Professional Documents
Culture Documents
IT6601 Uw PDF
IT6601 Uw PDF
UNIT – I
Unit - I
INTRODUCTION
*Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning Pvt. Ltd, New Delhi
2
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Basic Concepts
Mobile Handsets, Wireless Communications, and server
applications
Cell Phone System
Types of Telecommunication Networks
Computer Networks
Controller Area Networks (CANs)
Network is used to connect the different components of an embedded controller. Eg,
Automobiles industry
LANs - private owned, building or campus operate at 1 Gbps
Internetworks – several LANs connected
LAN Architecture – topologies (ring, mesh..)
3
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Basic Concepts
Components of a wireless communication system
Transmitter, receiver, filter, antenna, amplifier, mixers
Wireless Networking Standards (Table1.1)
ITU, IEEE and ISO
IEEE 802.11 standards (a,bc,d,e,f…u)
WLAN Architecture
Components ( Access point, bridge, and LAN card)
Applications
Campus WLANs
Streamlining inventory management
Providing LAN
WLAN connectivity to geographically dispersed computers
Advantages of wireless LAN over wired LAN
Mobility
Simplicity and speedy deployment
4
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
5
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
7
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Why Go Mobile?
8
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Mobile Computing
Vs
Wireless Networking
9
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
10
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
12
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
15
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Wireless Computing
Nomadic Computing
Mobile Computing
Computing Ubiquitous Computing
Pervasive Computing
Invisible Computing
16
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
MOBILE COMPUTING
• Mobile computing can be defined as a
computing environment over physical
mobility.
• The user of a mobile computing
environment will be able to access data,
information or other logical objects from
any device in any network while on the
move.
17
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
20
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
21
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
• Bearer Mobility:
– User should be able to move from one bearer to
another and use the same service.
– Example could be a user was using a service
through WAP bearer in his home network in
Bangalore. He moves to Coimbatore, where WAP
is not supported, he switch over to voice or
SMS(Short Message Service) bearer to access the
same application.
25
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
• Device Mobility:
– User should be able to move from one
device to another and use the same service.
– Example could be sales representatives
using their desktop computer in home
office. During the day while they are on the
street they would like to use their Palmtop
to access the application.
26
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
28
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
• Host Mobility:
– The user device can be either a client or
server.
– When it is a server or host, some of the
complexities change.
– In case of host mobility the mobility of IP
needs to be taken care of.
29
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
• Laptops
• Palmtops
• PDAs
• Cell phones
• Pagers
• Sensors
30
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Apple’s Newton
1987
31
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
The Palm
1990
32
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Motorola Marco
• Newton OS 1.3
• 4MB ROM
• 1995 • 687KB Flash RAM
• 320x240 Monochrome LCD resistive
touchscreen
• RS422 serial port
• Localtalk support
• 1 PCMCIA Slot (5V or 12V)
• 1 Sharp ASK infrared port
• 4 AA batteries, rechargeable NiCd
batteries may be used
• First released January 1995
• It weighs 1.8 pounds and is 7.5 inches
high, 5.8 inches wide and 1.4 inches deep
1995 • Street price: USD 900-1400
33
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Motorola Envoy
1996
34
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
The Pocket PC
1998
35
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
1996
36
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
1998
37
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
1999
38
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
The Tablet PC
Fujitsu Stylistic 2300/3400
2002
39
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Laptops: 1991
Notebooks: 1996
Netbooks: 2006
40
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
41
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
42
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
43
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
44
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Http://ww.via-pc.com
2007
45
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Wireless Helmet?
46
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
47
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
48
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
http://www.canesta.com
49
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Today
Andriod
The iphone
MyVu
The iPad
Smart Phones
51
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Smart Phones
2009
2010-2011
2010
Microsoft: Soon
54
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
55
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Application Structure
Ethernet Ethernet
Distributed DB
Database
Mobile Station
Distributed
Database
Communication path Client X 56
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Main Office
Content Provider
ATM
Internet
Radio/Infrared
DAB: Digital Audio Broadcast
RDS/TMC: Radio Data System/ Traffic
Infrastructure Message Channel
57
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
IMT2000/
UMTS
Packet Networks Modacom
Mobitex
Circuit Switched Networks Tetra
Radio-LAN
Local Networks IEEE 802.11/ MBS
Hiperlan
IR-LAN
59
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Used Acronyms
60
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
61
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
A B C
62
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
A B C D
63
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
A B C
64
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Classification of
wireless MAC protocols
65
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Fixed-assignment schemes
• TDMA – Time Division Multiple Access
67
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
TDMA
• Each user transmits data on a time slot on
multiple frequencies
• A time slot is a channel
• A user sends data at an accelerated rate
(by using many frequencies) when its
time slot begins
• Data is stored at receiver and played back
at original slow rate
68
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
TDMA Operation
• Efficiency of TDMA frame:
bOH - overhead bits per frame
N r - number of reference bursts per frame
N t - number of traffic bursts per frame
br - number of overhead bits per reference burst
bp - number of overhead bits per preamble per slot
bg - number of equivalent bits in each guard time interval
T f - frame duration
Rrf - bit rate of the radio-frequency channel
bOH N r br N t bp N t N r bg
btotal T f Rrf
b
f 1 OH 100%
b total
70
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Advantages of TDMA
• Flexible bit rate
• No frequency guard band required
• No need for precise narrowband filters
• Easy for mobile or base stations to initiate and
execute hands off
• Extended battery life
• TDMA installations offer savings in base station
equipment, space and maintenance
• The most cost-effective technology for upgrading a
current analog system to digital
71
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
72
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
FDMA
• Similar to broadcast radio and TV, assign a
different carrier frequency per call
• Modulation technique determines the
required carrier spacing
• Each communicating wireless user gets his/her
own carrier frequency on which to send data
• Need to set aside some frequencies that are
operated in random-access mode to enable a
wireless user to request and receive a carrier
for data transmission
73
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
74
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
FDMA Operation
f 2 guard
• Number of FDMA Channels N
c
f - total spectrum
guard - guard band
c - channel bandwidth
guard 10kHz
c 30kHz
12.5MHz 2 10kHz
N 416
30kHz
75
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Advantages of FDMA
• If channel is not in use, it sits idle
• Channel bandwidth is relatively narrow (30kHz)
• Simple algorithmically, and from a hardware
standpoint
• Fairly efficient when the number of stations is small
and the traffic is uniformly constant
• Capacity increase can be obtained by reducing the
information bit rate and using efficient digital code
• No need for network timing
• No restriction regarding the type of baseband or type
of modulation 76
Frequency vs Time
Frequency
Frequency
78
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
CDMA Operation
• Spread Spectrum Multiple Access Technologies
80
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Advantages of CDMA
• Many users of CDMA use the same frequency,
TDD or FDD may be used
• Multipath fading may be substantially reduced
because of large signal bandwidth
• No absolute limit on the number of users
• Easy addition of more users
• Impossible for hackers to decipher the code sent
• Better signal quality
• No sense of handoff when changing cells
81
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
82
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
• ALOHA
• CSMA
83
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
84
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Pure ALOHA
• In pure ALOHA, frames are transmitted at
completely arbitrary times.
85
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Collisions
86
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
87
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
88
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Slotted Aloha
89
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
90
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
• Simple.
• But, poor utilization…
– When?
91
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
92
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
CSMA
CSMA Protocol
Packet
ready
Channel
Busy?
yes
no
transmit
delay packet
wait for a transmission
round-trip time k times
94
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
CSMA (cont’d)
• Collisions can occur only when 2 or
more stations begin transmitting
within short time.
• If station transmits and no collisions
during the time leading edge of
frame propagates to farthest station,
then NO collisions.
95
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
CSMA Flavors
• After detecting carrier, a station can persist trying to
transmit after the channel is idle again.
• 1-persistent CSMA (IEEE 802.3)
– If medium idle, transmit; if medium busy, wait until idle; then
transmit with p=1.
– If collision, waits random period and starts again.
• Non-persistent CSMA: if medium idle, transmit; otherwise
wait a random time before re-trying.
– Thus, station does not continuously sense channel when it is in
use.
• P-persistent: when channel idle detected, transmits packet in the
first slot with p.
– Slotted channel, i.e., with probability q = p-1, defers to next
slot. Michael College of Engineering & Technology 96
Fatima
Fatima Michael College of Engineering & Technology
CSMA vs Aloha
CSMA/CD
• CSMA with collision detection.
• Problem: when frames collide, medium
is unusable for duration of both
(damaged) frames.
• For long frames (when compared to
propagation time), considerable waste.
• What if station listens while
transmitting?
98
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
CSMA/CD Protocol
1. If medium idle, transmit; otherwise 2.
2. If medium busy, wait until idle, then
transmit with p=1.
3. If collision detected, transmit brief
jamming signal and abort transmission.
4. After aborting, wait random time, try
again.
99
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
CSMA/CD Performance
100
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Ethernet
• IEEE 802. family.
• Standards for LANs and MANs.
• Ethernet defined in the IEEE 802.3
standard.
• PHY, MAC, and LLC.
102
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
103
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
MACA
RTS
A B
CTS D
C
• Any station that hears the RTS message, defers all communication
for some time until the associated CTS message has been finished.
• A CTS message defers communication for the duration of the time
indicated in the CTS message.
• When A is transmitting data, C can go ahead and access the
channel.
• What all could go wrong here ?
104
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
105
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Exponential Back-Off
• RTS and CTS slot times (defined to be 30 bytes) form the
basic slot size.
• If CTS is not heard, a station chooses a time that is
uniformly distributed between 1 and BO (for Back-Off).
What is BO ?
• If a CTS message is received then BO is set to BOmin .
• If a CTS is missed, then, if the previous BO was BOold, the
new BO, BOnew is set to BOnew = Min ( 2 x BOold, BOmin).
• BOmin and BOmax represent the minimum and maximum
back-off intervals.
106
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Questions ?
UNIT – II
Unit - II
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Performance.
*Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning Pvt. Ltd, New Delhi
2
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
3
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
4
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
IP Overview (1/3)
IP Addressing :
Dotted Decimal Notation: 32 bits (4x8) used to
represent IPv4 addresses - 192.19.241.18
Network Prefix and Host Portions: p - prefix, h -
host, p + h = 32. If p = 24 then h = 32 - 24 = 8.
Using above address the network prefix will be
192.19.241 and host will be 18. For those of you
familiar with subnet masks, “p” represents the
number of 1’s in the subnet mask. If p = 24, subnet
mask is 255.255.255.0, if p = 26, subnet mask is
255.255.255.192.
5
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
IP Overview (2/3)
IP Routing:
Network prefix is used for routing. Routing tables are used to look
up next hop and the interface on the router that is to be used.
If two subnet masks/prefixes fit the address, the one with the
largest prefix is chosen for routing. E.g., a router with the
following 3 entries in its table: 7.7.7.99/32 (p=32 host specific)
and 7.7.7.0/24 (0<p<32 network prefix) and 0.0.0.0/0 (p=0 default)
will use entry 2 for an IP packet with destination 7.7.7.1 and entry
3 for destination 192.33.14.12.
6
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
IP Overview (3/3)
Domain Name System (DNS): used to translate a host name to an IP
address. A host sends a query to a server to obtain the IP address of a
destination of which it only has the host name.
Link Layer Addresses - Address Resolution Protocol (ARP):
Once a host has the IP address of a destination it then needs to finds
its layer 2 address or the layer 2 address of the next hop on the path.
A broadcast message is sent and the targeted host responds with its
layer 2 address.
A proxy ARP is a response by a node for another node that cannot
respond at the time the request is made (e.g. the node is a mobiel
node and not on its host net at the time, its home agent will respond
in its stead).
A gratuitous ARP, is a reply to no ARP request, used by a node that
just joins the network and wants to make its address known. Can be
used by a mobile node upon its return to its home net.
7
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
9
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Requirements to Mobile IP
Transparency
mobile end-systems keep their IP address
continuation of communication after interruption of link possible
point of connection to the fixed network can be changed
Compatibility
support of the same layer 2 protocols as IP
no changes to current end-systems and routers required
mobile end-systems can communicate with fixed systems
Security
authentication of all registration messages
Efficiency and scalability
only little additional messages to the mobile system required
(connection typically via a low bandwidth radio link)
world-wide support of a large number of mobile systems in the
whole Internet
Fatima Michael College of Engineering & Technology 10
Fatima Michael College of Engineering & Technology
Mobile IP Terminology
Mobile Node (MN)
system (node) that can change the point of connection to the
network without changing its IP address
Home Agent (HA)
system in the home network of the MN, typically a router
registers the location of the MN, tunnels IP datagrams to the COA
Foreign Agent (FA)
system in the current foreign network of the MN, typically a router
forwards the tunneled datagrams to the MN, typically also the
default router for the MN
Care-of Address (COA)
address of the current tunnel end-point for the MN (at FA or MN)
actual location of the MN from an IP point of view
can be chosen, e.g., via DHCP
Correspondent Node (CN)
communication partner 11
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Properties of COA
A care-of address is an IP address associated with
mobile node that is visiting a foreign link:
A care-of address is specific to the foreign link currently
being visited by a mobile node
Generally changes every time the mobile node moves from
one foreign link to another
No Mobile IP-specific procedures are needed in order to
deliver packets to a care-of address
Is used as the exit-point of a tunnel from the home agent
toward the mobile node
Is never returned by DNS when another node looks up the
mobile node’s hostname
12
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
COA
COA
router
home router MN
FA
network HA
foreign
Internet network
CN router
3.
router
home router MN
2. FA
network HA
4.
foreign
Internet network
1.
CN router
13
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Types of COA
A foreign agent care-of address is an IP address of a foreign
agent which has an interface on the foreign link being visited
by a mobile node. Can be shared by many mobile nodes
simultaneously
A collocated care-of address is an IP address temporarily
assigned to an interface of the mobile node itself. The
network-prefix of a collocated care-of address must equal the
network-prefix that has been assigned to the foreign link being
visited by a mobile node. This type of c/o address might be
used by mobile node in situations where no foreign agents are
available on a foreign link. A collocated c/o address can be
used by only one mobile node at a time
14
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Mobile IP Features
Allows a host to be reachable at the same
address, even as it changes its location
makes it seem as one network extends over
the entire Internet
continuous connectivity, seamless roaming
even while network applications are running
fully transparent to the user
15
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Example network
HA
MN
router
end-system router
16
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
18
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
receiver
19
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Route Optimization
Triangle Routing: tunneling in its simplest form has all packets go to
home network (HA) and then sent to MN via a tunnel.
This involves two IP routes that need to be set-up, one original and
the second the tunnel route.
Causes unnecessary network overhead and adds to the latency.
Route optimization: allows the correspondent node to learn the current
location of the MN and tunnel its own packets directly. Problems arise
with
mobility: correspondent node has to update/maintain its cache.
authentication: HA has to communicate with the correspondent
node to do authentication, i.e., security association is with HA not
with MN.
21
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Change of FA
packets on-the-fly during the change can be
lost
new FA informs old FA to avoid packet loss,
old FA now forwards remaining packets to
new FA
this information also enables the old FA to
release resources for the MN
22
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
data data
MN changes
location
registration registration
update
ACK
data
data data
warning
update
ACK
data
data
t
23
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
24
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
1. MN sends to FA
3 2. FA tunnels packets to HA
CN by encapsulation
3. HA forwards the packet to the
receiver (standard case)
receiver
25
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
26
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
DHCPDISCOVER
server client
client relay
27
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
selection of configuration
DHCPREQUEST DHCPREQUEST
confirmation of
(reject) (options)
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
28
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
DHCP characteristics
Server
several servers can be configured for DHCP, coordination not
yet standardized (i.e., manual configuration)
Renewal of configurations
IP addresses have to be requested periodically, simplified
protocol
Options
available for routers, subnet mask, NTP (network time
protocol) timeserver, SLP (service location protocol)
directory, DNS (domain name system)
Big security problems!
no authentication of DHCP information specified
29
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Mobile IP Summary
Allows node mobility across media of similar or dissimilar types
Uses the Mobile Node’s permanent home address when it
changes its point of attachment to the Internet
Not requires any hardware and software upgrades to the
existing, installed base of IPv4 hosts and routers – other than
those nodes specifically involved in the provision of mobility
services
Mobile Node must provide strong authentication when it
informs its Home Agent of its current location
Uses tunneling to deliver packets that are destined to the Mobile
Node’s home address
3 main entities: Mobile Nodes, Foreign Agents and Home
Agents
3 basic functions: Agent Discovery, Registration, Packet Routing
30
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Origins of TCP/IP
Transmission Control Protocol/Internet Protocol
(TCP/IP)
Resulted from a coordinated effort by the U.S. Department
of Defense (DOD)
Advanced Research Projects Agency (ARPA)
Charged with creating a wide area network (WAN)
Results were TCP/IP and ARPANET
DOD funded two projects
The adaptation of TCP/IP to work with UNIX
The inclusion of the TCP/IP protocol with Berkeley UNIX
(BSD UNIX)
31
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Overview of TCP/IP
Reliable, full-duplex, connection-
oriented, stream delivery
Interface presented to the application
doesn’t require data in individual packets
Data is guaranteed to arrive, and in the
correct order without duplications
Or the connection will be dropped
Imposes significant overheads
32
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
33
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
34
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
TCP/IP Architecture
Application TELNET FTP SMTP DNS SNMP DHCP
Presentation
Session
RIP
IGMP ICMP
ARP
Data link
Physical Ethernet Token Bus Token Ring FDDI
35
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Application Layer
Protocols at the TCP/IP Application layer include:
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Network File System (NFS)
Simple Mail Transfer Protocol (SMTP)
Terminal emulation protocol (telnet)
Remote login application (rlogin)
Simple Network Management Protocol (SNMP)
Domain Name System (DNS)
Hypertext Transfer Protocol (HTTP)
36
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Transport Layer
Performs end-to-end packet delivery,
reliability, and flow control
Protocols:
TCP provides reliable, connection-oriented
communications between two hosts
Requires more network overhead
UDP provides connectionless datagram services
between two hosts
Faster but less reliable
Reliability is left to the Application layer
37
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
39
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
41
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
42
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
43
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
45
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Internetwork Layer
Four main protocols function at this layer
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
ARP
A routed protocol
Maps IP addresses to MAC addresses
ARP tables contain the MAC and IP addresses of
other devices on the network
46
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
48
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
50
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
53
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
56
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
57
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
59
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
60
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Traditional TCP
Communication characterized by
sporadic high bit-error rates (10-4 to
10-6)
disconnections
intermittent connectivity due to
handoffs
low bandwidth
62
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
FH
BS1 BS2
FH – Fixed Host
BS – Base Station
MH MH
MH – Mobile Host
63
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
64
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Classification of Schemes
End-to-End protocols
loss recovery handled by sender
Link-layer solutions
hide link-related losses from sender
TCP sender may not be fully shielded
Split-connection approaches
hide any non-congestion related losses from TCP
sender
since the problem is local, solve it locally
65
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
End-to-End Protocols
66
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Link-Layer Protocols
67
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Link-layer Protocols
Pros:
The wireless link is made more reliable
Doesn’t change the semantics of TCP
Fits naturally into the layered structure of network
protocols
Cons:
If the wireless link is very lossy, sender times-out
waiting for ACK, and congestion control algorithm
starts
68
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Split Connection
Split the TCP connection into two
separate connections.
1st connection: sender to base station
2nd connection: base station to receiver
The base station simply copies packets
between the connections in both directions.
antenna
69
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Split Connection
Pros:
Sender shielded from wireless link.
Better throughput can be achieved by fine
tuning the wireless protocol link.
Cons:
Violates the semantics of TCP
Extra copying at the Base station.
70
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Classification of Schemes
71
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
72
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Snoop-TCP
A (snoop) layer is added to the routing
code at BS which keep track of packets in
both directions
Packets meant to MH are cached at BS, and
if needed, retransmitted in the wireless link
BS suppress DUPACKs sent from MH to
FH
BS use shorter local timer for local timeout
73
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Snoop-TCP
74
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Snoop Performance
Poisson
Distributed bit
error model.
Max. Bandwidth
– 2Mbps
75
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Aggregate bandwidth:
Snoop – 1Mbps,
TCP – 0.25 Mbps
76
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
78
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
79
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
I-TCP
Disadvantages
End-to-end semantics is not followed
MSR sends an ack to the correspondent but
loses the packet to the mobile host
Copying overhead at MSR
Conclusion
I-TCP particularly suited for applications
which are throughput intensive
80
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Slow Start
Sender starts by transmitting 1
segment Sender Receiver
On receiving Ack, congestion
window is set to 2.
On receiving Acks, congestion
window is doubled.
Continues until Timeout occurs
After ssthresh, the sender
increases its window size by
1/[current_window] on
receiving Ack. (Congestion
Avoidance phase)
81
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Fast Retransmission
Sender Receiver
Uses Duplicate
Ack to retransmit
Packet Loss
Dup ACK 1
Dup ACK 2
Dup ACK 3
Retransmits
without waiting
for timeout.
82
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Fast Recovery
After Fast retransmit, perform congestion
avoidance instead of slow start.
Why?
Duplicate ACK indicates that there are still
data flowing between the two ends →
Network resources are still available.
TCP does not want to reduce the flow
abruptly by going into slow start.
83
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Questions ?
UNIT – III
Unit - III
MOBILE TELECOMMUNICATION SYSTEM
*Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning Pvt. Ltd, New Delhi
2
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Synopsis
Global System for Mobile Communication (GSM)
GSM Services
System Architecture of GSM
GSM Security
General Packet Radio Service (GPRS)
GPRS Services
GPRS Architecture
Universal Mobile Telecommunication System (UMTS)
UMTS Network Architecture
3
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
What is GSM?
GSM (Global System for Mobile communication)
is a digital mobile telephony system that is widely
used in Europe and other parts of the world.
GSM is a second generation cellular standard
developed to cater voice services and data delivery
using digital modulation.
GSM uses a variation of time division multiple
access (TDMA) and is the most widely used of the
three digital wireless telephony technologies
(TDMA, GSM, and CDMA).
4
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
What is GSM?
5
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GSM Services
GSM Architecture
Network sub-system
Radio sub-system
Operation and maintenance sub-system
12
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GSM Architecture
13
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Mobile Station(MS)
The Mobile Station is made up of two entities:
Mobile Equipment (ME)
Subscriber Identity Module (SIM)
Mobile Equipment (ME)
Portable, vehicle mounted, hand held device
Uniquely identified by an IMEI (International Mobile
Equipment Identity)
Voice and data transmission
Monitoring power and signal quality of surrounding cells
for optimum handover
Power level : 0.8W – 20 W
160 character long SMS.
14
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Mobile Station(MS)
15
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
17
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
18
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
20
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
OPERATION AND
MAINTENANCE SUBSYSTEM
Dynamic monitoring and controlling of
network.
Operation and maintenance data function.
Configuration management.
Fault report and alarm handling.
Performance supervision.
Storage of software and data.
Stores data for minimum one year.
21
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Security in GSM
22
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Challenge RAND
SIM
Ki Ki
A3 A3
Signed response (SRES)
SRES SRES
mi Encrypted Data mi
A5 A5
25
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
A3 – MS Authentication Algorithm
Goal
Generation of SRES response to MSC’s random
challenge RAND
Ki (128 bit) A3
26
Fatima Michael College of Engineering & Technology
A8 – Voice Privacy Key Generation
Fatima Michael College of Engineering & Technology
Algorithm
Goal
Generation of session key Kc
A8 specification was never made public
Ki (128 bit) A8
KC (64 bit)
27
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
28
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
A5 – Encryption Algorithm
A5 is a stream cipher
Implemented very efficiently on hardware
Design was never made public
Leaked to Ross Anderson and Bruce Schneier
Variants
A5/1 – the strong version
A5/2 – the weak version
A5/3
GSM Association Security Group and 3GPP design
Based on Kasumi algorithm used in 3G mobile systems
29
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
A5 Encryption
Mobile Stations Base Station Network Subscriber and terminal
Subsystem Management equipment databases
OMC
BTS
Exchange
System
VLR
BTS BSC MSC
HLR AUC
BTS EIR
A5 Encryption
30
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
31
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GPRS
Networks based on the Internet Protocol (IP) and X.25
Theoretically maximum rate is just 171. 2 Kbits/sec.
A realistic estimation on transfer is between 5 and 40
kbps.
It applies a packet radio principle to transfer user data
packets in an efficient way.
This principle offers a more user-friendly billing than
that offered by circuit switched services.
User can be "online" over a long period of time but
will be billed based on the transmitted data volume.
32
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GPRS Architecture
33
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GPRS Architecture
A serving GPRS support node (SGSN) is responsible
for
Delivery of data packets from and to the mobile
stations within its service area.
Packet routing and transfer
Mobility management (attach/detach and location
management)
Authentication and charging functions. The location
register of the SGSN stores location information and
user profiles (IMSI, addresses used in the packet data
network) of all GPRS users registered with this
SGSN.
34
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GPRS Architecture
A gateway GPRS support node (GGSN) acts as an
interface between the GPRS backbone network and the
external packet data networks.
It converts the GPRS packets coming from the SGSN
into the appropriate packet data protocol (PDP) format
(IP or X.25) and sends them out on the corresponding
packet data network.
In the other direction, PDP addresses of incoming data
packets are converted to the GSM address of the
destination user. The readdressed packets are sent to
the responsible SGSN. For this purpose, the GGSN
stores the current SGSN address of the user and his or
her profile in its location register.
Also performs authentication and charging functions.
35
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GPRS Attachment
GPRS Detachment
Location Management
36
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Attach request which includes IMSI which then processed by the network
to P-TMSI.
mobile is authenticated
with the mobile's Home
Location Register
SGSN does an update
of the GPRS location
SGSN sends an "Attach
Accept" message to the
mobile
mobile responds with
an "Attach Complete"
37
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Location Management
Aim is to keep track of the user's current location,
so that incoming packets can be routed to his or
her MS.
If the MS sends update messages seldom, its
location is not known exactly, resulting in a
significant delivery delay.
On the other hand, if location updates happen
very often, the MS's location is well known to the
network, and the data packets can be delivered
without any additional delay. But, quite a lot of
uplink radio capacity and battery power is
consumed for mobility management.
39
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Location Management
Location Management
In IDLE state the MS is not reachable. Performing
a GPRS attach, the MS gets into READY state.
With a GPRS detach it may disconnect from the
network and fall back to IDLE state. All PDP
contexts will be deleted.
The STANDBY state will be reached when an MS
does not send any packets for a longer period of
time, and therefore the READY timer, which was
started at GPRS attach, expires.
In IDLE state, no location updating is performed,
the current location of the MS is unknown to the
network.
41
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Location Management
An MS in READY state informs its SGSN of every
movement to a new cell(in GSM).
In GPRS, for the location management of an MS in
STANDBY state, a GSM location area (LA) is
divided into several routing areas (RA). In general,
an RA consists of several cells. The SGSN will only
be informed when an MS moves to a new RA; cell
changes will not be disclosed. Whenever an MS
moves to a new RA, it sends a "routing area update
request" to its assigned SGSN. The message
contains the routing area identity (RAI) of its old
RA.
In same SGSN routing area update
In different SGSN routing area update
42
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Session Management
To exchange data packets with external PDNs
after a successful GPRS attach, a mobile
station must apply for one or more addresses
used in the PDN, e.g., for an IP address in case
the PDN is an IP network.
This address is called PDP address (Packet
Data Protocol address).
43
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Session Management
The allocation of the PDP address can be static or
dynamic.
Static : The network operator of the user's home-
PLMN permanently assigns a PDP address to the user.
Dynamic : PDP address is assigned to the user upon
activation of a PDP context.
The PDP address can be assigned by the operator of
the user's home-PLMN (dynamic home-PLMN PDP
address)
By the operator of the visited network (dynamic
visited-PLMN PDP address).
In case of dynamic PDP address assignment, the GGSN is
responsible for the allocation and the activation/
deactivation of the PDP addresses
Fatima Michael College of Engineering & Technology 44
Fatima Michael College of Engineering & Technology
Session Management
For each session, a PDP context is created, which
describes the characteristics of the session. It contains;
the PDP type (e.g., IPv4),
the PDP address assigned to the mobile station (e.g.,
129.187.222.10),
the requested QoS,
the address of a GGSN that serves as the access point
to the PDN
This context is stored in the MS, the SGSN, and the
GGSN. With an active PDP context, the mobile station is
"visible" for the external PDN and is able to send and
receive data packets. The mapping between the two
addresses, PDP and IMSI, enables the GGSN to transfer
data packets between PDN and MS.
45
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Session Management
PDP context activation procedure
46
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Quality of Service
GPRS allows defining QoS profiles using the parameters service
precedence, reliability, delay, and throughput.
The service precedence is the priority : high, normal, and low.
The reliability indicates the transmission characteristics
required by an application. Three reliability classes are
defined, which guarantee certain maximum values for the
probability of loss, duplication, missequencing, and corruption
(an undetected error) of packets.
The delay parameters define maximum values for the mean
delay. The delay is defined as the end-to-end transfer time
between two communicating mobile stations or between a
mobile station and the Gi interface to an external packet data
network.
The throughput specifies the maximum bit rate and the mean
bit rate.
47
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GPRS Services
Offers end-to-end packet switched data transfer
Bearer Services
PTP - Point-To-Point service (CLNS mode)
PTM - Point-To-Multipoint service(CONS Mode)
PTM-M Multicast service
PTM-G Group call service
Supplementary Services
SMS-Short Message Service
CFU-Call Forwarding Unconditional
48
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
GPRS Services
CFNRc Call Forwarding on mobile subscriber
not reachable
CUG Closed User Group
Tele action, access to data bases
Quality of Service
GPRS allows defining QoS profiles
Service precedence, reliability, delay,
throughput
49
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Advantages of GPRS
Improves the utilization of the radio resources
Multiple users can share one physical
channel
Volume-based billing
Higher transfer rates
Max 171.2Kbits/sec
Shorter access times
Simplifies the access to packet data networks
50
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Applications of GPRS
51
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
52
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
UMTS Architecture
53
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
End-to-End Service
54
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
55
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Questions ?
56
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
What is a MANET
Mobile nodes, wireless links
Infrastructure-less: by the nodes, …
Multi-hop routing: …, and for the nodes
Minimal administration: no hassles
Other Challenges
Auto configuration issues
Address assignment
Service discovery
Security issues
Ease of denial-of-service attack
Misbehaving nodes difficult to identify
Nodes can be easily compromised
New Applications/services
Location based: Distribute some information to all nodes in a
geographic area (geocast).
Content based: Query all sensors that sensed something
particular in the past hour.
Routing Protocols
Reactive (On-demand) protocols
Discover routes when needed
Source-initiated route discovery
Proactive protocols
Traditional distributed shortest-path protocols
Based on periodic updates. High routing overhead
Tradeoff
State maintenance traffic vs. route discovery traffic
Route via maintained route vs. delay for route
discovery
Reactive Routing
Advantages:
0 eliminate periodic updates
query(0)
reply(0) adaptive to network dynamics
1 query(0) Disadvantages:
query(0) high flood-search overhead
3 with
reply(0)
mobility, distributed traffic
query(0)
query(0)
2 high route acquisition latency
4
query(0)
reply(0) query(0)
5
B Initiator ID
A-B-D-G
A-B-D-G G Initiator seq#
A-B-D-G
A A-B Target ID
D A-B-D
Partial route
A
A-C-E
A E H A-B-C
A-C-E
Route Request (RREQ)
A-C-E
C A-C A-B-C
F Route Reply (RREP)
no
Host’s
address yes Discard
already in route
patrial request
route
Append no
myAddr to no
partial route myAdd
r=targ
et
yes
Store <src,id>
in list Send route
reply packet
Broadcast packet
done
Route Maintenance
Route maintenance performed only while route is in
use
Error detection:
Monitors the validity of existing routes by passively
listening to data packets transmitted at neighboring nodes
Lower level acknowledgements
When problem detected, send Route Error packet to
original sender to perform new route discovery
Host detects the error and the host it was
attempting;
Route Error is sent back to the sender the packet –
original src
Route Maintenance
B
RERR
RERR G
D
G
C
F
A Summary of DSR
Break…
Then AODV
S E
F
A
C
G D
B
S E
F
A
C
G D
B
S E
F
A
C
G D
B
S E
F
A
C
G D
B
S E
F
A
C
G D
B
Route Expiry
S E
F
A
C
G D
B
AODV – Optimization
A B C D
A B C D
S Y ? D
Dest seq. no. = 10 Has a route to D
with seq. no = 7 Seq. no. = 15
Avoidance of Loop
DSN = Destination Sequence Number.
9
A B C D
7 9 10
E
5
All DNS’s are for D
Path Maintenance
3’ 3’
1 3 1
Destination Destination
2 2
Source 4 Source 4
Summary: AODV
At most one route per destination maintained
at each node
After link break, all routes using the failed link are
erased.
Expiration based on timeouts.
Use of sequence numbers to prevent loops.
Optimizations
Routing tables instead of storing full routes.
Control flooding (incrementally increase ‘region’)
Questions…
Other notes
Acknowledgements
DSR Slides:
Yinzhe Yu (umn.edu)
Node C Cache
E:
E:C,
C,D,
D,EE
A: C, B, A
Node A Cache Z: C, X, Y, Z
E: A, B, C, D, E V: C, X, W, V
A B C D E
V W X Y Z
B
RERR
RERR
RREQ
(! D-G) D
G
B
RERR
RERR G
D
G
Route Cache (D)
A G: D, E, H, G
E H
C
F
Distance Vector
0
0 2 3 3
1 2 2
… … …
2
4
Tables grow linearly with # nodes
4 {2,3,5}
5
Dijkstra’s Algorithm can {2,4}
then be used for the
shortest path
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Outline
Introduction
Medium Access Control
Routing (unicast)
– Reactive Protocols
– Proactive Protocols
– Hybrid Protocols
Transport Issues
Summary and Conclusions
Wireless Networks
Infrastructure-based Networks
– traditional cellular systems (base station infrastructure)
Wireless LANs
– Infrared (IrDA) or radio links (Wavelan)
– very flexible within the reception area; ad-hoc networks possible
– low bandwidth compared to wired networks (1-10 Mbit/s)
Ad hoc Networks
– useful when infrastructure not available, impractical, or expensive
– military applications, rescue, home networking
Cellular Wireless
Multi-Hop Wireless
A B
B A
Ad hoc networks:
– Do not need backbone infrastructure support
– Are easy to deploy
– Useful when infrastructure is absent, destroyed or impractical
Many Applications
Application
– new applications and adaptations
Transport
– congestion and flow control
Network
– addressing and routing
Link
– media access and handoff
Physical
– transmission errors and interference
Motivation
Example CSMA/CD
– Carrier Sense Multiple Access with Collision Detection
– send as soon as the medium is free, listen into the medium if a
collision occurs (original method in IEEE 802.3)
A B C
Exposed terminals
– B sends to A, C wants to send to another terminal (not A or B)
– C senses carrier, finds medium in use and has to wait
– A is outside the radio range of C, therefore waiting is not necessary
– C is “exposed” to B
MAC: Reliability
Wireless links are prone to errors. High packet loss rate is detrimental
to transport-layer performance.
A B C
Routing Protocols
Traditional Routing
Issues
– Frequent route changes
• amount of data transferred between route changes may be
much smaller than traditional networks
– Route changes may be related to host movement
– Low bandwidth links
Mobile IP
MH Router
S
3
Home
agent
Router Router
1 2
Mobile IP
move
Router
S MH
3
Foreign agent
Home agent
Routing in MANET
Routing Protocols
Proactive protocols
– Traditional distributed shortest-path protocols
– Maintain routes between every host pair at all times
– Based on periodic updates; High routing overhead
– Example: DSDV (destination sequenced distance vector)
Reactive protocols
– Determine route if and when needed
– Source initiates route discovery
– Example: DSR (dynamic source routing)
Hybrid protocols
– Adaptive; Combination of proactive and reactive
– Example : ZRP (zone routing protocol)
Protocol Trade-offs
Proactive protocols
– Always maintain routes
– Little or no delay for route determination
– Consume bandwidth to keep routes up-to-date
– Maintain routes which may never be used
Reactive protocols
– Lower overhead since routes are determined on demand
– Significant delay in route determination
– Employ flooding (global search)
– Control traffic may be bursty
Z
S E
F
B
C M L
J
A G
H D
K
I N
[S] Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
DATA [S,E,F,J,D] Z
S E
F
B
C M L
J
A G
H D
K
I N
Request Zone
Define a Request Zone
LAR is same as flooding, except that only nodes in request
zone forward route request
Smallest rectangle including S and expected zone for D
Request Zone
D
Expected Zone
x
Y
S
Advantages
– reduces the scope of route request flood
– reduces overhead of route discovery
Disadvantages
– Nodes need to know their physical locations
– Does not take into account possible existence of obstructions for
radio transmissions
AODV
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
Route Request (RREQ) includes the last known sequence number for
the destination
Link Failure
When the next hop link in a routing table entry breaks, all active
neighbors are informed
Route Error
When node S receives the RERR, it initiates a new route discovery for
D using destination sequence number at least as large as N
AODV: Summary
Other Protocols
Many variations of using control packet flooding for route discovery
A B F
C E G
A B F
Links are bi-directional
A B F
C E G
Any node, other than the destination, that has no outgoing links
reverses all its incoming links.
Node G has no outgoing links
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G
Advantages
– Link reversal methods attempt to limit updates to routing tables at
nodes in the vicinity of a broken link
• Partial reversal method tends to be better than full reversal
method
– Each node may potentially have multiple routes to a destination
Disadvantages
– Need a mechanism to detect link failure
• hello messages may be used
– If network is partitioned, link reversals continue indefinitely
Asymmetric Algorithms
CGSR
CEDAR
A
G
D
H B C E
S J K
A E H
C K
G
D
B F J
A E H
C K
G
D
Routing Summary
Protocols
– Typically divided into proactive, reactive and hybrid
– Plenty of routing protocols. Discussion here is far from exhaustive
Performance Studies
– Typically studied by simulations using ns, discrete event simulator
– Nodes (10-30) remains stationary for pause time seconds (0-900s) and
then move to a random destination (1500m X300m space) at a uniform
speed (0-20m/s). CBR traffic sources (4-30 packets/sec, 64-1024
bytes/packet)
– Attempt to estimate latency of route discovery, routing overhead …
Transport in MANET
End-to-end semantics
– Receiver sends cumulative acknowledgements for in-sequence packets
– Receiver sends duplicate acknowledgements for out-of-sequence packets
Duplicate acks
– sender assumes packet loss if it receives three consecutive
duplicate acknowledgements (dupacks)
TCP in MANET
No throughput
No throughput
despite route repair
D D D
C C C
B B B A
A A
TCP performance typically degrades when caches are used for route repair
Impact of Acknowledgements
TCP Acks (and link layer acks) share the wireless bandwidth with TCP
data packets
Network feedback
– Network knows best (why packets are lost)
– Need to modify transport & network layer to receive/send feedback
- Need mechanisms for information exchange between layers
In Conclusion
• What is a VANET?
• Intelligent transportation system
• Vehicle to vehicle communication
• Vehicle to infrastructure communication
• Dedicated Short Range Communication
• challenges
• Applications of VANET
• conclusion
• references
Communication
facility
Rear radar
Human-Machine Display
Interface Computing platform
10
11
12
13
14
proactive routing
• It tries to maintain routes to all destinations.
Reactive routing
• It initiates route discovery in demand of data traffic.
Position based Routing
• Routing based on destination’s position.
15
Mobicasting
• Consider time into account.
• Main goal is delivery of information to all nodes in a point of
time.
16
Security
17
Routing
• Large end-to-end delays and decreased packet delivery ratio.
Security Frameworks
• Need lightweight, scalable authentication frameworks.
• Need reliable and secureness .
• Need fast and low-cost message exchange facility.
18
Quality of Service.
• QoS challenges are packet delivery ratio and connection
duration.
Broadcasting.
• Most messages in Vanet are broadcast messages.
• Collisions affects message delivery.
19
20
21
22
23
24
• Jinyuan, S., Chi, Z. & Yuguang, F., “An ID-based Framework Achieving
Privacy and Non-Repudiation”, in Proceedings of IEEE Vehicular Ad Hoc
Networks, Military Communications Conference (MILCOM 2007).
25
26
27
UNIT – V
Unit - V
*Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning Pvt. Ltd, New Delhi
2
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Synopsis
Mobile Device Operating Systems
Mobile Operating System Structure
JAVA ME Platform
Special Constrains & Requirements
Commercial Mobile Operating Systems
Windows Mobile
Palm OS
Symbian OS
iOS
Android
Blackberry Operating system
3
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Synopsis
Software Development Kit
M- Commerce
Applications of M- Commerce
Structure of M- Commerce
Pros and cons of M- Commerce
Mobile Payment Systems
Security issues
4
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Applications
OS Libraries
6
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Scheduling
Memory Allocation
Keypad Interface
I/O Interface
Multimedia features
Fatima Michael College of Engineering & Technology 7
Fatima Michael College of Engineering & Technology
Java ME Platform
J2ME platform is a set of technologies,
specifications and libraries developed for small
devices like mobile phones, pagers, and
personal organizers.
Java ME was designed by Sun Microsystems. It
is licensed under GNU General Public License
Configuration: it defines a minimum platform
including the java language, virtual machine
features and minimum class libraries for a
grouping of devices. E.g. CLDC
8
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Java ME Architecture
Profile: it supports higher-level services common to a more specific class of
devices. A profile builds on a configuration but adds more specific APIs to
make a complete environment for building applications. E.g. MIDP
Java ME platforms are composed of the following elements:
Application
Vendor
Optional
Profile specific
Packages
classes - OEM
Configuration
Device/ Hardware
9
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Java ME Platform
It includes two kinds of platforms:
High-end platform for high-end consumer devices. E.g. TV set-
top boxes, Internet TVs, auto-mobile navigation systems
Low-end platform for low-end consumer devices. E.g. cell
phones, and pagers
Platforms Device Characteristics
High-End a large range of user interface capabilities
consumer total memory budgets starting from about two to four MB
devices persistent, high-bandwidth network connections, often using
TCP/IP
Low-end simple user interfaces
consumer minimum memory budgets starting from about 128–256 KB
devices low bandwidth, intermittent network connections that is often
not based on the TCP/IP protocol suite.
most of these devices are battery-operated
10
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Windows Mobile
Palm OS
Symbian OS
iOS
Android
Blackberry Operating system
11
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Windows Mobile OS
Windows Mobile is a compact operating system designed
for mobile devices and based on Microsoft Win32.
It provides ultimate interoperability. Users with various
requirements are able to manipulate their data.
Windows CE (Compact Edtion) - designed specifically for
handheld devices, based on Win32 API.
PDA (personal digital assistant), palmtop computer,
PocketPC were original intended platform for the Windows
Mobile OS.
For devices without mobile phone capabilities, and those
that included mobile phone capabilities
12
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Palm OS
Palm OS is an embedded operating system
designed for ease of use with a touch
screen-based graphical user interface.
It has been implemented on a wide variety
of mobile devices such as smart phones,
barcode readers, and GPS devices.
It is run on Arm architecture-based
processors. It is designed as a 32-bit
architecture.
15
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Palm OS
The key features of Palm OS
A single-tasking OS:
Palm OS Garnet (5.x) uses a kernel developed at
Palm, but it does not expose tasks or threads to
user applications. In fact, it is built with a set of
threads that can not be changed at runtime.
Palm OS Cobalt (6.0 or higher) does support
multiple threads but does not support creating
additional processes by user applications.
16
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Palm OS
Palm OS has a preemptive multitasking kernel
that provides basic tasks but it does not
expose this feature to user applications.
Memory Management: The Memory, RAM
and ROM, for each Palm resides on a memory
module known as card. In other words, each
memory card contains RAM, ROM or both.
Palms can have no card, one card or multiple
cards.
Handwriting recognition input called Graffiti 2
17
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Palm OS
Expansion support: This capability not only
augments the memory and I/O , but also it
facilitates data interchanges with other Palm
devices and with other non-Palm devices
such as digital cameras, and digital audio
players.
HotSync technology for synchronization
with PC computers
Sound playback and record capabilities
TCP/IP network access
18
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Palm OS
Support of serial port, USB,
Infrared, Bluetooth and Wi-
Fi connections
Defined standard data
format for PIM (Personal
Information Management)
applications to store
calendar, address, task and
note entries, accessible by
third-party applications
19
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Symbian OS
Symbian OS is 32 bit, little-endian
operating system, running on
different flavors of ARM
architecture
It is a multitasking operating
system and very less dependence
on peripherals.
Kernel runs in the privileged mode and exports its
service to user applications via user libraries.
20
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Symbian OS
21
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Symbian OS
The following demonstrates the Symbian OS
architecture
Symbian OS Libraries
KVM
Application Engines
Servers
Hardware
22
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Symbian OS Features
Real-time: it has a real-time, multithreaded kernel.
Data Caging
it allows applications to have their own private data
partition. This feature allows for applications to guarantee a
secure data store. It can be used for e-commerce
applications, location aware applications and etc.
Platform Security
Symbian provides a security mechanism against malware. It
allows sensitive operations can be accessed by applications
which have been certified by a signing authority. In addition,
it supports full encryption and certificate management,
secure protocols (HTTPS, TLS and SSL) and WIM
framework.
23
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Symbian OS Features
Multimedia
it supports audio, video recording, playback and streaming,
and Image conversion.
Internationalization support
it supports Unicode standard.
Fully object-oriented and component- based
Optimized memory management
Client-server architecture
it provides simple and high-efficient inter process
communication. This feature also eases porting of code
written for other platforms to Symbian OS.
24
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Symbian OS Features
A Hardware Abstraction Layer (HAL)
This layer provides a consistent interface to
hardware and supports device-independency
Kernel offers hard real-time guarantees to kernel
and user mode threads.
25
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
iPhone OS
26
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
iOS
About Apple’s Proprietary Mobile OS – iOS
iOS is Apple’s proprietary mobile operating
system initially developed for iPhone and now
extended to iPAD, iPod Touch and Apple TV.
Initially known as “iPhone OS”, in June 2010
renamed “iOS”.
iOS is not enabled for cross licensing, it can
only be used on Apple’s devices.
27
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
iOS
Apple’s Proprietary Mobile OS
The user interface of iOS is based on the
concept of usage of multi touch gestures.
iOS is a Unix based OS.
iOS uses four abstraction layers, namely: the
Core OS layer, the Core Services layer, the
Media layer, and the Cocoa Touch layer.
Apple’s App store contains close to 550,000
applications as of March 2012.
28
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
iOS
Apple’s Proprietary Mobile OS
It is estimated that the APPs are downloaded
25B times till now.
First version of iOS is released in 2007 with the
mane ‘OS X’ and then in 2008 the first beta
version of ‘iPhone OS’ is released.
In 2007 September Apple released first iPod
Touch that also used this OS.
In 2010 iPad is released that has a bigger screen
than the iPod and iPhone.
Fatima Michael College of Engineering & Technology 29
Fatima Michael College of Engineering & Technology
iOS
Cisco owns the trademark for ‘IOS’;
Apple licenses the usage of ‘iOS’ from
Cisco.
30
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Mac OS X Architecture
31
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Android
Google owns a trademark for Android – Google’s
permission is necessary to use Android’s
trademark
In 2011, Microsoft announced it has made an
agreement with Android device manufacturers
(including Samsung and HTC) to collect fees
from them.
Android’s source code is available under Apache
License version 2.0. The Linux kernel changes are
available under the GNU General Public
License version 2.
32
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Android OS
Android is Linux based mobile OS for mobile
devices such as Tablets and Smartphones.
In 2005 Google acquired the initial developer of
the OS, Android Inc.
Then in 2007 Google formed an Open Handset
Alliance with 86 hardware, software and telecom
companies.
This alliance developed and announced Android
as an open source mobile OS under the Apache
License.
33
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Android
Now, this OS is being used by multiple device
manufacturers (Samsung, Motorola, HTC, LG,
Sony etc) in their handsets
Android developer community has large
number of developers preparing APPs in Java
environment and the APP store ‘Google Play’
now has close to 450,000 APPs, among which
few are free and others are paid.
It is estimated that, as of December 2011,
almost 10B APPs were downloaded.
34
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Android
It is estimated that as of February 2012 there
are over 300M Android devices and
approximately 850,000 Android devices are
activated every day.
The earliest recognizable Android version is
2.3 Gingerbread, which supports SIP and NFC.
In 2011 Android Honeycomb version (3.1 and
3.2) are released with focus on Tablets. This is
mainly focused on large screen devices.
35
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Android
Handset layouts – compatible with different
handset designs such as larger, VGA, 2D
graphics library, 3D graphics library based.
Storage – a lightweight relational database, is
used for data storage
Connectivit: GSM/EDGE, IDEN, CDMA, EV-
DO,UMTS,Bluetooth,WiFi, LTE, NFC &WiMAX
Messaging – SMS, MMS, threaded text
messaging and Android Cloud To Device
Messaging (C2DM)
36
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Android
Google faced many patent lawsuits against
Android such as by Oracle in 2006 that included
patents US5966702 and US6910205.
Created by Android
Distributed under
Apache License
Inc., as part of Google Linux Kernel
in 2005
Programmers are
Java-based
Development is Open application
welcome to contribute
Source; source code is
publicly available
via Software framework
Development Kit (SDK)
37
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Blackberry OS
The first operating system launched by
Research in Motion(RIM -the company
behind BlackBerry)
Operating system structure mainly
consists of following: -
GUI (Graphic User Interface).
Command processor.
Kernel.
38
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Blackberry OS Architecture
39
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Blackberry OS Features
Gestures
Multi-tasking
Blackberry Hub
Blackberry Balance
Keyboard
Voice Control
40
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Process Management
Memory Management
Types of Kernel – Microkernel
41
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Advantages of Blackberry OS
It provides good security for data.
It avoids collusion of personal and business data.
Content promotion: Dedicated content channels
and feature banners that provide prime real estate to
help distribute your app to the right users.
App discovery: Universal search, top lists, social
sharing, reviews, and ratings help users find the
right app.
The Games app (in combination with Score loop):
A specialized portal for gaming allowing
multiplayer, social connections.
Fatima Michael College of Engineering & Technology 42
Fatima Michael College of Engineering & Technology
Disadvantages of Blackberry OS
New operating system was introduced too late
into the ever-growing market.
Yet to have as many apps available for
purchase or download compared to other phone
in the market.
Consumers have switched over to other
devices made by Apple or Android.
Swipe vs. home button. Once an application is
opened, you have to swipe up to return to the
main display.
43
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
44
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
45
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
46
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
47
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
48
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
49
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
50
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Advantages of Android
Android is open
Multitasking
Easy access to the Android App Market
Can install a modified ROM
Phone options are diverse
Ease of notification
Widget
51
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
M- Commerce
M-commerce (mobile commerce) is the buying and
selling of goods and services through wireless
handheld devices such as cellular telephone and
personal digital assistants (PDAs). Known as next-
generation e-commerce, m-commerce enables users to
access the Internet without needing to find a place to
plug in.
The emerging technology behind m-commerce, which
is based on the Wireless Application Protocol (WAP),
has made far greater strides in Europe, where mobile
devices equipped with Web-ready micro-browsers are
much more common than in the United States.
52
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
M- Commerce
M-commerce can be seen as means of selling and
purchasing of goods and services using mobile
communication devices such as cellular phones,
PDA s etc, which are able to connect to the Internet
through wireless channels and interact with e-
commerce systems
M-commerce can be referred to as an act of carrying-
out transactions using a wireless device
It is understood as a data connection that results in
the transfer of value in exchange for information,
services or goods
53
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
M- Commerce
It can also bye seen as a natural extension of e-commerce that
allows users to interact with other users or businesses in a
wireless mode, anytime/anywhere.
It can be perceived to be any electronic transaction or
information interaction conducted using a mobile device and
mobile network thereby guaranteeing customers virtual and
physical mobility, which leads to the transfer of real or
perceived value in exchange for personalized, location-based
information, services, or goods.
M-commerce can also be seen and referred to as wireless
commerce.
It is any transaction with a monetary value that is conducted
via a mobile telecommunications network.
54
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
M- Commerce
M-commerce can also be seen and referred to
as wireless commerce.
It is any transaction with a monetary value
that is conducted via a mobile
telecommunications network .
An ability to access an IT-System whilst
moving from one place to the other using a
mobile device and carry out transactions and
transfer information wherever and whenever
needed to.
55
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
56
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
57
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
M-Commerce Terminology
Generations
1G: 1979-1992 wireless technology
2G: current wireless technology; mainly
accommodates text
2.5G: interim technology accommodates graphics
3G: 3rd generation technology (2001-2005)
supports rich media (video clips)
4G: will provide faster multimedia display (2006-
2010)
58
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
59
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
M- Commerce Structure
60
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Pros of M- Commerce
M-commerce is creating entirely new service
opportunities - such as payment, banking, and
ticketing transactions - using a wireless device .
M-commerce allows one-to-one communication
between the business and the client and also
business-to-business communication .
M-commerce is leading to expectations of
revolutionary changes in business and markets.
M-commerce widens the Internet business
because of the wide coverage by mobile networks.
61
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Cons of M- Commerce
Cell phones have small screen displays and that might be
irritating to someone who has the experience of the
desktop environment.
Another issue that can be seen as a disadvantage to m-
commerce is the limitation in bandwidth. The GSM
technology has the data rate of 9.3 Kbps and the current
3-G technology offers a data rate goes up to 2 Mbps.
Mobile devices use batteries as their form of power
supply . Normally, power for a cell phone battery lasts
up to 2-3 days depending on how new the battery is. It
then gives the owner the burden of having to remember
to recharge it every now and then.
62
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Cons of M- Commerce
Mobile devices do not have enough processing
power and the developer has to be careful about
loading an application that requires too much
processing. Also, mobile devices do not have
enough storage space. The developer has to be
also concerned about the size of his application in
the due process of development.
Mobile appliances are quite vulnerable to theft,
loss and corruptibility. Security solutions for
mobile appliances must, therefore, provide for
security under these challenging scenarios.
63
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
64
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Browsing (negotiation)
Merchant
MeP
Mobile Wallet
CC/Bank
67
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Browsing (negotiation)
Mobile Commerce
Server
Merchant
GSM Security
User SSL tunnel
SMS-
C ISO8583 Based
CP
VPP IF
CC/Bank
Mobile Wallet
Voice PrePaid
68
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Security in M-Commerce
CA
SAT GW
(SIM)
Mobile IP Content
Mobile Aggregation
Service
Network
Provider Internet
Network
WAP1.1(+SIM where avail.) Merchant
WAP GW
WAP Architecture
with WML-Script
WML Encoder CGI
WML Decks
WML- Scripts
WSP/WTP WMLScript
HTTP etc.
Script
Compiler
WTAI
Protocol Adapters Content
Etc.
70
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Comparison between Internet and
WAP technologies
Wireless Application Protocol
WAP Risks
WAP Gap
Claim: WTLS protects WAP as SSL
protects HTTP
Problem: In the process of translating one
protocol to another, information is
decrypted and re-encrypted
Recall the WAP Architecture
Solution: Doing decryption/re-encryption
in the same process on the WAP gateway
Wireless gateways as single point of failure
72
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Platform Risks
Without a secure OS, achieving security on
mobile devices is almost impossible
Learned lessons:
Memory protection of processes
Protected kernel rings
File access control
Authentication of principles to resources
Differentiated user and process privileges
Sandboxes for untrusted code
Biometric authentication
Fatima Michael College of Engineering & Technology 73
Fatima Michael College of Engineering & Technology
Bluetooth Security
Bluetooth provides security between any two Bluetooth
devices for user protection and secrecy
mutual and unidirectional authentication
encrypts data between two devices
Session key generation
configurable encryption key length
keys can be changed at any time during a connection
Authorization (whether device X is allowed to have
access service Y)
Trusted Device: The device has been previously
authenticated, a link key is stored and the device is
marked as “trusted” in the Device Database.
75
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
77
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
78
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
79
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
80
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology
Questions ?