Memory Support

• Large storage memory

• Includes 80 MB of built-in memory in a Multimedia Card (MMC)

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 39

• MMC (multimedia card), SD (secure digital) memory card, and SDIO (secure digital

input/output) memory card.

Software

• Desktop both for Lotus and Windows programs

• Push-to-talk

• Graphics support including support for 3D rendering

• Simple APIs as compared to Windows CE, PIM, Java Phone

• Telephony standard interfaces

• MIDP (mobile information device profile)

• Contacts

• SyncML

• Office

• address book

• Spreadsheet

• Calendar

• Agenda

• Word processor

• Text-to-speech converter

• Browsing

• Messaging (SMS, MMS, email, and IMAP4)

• WAP push Microsoft Office formats (MS Office 97 onwards)

• Slide shows

• email download, offline creation and sending of POP3 (post office protocol 3) email

• Internet browsing

• GUI development support on C/C++ and Java platform

• Java application using J2ME

• multimedia applications such as playing music (Palm Tungsten)

• Wireless communications Support for WLAN

• Adobe Reader for accessing PDF files

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 40

• Symantec Client Security 3.0

• IBM Web Sphere Everyplace Access

• BlackBerry Connect

• Oracle Collaboration Suite

• Secure mobile connections via VPN Client

Ports

• Serial

• USB

• Infrared

• Telephony

• Bluetooth for communication with mobile phones and external modems

Third Party Support

• Extensive

• Games

• Travel and flight planner

• Enterprise solutions

• Calculator

• Graphic drawings

• Preparing slide shows

OS and Hardware layers of Symbian

The OS and Hardware layers of Symbian OS is shown in the below figure.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 41

Figure 4.7 OS and Hardware layers of Symbian OS

Communication APIs

• WAP

• WiFi

• CDMA

• GPRS

• GSM Telephony

Network APIs

• Serial

• Bluetooth

• IrDA

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 42

• TCP/IP, communication APIs for HTTP, TCP/IP, DNS, SSL, WAP, PPP

4.13 LINUX FOR MOBILE DEVICES Linux

• Embedded Linux Consortium (ELC) standards for Linux for designing user interfaces,

managing power consumption in devices, and real-time operation

• Also considered to be more secure than most other operating system. Several

international mobile phone manufacturers use Linux for their OS requirements.

Example of Linux OS – Mobile

• An open source OS

• Enables the user to customize their device to suit their specific needs

• Provides ease to suit different sorts of hardware and software applications

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 43

4.14 Question Bank PART – A (2 MARKS)

1. What is slow start?

2. What is the use of congestion threshold?

3. What led to the development of Indirect TCP?

4. What is the goal of M-TCP?

5. What do you mean by persistent mode?

6. What are the characteristics of 2.5G/3.5G wireless networks?

7. What are the configuration parameters to adapt TCP to wireless environments?

8. What are the requirements of mobile IP?

9. Mention the different entities in a mobile IP.

10. Define Mobile node

11. Define Cellular IP

12. What do you mean by mobility binding?

13. Define COA.

14. Define a tunnel.

15. What is encapsulation?

16. What is decapsulation?

17. Define an outer header

18. Define an inner header

19. What is the use of network address translation?

20. Define triangular routing.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-4 4. 44

PART – B (16 MARKS)

1. Explain traditional TCP in details.

2. Explain classical TCP improvements and snooping TCP.

3. Explain the function of the components of the WAP architecture.

4. Explain the concept of wireless markup language.

5. Explain wireless application protocols with its version WAP 2.0 in detail.

6. Describe the operation of the window flow control mechanism.

7. Explain in detail about tunneling

8. Explain in detail about Cellular IP.

9. Explain in detail about binding concept.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 1

UNIT 5

MOBILE MIDDLEWARE

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 2

CONTENTS

5.1 Mobile Middleware

5.2 Middleware for application development

5.3 Adaptation

5.4 Mobile Agent

5.4.1 Reputation and Trust

5.4.2 Differences between trust and reputation systems

5.5 Service discovery

5.6 Services

5.7 Garbage Collection

5.8 Eventing

5.9 Security

5.10 Interoperability

5.11 Adhoc and Sensor Networks

5.11.1 Mobile Sensor Networks Overview

5.11.2 Mobile Ad-Hoc Networks – MANET Overview

5.12 Properties of MANETs

5.13Unique features of sensor networks

5.14Applications

5.15 Challenges

5.16 Constrained Resources

5.17 Security

5.18 Mobility

5.19 Protocols

5.20 Auto Configuration

5.21 Energy Efficient Communication

5.22 Mobility requirements

5.23 Question Bank

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 3

TECHNICAL TERMS

1. Mobile middleware is, as the name implies, middleware used in the context of mobile-

computing devices. Mobile middleware offers various transparencies that hide the

complexities of mobile environments.

2. Middleware is the "glue" between software components or between software and the

network or it is the slash in Client/Server.

3. Adaptation middleware assists applications in providing the best quality of service

possible to users, given the widely fluctuating resource levels that may exist in mobile

environments.

4. Mobile agents provide an alternative to static client/server systems for designing

interesting mobile applications that access remote data and computational services.

5. Service discovery is an adaptable middleware in a device (or a mobile computing

system) that dynamically discovers services. Bluetooth Service discovery protocol, JINI,

SLP (service location protocol), UPnP (Universal Plug and Play) service discovery

functions

6. Location management enables the wireless network to discover the current point of

attachment of the MS and deliver calls.

7. Split multipath routing (SMR) is an on-demand routing protocol that constructs

maximally disjoint paths between a given source destination.

8. Caching and multipath routing protocol (CHAMP) makes use of temporal locality in

dropped packets and targets at reducing packet loss due to a route breakdown.

9. Neighbor-table-based multipath routing (NTBMR) is a mixed multipath routing

protocol that deals with regular topology changes in mobile ad hoc networks.

10. Adhoc on-demand distance vector–backing routing (AODV–BR) is a multipath

routing protocol which constructs routes on demand and uses alternate paths only when

the primary route is disrupted.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 4

11. On-demand multipath routing is an extension of the DSR protocol. It exploits

multipath techniques in reducing the frequency of query floods used to discover new

routes.

12. Interoperability is the ability of software and hardware on different machines from

different vendors to share data.

13. A router is a device in computer networking that forwards data packets to their

destinations, based on their addresses. The work a router does it called routing, which is

somewhat like switching, but a router is different from a switch. The latter is simply a

device to connect machines to form a LAN.

14. Routing: In internetworking, the process of moving a packet of data from source to

destination. Routing is usually performed by a dedicated device called a router.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 5

5. MOBILE MIDDLEWARE

5.1 Mobile Middleware Mobile middleware is, as the name implies, middleware used in the context of mobile-

computing devices. Mobile middleware offers various transparencies that hide the complexities

of mobile environments. For instance, location transparency allows applications to exchange data

with other applications without any regard for their location. Similar abstractions are likewise

provided by transparencies on the transport protocol, operating system, programming and others.

Mobile middleware typically involves services like messaging and Remote Procedure Call

(RPC), resource discovery, transactions, directory, security, and storage services and data

synchronization.

5.2 Middleware for application development There are two types of middleware, adaptation middleware and mobile agent systems.

Adaptation middleware assists applications in providing the best quality of service possible to

users, given the widely fluctuating resource levels that may exist in mobile environments.

Mobile agents provide an alternative to static client/server systems for designing interesting

mobile applications that access remote data and computational services.

5.3 Adaptation Mobile computers must execute user- and system-level applications subject to a variety

of resource constraints that generally can be ignored in modern desktop environments. The most

important of these constraints are power, volatile and nonvolatile memory, and network

bandwidth, although other physical limitations such as screen resolution are also important.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 6

In order to provide users with a reasonable computing environment, which approaches

the best that currently available resources will allow, applications and/or system software must

adapt to limited or fluctuating resource levels.

For example, given a sudden severe constraint on available bandwidth, a mobile audio

application might stop delivering a high-bit-rate audio stream and substitute a lower-quality

stream. The user is likely to object less to the lower quality delivery than to the significant

dropouts and stuttering if the application attempted to continue delivering the high-quality

stream.

Similarly, a video application might adjust dynamically to fluctuations in bandwidth,

switching from high-quality, high-frame-rate color video to black-and-white video to color still

images to black-and-white still images as appropriate. A third example is a mobile videogame

application adjusting to decreased battery levels by modifying resolution or disabling three-

dimensional (3D) features to conserve power.

5.4 Mobile Agent (MA) Mobile Agent, namely, is a type of software agent, with the feature of autonomy, social

ability, learning, and most importantly, mobility. A mobile agent is a process that can transport

its state from one environment to another, with its data intact, and be capable of performing

appropriately in the new environment.

Mobile agents decide when and where to move. Movement is often evolved

from RPC methods. Just as a user directs an Internet browser to "visit" a website (the browser

merely downloads a copy of the site or one version of it in the case of dynamic web sites),

similarly, a mobile agent accomplishes a move through data duplication. When a mobile agent

decides to move, it saves its own state, transports this saved state to the new host, and resumes

execution from the saved state.

A mobile agent is a specific form of mobile code, within the field of code mobility.

However, in contrast to the remote evaluation and code on demand programming paradigms,

mobile agents are active in that they can choose to migrate between computers at any time during

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 7

their execution. This makes them a powerful tool for implementing distributed applications in

a computer network.

An open multi-agent system (MAS) is a system in which agents that are owned by a

variety of stakeholders continuously enter and leave the system.

5.4.1 Reputation and Trust

The following are general concerns about Trust and Reputation in MA research:

1. Source of trust information is direct experience, witness information, role-based rules.

2. How trust value is calculated

3. Overall trust value

5.4.2 Differences between trust and reputation systems

Trust systems produce a score that reflect the relying party’s subjective view of an

entity’s trustworthiness, whereas reputation systems produce an entity’s (public) reputation score

as seen by the whole community.

Some advantages which mobile agents have over conventional agents:

Computation bundles - converts computational client/server round trips to

relocatable data bundles, reducing network load.

Parallel processing -asynchronous execution on multiple heterogeneous network

hosts

Dynamic adaptation - actions are dependent on the state of the host environment

Tolerant to network faults - able to operate without an active connection between

client and server

Flexible maintenance - to change an agent's actions, only the source (rather than

the computation hosts) must be updated

One particular advantage for remote deployment of software includes increased

portability thereby making system requirements less influential.

5.5 Service Discovery Middleware

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 8

The Service discovery middleware is an adaptable middleware in a device (or a mobile

computing system) that dynamically discovers services. Bluetooth Service discovery protocol,

JINI, SLP (service location protocol), UPnP (Universal Plug and Play) are the service discovery

functions

Steps for Service discovery

1. Lets nearby service network (or device or system) recognize that device

2. Lets the nearby network know of device service(s)

3. Searches and discovers a new service(s) at the network

4. Interacting with nearby network using discovered service(s)

5.6 Services The Services that offer by middleware are

Client/Server Connectivity -Middleware provides the mechanism by which network

applications communicate across the network. This includes in the case of database networking

for example the service of putting packages of query results data into network transport packets.

Microsoft SQL Server, for example, uses Sybase's Tabular Data Stream (TDS) protocol to

handle formatting of data for transport across the network. This session layer interaction may

also have its own timers and even error control to handle automatic retransmission of lost

packets. One feature common is the ability for the client to interrupt the current operation on the

server to cancel a large query response download.

Platform Transparency -Client and server don't have to have intimate knowledge of

each other in order for work to get done. Differences between platform specific encodings like

big-endian and little-endian or EBCDIC and ASCII are typically hidden by middleware.

Middleware often runs on a variety of platforms, letting the organization utilize all its existing

desktop and server hardware as applications require. Still, some middleware products find it hard

to look beyond Windows clients and UNIX or Windows NT servers. Make sure the middleware

you're buying handles all the platforms you really have deployed. Microsoft SQL Server DB-

Library middleware provides access only to Windows NT servers (since that's the only supported

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 9

SQL Server host platform), but does so from DOS, Windows (3.1, 95, NT), Mac and UNIX

clients.

Network Transparency and Isolation -Middleware often makes networking choices

transparent to application programmers. Actually, though, every middleware product we've ever

heard of runs on TCP/IP, with all the other protocols coming in a distant second. If you want to

be more prepared to run tomorrow's middleware, get on the TCP/IP bandwagon. Then again,

don't let application programmers become too divorced from networking decisions.

SQL Server supports multiple protocols between clients and servers, though some are specific to

a given platform. From Macs, the choices are TCP/IP and AppleTalk. From PCs, there are more

choices: TCP/IP, NetWare IPX/SPX, and NetBIOS/NetBEUI (Named Pipes). In some cases, the

client and server don't even have to run the same network protocol between them. An

intermediate device which might best be called a database relay can get the two end nodes

talking to each other.

Application and Tool Support (APIs) -Before middleware can be used, it must present

its own API to client applications that might use it. For shrink-wrapped tools like a database

query tool, the API support can be critical. While ODBC has provided some level of

transparency across multiple proprietary database APIs, many RDBMS vendors still encourage

using their own proprietary APIs. Be sure you know what APIs your middleware offers as well

as what APIs your tools can use. Hopefully there's a match! SQL Server offers both ODBC

standard and DB-Library proprietary APIs on the client. For more generic middleware, the API

on the server must be available as well; for RDBMS middleware, the server side is typically

hard-coded to support an RDBMS.

Language Support -Middleware often provides transparency across different SQL

database dialects. Even when coding in embedded SQL in a 3GL, the middleware might allow

the use of a single SQL dialect across a variety of RDBMS back ends. Outside of the database

specific middleware products, generic middleware products often allow different programming

languages to be used to create the distinct pieces of an application (pieces that reside on different

machines). Since SQL Server's DB-Library only supports SQL Server RDBMSs, the SQL dialect

supported is Transact SQL, a superset of ANSI 89 SQL created by Sybase and Microsoft.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 10

RDBMS Support -When we focus on database networking middleware (also called data

access middleware), middleware may also provide a level of transparency across different data

storage formats. It will make different RDBMSs look like the same RDBMS. ODBC is one way

of hiding RDBMS differences, but middleware products often provide multiple RDBMS support

from both proprietary and standard APIs. SQL Server's DB-Library middleware does support

ODBC interfaces, but still natively gets users to SQL Server RDBMS only.

Much database networking middleware is closely tied to the RDBMS of that same

vendor. To get to even more data sources, database gateway products are needed. Third party

products like TechGnosis SequeLink or IBI EDA/SQL offer more variety in RDBMSs. Even

Microsoft has recently allied with IBI to have their multi-RDBMS connectivity solution

connected to the DB-Library network so that DB-Library clients can get to RDBMSs other than

SQL Server.

For non-data access products, RDBMS functionality can still be provided using

extensions to make accessing that kind of data directly easy over the middleware solution

deployed. NetWeave is one messaging vendor that also has database access software options.

5.7 Garbage collection:

Garbage collection is the systematic recovery of pooled computer storage that is being

used by a program when that program no longer needs the storage. This frees the storage for use

by other programs (or processes within a program). It also ensures that a program using

increasing amounts of pooled storage does not reach its quota (in which case it may no longer be

able to function).

Garbage collection is an automatic memory management feature in many modern

programming languages, such as Java and languages in the .NET framework. Languages that use

garbage collection are often interpreted or run within a virtual machine like the JVM. In each

case, the environment that runs the code is also responsible for garbage collection.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 11

In older programming languages, such as C and C++, allocating and freeing memory is

done manually by the programmer. Memory for any data that can't be stored within a primitive

data type, including objects, buffers and strings, is usually reserved on the heap. When the

program no longer needs the data, the programmer frees that chunk of data with an API call.

Because this process is manually controlled, human error can introduce bugs in the code.

Memory leaks occurs when the programmer forgets to free up memory after the program no

longer needs it. Other times, a programmer may try to access a chunk of memory that has already

been freed, leading to dangling pointers that can cause serious bugs or even crashes.

Programs with an automatic garbage collector (GC) try to eliminate these bugs by

automatically detecting when a piece of data is no longer needed. A GC has two goals: any

unused memory should be freed, and no memory should be freed unless the program will not use

it anymore. Although some languages allow memory to be manually freed as well, many do not.

5.8 Eventing In event notification, a UPnP device notifies control points that registered a service in

control phase of changes to the services they registered to, following a publish-subscribe –style

messaging paradigm.

Universal Plug and Play, UPnP, provides a programming language and platform

independent discovery mechanism by relying on HTTP and XML. UPnP relies on listening and

responding to HTTP-based requests on a particular multicast channel. UPnP architecture consists

of control points (i.e. UPnP client devices) and UPnP devices. UPnP can be seen to contain five

phases: discovery, description, control, event notification and presentation.

5.9 Security

Just as any other platform that executes general-purpose applications; mobile platforms

need security mechanisms to protect the resources on the devices. Two important techniques can

be distinguished: memory management and software protection. Native platforms need to ensure

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 12

that applications cannot access memory that belongs to other applications or to the platform

itself. This separation is guaranteed by memory management. Some of the older mobile device

platforms such as Palm OS have no form of memory protection at all, which makes these

platforms inherently in secure.

Most modern native platforms (Windows Mobile, Symbian) do provide basic memory

protection. One of the important strengths of managed platforms (.NET Compact Framework,

Java ME) is that they have a strong memory protection model because applications have no

direct access to the memory and because these platforms guarantee type safety. Other resources

on the device such as personal data, wireless networking, or SMS messages are accessed via

APIs and are protected by the security architecture of the platform.

Security Issues

Important security mechanisms found on full-scaled platforms are omitted

The developer has very little options in customizing security mechanisms

APIs can be protected but often in an all-or-nothing way

It is hard to securely store sensitive data

A mobile device is subject to different kinds of threats

5.10 Interoperability

Interoperability is the ability of software and hardware on different machine from

different vendors to share data.

The need for interoperability between information systems is readily apparent in

peacekeeping and disaster-response operations. In these situations, a coalition of civilian and

military organizations, each with its own intelligence or other information assets, is formed on

short notice and required to operate in areas where the fixed communication infrastructure has

been severely damaged or completely destroyed. The field units are forced to rely on limited-

power devices that use an unreliable low-bandwidth data link to communicate between them and

to access information held within constituent organizations’ headquarters.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 13

5.11 Adhoc and Sensor Networks 5.11.1 Mobile Sensor Networks Overview

As sensors become widely deployed, some sensors may be enhanced with mobility. Such

mobile sensors may be more powerful and can re-charge themselves automatically. An important

application is in the robot area.

Need of mobile sensors:

Resilient to failures

Reactive to events

To support disparate missions

5.11.2Mobile Ad-Hoc Networks – MANET Overview

Mobile Ad hoc NETworks (MANETs) are wireless networks which are characterized by

dynamic topologies and no fixed infrastructure. Each node in a MANET is a computer that may

be required to act as both a host and a router and, as much, may be required to forward packets

between nodes which cannot directly communicate with one another. Each MANET node has

much smaller frequency spectrum requirements that that for a node in a fixed infrastructure

network.

A MANET is an autonomous collection of mobile users that communicate over relatively

bandwidth constrained wireless links. Since the nodes are mobile, the network topology may

change rapidly and unpredictably over time. The network is decentralized, where all network

activity including discovering the topology and delivering messages must be executed by the

nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 14

Figure 5.1 MANET

MANETs

● Are rapidly deployable, self configuring.

●No need for existing infrastructure.

●Wireless links.

●Nodes are mobile, topology can be very dynamic.

●Nodes must be able to relay traffic since communicating nodes might be out of range.

●A MANET can be a standalone network or it can be connected to external networks

(Internet).

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 15

Figure 5.2 Example of a MANET

MANET usage areas

●Military scenarios

●Sensor networks

●Rescue operations

●Students on campus

●Free Internet connection sharing

●Conferences

Mechanisms required in a MANET

●Multi-hop operation requires a routing mechanism designed for mobile nodes.

●Internet access mechanisms.

●Self configuring networks requires an address allocation mechanism.

●Mechanism to detect and act on, merging of existing networks.

●Security mechanisms.

5.12 Properties of MANETs

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 16

MANET enables fast establishment of networks. When a new network is to be

established, the only requirement is to provide a new set of nodes with limited wireless

communication range. A node has limited capability, that is, it can connect only to the

nodes which are nearby. Hence it consumes limited power.

A MANET node has the ability to discover a neighboring node and service. Using a

service discovery protocol, a node discovers the service of a nearby node and

communicates to a remote node in the MANET.

MANET nodes have peer-to-peer connectivity among themselves.

MANET nodes have independent computational, switching (or routing), and

communication capabilities.

The wireless connectivity range in MANETs includes only nearest node connectivity.

The failure of an intermediate node results in greater latency in communicating with the

remote server.

Limited bandwidth available between two intermediate nodes becomes a constraint for

the MANET. The node may have limited power and thus computations need to be

energy-efficient.

There is no access-point requirement in MANET. Only selected access points are

provided for connection to other networks or other MANETs.

MANET nodes can be the iPods, Palm handheld computers, Smart phones, PCs, smart

labels, smart sensors, and automobile-embedded systems

MANET nodes can use different protocols, for example, IrDA, Bluetooth, ZigBee,

802.11, GSM, and TCP/IP.MANET node performs data caching, saving, and

aggregation.

MANET mobile device nodes interact seamlessly when they move with the nearby

wireless nodes, sensor nodes, and embedded devices in automobiles so that the seamless

connectivity is maintained between the devices.

5.13 Unique features of sensor networks

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 17

Dynamic network topology

Bandwidth constraints and variable link capacity

Energy constrained nodes

Multi-hop communications

Limited security

Autonomous terminal

Distributed operation

Light-weight terminals

5.14 Applications The set of applications for MANETs is diverse, ranging from small, static

networks that are constrained by power sources, to large-scale, mobile, highly dynamic

networks. The design of network protocols for these networks is a complex issue. Regardless of

the application, MANETs need efficient distributed algorithms to determine network

organization, link scheduling, and routing. Some of the main application areas of MANET’s are:

Military battlefield– soldiers, tanks, planes. Ad- hoc networking would allow the

military to take advantage of commonplace network technology to maintain an

information network between the soldiers, vehicles, and military information

headquarters.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 18

Figure 5.3 MANET Applications

Sensor networks – to monitor environmental conditions over a large area

Local level – Ad hoc networks can autonomously link an instant and temporary

multimedia network using notebook computers or palmtop computers to spread

and share information among participants at e.g. conference or classroom.

Another appropriate local level application might be in home networks where

devices can communicate directly to exchange information.

Personal Area Network (PAN) – pervasive computing i.e. to provide flexible

connectivity between personal electronic devices or home appliances. Short-range

MANET can simplify the intercommunication between various mobile devices

(such as a PDA, a laptop, and a cellular phone). Tedious wired cables are replaced

with wireless connections. Such an ad hoc network can also extend the access to

the Internet or other networks by mechanisms e.g. Wireless LAN (WLAN),

GPRS, and UMTS.

Vehicular Ad hoc Networks – intelligent transportation i.e. to enable real time

vehicle monitoring and adaptive traffic control

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 19

Civilian environments – taxi cab network, meeting rooms, sports stadiums, boats,

small aircraft

Emergency operations – search and rescue, policing and fire fighting and to

provide connectivity between distant devices where the network infrastructure is

unavailable. Ad hoc can be used in emergency/rescue operations for disaster relief

efforts, e.g. in fire, flood, or earthquake. Emergency rescue operations must take

place where non-existing or damaged communications infrastructure and rapid

deployment of a communication network is needed. Information is relayed from

one rescue team member to another over a small hand held.

5.15 Challenges To design a good wireless ad hoc network, various challenges have to be taken

into account:

Dynamic Topology: Nodes are free to move in an arbitrary fashion resulting in

the topology changing arbitrarily. This characteristic demands dynamic

configuration of the network.

Limited security: Wireless networks are vulnerable to attack. Mobile ad hoc

networks are more vulnerable as by design any node should be able to join or

leave the network at any time. This requires flexibility and higher openness.

Limited Bandwidth: Wireless networks in general are bandwidth limited. In an ad

hoc network, it is all the more so because there is no backbone to handle or

multiplex higher bandwidth

Routing: Routing in a mobile ad hoc network is complex. This depends on many

factors, including finding the routing path, selection of routers, topology, protocol

etc.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 20

5.16 Constrained Resources ●Self starting and self organizing

●Multi-hop, loop-free paths

●Dynamic topology maintenance

●Rapid convergence

●Minimal network traffic overhead

●Scalable to large networks

5.17 Security in MANET’s Securing wireless ad-hoc networks is a highly challenging issue. Understanding possible

form of attacks is always the first step towards developing good security solutions. Security of

communication in MANET is important for secure transmission of information. Absence of any

central co-ordination mechanism and shared wireless medium makes MANET more vulnerable

to digital/cyber attacks than wired network there are a number of attacks that affect MANET.

These attacks can be classified into two types:

External Attack: External attacks are carried out by nodes that do not belong to the

network. It causes congestion sends false routing information or causes unavailability of

services.

Internal Attack: Internal attacks are from compromised nodes that are part of the

network. In an internal attack the malicious node from the network gains unauthorized

access and impersonates as a genuine node. It can analyze traffic between other nodes

and may participate in other network activities.

Denial of Service attack: This attack aims to attack the availability of a node or the

entire network. If the attack is successful the services will not be available. The attacker

generally uses radio signal jamming and the battery exhaustion method.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 21

Impersonation: If the authentication mechanism is not properly implemented a

malicious node can act as a genuine node and monitor the network traffic. It can also

send fake routing packets, and gain access to some confidential information.

Eavesdropping: This is a passive attack. The node simply observes the confidential

information. This information can be later used by the malicious node. The secret

information like location, public key, private key, password etc. can be fetched by

eavesdropper.

Routing Attacks: The malicious node makes routing services a target because it’s an

important service in MANETs. There are two flavors to this routing attack. One is attack

on routing protocol and another is attack on packet forwarding or delivery mechanism.

The first is aimed at blocking the propagation of routing information to a node. The latter

is aimed at disturbing the packet delivery against a predefined path.

Black hole Attack: In this attack, an attacker advertises a zero metric for all destinations

causing all nodes around it to route packets towards it. A malicious node sends fake

routing information, claiming that it has an optimum route and causes other good nodes

to route data packets through the malicious one. A malicious node drops all packets that it

receives instead of normally forwarding those packets. An attacker listen the requests in a

flooding based protocol.

Wormhole Attack: In a wormhole attack, an attacker receives packets at one point in the

network, tunnels them to another point in the network, and then replays them into the

network from that point. Routing can be disrupted when routing control message are

tunneled. This tunnel between two colluding attacks is known as a wormhole.

Replay Attack: An attacker that performs a replay attack is retransmitted the valid data

repeatedly to inject the network routing traffic that has been captured previously. This

attack usually targets the freshness of routes, but can also be used to undermine poorly

designed security solutions.

Jamming: In jamming, attacker initially keep monitoring wireless medium in order to

determine frequency at which destination node is receiving signal from sender. It then

transmit signal on that frequency so that error free receptor is hindered.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 22

Man- in- the- middle attack: An attacker sites between the sender and receiver and

sniffs any information being sent between two nodes. In some cases, attacker may

impersonate the sender to communicate with receiver or impersonate the receiver to reply

to the sender.

Gray-hole attack: This attack is also known as routing misbehavior attack which leads

to dropping of messages. Gray-hole attack has two phases. In the first phase the node

advertise itself as having a valid route to destination while in second phase, nodes drops

intercepted packets with a certain probability.

5.18 Mobility First of all, mobility management has to be taken into consideration while designing the

infrastructure itself for wireless mobile networks. Effective and efficient handoff is the key

factor enabling the mobile user to move seamlessly from one cell to another cell, from one

service area to another, and so on.

Mobility management features two tasks—location management and handoff

management—that enable mobile networks to locate roaming MSs for call delivery and

maintain connections as the MSs are moving around.

Location management enables the wireless network to discover the current point of

attachment of the MS and deliver calls. The first stage of location management is the location

registration (or location update). In this stage, the MS periodically notifies the network of its

new AP, allowing the network to authenticate the user and revise the user’s location profile.

The second stage is the call delivery, in which the wireless mobile network is queried for the

MS location profile and the current position of the MS is found.

Handoff primarily represents a process of changing some of the parameters of a channel

(frequency, time slot, spreading code, or a combination of them) associated with the current

connection in progress. The handoff process usually consists of two phases: the handoff

initialization phase and the handoff-enabling phase. In the handoff initialization phase, the

quality of the current communication channel is monitored in order to decide when to trigger

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 23

the handoff process. In the handoff execution phase, the allocation of new resources by a new

BS is initiated and processed. Poorly designed handoff schemes tend to generate very heavy

signaling traffic and thereby result in a dramatic decrease in quality of integrated service in

the wireless network.

Mobility management requests are often initiated either by a MS’s movement when it

crosses a cell boundary, or by a deteriorated quality of signal received on a currently

employed channel. With the anticipated increased penetration of wireless services, the next

generation of wireless mobile networks will provide an architectural basis to support a drastic

increase in traffic bandwidth. According to the IMT-2000 outline of ITU, a simultaneous

operation of high capacity pico cells, urban terrestrial microcells and macro cells, and large

satellite cells will be exploited in IMT-2000. Much more frequent handoffs will occur when

the size of the cell becomes smaller or there is a drastic change in the propagation condition

of the signal.

Mobility management should be given more careful consideration in next-generation

wireless mobile networks. Various handoff initiating criteria have been proposed recently. In

order to decide when to trigger the handoff, the quality of the current communication channel

is monitored. Handoff is a very rigorous process; therefore, unnecessary handoffs should be

avoided. If the handoff criteria are not chosen carefully, the call might be handed back and

forth several times between two neighboring BSs, especially when the MS is moving around

the overlapping region between the coverage area boundaries of the two BSs.

If the criteria are too conservative, then the call may be lost before the handoff can take

place. Based on the link status, the measurement process determines the need for handoff and

the new target cell for transfer. Since the propagation condition between the BS and the MS

is made up of the direct radio propagation paths (direct, reflection, refraction), the following

types of handoff-initiating criteria have been proposed:

Word error indicator: A metric that indicates whether the current burst was

demodulated properly in the MS.

Received signal strength indication: A measure of the received signal strength that

indicates useful dynamic range, typically between 80 and 100 dB.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 24

Quality indicator: An estimate of the “eye opening” for a radio signal, which is related

to the signal to interference and noise ratio, including the effects of dispersion. The

quality indicator has a narrow range (relating to the range of SIR from 5 dB to 25 dB).

In the design of a good handoff scheme, it is desirable that the blocking

probability for calls originated in a cell be minimized as much as possible. However,

from the user’s point of view, how to handle a handoff request is more important. If new

resources cannot be allocated in a timely fashion, the ongoing call has to face forced

termination, which is much more disastrous than the blocking of a new call.

In addition, attempts should be made to decrease the transmission delay of non–

real-time service calls as well as increase channel utilization in a fair manner. Therefore,

the handoff strategy for integrated service in next-generation wireless networks needs to

take different features of these services into account (i.e., the ideal handoff processes

have to be service dependent).

For example, transmission of real-time service is very sensitive to interruptions.

On the other hand, transmission delay of non–real time service does not have any

significant impact on the performance of service (i.e., non–real-time service is delay

insensitive). Therefore, a successful handoff without interruption is very important for

real-time services, but not so critical for non–real time services. In order to provide better

service for a MS with limited frequency spectrum, a wireless system must manage radio

resources efficiently.

5.19 Protocols Hybrid Protocols are

Zone Routing

The zone routing protocol (ZRP) is a hybrid of proactive and reactive protocols. It tries to

limit the scope of proactive search to the node’s local neighborhood. At the same time, global

search throughout the network can also be performed efficiently by querying selected nodes (and

not all the nodes in the network). A node’s local neighborhood is called a routing zone.

Specifically, a node’s routing zone is defined as the set of nodes whose minimum distance in

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 25

hops from the node is no greater than the zone radius. A node maintains routes to all the

destinations in the routing zone proactively. It also maintains its zone radius, and the overlap

from the neighboring routing zones.

To construct a routing zone, the node must identify all its neighbors first which are one

hop away and can be reached directly. The process of neighbor discovery is governed by the

neighbor discovery protocol (NDP), a MAC-level scheme. ZRP maintains the routing zones via a

proactive component called the intra-zone routing protocol (IARP) and is implemented as a

modified distance vector scheme. Thus, IARP is responsible for maintaining routes within the

routing zone. Another protocol called the inter-zone routing protocol (IERP) is responsible for

discovering and maintaining the routes to nodes beyond the routing zone. This process uses a

query-response mechanism on-demand basis. IERP is more efficient than standard flooding

schemes.

When a source node has data to be sent to a destination which is not in the routing zone,

the source initiates a route query packet. The latter is uniquely identified by the tuple -<source

node ID, request number>. This request is then broadcast to all the nodes in the source node’s

periphery. When a node receives this query, it adds its own ID to the query. Thus, the sequence

of recorded nodes presents a route from the source to the current routing zone. Otherwise, if the

destination is in the current node’s routing zone, a route reply is sent back to the source along the

reverse path from the accumulated record. A big advantage of this scheme is that a single route-

request can result in multiple route replies. The source can determine the quality of these

multiple routes based on such parameter(s) as hop count or traffic and choose the best route to be

used.

Fisheye State Routing

The fisheye state routing (FSR) protocol uses multilevel fisheye scopes to reduce the

routing update overhead in large networks. The key idea is to exchange link-state entries with the

neighbors with a frequency that depends on the distance to the destination. More effort is made

in collecting topological data that is more likely to be required soon. With the basic assumption

that nearby changes in network topology matter the most, FSR focuses its efforts on viewing the

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 26

nearby changes with the highest resolution and very frequently. The changes at distant nodes are

seen with a lower resolution and less frequently.

Landmark Routing (LANMAR) for MANET with Group

Landmark ad hoc routing (LANMAR) combines the features of FSR and landmark

routing. The major addition here is to use landmarks for each set of nodes that move together as

a group (e.g., a company of soldiers in a battlefield). This reduces the overall routing update

overhead. The nodes exchange the link-state information only with their neighbors, as in FSR.

Routes within a fisheye scope are accurate, and the routes to remote groups of nodes called

subnets are “handled” by the corresponding landmarks in the neighborhood. As the packet comes

closer to the destination, it eventually switches to the accurate route provided by the fisheye. A

modified version of FSR is used for routing.

The major difference between the two routing schemes is that in FSR the routing table

contains all the nodes in the network. On the other hand, in LANMAR, the routing table contains

only the nodes within the scope and the landmark nodes. This reduces the routing table size and

overhead of the update traffic and hence increases the scalability of the scheme. While relaying a

packet, the logical subnet for the destination is looked up and the packet is routed toward the

landmark node for that subnet. However, the packet need not pass through the landmark. For the

updates in the routing table, LANMAR uses a scheme similar to that in FSR. Nodes periodically

exchange the topological information with their immediate neighbors. In each update, a node

sends entries within its fisheye scope. A distance vector with information about all the landmark

nodes is also piggybacked onto this update.

Multipath Routing Protocols

Based on the route-discovery mechanism, routing protocols are classified as either

reactive, proactive, or hybrid protocols as discussed in previous sections. Similarly, based on the

number of routes discovered between source and destination, protocols can be either unipath or

multipath protocols. Multipath protocols aim at providing redundant paths to the destination. The

availability of redundant paths to the same destination increases the reliability and robustness of

the network. Providing multiple paths is beneficial, particularly in wireless ad hoc networks

where routes are disconnected frequently due to mobility of the nodes and poor wireless link

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 27

quality. However, multipath routing can lead to increased out-of-order delivery and resequencing

of packets at the destination along with increased collision.

Multipath routing protocols can also aid in secure routing against denial-of service

attacks by providing multiple routes between the nodes. Nodes can switch over to an alternate

route when the primary route has intermediate malicious nodes and appears to have been

compromised. Various unipath protocols discussed in earlier sections can discover multiple paths

between nodes. Diversity coding takes advantage of multiple paths for fault-tolerant

communication between nodes, where out of n paths available, m paths are used for transmitting

data and the remaining n − m paths are used for transmitting redundant information.

Multipath Routing protocol:

On-Demand Multipath Routing for Mobile Ad Hoc Networks

On-demand multipath routing is an extension of the DSR protocol. It exploits multipath

techniques in reducing the frequency of query floods used to discover new routes. It also

improves performance by providing all intermediate nodes in the primary (shortest) route with

alternate paths rather than providing only the source with alternate paths. Two multipath

extensions for DSR (MDSR) have been proposed; in both, DSR starts route discovery by

flooding the network using query messages. Each query message carries the sequence of hops it

passed through in the message header. After receiving a query packet, the destination node

replies with a reply packet that simply copies the route from the query packet and sends it back.

Each node maintains a route cache, where complete routes to desired destinations are

stored as learned from the reply packets. The destination node can receive many copies of the

flooded query messages. In the first MDSR, the destination replies to a set of query packets that

carry a source route that is link-wise disjoint from the primary source route. The primary source

route is the route taken by first query reaching the destination node. The source caches all routes

received in reply packets in its local route cache. When the primary route breaks, the remaining

shortest route is used.

The process continues still all the alternate routes are exhausted, and then a fresh route

discovery is initiated. Alternate routes are therefore provided only to the source since reply

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 28

packets sent by the destination node are addressed only to the source node. An intermediate link

failure on the primary route results in a rote error packet being sent to the source, which will then

use an alternate route. This leads to retransmissions of data packets already in transit from the

broken link.

To avoid this retransmission’s, in the second MDSR all intermediate nodes are provided a

disjoint alternate route so that in-transit data packets no longer face route loss. The destination

node now replies to each intermediate node in the primary route with an alternate disjoint route

to the destination. It is possible that not all intermediate nodes will get a different disjoint route

(especially in sparse networks), and there still may be temporary route loss due to link failures,

until an upstream node switches to an alternate route.

Thus, any intermediate node with an alternate path to the destination douses the error

packet. This continues till the source gets an error packet and has no alternate route resulting in

initiation of a new route discovery.

Ad Hoc On-Demand Distance Vector-Backup Routing

The adhoc on-demand distance vector–backing routing (AODV–BR) is a multipath

routing protocol which constructs routes on demand and uses alternate paths only when the

primary route is disrupted. This method utilizes a mesh arrangement to provide multiple alternate

paths to existing on-demand routing protocols without extra control message overhead.

Similar to its parent protocol AODV, this protocol also consists of two phases:

Route construction: Source initiates route discovery by flooding a route request

(RREQ) packet having a unique identifier so that intermediate nodes can detect and drop

duplicate packets. Upon receiving a non-duplicate RREQ, the intermediate node stores the

previous hop and the source node information in its route table. This process is also known as

backward learning. It then broadcasts the RREQ packet or sends a route reply (RREP) packet, if

it has a route to the destination. The destination node sends a RREP via the selected route when

it receives the first RREQ packet or subsequent RREQs that have a better route than the

previously replied route.

The mesh construction and the alternate paths are established during the route reply

phase. A node overhearing a RREP packet transmitted by a neighbor (on the primary route) but

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 29

not directed to it records that neighbor as the next hop to the destination in its alternate route

table. A node may receive numerous RREPs for the same route if the node is within the radio

range of more than one intermediate node of the primary route. The node then chooses the best

route among them and inserts it into the alternate route table. When the RREP packet reaches the

source, the primary route between the source and the destination is established and ready for use.

Nodes that have an entry to the destination in their alternate route table become part of the mesh

structure.

Split Multipath Routing

Split multipath routing (SMR) is an on-demand routing protocol that constructs

maximally disjoint paths between a given source destination. Multiple routes are established, and

data traffic is split into them to avoid congestion and facilitate efficient use of network resources.

These routes may not be of equal lengths. SMR like other on-demand routing protocols builds

multiple routes using request/reply cycles.

Caching and Multipath Routing Protocol

The caching and multipath routing protocol (CHAMP) makes use of temporal locality in

dropped packets and targets at reducing packet loss due to a route breakdown. Every node

maintains a small buffer for caching data packets that pass through it. When a downstream node

discovers a error in forwarding, an upstream node with the relevant data in its buffer and an

alternate route can retransmit the data. This approach can be useful only if nodes maintain

alternate routes to a destination. The main features of this protocol are therefore shortest

multipath route discovery and cooperative packet caching. Every node maintains a route cache

and a route request cache. A route cache is a list containing forwarding information to every

active destination. Each entry contains the destination identifier, distance to the destination, next

hop nodes to the destination, the last time, and the number of times each successor node was

used for forwarding. A route entry that has not been used for route lifetime is deleted. The route

request cache at a node is a list containing an entry for recent route request received and

processed.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 30

Neighbor-Table-Based Multipath Routing in Ad Hoc Networks

Neighbor-table-based multipath routing (NTBMR) is a mixed multipath routing protocol

that deals with regular topology changes in mobile ad hoc networks. In this scheme, multiple

routes need not be disjoint as in SMR. Theoretical analysis has revealed that for error-prone

wireless links, non-disjoint multipath routing has higher route dependability. In NTBMR every

node maintains a neighbor, which records its k-hop neighbor nodes. This scheme also consists of

route discovery and route maintenance. The principal mechanism here is construction of a

neighbor table and a route cache at every node. The routes in the neighbor table are used in the

construction of route cache and are also used to establish the lifetime of wireless links to assist in

route discovery.

5.20 Auto Configuration The nodes of a network need some mechanism to interchange messages with each other.

The TCP/IP protocol allows the different nodes from the network to communicate by associating

a distinct IP address to each node of the same network. In wired or wireless networks with an

infrastructure, there is a server or node which correctly assigns these IP addresses.

Mobile ad hoc networks, on the other hand, do not have such a centralized entity able to

carry out this function. Therefore, some protocol that performs the network configuration in a

dynamic and automatic way is necessary, which will utilize all the nodes of the network (or only

part of them) as if they were servers which manage IP addresses.

Due to the dynamic topology of mobile ad hoc networks (constant movement of the

nodes that can join and leave the network frequently and even simultaneously), auto-

configuration protocols are faced with various problems in guaranteeing the uniqueness of IP

addresses and in allowing network partitioning and merging.

To guarantee the correct functioning of the network, the protocols strive to achieve

the following objectives:

Assign unique IP addresses: Ensure that two or more nodes do not obtain the

same IP address.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 31

Function correctly: An IP address is only associated with a node for the time that

it is kept in the network. When a node leaves the network, its IP address should

then became available for association to another node.

Fix the problems derived from the loss of messages: In case of any node failure

or if message loss occurs, the protocol should operate quick enough to prevent

two or more nodes from having the same IP address.

Allow multi-hop routing: A node will not be configured with an IP address if

there aren’t any available in the whole network. Thus, if any node of the network

has a free IP address, it has to associate itself with the node which is requesting an

IP address, even though it is at two-hop of distance or more.

Minimize the additional packet traffic in the network: The protocol must

minimize the number of packets exchanged among the nodes in the auto-

configuration process. In other words, control packets traffic must cause as little

harm as possible to the data packet traffic, given that in the extreme case, the

network performance would decrease.

Verify the existence of competing petitions for an IP address: When two nodes

request an IP address at the same time, the protocol must carry out the pertinent

treatment so that the same IP address is not given to two nodes.

Be flexible to partitioning and merging of the mobile ad hoc network: The

protocol must be able to achieve the union of two different mobile ad hoc

networks as well as the possible partitioning into two networks.

Conduct synchronization: The protocol must adapt itself to the rapid changes of

the wireless network topology due to the frequent mobility of the nodes. The

synchronization is carried out periodically to ensure the configuration of the

network is as up to date as possible.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 32

Classification of Auto-Configuration Protocols

The auto-configuration protocols may be classified according to address management:

Stateful: The nodes know the network state, i.e., they keep tables with the IP addresses

of the nodes.

Stateless: The IP address of a node is managed by itself. Generally they create a random

address and perform a process of duplicated address detection steps to verify their

uniqueness.

Hybrid Protocols: They mix mechanisms from the previous ones to improve the

scalability and reliability of the auto-configuration. Their algorithms have a high level of

complexity.

5.21 Energy Efficient Communication Energy efficient communication in MANETs begins at the node. “In an ad hoc network,

nodes are dependent on each other and must cooperate to provide routing and other essential

services.” The energy spent running these services may be significant enough as to cause

disruption of service in the entire network if a death of even a few nodes occurs. “Because the

nodes are usually small, battery powered devices, energy management is a criticalissue for

practical deployment of ad hoc networks. The solution to prolonging the battery lifetime of

nodes and hence the useful life the network is making successful use of power save routing

protocols.

In conventional routing algorithms, which are unaware of an energy budget, connections

between two nodes are established through the shortest path possible. These algorithms may

however result in a quick depletion of the battery energy of the nodes along the most heavily

used routes in the network.” On the other hand, nodes using power saving routing protocols are

able to decide how much power a node needs at a certain time. Power-saving protocols work by

selecting intervals during which a node can put its interface into a low power sleep mode, with

minimal impact on overall network performance. An ad hoc node may function in several

different modes, or states of operation.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 33

The four primary modes are sending, receive, idle, and sleep. To be able to transmit or

receive, a node must transition to the idle state, which requires both time and energy. In its sleep

state, a node saves power by energizing only its most critical electrical components while

waiting for a connection request to be made. However, sending and receiving are not the

dominant source of energy consumption: being awake and ready to send or receive traffic.

Therefore, “to reduce the energy consumption of the network, it is necessary to find a way for

nodes to spend more time in the sleep state and less time awake in the idle state”.

5.22 Mobility Requirements

Mobile users encounter various mobile application scenarios that require special

planning. For example, a user might start using a mobile application while away from work by

connecting through the 3G network, then switch to the corporate Wi-Fi network when arriving at

work, and then switch back to 3G when leaving the building. You need to plan your environment

to support such network transitions and guarantee a consistent user experience. This section

describes the infrastructure requirements you need to meet to support mobile applications and

automatic discovery of mobility resources.

When you use automatic discovery, mobile devices use Domain Name System (DNS) to

locate resources. During the DNS lookup, first a connection is attempted to the fully qualified

domain name (FQDN) that is associated with the internal DNS record. If a connection cannot be

made by using the internal DNS record, a connection is attempted by using the external DNS

record. A mobile device that is internal to the network connects to the internal auto discover

Service URL, and a mobile device that is external to the network connects to the external auto

discover Service URL. External requests go through the reverse proxy.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 34

5.23 Question Bank PART – A

1. What is meant by congestion? How to reduce it?

2. What are the mobility requirements?

3. List out the features of Adhoc Network?

4. Explain Mobility in Adhoc Network?

5. Explain Security limit in Adhoc Network?

6. Explain mobile Agent and interoperability in middleware?

7. Explain Security and Eventing in middleware?

8. What are the mobility requirements?

9. What is meant by middleware?

10. List out application of middleware’s?

11. Define Garbage Collection.

12. Define Eventing.

www.Vidyarthiplus.com

www.Vidyarthiplus.com

Paavai Institutions Department of IT

UNIT-5 5. 35

PART – B (16 Marks)

1. Compare the reactive and proactive routing protocols.

2. Explain the properties of MANETs.

3. How does dynamic source routing handle routing? What is the motivation behind

dynamic source routing compared to other routing algorithms fixed networks?

4. Describe security problems in MANETs.

5. Explain destination sequence distance vector routing algorithm in MANETs.

6. What are the security threats to a MANET? Why a MANET faces grater security threats

than a fixed infrastructure networks?

7. Why is routing in multi-hop ad-hoc networks complicated? What are the special

challenges?

8. Explain in detail AODV routing algorithm for MANETS.

9. What is MANET? How is it different from cellular system? What are the essential

features of MANET? What are the applications of MANET?

10. What is mobile ad-hoc network? Explain in detail about MANETS.

11. What are the disadvantages of MANETS and explain in detail?

12. Explain mobile agent and interoperability in middleware?

13. Explain Security and Eventing in middleware?

14. Explain Garbage Collection?

15. Explain in detail about the service discovery middleware.

www.Vidyarthiplus.com

www.Vidyarthiplus.com