Professional Documents
Culture Documents
MC New - Compressed
MC New - Compressed
COURSE MATERIAL
IT6601-MOBILE COMPUTING
LTPC
3 0 03
UNIT I INTRODUCTION 9
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile
Computing Applications –Characteristics of Mobile computing – Structure of
Mobile Computing Application. MAC Protocols –Wireless MAC Issues – Fixed
Assignment Schemes – Random Assignment Schemes – Reservation Based
Schemes.
UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT
LAYER 9
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP
– route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation
of TCP Window – Improvement in TCP Performance.
UNIT III MOBILE TELECOMMUNICATION SYSTEM 9
Global System for Mobile Communication (GSM) – General Packet Radio
Service (GPRS) –Universal Mobile Telecommunication System (UMTS).
UNIT IV MOBILE AD-HOC NETWORKS 9
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues –
Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols
– Vehicular Ad Hoc networks ( VANET) –MANET Vs VANET – Security.
UNIT V MOBILE PLATFORMS AND APPLICATIONS 9
Mobile Device Operating Systems – Special Constrains & Requirements –
Commercial Mobile Operating Systems – Software Development Kit: iOS,
Android, BlackBerry, Windows Phone – M Commerce– Structure – Pros & Cons
– Mobile Payment System – Security Issues.
TOTAL: 45 PERIODS
TEXT BOOK:
1. Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile
Computing”, PHI Learning Pvt.Ltd, New Delhi – 2012.
REFERENCES:
1. Jochen H. Schller, “Mobile Communications”, Second Edition, Pearson
Education, New Delhi,2007.
2. Dharma Prakash Agarval, Qing and An Zeng, "Introduction to Wireless and
Mobile systems",
Thomson Asia Pvt Ltd, 2005.
3. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober,
“Principles of Mobile
Computing”, Springer, 2003.
4. William.C.Y.Lee,“Mobile Cellular Telecommunications-Analog and Digital
Systems”, Second Edition,Tata Mc Graw Hill Edition ,2006.
5. C.K.Toh, “AdHoc Mobile Wireless Networks”, First Edition, Pearson
Education, 2002.
6. Android Developers : http://developer.android.com/index.html
7. Apple Developer : https://developer.apple.com/
8. Windows Phone Dev Center : http://developer.windowsphone.com
9. BlackBerry Developer : http://developer.blackberry.com/
COURSE OBJECTIVE
COURSE OUTCOMES
UNIT- I
INTRODUCTION
Fixed Infra structure Network: Wireless device connects to the access point to
connect to the network – Access point acts as a hub to connect two wireless
devices.
Location Awareness:
Current location of the user can be found out using GPS (Global
positioning system)
Ex: Personalized application to find car maintaining service, Traffic
control application, and Fleet management application when travelling by
car.
Adaptation
Adjust the bandwidth fluctuation automatically without disturbing the user
Personalization:
Services can be personalized according to the user need. Some type of information
can be obtained from the specific source.
Presentation tier:
User interface: request and response in a meaningful way.
Needs web browser and client program for transfer of information.
Get the information from the user and makes the decision.
Moves data between presentation and data layers.
This layer is implemented using JAVA, .NET services, cold fusion etc.
Data tier:
Contains database in which information is stored and retrieved.
Access Control protocols define rules for orderly access to the shared medium
It should have the following features
Fairness in sharing
Maximize the utilization of the channel
Support different types of traffic
Should be robust for equipment failures and changing network condition.
There are two types of basic classification to avoid medium access problem
1) Contention protocols
2) Conflict-free protocols
Contention protocols:
Contention protocols resolve a collision after it occurs or try to avoid it. These
protocols execute a collision resolution protocol after each collision.
Conflict-free protocols:
Conflict-free protocols (e.g., TDMA, FDMA, and CDMA) ensure that a
collision can never occur
Hidden Terminal Problem
A hidden node is one that is within the range of the intended destination but out
Of range of sender
TDMA
TDMA allocates each user a different time slot on a given frequency.
TDMA Divides each cellular channel into three time slots in order to increase the
amount of data that can be carried. Each user occupies a cyclically repeating time
slot.
All the nodes use the same channel but in different time given to them in
Round Robin Fashion.
Advantages of TDMA
Flexible bit rate
• No frequency guard band required
• No need for precise narrowband filters
• Easy for mobile or base stations to initiate and execute hands off
• Extended battery life
• It is very cheap.
Disadvantages to using TDMA
Unused time slot is wasted. So it will lead to less channel utilization.
Has a predefined time slot. When moving from one cell site to other, if all the time
slots in the moved cell are full the user might be disconnected.
Multipath distortion
Code division Multiplexing Access: CDMA
Many users can use the channel to send the data. Collision can be avoided
using code. Each user is allotted different codes .when sending a data the users
can multiplex their data with the code and send the data in the same channel.so
different users use the same channel at the same time by using the coding
technique. The code can be generated by using a technique called m bit pseudo-
noise code sequence.by using m bits 2m codes can be obtained. From these each
user can use one code.
Advantages of CDMA
Many users of CDMA use the same frequency, TDD or FDD may be used
• Multipath fading may be substantially reduced because of large signal
bandwidth.
• No limit on the number of users.
• Easy addition of more users.
• Impossible for hackers to decipher the code sent.
M.I.E.T./CSE/III YR/MOBILE COMPUTING
IT6601 – MOBILE COMPUTING
MACA
• When a node wants to transmit a data packet, it first transmit a
RTS (Request to Send) frame.
• The receiver node, on receiving the RTS packet, if it is ready to
receive the data packet, transmits a CTS (Clear to Send) packet.
• Once the sender receives the CTS packet without any error, it
starts transmitting the data packet.
• If a packet transmitted by a node is lost, the node uses the binary
exponential back-off (BEB) algorithm to back off a random
interval of time before retrying.
MACAW
Variants of this method can be found in IEEE 802.11 as DFWMAC
(Distributed Foundation Wireless MAC),
UNIT II
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Tunnel
It is the path taken by the encapsulated packets.
• Tunneling
A Tunnel(like a pipe) is set up by the Home Agent to the care-of
address (current location of the Mobile Node on the foreign network) to
send the packets to the Mobile Node as it roams.
PACKET DELIVERY
1) Agent discovery
A mobile node has to find a foreign agent when it moves away from its
home network. To do this, mobile IP describes two methods:
Agent advertisement.
Agent solicitation.
Agent advertisement:
The Home Agent and Foreign Agent advertise their services on the network
by using the ICMP Router Discovery Protocol (IRDP). The Mobile Node
listens to these advertisements to determine if it is connected to its home
network or foreign network.
The mobile node when travels to the foreign network and gets the care of
address from the foreign network it has to inform this to the home network.
This is done using the registration process.
The process are
1) It first sends the registration request message to the foreign network .This
is the registration process with the foreign network. The registration request
message consists of mobile node’s Permanent IP Address and the home
agent’s IP address.
2) The foreign agent will send the registration request message to the home
agent.
3) The home agent will store this information in its routing table. This is
called mobility binding
4) The home agent then sends an acknowledgement to the foreign agent.
5) The foreign agent passes this reply to the mobile node
6) The foreign agent updates its visitor list.
3) Tunneling and encapsulation
The new header is also called the outer header for obvious reasons.
Old header is called inner header .There are three methods of
encapsulation
IP-in-IP encapsulation: The figure shows the format of the packet
DHCP.
It is Dynamic Host Configuration Protocol
Administrator manually assigns the IP address to the system.
Manual configuration is difficult and error-prone.
Dynamic Host Configuration Protocol (DHCP) is used to configure IP
automatically.
Using DHCP server.
DHCP provides static and dynamic address allocation that can be manual
or automatic.
In static allocation, a DHCP server has a manually created static
database that binds
Physical addresses to IP addresses.
Origins of TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP)
effort by the U.S. Department of Defense
(DOD).
Advanced Research Projects Agency (ARPA).
.
.
.
.
inclusion of the TCP/IP protocol with Berkeley UNIX (BSD UNIX).
Application Layer
Protocols at the TCP/IP Application layer include:
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Network File System (NFS)
Simple Mail Transfer Protocol (SMTP)
Terminal emulation protocol (telnet)
Remote login application (rlogin)
Simple Network Management Protocol (SNMP)
Domain Name System (DNS)
Hypertext Transfer Protocol (HTTP)
Transport Layer Performs end-to-end packet delivery, reliability, and flow
control.
Protocols:
TCP provides reliable, connection-oriented
communications between two hosts
Requires more network overhead
UDP provides connectionless datagram services between two hosts
Faster but less reliable
Reliability is left to the Application layer Ports
TCP and UDP use port numbers for communications between hosts
Port numbers are divided into three ranges:
Well Known Ports are those from 1 through 1,023
Registered Ports are those from 1,024 through 49,151
Dynamic/Private Ports are those from 49,152 through 65,535
The RARP reply is used to configure the IP protocol on the local host
Routers and ARP
ARP requests use broadcasts
Routers filter broadcast traffic
Source must forward the frame to the router
ARP tables
Routers maintain ARP tables to assist in transmitting frames from one
network to another.
A router uses ARP just as other hosts use ARP.
Routers have multiple network interfaces and therefore also include the
port numbers of their NICs in the ARP table.
The Ping utility.
Packet Internet Groper (Ping) utility verifies connectivity between two
points.
Uses ICMP echo request/reply messages.
Classification of Schemes
End-to-End protocols
loss recovery handled by sender
Link-layer solutions
hide link-related losses from sender
TCP sender may not be fully shielded
Split-connection approaches
hide any non-congestion related losses from TCP sender
since the problem is local, solve it locally End-to-End Protocols
Make the sender realize some losses are due to bit-error, not congestion.
Sender avoid invoking congestion control algorithms if non-congestion
related losses occur.
E.g. Reno, New-Reno, SACK
Link-Layer Protocols Hides the characteristics of the wireless link from the
transport layer and tries to solve the problem at the link layer
Uses technique like forward error correction (FEC)
Snoop, AIRMAIL(Asymmetric Reliable Mobile Access In Link-layer)
Pros:
The wireless link is made more reliable
Doesn’t change the semantics of TCP
Fits naturally into the layered structure of network protocols
Cons:
If the wireless link is very lousy, sender times-out waiting for ACK, and
congestion control algorithm starts Split Connection
Split the TCP connection into two separate connections.
1st connection: sender to base station
2nd connection: base station to receiver
The base station simply copies packets between the connections in both
directions.
Pros:
Sender shielded from wireless link.
Better throughput can be achieved by fine tuning the wireless protocol link.
Cons:
Violates the semantics of TCP
Extra copying at the Base station
Classification of Schemes
MSR sends an ack to the correspondent but loses the packet to the mobile
Slow Start
Fast Recovery
Why?
After Fast retransmit, perform congestion avoidance instead of slow start.
Duplicate ACK indicates that there are still data flowing between the two
ends → Network resources are still available.
TCP does not want to reduce the flow abruptly by going into slow start.
End to End Protocols
Fast Retransmission
Packet Loss Scenario
UNIT III
MOBILE TELECOMMUNICATION SYSTEM
Cellular Network Organization
Use multiple low-power transmitters (Base station) (100 W or less)
Areas divided into cells
Each served by its own antenna
Served by base station consisting of
transmitter, receiver, and control unit
Band of frequencies allocated
Cells set up such that antennas of all neighbors are equidistant
(Hexagonal pattern)
Cellular systems implements Space Division Multiplexing Technique
(SDM). Each transmitter is called a base station and can cover a fixed area called
a cell. This area can vary from few meters to few kilometres.
Mobile network providers install several thousands of base stations each
with a smaller cell instead of using power full transmitters with large cells
Basic concepts:
High capacity is achieved by limiting the coverage of each base station to
a small geographic region called a cell
Same frequencies/ timeslots/codes are reused by spatially separated base
station
A switching technique called handoff enables a call to proceed
uninterrupted when one user moves from one cell to another
Neighboring base stations are assigned different group of channels so as to
minimize the interference
By systematically spacing base station and the channels group may be
reused as many number of times as necessary
As demand increases the number of base stations may be increased thereby
providing additional capacity
Frequency Reuse
Advantages
1. Higher capacity
Smaller the size of the cell more the number of concurrent user’s i.e. huge cells
do not allow for more concurrent users.
2. Less transmission power
Huge cells require a greater transmission power than small cells.
3. Local interference only
For huge cells there are a number of interfering signals, while for small cells
there is limited interference only.
4. Robustness
As cellular systems are decentralized, they are more robust against the failure of
single components.
Disadvantages:
Infrastructure needed: Cellular systems need a complex
infrastructure to connect all base stations
Handover needed: The mobile station has to perform a handover
when changing from one cell to another.
3.1 GSM ARCHITECTURE
GSM is a digital cellular system designed to support a wide variety of
services, depending on the user contract and the network and mobile
equipment capabilities.
formerly: Group Special Mobile (founded 1982)
now: Global System for Mobile Communication
GSM offers several types of connections
voice connections, data connections, short message service
There are three service domains
Bearer Services
Telematics Services
Supplementary Services
radio cell
BSS
MS MS
Um radio cell
RSS BTS MS
BTS
Abis
BSC BSC
A
MSC MSC
NSS signaling
VLR VLR
ISDN, PSTN
HLR GMSC
PDN
IWF
O
OSS
EIR AUC OMC
Radio subsystem:
The Radio Subsystem (RSS) contains three main parts
Base Transceiver Station (BTS)
Base Station Controller (BSC)
Mobile Stations (MS)
Base Transceiver Station (BTS) defines a cell and is responsible for radio
link protocols with the Mobile Station
Base Station Controller (BSC) controls multiple BTSs and manages radio
channel setup, and handovers. The BSC is the connection between the
Mobile Station and Mobile Switching Center.
A mobile station (MS) is a hand portable and vehicle mounted unit
It contains several functional groups
SIM (Subscriber Identity Module)
personalization of the mobile terminal, stores user parameters
PIN
IMEI
Cipher key
Location Area Identification
It also has Display, loudspeaker, microphone and programmable keys.
Base Station Subsystem Consists of:
Base Transceiver Station (BTS) defines a cell and is responsible for
radio link protocols with the Mobile Station
Base Station Controller (BSC) controls multiple BTSs and manages
radio channel setup, and handovers. The BSC is the connection between
the Mobile Station and Mobile Switching Center.
Network and Switching Subsystems
It consists of
Mobile Switching Center (MSC)
Home Location Register (HLR)
Visitors Location Register (VLR)
Authentication Center (AuC)
Radio spectrum is very limited resource and this is shared by all users. Time- and
Frequency-Division Multiple Access (TDMA/FDMA) is used to share the
frequency. FDMA divides frequency bandwidth of the (maximum) 25 MHz into
124 carrier frequencies. Each Base Station (BS) is assigned one or more carrier
frequencies.
Time Division Multiple Access (TDMA) - the users take turns (in a round robin),
each one periodically getting the entire bandwidth for a little time.
Frequency Division Multiple Access (FDMA) - the frequency spectrum is
divided among the logical channels, with each user using some frequency band.
Mobile unit can be in two modes
Idle - listening Dedicated: sending/receiving data
There are two kinds of channels: Traffic channels (TCH) and Control channels
Organization of bursts, TDMA frames, and multi frames for speech and data.
The fundamental unit of time in TDMA scheme is called a burst period and it
lasts 15/26 msec. Eight bust periods are grouped in one TDMA frame (120/26
msec), which forms a basic unit of logical channels. One physical channel is
one burst period per TDMA frame. Traffic channels. It is used to transmit data.
It is divided to Full rate TCH and Half rate TCH.
In GSM system two types of traffic channels used:
Full Rate Traffic Channels (TCHF): This channel carries information at
rate of 22.8 Kbps.
Half Rate Traffic Channels (TCHH): This channels carries information
at rate of 11.4 Kbps.
MS Protocols
GSM signaling protocol is divided in to three layers:
Layer 1: The physical layer. It uses the channel structures over the air
interface.
Layer 2: The data-link layer. Across the Um interface, the data-link layer
is LAP-D protocol is used. Across Abs interface (LAP-Dm) is used. Across
the A interface, the Message Transfer Part (MTP) is used.
Layer 3 : GSM protocol’s third layer is divided into three sub layers:
o Radio Resource Management (RR),
o Mobility Management (MM), and
o Connection Management (CM).
THIRD LAYER (RR, MM, AND CM):
The RR layer (radio resource) is the lower layer that manages both radio
and fixed link, between the MS and the MSC. The work of the RR layer is to
setup, maintenance and release of radio channels .
The MM layer is above the RR layer. It handles the functions of the
mobility of the subscriber, authentication and security and Location
management...
The CM layer is the topmost layer of the GSM protocol stack. This layer
is responsible for Call Control, Supplementary Service Management, and Short
Message Service Management call establishment, selection of the type of service
(including alternating between services during a call), and call release.
SECOND LAYER:
To Signal between entities in a GSM network requires higher layers. For
this purpose, the LAPDm protocol is used at the Um interface for layer two.
LAPDm is called link access procedure for the D-channel (LAPD. LAPDm gives
reliable data transfer over connections, sequencing of data frames, and flow
control.
PHYSICAL LAYER:
The physical layer handles all radio-specific functions. It multiplexes the
bursts into a TDMA frame, synchronization with the BTS, detection of idle
channels, and measurement of the channel quality on the downlink.
The physical layer at Um uses GMSK for digital modulation and performs
encryption/decryption of data.
The main tasks of the physical layer comprise channel coding and error
detection/correction.
It uses forward error correction (FEC) schemes.
The GSM physical layer tries to correct errors, but it does not deliver
erroneous data to the higher layer.
The physical layer does voice activity detection (VAD)
CONNECTION ESTABLISHMENT
Security in GSM
Security services
Access control/authentication
User SIM (Subscriber Identity Module): secret
PIN (personal identification number)
SIM network: challenge response method
Confidentiality
voice and signaling encrypted on the wireless link (after
successful authentication)
Anonymity
temporary identity TMSI (Temporary Mobile Subscriber
Identity)
newly assigned at each new location update (LUP)
encrypted transmission
3 algorithms specified in GSM
A3 for authentication (“secret”, open interface)
A5 for encryption (standardized)
A8 for key generation (“secret”, open interface)
M.I.E.T./CSE/III YR/MOBILE COMPUTING
IT6601 – MOBILE COMPUTING
AUTHENTICATION
Authentication key Ki,, the user identification IMSI, and the algorithm
used for authentication A3 is stored in the sim. This is known only to the MS
and BTS. Authentication uses a challenge-response method: The access
control AC (BTS) generates a random number RAND this is called as
challenge, and the SIM within the MS reply with SRES (signed
response) .This is called as SRES response.
N/W side:
BTS send random number RAND to MS.
MS side:
MS prepares SRES response by giving the random number RAND and
Ki, to the algorithm A8.The output is the SRES which is sent to the BTS.
BTS side:
BTS also prepares the same SRES and the output from the MS is compared
with result created by the BTS.
If they are the same, the BTS accepts the subscriber, otherwise the
subscriber is rejected.
ENCRYPTION
To maintain the secrecy of the conversation, all messages are encrypted
in GSM. Encryption is done by giving the cipher key Kc with message to the
algorithm A5 .Here the key is generated separately.
Intra-cell handover:
Within a cell, narrow-band interference could make transmission at
a certain frequency impossible.
The BSC could then decide to change the carrier frequency (scenario
1).
Inter-cell, intra-BSC handover:
The mobile station moves from one cell to another, but stays within
the control of the same BSC.
The BSC then performs a handover, assigns a new radio channel in
the new cell and releases the old one (scenario 2).
Inter-BSC, intra-MSC handover:
The next steps include the establishment of the link (this includes layer
two link
Establishment and handover complete messages from the MS).
the MS has then finished the handover, release its old resources to the old
BSC and BTS
Packet data is transmitted from a PDN, via the GGSN and SGSN directly
to the BSS and finally to the MS.
The MSC, which is responsible for data transport in the traditional circuit-
switched GSM, is only used for signaling in the GPRS scenario.
Before sending any data over the GPRS network, an MS must attach to it,
following the procedures of the mobility management. A mobile station must
register itself with GPRS network.
GPRS attach
GPRS detach
GPRS detach can be initiated by the MS or the network.
The attachment procedure includes assigning a temporal identifier, called a
temporary logical link identity (TLLI), and a ciphering key sequence number
(CKSN) for data encryption.
A MS can be in 3 states:
IDLE
READY
STANDBY
In idle mode an MS is not reachable and all context is deleted.
In the standby state only movement across routing areas is updated to the
SGSN but not changes of the cell.
In the ready state every movement of the MS is indicated to the SGSN
M.I.E.T./CSE/III YR/MOBILE COMPUTING
IT6601 – MOBILE COMPUTING
PROTOCOL ARCHITECTURE
BSSGP does not perform error correction and works on top of a frame
relay (FR) network.
Finally, radio link dependent protocols are needed to transfer data over the
Um interface.
The radio link protocol (RLC) provides a reliable link.
UNIT 4
MOBILE AD HOC NETWORKS
Had adopted the term "Ad hoc networks" and the research community had
started to look into the possibility of deploying Ad hoc networks in other
areas of application.
4.1 BASIC CONCEPTS OF MOBILE AD HOC NETWORKS
An Ad hoc network is a collection of mobile nodes, which forms a
temporary network without the aid of centralized administration or standard
support devices regularly available as conventional networks. These nodes
generally have a limited transmission range and, so, each node seeks the
assistance of its neighboring nodes in forwarding packets and hence the nodes
in an Ad hoc network can act as both routers and hosts. Thus a node may
forward packets between other nodes as well as run user applications. By
nature these types of networks are suitable for situations where either no fixed
infrastructure exists or deploying network is not possible. Ad hoc mobile
networks have found many applications in various fields like military,
emergency, conferencing and sensor networks. Each of these application areas
has their specific requirements for routing protocols.
Since the network nodes are mobile, an Ad hoc network will typically
have a dynamic topology, which will have profound effects on
network characteristics. Network nodes will often be battery powered, which
limits the capacity of CPU, memory, and bandwidth. This will require network
functions that are resource effective. Furthermore, the wireless (radio) media
will also affect the behavior of the network due to fluctuating link bandwidths
resulting from relatively high error rates. These unique desirable features pose
several new challenges in the design of wireless Ad hoc networking protocols.
Network functions such as routing, address allocation, authentication and
authorization must be designed to cope with a dynamic and volatile network
topology. In order to establish routes between nodes, which are farther than a
single hop, specially configured routing protocols are engaged. The unique
feature of these protocols is their ability to trace routes in spite of a dynamic
topology. In the simplest scenarios, nodes may be able to communicate directly
with each other, for example, when they are within wireless transmission
range of each other. However, Ad hoc networks must also support
M.I.E.T./CSE/III YR/MOBILE COMPUTING
IT6601 – MOBILE COMPUTING
Multi-hop radio relaying- When a source node and destination node for a
Message is out of the radio range, the MANETs are capable of multi-hop
routing.
Distributed nature of operation for security, routing and host
configuration. A centralized firewall is absent here.
The nodes can join or leave the network anytime, making the network
topology dynamic in nature.
Mobile nodes are characterized with less memory, power and light
weight features.
The reliability, efficiency, stability and capacity of wireless links are
often inferior when compared with wired links. This shows the
fluctuating link bandwidth of wireless links.
Mobile and spontaneous behavior which demands minimum human
intervention to configure the network.
All nodes have identical features with similar responsibilities and
capabilities and hence it forms a completely symmetric environment.
High user density and large level of user mobility.
Nodal connectivity is intermittent.
Distributed Operation
Since there is no background network for the central control of the
network operations, the control and management of the network is distributed
Among the terminals. The nodes involved in a MANET should collaborate
amongst themselves and each node acts as a relay as needed to implement
functions like security and routing.
Since the n o d e s are mobile, the network topology may change rapidly
and predictably and the connectivity among the terminals may vary with time.
MANET should adapt to the traffic and propagation conditions as well as the
mobility patterns of the mobile network nodes. The mobile nodes in the network
dynamically establish routing among themselves as they move about, forming
their own network on the fly. Moreover, a user in the MANET may not only
operate within the Ad hoc network, but may require access to a public fixed
network (e.g. Internet).
and comfort for passengers. To this end a special electronic device will be placed
inside each vehicle which will provide Ad hoc Network connectivity for the
passengers. This network tends to operate without any infrastructure or legacy
client and server communication. Each vehicle equipped with VANET device
will be a node in the Ad hoc network and can receive and relay others messages
through the wireless network. Collision warning, road sign alarms and in-place
traffic view will give the driver essential tools to decide the best path along the
way. There are also multimedia and internet connectivity facilities for passengers,
all provided within the wireless coverage of each car. Automatic Payment for
parking lots and toll collection are other examples of possibilities inside
VANET. Most of the concerns of interest to MANETS are of interest in
VANETS, but the details differ. Rather than moving at random, vehicles tend to
move in an organized fashion. The interactions with roadside equipment can
likewise be characterized fairly accurately. And finally, most vehicles
are restricted in their range of motion, for example by being constrained to follow
a paved high way.
Ad hoc networking has been a popular field of study during the last few
years. Almost every aspect of the network has been explored in one way or other
at different level of problem. Yet, no ultimate resolution to any of the problems
is found or, at least, agreed upon. On the contrary, more questions have arisen.
The topics that need to be resolved are as follows
Scalability.
Routing.
Quality of service
Client server model shift Security
Energy conservation
Node cooperation
Interoperation
The approach to tackle above aspects has been suggested and possible
update solutions have been discussed [31]. In present research work one of the
aspects “the routing” has been reconsidered for suitable protocol performing
better under dynamic condition of network.
Scalability
Most of the visionaries depicting applications which are anticipated to
benefit from the Ad hoc technology take scalability as granted. Imagine, for
example, the vision of ubiquitous computing where networks can be of "any
size". However, it is unclear how such large networks can actually grow. Ad
hoc networks suffer , by nature, from the s c alabilit y problems in
c a p a ci t y. To exemplify this , we may look into simple interference
studies. In a non- cooperative network, where Omni-directional antennas
are being used, the throughput per node decreases at a rate 1/√N, where N
is the number of nodes
That is, in a network with 100 nodes, a single device gets, at most,
Approximately one tenth of the theoretical network data rate. This problem,
however, cannot be fixed except by physical layer improvements, such as
directional antennas .If the available capacity like bandwidth, radiation pattern of
antenna sets some limits for communications. This demands the formulation of
new protocols to overcome circumvents. Route acquisition, service location and
encryption key exchanges are just few examples of tasks that will require
considerable overhead as the network size grows. If the scarce resources are
wasted with profuse control traffic, these networks may see never the day dawn.
Therefore, scalability is a boiling research topic and has to be taken into account
in the design of solutions for Ad hoc networks.
Routing
Routing in wireless Ad hoc networks is nontrivial due to highly dynamic
Environment. An Ad hoc network is a collection of wireless mobile nodes
dynamically forming a temporary network without the use of any preexisting
network infrastructure or centralized administration. In a typical Ad hoc
network, mobile nodes come together for a period of time to exchange
information. While exchanging information, the nodes may continue to move,
and so the network must be prepared to adapt continually to establish routes
among themselves without any outside support.
Quality of Service
The heterogeneity o f e x i s t i n g I n t e r n e t a p p l i c a t i o n s h a s
c h a l l e n g e d network designers who have built the network to provide best-
effort service only. Voice, live video and file transfer are just a few
applications having very diverse requirements. Qualities of Service (QoS)
aware solutions are being developed to meet the emerging requirements of
these applications. QoS has to be guaranteed by the network to provide certain
performance for a given flow, or a collection of flows, in terms of QoS
parameters such as delay, jitter, bandwidth, packet loss probability, and
so on. Despite the current research efforts in the QoS area, QoS in Ad hoc
networks is still an unexplored area. Issues of QoS in robustness, QoS in
routing policies, algorithms and protocols with multipath, including
preemptive, priorities remain to be addressed.
Energy Conservation
Energy conservative networks are becoming extremely popular within the
Ad hoc networking research. Energy conservation is currently being addressed
in every layer of the protocol stack. There are two primary research topics
which are almost identical: maximization of lifetime of a single battery
and maximization of the lifetime of the whole network. The former is related
to commercial applications and node cooperation issues whereas the latter is
more fundamental, for instance, in military environments where node cooperation
M.I.E.T./CSE/III YR/MOBILE COMPUTING
IT6601 – MOBILE COMPUTING
Interoperation
The self-organization of Ad hoc networks is a challenge when two
independently formed networks come physically close to each other. This is
an unexplored research topic that has implications on all levels on the
system design. When two autonomous Ad hoc networks move into same
area the interference with each other becomes unavoidable. Ideally, the
networks would recognize the situation and be merged. However, the issue
of joining two networks is not trivial; the networks may be using different
synchronization, or even different MAC or routing protocols. Security also
becomes a major concern. Can the networks adapt to the situation? For
example; a military unit moving into an area covered by a sensor network
could be such a situation; moving unit would probably be using different
routing protocol with location information support, while the sensor network
would have a simple static routing protocol. Another important issue comes into
picture when we talk about all wireless networks. One of the most important
aims of recent research on all wireless networks is to provide seamless
integration of all types of networks. This issue raises questions on how the Ad
hoc network could be designed so that they are compatible with wireless LANs,
3 Generation (3G) and 4G cellular networks.
ISSUES TO BE CONSIDERED WHEN DEPLOYING MANET
The following are some of the main routing issues to be considered when
Deploying MANETs
Unpredictability of environment Unreliability of Wireless Medium
Resource- Constrained Nodes
Dynamic Topology
Transmission Error
Node Failures
Link Failures
Route Breakages
Congested Nodes or Links
Node Failures: Nodes may fail at any time due to different types of hazardous
conditions in the environment. They may also drop out of the network either
voluntarily or when their energy supply is depleted.
M.I.E.T./CSE/III YR/MOBILE COMPUTING
IT6601 – MOBILE COMPUTING
Congested Nodes or Links: Due to the topology of the network and the nature
of the routing protocol, certain nodes or links may become over utilized, i.e.,
congested. This will lead to either larger delays or packet loss.
4.5 ROUTING PROTOCOLS
Collection of wireless mobile nodes (devices) dynamically forming a
temporary network without the use of any existing network infrastructure
or centralized administration
– useful when infrastructure not available, impractical, or expensive
– military applications, rescue, home networking
– Data must be routed via intermediate nodes.
Proactive Routing Protocols:
Proactive protocols set up tables required for routing regardless of any
traffic .This protocol is based on a link-state algorithm. Link-state
algorithms flood their i n f o r ma t i o n about neighbors periodically with
routing table.
Ex: Destination sequence distance vector (DSDV)
Advantage of proactive
QoS guaranteed.
The routing tables reflect the current topology with a certain precision.
Disadvantage
erheads in lightly loaded networks
Next Hop: number of nodes the source will jump to reach the Destination.
Metric: Number of Hops to Destination
Sequence Number: Seq No of the last Advertisement
Install Time when entry was made
networks (MANET)
Intended for networks that may contain thousands of nodes
One of a class of demand-driven protocols
The route discovery mechanism is invoked only if a route to a destination
is not known.
Route requests
This Protocol finds out multicast routes on demand using a
broadcast route discovery mechanism. When a node wishes to join the
multicast group or it wants to send packets to the group, it needs to find
a route to the group. This is done using two messages; RREQ and RR
EP.
When a node wants to join a multicast group, it
sends a route request (RREQ) message to the group. Only the members of
the multicast group respond to the join RREQ. If any nonmember receives
a RREQ it rebroadcast the RREQ to its neighbors. But if the RREQ is not
a join request any node of the multicast group may respond.
Figure 1 depicts the propagation of RREQ.
Pointers:
Every node sets up pointers to determine the reverse route in its routing table
when receiving a RREQ. This entry is used later to pass on a response back to
the route requester. This entry is not activated until or unless it gets multicast
activation message from the requester. The responding node unicasts the route
response RREP (figure 2) back to the route requester after the completion of
necessary updates on it routing table.
Route reply
When a node receives a RREQ for a multicast route, it first checks the
Join -flag in the message. If the Join -flag is set, then the node may answer
only if it is itself a member of the multicast tree and its sequence number for
this tree greater than the number in the RREQ.
If the Join -flag is not set, then any node may answer
Creation of the multicast tree
The first node that wants to join the multicast group, selects itself as
the multicast group leader. The reason of this node is to keep the count of
the sequence number that is given to the multicast group address.
The group leader assigns the sequence number by sending periodic Group
Hello messages. Group Hellos messages are used to distribute group
information.
Message types
MAODV uses four different message types for creation of the
multicast routing table. These messages are;
Route request (RREQ) Route reply (RREP) Multicast activation (MACT)
Group hello (GRPH)
M.I.E.T./CSE/III YR/MOBILE COMPUTING
IT6601 – MOBILE COMPUTING
Control tables
MADV has a routing table for the multicast routes. The entries in this
table have the following attributes;
Multicast group IP address Multicast group leader IP address
Multicast group sequence number Next hop(s) Hop count to next
multicast group member Hop count to multicast group leader
In addition, a node may also keep a multicast group leader table, which is
used to optimize the routing. This has the following fields;
The MACT message has four flags. These are join, prune, grpld r and update.
The join is used, if the node wishes to join the tree p r u n e is for leaving the
tree. The two other messages are used, if the tree breaks and must be
repaired.
Leaving the tree
The membership of the multicast group is dynamic. Each node can join
or leave the group at any time. The leaving of the tree is done by sending the
MACT message with the prune-flag set.
Security Approaches
Intrusion Detection System (IDS)
Automated detection
Subsequent generation of an alarm
IDS is a defense mechanism that continuously monitors the
network for unusual activity and detects adverse activities
Capable of distinguishing between attacks originating from inside the
network and external ones
Intrusion detection decisions are based on collected audit data
UNIT V
MOBILE PLATFORMS AND APPLICATIONS
5.1 Mobile Device Operating Systems
Mobile Operating System Structure
JAVA ME Platform
Special Constrains & Requirements
Commercial Mobile Operating Systems
Windows Mobile
Palm OS
Symbian OS
iOS
Android
Blackberry Operating system
an operating system
that is specifically designed to run on mobile devices such as mobile phones,
smartphones, PDAs, tablet computers and other handheld devices.
include processor, memory, files, and various types of attached devices such as
camera, speaker, keyboard and screen.
and networks.
Control, data and voice communication with BS using different types of
protocols.
A mobile OS is a software platform on top of which other programs called
application programs, can run on mobile Devices such as PDA, cellular phones,
smart phone and etc.
Features
Java ME Platform
J2ME platform is a set of technologies, specifications and libraries developed
for small devices like mobile phones, pagers, and personal organizers.
va ME was designed by Sun Microsystems. It is licensed under GNU
General Public License Configuration: it defines a minimum platform
including the java language, virtual machine features and minimum class
libraries for a grouping of devices. E.g. CLDC
Profile: it supports higher-level services common to a more specific class of
devices. A profile builds on a configuration but adds more specific APIs to make
a complete environment for building applications. E.g. MIDP
Windows Mobile OS
Windows Mobile is a compact operating system designed for mobile devices and
based on Microsoft Win32.
Palm OS
Palm OS is an embedded operating system designed for ease of use with a touch
screen-based graphical user interface.
on a wide variety of mobile devices such as
smartphones, barcode readers, and GPS devices.
-based processors. It is designed asa 32-b
The key features of Palm OS
-tasking OS:
but it does not expose
tasks or threads to user applications. In fact, it is built with a set of threads
that cannot be changed at runtime.
higher) does support multiple threads but doesn’t
support creating additional processes by user applications. Expansion support:
This capability not only augments the memory and I/O, but also it facilitates
data interchanges with other Palm devices and with other non-Palm devices
such as digital cameras, and digital audio players.
synchronization with PC computers
Symbian OS Features
Multimedia
recording, playback and streaming,
and Image conversion.
-server architecture
-efficient inter process communication. This
feature also eases porting of code written for other platforms to Symbian OS.
A Hardware Abstraction Layer (HAL)
layer provides a consistent interface to hardware and supports device-
independency
s hard real-time guarantees to kernel and user mode threads
5.4 Software Development Kit
5.4.1 iPhone OS
5.4.2 Android
Google owns a trademark for Android – Google’s permission is necessary to
use Android’s trademark
made an agreement with Android device
manufacturers (including Samsung and HTC) to collect fees from them.
source code is available under Apache License version 2.0. The
Linux kernel changes are available under the GNU General Public License
version 2.
Android is Linux based mobile OS for mobile devices such as Tablets and
Smartphones.
Google faced many patent lawsuits against Android such as by Oracle in 2006
that included patents US5966702 and US6910205.
5.4.3 Blackberry OS
The first operating system launched by Research in Motion
(RIM the company behind BlackBerry)
-
Interface).
Blackberry OS Features
Gestures
Multi-tasking
Blackberry Hub
Blackberry Balance
Keyboard
Voice Control
– Microkernel
Advantages of Blackberry OS
It provides good security for data.
Dalvik, a custom virtual machine designed for embedded use which runs on top
of a Linux kernel.
Android SDK Environment
The Android Development Tools (ADT) plugin for Eclipse adds powerful
extensions to the Eclipse integrated development environment. It allows you to
create and debug Android applications easier and faster.
Advantages:
inside the Eclipse
IDE. For example, ADT lets you access the many capabilities of the DDMS
tool: take screenshots, Manage port‐forwarding, set breakpoints, and view
thread and process information directly from Eclipse.
promotion: Dedicated content channels and feature banners that
provide prime real estate to help distribute your app to the right users.
discovery: Universal search, top lists, social sharing, reviews, and ratings
help users find the right app.
The Games app (in combination with Score loop): A specialized portal for
gaming allowing multiplayer, social connections.
Disadvantages of Blackberry OS
New operating system was introduced too late into the ever-growing market.
yet to have as many apps available for purchase or download compared to
other phone in the market.
Consumers have switched over to other devices made by Apple or Android.
Once an application is opened, you have to swipe up
to return to the main display.
Android Software Development Kit
A software development kit that enables developers to create applications
for the Android platform.
Android SDK includes sample projects with source code, development
tools, an emulator, and required libraries to build Android applications.
Dalvik, a custom virtual machine designed for embedded use which runs on top
of a Linux kernel.
Android SDK Environment
The AndroidDevelopment Tools (ADT) plugin for Eclipse adds powerful
extensions to the Eclipse integrated development environment. It allows you to
create and debug Android applications easier and faster.
Advantages:
inside the Eclipse
IDE. For example, ADT lets you access the many capabilities of the DDMS
tool: take screenshots,
Manage port‐forwarding, set breakpoints, and view thread and process
information directly from Eclipse.
5.5 M- Commerce
M-commerce (mobile commerce)is the buying and selling of goods and
services through wireless handheld devices such as cellular telephone and
personal digital assistants (PDAs).Known as next- generation e-commerce, m-
commerce enables users to access the Internet without needing to find a place
to plug in.
-commerce, which is based on the Wireless
Application Protocol (WAP), has made far greater strides in Europe, where
mobile devices equipped with Web-ready micro-browsers are much more
common than in the United states.
M-commerce can be seen as means of selling and purchasing of goods and
services using mobile communication devices such as cellular phones, PDA s
etc, which are able to connect to the Internet through wireless channels and
interact with e- commerce systems
-commerce can be referred to as an act of carrying- out transactions using a
wireless device
is understood as a data connection that results in thetransfer of value in
exchange for information, services or goods. It can also be seen as a natural
extension of e-commerce that allows users to interact with other users or
businesses in a wireless mode, anytime/anywhere.
perceived to be any electronic transaction or information interaction
conducted using a mobile device and mobile network thereby guaranteeing
customers virtual and physical mobility, which leads to the transfer of real or
perceived value in exchange for personalized, location-based information,
services, or goods.
Application Protocol
—Internet-enabled cell phones with attached applications
5.6 M-Commerce Structure
Customer requirements:
Merchant benefits:
untrusted code
Does not differentiate trusted local code from untrusted code downloaded from
the Internet. So, there is no access control!!
-safe.