You are on page 1of 127

MOBILE COMPUTING

Answer Key

Introduction
Question & Answers

1/31/2012

Questions
3

Define Mobile Computing, its applications and limitations Define - Mobile Computing, Mobile Communications, Passive Computing, Ubiquitous networks, Mobile applications Define Spread Spectrum. Differentiate FHSS and DSSS Write short notes on DSSS and FHSS What is spread spectrum. Explain FHSS with a neat diagram. What is spread spectrum. Explain Direct Sequence Spread Spectrum with a neat diagram. Define multiplexing. Explain in detail the various methods of multiplexing available with neat diagram What is modulation? Explain the various methods available for digital modulation with neat diagrams. Explain the use of all the layers using the Simplified Reference Model of Communication Systems with a neat diagram.
1/31/2012

Definitions 1/1
4

Mobile Computing is an umbrella term used to describe technologies that enable people to access network services at any place, anytime, and anywhere. Mobile Communication Pervasive Computing - Pervasive means existing in all parts of a place or thing. The next generation of computing which takes into account the environment in which information and communication technology is used everywhere by everyone and at all times. Ubiquitous networks - A term that describes integration of computers into practically all objects in our everyday environment, endowing them with computing abilities Mobile applications 1/31/2012

Application of Mobile Computing


5

Emergency services
Flood Earthquake

For Estate Agents In courts In companies Stock Information Collection/Control Credit Card Verification Taxi/Truck Dispatch Electronic Mail/Paging
1/31/2012

Challenges and Limitations 1/3


6

Interference: Radio transmission cannot be protected against interference using shielding as this is done in coaxial cable or shielded twisted pair. Regulations and spectrum: Frequencies have to be coordinated, and unfortunately, only a very limited amount of frequencies are available Low bandwidth: Although they are continuously increasing, transmission rates are still very low for wireless devices compared to desktop systems. Local wireless systems reach some Mbit/s while wide area systems only offer some 10 kbit/s.
1/31/2012

Challenges and Limitations 2/3


7

High delays, large delay variation: A serious problem for communication protocols used in todays Internet (TCP/IP) is the big variation in link characteristics. In wireless systems, delays of several seconds can occur, and links can be very asymmetrical (i.e., the links offer different service quality depending on the direction to and from the wireless device). Applications must be tolerant and use robust protocols. Lower security, simpler to attack: Not only can portable devices be stolen more easily, but the radio interface is also prone to the dangers of eavesdropping. Wireless access must always include encryption, authentication, and other security mechanisms that must be efficient and simple to use.
1/31/2012

Challenges and Limitations 3/3


8

Shared medium: Radio access is always realized via a shared medium. Ad-hoc networking: Wireless and mobile computing allows for spontaneous networking with prior set-up of an infrastructure. However, this raises many new questions for research: routing on the networking and application layer, service discovery, network scalability, reliability, and stability etc.

Device

Fit more functionality into single, smaller device. Need power and energy efficient
1/31/2012

Spread Spectrum Overview


9

Spread Spectrum is a means of transmission in which the data sequence occupies a bandwidth in excess of the minimum bandwidth necessary to send it.

Effectively the signal is mapped to a higher dimension signal space The signal component in each direction is sqrt(E/N)

Signal spreading is done before transmission by using a spreading sequence. The same sequence is used at the receiver to retrieve the signal Spread Spectrum is most effective against interference (intentional or non-intentional) with fixed energy. Main commercial applications in wireless and GPS.

1/31/2012

Spread Spectrum Pros & Cons


10

Pros

Immunity from various noise and multipath distortion


 

Including jamming Only receiver who knows spreading code can retrieve signal

Can hide/encrypt signals Several users can share same higher bandwidth with little interference
Cellular telephones  Code division multiplexing (CDM)  Code division multiple access (CDMA)


Cons

More complex implementation


1/31/2012

Frequency Hopping Spread Spectrum (FHSS)


11

Carrier changes frequency (HOPS) according to a pseudorandom Sequence.


Pseudorandom sequence is a list of frequencies. The carrier hops through this lists of frequencies. The carrier then repeats this pattern. During Dwell Time the carrier remains at a certain frequency. During Hop Time the carrier hops to the next frequency. The data is spread over 83 MHz in the 2.4 GHz ISM band. This signal is resistant but not immune to narrow band interference.
1/31/2012

FHSS Transmitter and Receiver


12

1/31/2012

Direct Sequence Spread Spectrum (DSSS) 1/2


13

 Spread spectrum increases the bandwidth of the signal

compared to narrow band by spreading the signal. FHSS and DSSS.

 There are two major types of spread spectrum techniques:

FHSS spreads the signal by hopping from one frequency to another across a bandwidth of 83 Mhz. DSSS spreads the signal by adding redundant bits to the signal prior to transmission which spreads the signal across 22 Mhz. The process of adding redundant information to the signal is called Processing Gain . The redundant information bits are called Pseudorandom Numbers (PN).
1/31/2012

DSSS 2/2
14

 DSSS works by combining information bits (data signal) with

higher data rate bit sequence (pseudorandom number (PN)).

The PN is also called a Chipping Code (eg., the Barker chipping code) chipping code are called chips - the result- which is then transmitted.

 The bits resulting from combining the information bits with the

The higher processing gain (more chips) increases the signal's resistance to interference by spreading it across a greater number of frequencies. IEEE has set their minimum processing gain to 11. The number of chips in the chipping code equates to the signal spreading ratio. Doubling the chipping speed doubles the signal spread and the required bandwidth.
1/31/2012

DSSS Transmitter & Receiver


15

1/31/2012

FHSS Vs DSSS 1/2


16

DSSS is more susceptible to narrow band noise.


DSSS channel is 22 Mhz wide whereas FHSS is 79 Mhz wide.

The FCC regulated that DSSS use a maximum of 1 watt of transmitter power in Pt-to-Multipoint system.

 

DSSS costs less then FHSS FHSS can have more systems co-located than DSSS.
DSSS systems have the advantage in throughput

The Wi-Fi alliance tests for DSSS compatibility


No such testing alliance exists for FHSS
1/31/2012

FHSS Vs DSSS 2/2


17


 

DSSS generally has a throughput of 5-6 Mbps while FHSS is generally between 1-2 Mbps. Both FHSS and DHSS are equally insecure. DSSS has gained much wider acceptance due to its low cost, high speed and interoperability. This market acceptance is expected to accelerate.
FHSS advancement includes HomeRF and 802.15 (WPAN) (Bluetooth), however, it is expected to not advance into the enterprise.
1/31/2012

Multiplexing
18

Multiplexing describes how several users can share a medium with minimum or no interference. For wireless communication, multiplexing can be carried out in four dimensions: space, time, frequency, and code. In this field, the task of multiplexing is to assign space, time, frequency, and code to each communication channel with a minimum of interference and a maximum of medium utilization.

1/31/2012

Frequency Division Multiplexing


19

(FDM) describes schemes to subdivide the frequency dimension into several non-overlapping frequency bands
Separation

of the whole spectrum into smaller frequency bands A channel gets a certain band of the spectrum for the whole time

1/31/2012

Time Division Multiplexing


20

A more flexible multiplexing scheme for typical mobile communications is time division multiplexing (TDM). Here a channel is given the whole bandwidth for a certain amount of time, i.e., all senders use the same frequency but at different points in time. Again, guard spaces, which now represent time gaps, have to separate the different periods when the senders use the medium.

1/31/2012

Code Division Multiplexing


21

All channels use the same frequency at the same time for transmission. Separation is now achieved by assigning each channel its own code, guard spaces are realized by using codes with the necessary distance in code space, e.g., orthogonal codes. Implemented using spread spectrum technology Advantages:

The main advantage of CDM for wireless transmission is that it gives good protection against interference and tapping. Different codes have to be assigned, but code space is huge compared to the frequency space. Assigning individual codes to each sender does not usually cause problems. Bandwidth efficient No coordination and synchronization necessary Good protection against interference and tapping The main disadvantage of this scheme is the relatively high complexity of the receiver. A receiver has to know the code and must separate the channel with user data from the background noise composed of other signals and environmental noise. Additionally, a receiver must be precisely synchronized with the transmitter to apply the decoding correctly. To apply CDM, precise power control is required Lower user data rates

Disadvantage

1/31/2012

Modulation
22

digital modulation, - digital data (0 and 1) is translated into an analog signal (baseband signal). Digital modulation is required if digital data has to be transmitted over a medium that only allows for analog transmission.
amplitude

shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK

1/31/2012

Modulation Amplitude Shift Keying


23

Amplitude shift keying (ASK), is the most simple digital modulation scheme. The two binary values, 1 and 0, are represented by two different amplitudes. In the example, one of the amplitudes is 0 (representing the binary 0). This simple scheme only requires low bandwidth, but is very susceptible to interference. Effects like multi-path propagation, noise, or path loss heavily influence the amplitude. In a wireless environment, constant amplitude cannot be guaranteed, so ASK is typically not used for wireless radio transmission. The wired transmission scheme with the highest performance, namely optical transmission, uses ASK. Here, a light pulse may represent a 1, while the absence of light represents a 0.

1/31/2012

Modulation Frequency Shift Keying


24

A modulation scheme often used for wireless transmission is frequency shift keying (FSK) (see Figure 2.24). The simplest form of FSK, also called binary FSK (BFSK), assigns one frequency f1 to the binary 1 and another frequency f2 to the binary 0.

1/31/2012

Modulation Phase Shift Keying


25

Finally, phase shift keying (PSK) uses shifts in the phase of a signal to represent data. Figure 2.25 shows a phase shift of 180 or as the 0 follows the 1 (the same happens as the 1 follows the 0). This simple scheme, shifting the phase by 180 each time the value of data changes, is also called binary PSK (BPSK).

1/31/2012

26

Medium Access Control


Questions & Answers

1/31/2012

Medium Access Control


27

What is hidden terminal and exposed terminal problems? How are they handled in wireless networks? Why MAC protocol does not implement CSMA/CD? How the hidden terminal and fading problems are taken care? Explain the characteristics of Medium Access Control protocols. Explain ALOHA, PRMA, MACA, CSMA / CA, Polling Explain the following CSMA, MACA, DAMA, PRMA Define Pure ALOHA, Slotted ALOHA, CSMA/CD, CSMA/CA and MACA What is MACA? Explain in detail with a neat diagram. Explain in detail Multiple Access with Collision Avoidance with a neat diagram. What is Channel Allocation? Explain with suitable diagram Fixed Channel Allocation. What is multiple accesses? Define the group access, random access, controlled access and channelization Define Channelization, TDMA, FDMA and CDMA
1/31/2012

Hidden Terminal Problem


28

A and C cant see each other, both send to B RTS/CTS can help
Both

A and C would send RTS that B would see first B only responds with one CTS (say, echoing As RTS) C detects that CTS doesnt match and wont send
1/31/2012

Exposed Terminal Problem


29

B sending to A, C wants to send to D As C receives Bs packets, carrier sense would prevent it from sending to D, even though wouldnt interfere RTS/CTS can help
C

hears RTS from B, but not CTS from A C knows its transmission will not interfere with A 1/31/2012 C is safe to transmit to D

30

GSM
Questions & Answers

1/31/2012

GSM
31

Draw the GSM architecture and explain each block in detail. / In detail explain the functional architecture of a GSM system with a neat diagram./Explain functional architecture of a GSM system with a neat diagram. With a suitable diagram explain the role of GSM components BSC, MSC for mobile communications. Explain the cellular system and write about one cellular standard. Explain the concept of handover mechanisms in GSM in detail. / Handovers in GSM Systems Discuss the various types available with neat diagram./What is handover? Explain the various types of handover available with neat diagram. Explain the basic security services available in GSM systems using A3, A5, A8 algorithms with neat diagrams. Explain security of GSM in detail.

1/31/2012

Handover
32

If the mobile moves, the radio connection may be reestablished with a different base station without any interruption to user communication this is called handover There are two basic reasons for a handover
The

mobile station moves out of the range of a BTS load balancing by BSC or MSC

1/31/2012

4 types of handover
33

1 MS

2 MS

3 MS

4 MS

BTS

BTS BSC

BTS BSC MSC

BTS BSC MSC

1/31/2012

Handover Scenarios in GSM


34

Intra-cell handover:

Within a cell, narrow-band interference could make transmission at a certain frequency impossible. The BSC could then decide to change the carrier frequency (scenario 1). This is a typical handover scenario. The mobile station moves from one cell to another, but stays within the control of the same BSC. The BSC then performs a handover, assigns a new radio channel in the new cell and releases the old one (scenario 2). As a BSC only controls a limited number of cells; GSM also has to perform handovers between cells controlled by different BSCs. This handover then has to be controlled by the MSC (scenario 3). A handover could be required between two cells belonging to different MSCs. Now both MSCs perform the handover together (scenario 4).
1/31/2012

Inter-cell, intra-BSC handover:

Inter-BSC, intra-MSC handover:

Inter MSC handover:

Handover procedure (Intra MSC)


35

MS BTSold BSCold measurement measurement report result HO decision HO required

MSC

BSCnew

BTSnew

HO request resource allocation ch. activation ch. activation ack

HO command

HO command

HO command

HO request ack

HO access
Link establishment clear command clear complete clear command clear complete 1/31/2012 HO complete HO complete

Security Services in GSM


36

access control/authentication
 

user SIM (Subscriber Identity Module): secret PIN (personal identification number) SIM network: challenge response method voice and signaling encrypted on the wireless link (after successful authentication) temporary identity TMSI (Temporary Mobile Subscriber Identity) newly assigned at each new location update (LUP) encrypted transmission

confidentiality


anonymity
  

3 algorithms specified in GSM


A3 for authentication (secret, open A5 for encryption (standardized) A8 for key generation (secret, open interface)

secret: A3 and A8 available via the Internet interface) network providers can use stronger mechanisms 1/31/2012

GSM - authentication
37

mobile network Ki AC 128 bit A3 SRES* 32 bit SRES 32 bit SRES RAND 128 bit RAND

SIM RAND 128 bit A3 SIM 32 bit Ki 128 bit

MSC

SRES* =? SRES

SRES

Ki: individual subscriber authentication key

SRES: signed response 1/31/2012

GSM - key generation and encryption


38

mobile network (BTS) Ki AC 128 bit A8 cipher key BTS Kc 64 bit data A5 encrypted data RAND 128 bit RAND

MS with SIM RAND 128 bit A8 Ki 128 bit SIM

Kc 64 bit SRES data MS A5

1/31/2012

39

Wireless LAN
Questions & Answers

1/31/2012

Questions
40

What are the advantages and disadvantages of WLAN / Discuss at least two WLAN vulnerabilities Explain Bluetooth protocol in detail. \Write short note on Bluetooth protocol Write short note on security in Bluetooth. Compare and Contrast wired LANs with Wireless LANs Explain the location management requirements transparency of mobility, Security, Efficiency and Scalability and Identification. What is handoff? Explain with a suitable diagram HIPERLAN-2 reference model Explain with proper diagram Intra-EMAS-E/Intra-AP forward handover.
1/31/2012

Characteristics of wireless LANs


41

Advantages

very flexible within the reception area Ad-hoc networks without previous planning possible (almost) no wiring difficulties (e.g. historic buildings, firewalls) more robust against disasters like, e.g., earthquakes, fire - or users pulling a plug... typically very low bandwidth compared to wired networks (1-10 Mbit/s) many proprietary solutions, especially for higher bit-rates, standards take their time (e.g. IEEE 802.11) products have to follow many national restrictions if working wireless, it takes a vary long time to establish global solutions like, e.g., IMT-2000

Disadvantages

1/31/2012

7.1.1

How Does Bluetooth Work?


42

Short Range RF at 2.45 GHZ called ISM Uses Quick Frequency Hoping Packet Switched Protocol Transceiver has a unique 48 Bit Address Using IEEE 802 Standard Piconet Network Structure Ad-Hoc networking of up to 8 devices form a piconet. Each piconets master sets the FH behaviour. Up to 10 piconets can form a scatternet
1/31/2012

How Does Bluetooth Works?(cont.)


43

1/31/2012

How Does Bluetooth Works?(cont.)


44

More than one Piconet is a Scatternet Up to Eight Devices Allowed in a Piconet Each Piconet is Identified by a Different Frequency Hopping Sequence Connections can be made up to 10 meters or extended up to 100 meters Power Consumption is .3mA Supports Half-Duplex or Full-Duplex Time Division Duplex Scheme is used fo Full-Duplex

1/31/2012

Bluetooth protocol stack


Lets take a quick look at the Bluetooth stack

Software (on microcontroller)

Bluetooth radio module

1/31/2012

45

Bluetooth protocol stack


These (core) layers are always present: HCI: The Host Controller Interface layer provides a standard
communications protocol between the stack and the Bluetooth module. HCI communication packets can be transmitted using UART, RS232 or USB interface.

L2CAP The Logical Link Control and Adaptation Protocol layer allows multiple channels to share a single Bluetooth link. It also handles segmentation and assembly of long messages, group management and quality of service functionalities.

1/31/2012

46

Bluetooth protocol stack


These core layers are always present:
RFCOMM: The RFCOMM layer implements the functionalities of a virtual RS232 link. Most of the application Profiles uses RFCOMM as a means of transmitting and receiving data. SDP The Service Discovery Protocol layer provides functionalities to publish supported Bluetooth functionalities (SDP server), as well as for querying remote Bluetooth devices for supported functionalities (SDP client).

1/31/2012

47

Bluetooth protocol stack


The higher layers implement one or more bluetooth profiles with specific APIs:

Bluetooth audio Bluetooth printing Data access profiles (incl. TCP/IP over Bluetooth) Information transfer profiles (calendar, contacts sync.) Human Interface device profiles (mouse, keyboard,)

Overall, this is a lot of code! But many Bluetooth stack implementations exist, including open source stacks. E.g. BlueZ for Linux and Smart-Its for Atmel AVR chips.

1/31/2012

48

Bluetooth Security
49

Every bluetooth device has 4 entities for maintaining Security Bluetooth device address

48-bit address that is unique for each Bluetooth device and defined by IEEE 128-bit random number used for authentication purposes 8-128 bits in length that is used for encryption frequently changing 128-bit random or pseudo-random number that is made by the Bluetooth device itself
1/31/2012

Private authentication key

Private encryption key

Random number

Bluetooth security components & protocols


50

1/31/2012

51

Advantages of Wireless

Advantages of Wired

Easier to make changes to the network. Dont have to lay cables. Wireless LAN allows users to move around the covered area. A Wireless LAN can be relocated.

Wireless has limited bandwidth


Number of users is limited Available bandwidth per user is limited.

A wired LAN is more secure Wires can cover longer distances than wireless transmissions.
1/31/2012

Wired LAN Vs Wireless LAN


52

Contrast
802.3 (Ethernet) uses CSMA/CD, Carrier Sense Multiple Access with 100% Collision Detect for reliable data transfer 802.11 has CSMA/CA (Collision Avoidance)

Contrast They use specialized physical and data link protocols They integrate into existing networks through access points which provide a bridging function They let you stay connected as you roam from one coverage area to another They have unique security considerations They have specific interoperability requirements They require different hardware They offer performance that differs from wired LANs.
1/31/2012

Large differences in signal strengths Collisions can only be inferred afterward


 

Transmitters fail to get a response Receivers see corrupted data through a CRC error

53

Comparison Logically, impact should be minimal


Best-effort service model remains unchanged TCP and UDP can (and do) run over wireless, mobile

But, performance definitely is affected


TCP treats packet loss as a sign of congestion TCP tries to estimate the RTT to drive retransmissions TCP does not perform well under out-of-order packets

1/31/2012

Wireless ATM
54

Mobility extensions are added in the fixed ATM network. To support user mobility for a wireless network new mechanisms are needed and are fundamental, such as handover, routing, and location management. An important key feature is mobile QoS offered by the WATM as opposed with that of other technologies.

1/31/2012

THE NEED FOR WATM


55

New developments of wireless networks are needed to enable wireless technologies to interwork with existing wired networks.
In

order for ATM to be successful, it must offer a wireless extension, otherwise it cannot participate in the rapidly growing field of mobile communications.

Other wireless technologies are implemented in specific environments:


IEEE

802.11 only covers local area access methods. Bluetooth only builds up piconets. Mobile IP only works on the network layer.
1/31/2012

Handover
56

Procedure to hand over connection(s) from a mobile ATM terminal from one access point to another access point Support of an handover domain

several access points cover a certain area common handover protocol and strategy all access points and switches belong to one administrative domain multiple connection handover point-to-point and point-to-multipoint QoS support

Requirements

data integrity and security signaling and routing support high performance and low complexity
1/31/2012 8.27.1

Handover classes
57

Handover Classes

Hard handover: A wireless mobile terminal has a radio connection with only one AP at any time. Soft handover: Supports simultaneous communication of a wireless mobile terminal with more than one AP during the handover. Backward handover: The wireless mobile terminal notices, for example, a fading signal and initialises the handover to a new AP. The terminal continues to maintain the radio link while the handover is in process and switches over to a new AP after radio resources have been reserved and all entities involved are prepared for the handover. Hence the handover execution can be initiated via the old AP. Forward handover: Characterized by a wireless mobile terminal arriving at a new AP suddenly.
  

The handover can only be initiated after the terminal has associated itself with the new AP. In this case, the new AP has to initiate and control the handover from there after. This happens when the terminal suddenly loses its connection to the old AP (due to interference or a fast-moving terminal), so there is no time to perform a backward 1/31/2012 handover.

Handover scenarios
58

Intra-EMAS-E/ Intra-AP RT2 WMT

RT1 EMAS-E1 AP1

EMAS-N COS

EMAS-E2 RT3 AP2 RT4

Intra-EMAS-E/ Inter-AP Inter-EMAS-E/ Inter-AP

RT5

RT6

AP3

1/31/2012

FW handover - Intra-EMAS-E/Intra-AP
59

WMT

AP

EMAS-E

APCP_DisassocReq APCP_DisassocCnf APCP_AssocReq APCP_AssocCnf FW_HO_REQUEST APCP_EnquiryReq APCP_EnquiryRes FW_HO_RESPONSE

1/31/2012

8.35.1

HyperLAN 2 Introduction
60

 Two main standards families for Wireless Lan:


 IEEE 802.11 (802.11b, 802.11a, 802.11g...)  ETSI Hiperlan (Hiperlan Type 1, Type 2, HiperAccess, HiperLink...)

 HiperLAN Family
Description Freq. Range PHY Bit Rate Hiperlan 1 Wireless Ethernet 5GHz 23.5Mbps Hiperlan2 HiperAccess HiperLink Wireless ATM Wireless Local Wireless PointLoop to-Point 5GHz 5GHz 17GHz 6~54Mbps ~25Mbps ~155Mbps

1/31/2012 (data rate) (data rate)

Hiperlan2 System Overview


61

 Features
 5 GHz technology, up to 54 Mbit/s  Generic architecture supporting: Ethernet, IEEE 1394, ATM, 3G etc  Connection-oriented with QoS per conn.  Security - authentication & encryption  Plug-and-play radio network using DFS  Optimal throughput scheme

1/31/2012

HyperLAN 2 Reference Model 1/2


62

Control Plane CL MAC CAC PHY DLC


RRC ACF DCC

User Plane

EC

RLC MAC

HiperLAN Type 1 Reference Model

PHY

HiperLAN Type 2 Reference Model


MAC: Medium Access Sublayer EC: Error Control CAC: Channel Access Control Sublayer RLC: Radio Link Control PHY: Physical Layer RRC: Radio Resource Control DLC: Data Link Control Layer ACF: Association Control Function CL: Convergence Layer DCC: DLC Connection Control
1/31/2012

HyperLAN 2 Reference Model 2/2


63

The lowest layer, the physical layer, handles as usual all functions related to modulation, forward error correction, signal detection, synchronization etc. The data link control (DLC) layer contains the MAC functions, the RLC sublayer and error control functions Above the MAC DLC is divided into a control and a user part. This separation is common in classical connection-oriented systems such as cellular phones or PSTN. The user part contains error control mechanisms. The radio link control (RLC) sublayer comprises most control functions in the DLC layer

The association control function (ACF) controls association and authentication of new MTs as well as synchronization of the radio cell via beacons

The DLC user connection control (DCC or DUCC) service controls connection setup, modification, and release. Finally, the radio resource control (RRC) handles handover between APs and within an AP On top of the DLC layer there is the convergence layer. This highest layer of HiperLAN2 standardization may comprise segmentation and reassembly functions and adaptations to fixed LANs, 3G networks etc

1/31/2012

Location Management Requirement


64

Requirement
Transparency Security Efficiency

and Mobility

& Scalability Identification Inter-working and standards


Refer

Page No. 250 (Mobile Communications By Jochen H. Schiller)


1/31/2012

65

Mobile Network Layer


Questions & Answers

1/31/2012

Questions
66

Mobile IP.

Explain the functions of agents in mobile IP in OSI network layer. Explain tunneling and reverse tunneling concept of Mobile IP. Explain how agent discovery and registration is done during IP packet delivery in mobile IPs with neat diagrams / Explain the following basic functions in Mobile IP Agent Discovery and Registration

What are mobile agents and their applications and uses in mobile computing. / Briefly explain how mobile agents can be used for mobile clients (What support can a mobile agent give for mobile clients.) Explain with suitable diagram how the IP packet delivery is done in a wireless network. What is dynamic host configuration protocol? Explain its functions.

1/31/2012

Mobile IP
67

The goal of a mobile IP can be summarized as: supporting end-system mobility while maintaining scalability, efficiency, and compatibility in all respects with existing applications and Internet protocols.

1/31/2012

Mobile IP: Terminology


.68

Mobile Node (MN)


node

that moves across networks without changing its IP address with which MN is corresponding (TCP)

Correspondent Node (CN)


host

Home Agent (HA)


host

in the home network of the MN, typically a router registers the location of the MN, tunnels IP packets to the COA
1/31/2012

Terminology (contd.)
.69

Foreign Agent (FA)


host

in the current foreign network of the MN, typically a router forwards tunneled packets to the MN, typically the default router for MN

Care-of Address (COA)


address

of the current tunnel end-point for the MN (at FA

or MN) actual location of the MN from an IP point of view


1/31/2012

Mobility: Vocabulary
.70

home network: permanent home of mobile


(e.g., 128.119.40/24)

home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote

wide area network

Permanent address: address in home network, can always be used to reach mobile
e.g., 128.119.40.186

Correspondent node:

Source: Jim Kuroses slides


1/31/2012 Network Layer 4-70

Mobility: more vocabulary


.71

Permanent address: remains constant (e.g., 128.119.40.186)

visited network: network in which mobile currently resides (e.g., 79.129.13/24)

Care-of-address: address in visited network.


(e.g., 79,129.13.2) wide area network

correspondent: wants to communicate with mobile

Foreign agent: entity in visited network that performs mobility functions on behalf of mobile.
Source: Jim Kuroses slides
1/31/2012 Network Layer 4-71

IP Packet Delivery
72

1/31/2012

Mobility via Direct Routing


.73

correspondent forwards to foreign agent

foreign agent receives packets, forwards to mobile

visited network

home network
2 correspondent requests, receives foreign address of mobile 1
wide area network

3 4 mobile replies directly to correspondent Source: Jim Kuroses slides


1/31/2012 Network Layer 4-73

Mobility via Direct Routing: comments


.74

overcome triangle routing problem non-transparent to correspondent: correspondent must get care-of-address from home agent

What happens if mobile changes networks?

Source: Jim Kuroses slides


1/31/2012 Network Layer 4-74

Mobile IP
.75

RFC 3344 has many features weve seen:

home agents, foreign agents, foreign-agent registration, care-of-addresses, encapsulation (packet-within-apacket)

three components to standard:


agent discovery registration with home agent indirect routing of datagrams

Source: Jim Kuroses slides


1/31/2012 Network Layer 4-75

Mobile IP: agent discovery


agent advertisement: foreign/home agents advertise service by broadcasting ICMP messages (typefield =
9)
H,F bits: home and/or foreign agent R bit: registration required
0 type = 9 8 code = 0 =9 16 24 checksum =9 standard ICMP fields

router address

type = 16

length

sequence # RBHFMGV reserved bits mobility agent advertisement extension

registration lifetime

0 or more care-ofaddresses
1/31/2012 Source: Jim Kuroses slides

.76 Network Layer 4-76

Agent Advertisement
.77

HA/FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in home/foreign network MN reads a COA from the FA advertisement messages

1/31/2012

Mobile IP: registration example


.78 visited network: 79.129.13/24 home agent HA: 128.119.40.7 foreign agent COA: 79.129.13.2

ICMP agent adv.


COA: 79.129.13.2

Mobile agent MA: 128.119.40.186

registration req. registration req.


COA: 79.129.13.2 HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 9999 identification: 714 encapsulation format . COA: 79.129.13.2 HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 9999 identification:714 .

registration reply time


HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 4999 Identification: 714 encapsulation format .

registration reply
HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 4999 Identification: 714 .

Source: Jim Kuroses slides

1/31/2012 Network Layer 4-78

MN Registration
.79

MN signals COA to the HA via the FA HA acknowledges via FA to MN limited lifetime, need to be secured by authentication

1/31/2012

Tunneling and reverse tunneling


80

Reverse Tunneling Needed because of


Firewall Multicast TTL

1/31/2012

Tunneling
  

Home agent tunnels (encapsulates) packets to care-of address Tunnel source is the home agents address Tunnel destination is the care-of address IP within IP (other ways exist):

1/31/2012

81

Reverse tunneling (RFC 3024)


.82

FA tunnels packets to HA by encapsulation

MN sends packet to FA

home network
wide area network

1 2

3 HA forwards the packet to the CN

Adapted from Kuroses slide


1/31/2012

Mobile IP: Reverse tunneling


.83

Router accept often only topological correct addresses (firewall!)


a

packet from the MN encapsulated by the FA is now topologically correct

1/31/2012

Reverse tunneling
.84

Reverse tunneling does not solve


problems

with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing)

1/31/2012

Evolution Of DHCPv6


To boot the machines in a LAN, needs lot of network parameters to be configured in each machine. In order to avoid this manual process, all the network parameters are put in a server and when a machine in LAN is booting, it will contact the server for the configuration parameters. This is called BOOTP server. Later it is extended to DHCP with additional features. Generally called DHCP
1/31/2012


85

Dhcpv6 Concepts

86

What is DHCPv6 ?
 The Dynamic Host Configuration Protocol for IPv6 (DHCP) enables DHCP servers to pass configuration parameters such as IPv6 network addresses to IPv6 nodes.  DHCPv6 protocol Released in RFC 3315  This protocol is a stateful counterpart to "IPv6 Stateless Address Autoconfiguration" (RFC 2462).  Used separately or concurrently with the latter to obtain configuration parameters.

1/31/2012

DHCP Working
87

DHCP is based on a client/server model as shown in Figure 8.17. DHCP clients send a request to a server (DHCPDISCOVER in the example) to which the server responds. A client sends requests using MAC broadcasts to reach all devices in the LAN. A DHCP relay might be needed to forward requests across inter-working units to a DHCP server.

1/31/2012

Client initialization via DHCP


88

1/31/2012

89

Mobile Transport Layer


Questions & Answers

1/31/2012

Questions
90

Explain two features namely flow control and congestion control. Explain why traditional TCP features are failures in wireless network. Explain Indirect TCP with Mobile TCP How traditional TCP function with reference to sliding window concept. Describe snooping TCP. How it differs from indirect TCP? What are the advantages and disadvantages of each one? / Explain indirect TCP and Snooping TCP with neat diagrams.
1/31/2012

Traditional TCP
91

Congestion control
Slow


start Behavior TCP shows after congestion detection.


Congestion window
 

Sender calculates a congestion window for a receiver Exponential growth of the congestion window stops at congestion threshold  Further increase is linear

Flow control
Sliding

window
1/31/2012

Why traditional TCP is failure in Mobile Network


92

Standard TCP reacts with slow start if ACK are missing It is common for mobile network to miss the packets This results in degradation of performance.

1/31/2012

Classical TCP improvements


93

Indirect TCP Snooping TCP Mobile TCP

1/31/2012

94

Data Broadcasting
Questions & Answers

1/31/2012

Questions
95

What is communication asymmetry? Explain with suitable example. Discuss the different broadcast models. List its advantages and disadvantages. Discuss Dissemination based Data Delivery Using Broadcast Disks Explain unidirectional broadcast systems with reference to audio broadcast. Explain in detail Digital Video broadcasting with a neat diagram. Explain in detail the Digital Audio broadcasting with a neat diagram
1/31/2012

Broadcast or point-to-point access


96

Two fundamental information delivery methods for wireless data applications:

Point-to-point access: A logical channel is established between the client and the server. Broadcast: Data are sent simultaneously to all users in the broadcast area. It is up to the client to select the data it wants. Why broadcast?
Broadcast satisfies arbitrary number of users: A single broadcast of a data item can satisfy all the outstanding requests for that item at the same time. Broadcast satisfies the wireless environment: Mobile wireless environments are characterized by asymmetric communication. Data broadcast can take advantage of the large downlink capacity when delivering data to clients. Implemented without any additional cost: A wireless communication system essentially employs a broadcast component to deliver information. e.g. Server sends broadcast
information to find the cell-phone user.

1/31/2012

Broadcast system
97

Wireless broadcast data delivery:


to disseminate information to a large user community in a wireless asymmetric communication environment.

Asymmetric communication environment:


Systems are designed to deliver data from a few servers to a large number of mobile clients, but there is significantly more downlink bandwidth from servers to clients than in the opposite or uplink direction. Also, clients have low power reserves, while servers have plenty of power. Example:
 

news feeds and traffic information systems cable TV with set-top box

Special case: unidirectional distribution systems


high bandwidth from server to client downlink, but no bandwidth vice versa uplink.
1/31/2012

Communications Asymmetry
98

Network asymmetry

In many cases, downlink bandwidth far exceeds uplink bandwidth Large client population, few servers Small requests for info, large responses Again, downlink bandwidth more important Updates likely affect a number of clients

Client-to-server ratio

Data volume

Update-oriented communication

1/31/2012

Question and Answer


99

Question 1: What are the three types of broadcast models? Answer: Push based broadcast; On-demand (or pull based) broadcast; Hybrid broadcast. Question 2: Scheduling and indexing techniques are very important in wireless broadcast system, why? Answer: In wireless data system, access efficiency and power conservation are two critical issues. Scheduling technique provides more access efficiency, which concerns how fast a request is satisfied. Indexing technique helps reduce a mobile clients power consumption when it is accessing the data it wants.

1/31/2012

Three Types of broadcast delivery systems


100

Push-based broadcast:
The users cannot place requests directly to the server. The broadcast schedule should be determined based solely on the access probabilities.


The push-based model has already played an important role in our daily lives (e.g., the television programs) but, scheduling problem

On-Demand (Pull-based) broadcast:


The user can send a request to the server to tell what it is waiting for through a uplink channel.

Hybrid broadcast:
A combination of Push-based and Pull-based broadcast.

1/31/2012

Two Critical Issues in Wireless Broadcast System


101

Access efficiency: It concerns how fast a request is satisfied.


Solution: Scheduling Technique Power conservation: It concerns how to reduce a mobile clients power consumption when it is accessing the data it wants. Solution: Indexing Technique Two basic performance metrics used to measure access efficiency and power conservation for a broadcast system: Access time: The time elapsed between the moment when a query is issued and
the moment when it is satisfied.


Tune-in time: The time a mobile client stays active to receive the requested data
items.

1/31/2012

Data Scheduling
102

Key issue: how the server organize the data in the broadcast in
order that the clients can access the information efficiently in terms of the latency (access time) and the tune in time. Three categories:


Push-based scheduling (e.g. flat broadcast, probabilistic-based broadcast, broadcast disks, optimal scheduling, etc.) Pull-based scheduling (e.g. for equal-size items, for variable-size items, energy-efficient scheduling, etc.) Hybrid scheduling (adaptive scheduling)

1/31/2012

Data Scheduling
103

Key issue: how the server organize the data in the broadcast in
order that the clients can access the information efficiently in terms of the latency (access time) and the tune in time. Three categories:


Push-based scheduling (e.g. flat broadcast, probabilistic-based broadcast, broadcast disks, optimal scheduling, etc.) Pull-based scheduling (e.g. for equal-size items, for variable-size items, energy-efficient scheduling, etc.) Hybrid scheduling (adaptive scheduling)

1/31/2012

Push-based Data Scheduling


Broadcast Disks:
1) Order the pages from the hottest to coldest. 2) Partition the list of pages into multiple ranges. 3) Choose the relative frequency of broadcast for each of the disks. 4) Split each disk into a number of chunks. 5) Create the broadcast program by interleaving the chunks of each disk.
rel_feq(1)=4, rel_feq(2)=2, rel_feq(3)=1 LCM(4,2,1)=4 num_chunk(1)=1, num_chunk(2)=2, num_chunk(3)=4

1/31/2012

104

Push-based Data Scheduling


Empty slot problem:
when it is not possible to evenly divide the number of pages (in a disk) into the required number of chunks.


Complementary approach:
to move some pages which are located near the end of a broadcast cycle to those empty slots which occur before those pages.
After complementary approach

1/31/2012

105

DVB-S Satellites Multipoint Distribution System DVB-C Cable Terrestrial Receiver DVB-T Integrated Receiver-Decoder

SDTV EDTV HDTV

Multimedia PC

B-ISDN, ADSL,etc. DVD, etc.

DVB DIGITAL VIDEO BROADCASTING STANDARDS

What is DVB ?
107

DVB (Digital Video Broadcasting) is a set of international open standards for digital television DVB standards are publicly available DVB standards are used in Europe;

1/31/2012

DVB generalities
108

DVB standards define the physical layer and data link layer of the distribution system DVB standards are based on MPEG-2 and MPEG-4 standards and all data is transmitted in MPEG Transport Streams most important DVB standards are:

for satellite TV: DVB-S, DVB-S2 for terrestrial (aerial) TV: DVB-T, DVB-T2 for cable TV: DVB-C, DVB-C2 for handheld devices TV: DVB-H, DVB-SH

DVB has a conditional access system (DVB-CA) through Common Scrambling Algorithm (DVB-CSA) and a physical Common Interface (DVBCI)
1/31/2012

DAB and DVB


109

Digital Audio Broadcasting In service 1996

Digital Video Broadcasting In operation in Jan 2001 Australia and Europe

Specifications:


  

Transmits 6-10 CD quality audio channels (data-rate: 2.304 Mbit/s) 1.5 MHz bandwidth 192 - 1536 carriers depending on frequency Transmit with OFDM signal

Specifications:


   

Transmits MPEG-2 compressed video (same format as used for DVD players) Data rates up to 31 Mbps will replace the current analog system by around 2008 sufficient to support High Definition Television. Transmit OFDM signal
1/31/2012

Physical layer of DAB and DVB OFDM (Orthogonal


Frequency Division Multiplexing) 5 subcarriers sinc (sin(x)/x) frequency response overlap in the frequency domain The thick black line: the combined response Circles: signal seen by the receiver Receiver (FFT): Discrete frequency samples the peaks Orthogonality no ICI
Advantages of OFDM:
Strong multipath tolerance: no ISI Spectrally Efficient Each sub-carrier is independent: no ICI
1/31/2012 110

DAB Transmitter
111

Service Information Multiplex Information

FIC

Transmission Multiplexer Audio Audio Services Encoder Channel Coder MSC Multiplexer

OFDM

Transmitter

Radio Frequency
FIC: Fast Information Channel MSC: Main Service Channel OFDM: Orthogonal Frequency Division Multiplexing 1/31/2012

Data Services

Packet Mux

Channel Coder

DAB Receiver
112

(partial) MSC Tuner OFDM Demodulator FIC Independent Data Service Channel Decoder Audio Decoder Audio Service

Packet Demux Control Bus Controller

User Interface
1/31/2012

113

Mobile Ad hoc Networks (MANETs)


Questions & Answers

1/31/2012

Questions
114

What is mobile adhoc networks? Explain at least two applications for which mobile adhoc networks are suitable. Explain the basic functioning of Adhoc networks with a neat diagram Define mobile adhoc network. Explain the properties and applications of MANET Write about adhoc networks and routing protocols used. Explain table driven routing algorithm of MANET Explain routing in adhoc networks using DSDV, DSR and alternative metrics with neat diagrams.
1/31/2012

115

Support for mobility


Questions & Answers

1/31/2012

Questions
116

Explain WAP architecture with diagram. / Explain Wireless Application Protocol architecture. Give mobile computing architecture for a mobile device. Explain at least five services provided in wireless application protocol

1/31/2012

117

Miscellaneous
Questions & Answers

1/31/2012

Questions
118

What are six contributions for saving energy in mobile computing? Explain briefly at least four of them. How is energy conservation to be done in access protocol for mobile computing and communication (Transmission Scheduling Protocols & Reception Scheduling Protocols) What is disconnected operation and how it is managed in CODA FS? Explain the features and functions of Sync ML with suitable diagram.
1/31/2012

One Slide Case Study: Coda


119

Coda: file system developed at CMU that supports disconnected operation Cache/hoard files and resolve needed updates upon reconnection Replicate servers to improve availability What data items (files) do we hoard?

User selects and prioritizes Hoard walking ensures that cache contains the most important stuff Often, when connected

When and how often do we perform hoarding?

1/31/2012

Coda (2)
120

(OK, two slides) How do we deal with cache misses?

If disconnected, cannot

How do we reconcile the cached version of the data item with the version at the server?

When connection is possible, can check before updating When disconnected, use local copies Upon reconnection, resolve updates If there are hard conflicts, user must intervene (e.g., its manualrequires a human brain)

Coda reduces the cost of checking items for consistency by grouping them into volumes If a file within one of these groups is modified, then the volume is marked modified and individual files within can be checked
1/31/2012

121

More Slides

1/31/2012

Cellular Radio Network Architecture


122

Roaming Radio base station Switching and routing

Home network

Interconnect

Other Networks (GSM, fixed, Internet, etc.)

Visited network
1/31/2012

Direct Sequence Spread Spectrum (DSSS) 1/3


123

The DSSS encoder spreads the data across a broad range of frequencies using a mathematical key. The receiver uses the same key to decode the data.

Each bit represented by multiple bits using spreading code In proportion to number of bits used 10 bit spreading code spreads signal across 10 times bandwidth of 1 bit code Combine input with spreading code using XOR Input bit 1 inverts spreading code bit Input zero bit doesnt alter spreading code bit Data rate equal to original spreading code

Spreading code spreads signal across wider frequency band


One method:

Performance similar to FHSS


1/31/2012

Frequency Hopping Spread Spectrum (FHSS)


124

For frequency hopping spread spectrum (FHSS) systems, the total available bandwidth is split into many channels of smaller bandwidth plus guard spaces between the channels. Transmitter and receiver stay on one of these channels for a certain time and then hop to another channel. This system implements FDM and TDM. The pattern of channel usage is called the hopping sequence, the time spend on a channel with a certain frequency is called the dwell time. FHSS comes in two variants, slow and fast hopping
1/31/2012

Glossary of 802.11 Wireless Terms


125

Station (STA): A computer or device with a wireless network interface. Access Point (AP): Device used to bridge the wireless-wired boundary, or to increase distance as a wireless packet repeater. Ad Hoc Network: A temporary one made up of stations in mutual range. Infrastructure Network: One with one or more Access Points. Channel: A radio frequency band, or Infrared, used for shared communication. Basic Service Set (BSS): A set of stations communicating wirelessly on the same channel in the same area, Ad Hoc or Infrastructure. Extended Service Set (ESS): A set BSSs and wired LANs with Access Points that appear as a single logical BSS.

1/31/2012

Glossary of 802.11 Wireless Terms, cont.


126

BSSID & ESSID: Data fields identifying a stations BSS & ESS. Clear Channel Assessment (CCA): A station function used to determine when it is OK to transmit. Association: A function that maps a station to an Access Point. MAC Service Data Unit (MSDU): Data Frame passed between user & MAC. MAC Protocol Data Unit (MPDU): Data Frame passed between MAC & PHY. PLCP Packet (PLCP_PDU): Data Packet passed from PHY to PHY over the Wireless Medium.
1/31/2012

Overview, 802.11 Architecture


127

ESS Existing Wired LAN STA STA

AP STA Infrastructure Network STA Ad Hoc Network BSS STA BSS

AP BSS STA

STA BSS STA Ad Hoc Network

1/31/2012

You might also like