in JNTU World
LECTURE NOTES
NT
J MOBILE IV
U
B. Tech (JNTU)
COMPUTING
ON
W
I semester
orld
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Unit-1
Introduction to Mobile Computing
The rapidly expanding technology of cellular communication, wireless LANs, and satellite
services will make information accessible anywhere and at any time. Regardless of size,
most mobile computers will be equipped with a wireless connection to the fixed part of
the network, and, perhaps, to other mobile computers. The resulting computing
environment, which is often referred to as mobile or nomadic computing, no longer
requires users to maintain a fixed and universally known position in the network and
enables almost unrestricted mobility. Mobility and portability will create an entire new
class of applications and, possibly, new massive markets combining personal computing
and consumer electronics.
Mobile Computing is an umbrella term used to describe technologies that enable
people to access network services anyplace, anytime, and anywhere.
A communication device can exhibit any one of the following characteristics: ➢ Fixed
and wired: This configuration describes the typical desktop computer in an office.
Neither weight nor power consumption of the devices allow for mobile usage. The
devices use fixed networks for performance reasons.
➢Mobile and wired: Many of today’s laptops fall into this category; users carry the laptop
from one hotel to the next, reconnecting to the company’s network via the telephone
network and a modem.
➢ Fixed and wireless: This mode is used for installing networks, e.g., in historical
buildings
to avoid damage by installing wires, or at trade shows to ensure fast network setup.
➢ Mobile and wireless: This is the most interesting case. No cable restricts the user,
who can roam between different wireless networks. Most technologies discussed in this
book deal with this type of device and the networks supporting them. Today’s most
successful example for this category is GSM with more than 800 million users.
APPLICATIONS OF MOBILE COMPUTING
In many fields of work, the ability to keep on the move is vital in order to utilise time
efficiently. The importance of Mobile Computers has been highlighted in many fields of
which a few are described below:
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
a. Vehicles: Music, news, road conditions, weather reports, and other broadcast
information are received via digital audio broadcasting (DAB) with 1.5 Mbit/s. For
personal communication, a universal mobile telecommunications system (UMTS) phone
might be available offering voice and data connectivity with 384 kbit/s. The current
position of the car is determined via the global positioning system (GPS). Cars driving in
carry accident. specialists of the Business: customers. can with new travelling that
track With and a to triggered, communication worst revise service files powerful the
N
proposals. help a wireless of vital local information office all on All
cases, each the salesman can Managers They provider. information his activities ad-
hoc but the presentation synchronization and be An about access, other only or
T
Therefore, the necessary can consulted saves ambulance her in
network police decentralized, today keep possible access Buses, to the can of laptop
the time about their case their a and use to laptop steps mobile needs for safe
U
the trucks, for and take reflect new with of home
mechanisms ambulance travelling injured an mobile the latest distance. for money.
natural can advantage offers early instant wireless computers a fast and the this base,
high-quality market be persons computers exchange trains diagnosis. current particular
and disasters employees, turned In service access ad-hoc are which
W
case of call share can are this situation, needed to into
meetings of will of to already such Wireless wireless type networks leverage helps say,
the information. information. an information the to a be as accident, hospital of to true
critical keep informed company’s to to transmitting ensure hurricanes accident for
o
connection networks enable improve survive. mobile competitive
discussing databases They presentations from At in not data via emergency the can a
office, only database: or are organization small consistency. an the can company
r
maintenance to be earthquakes. responds emergency the advantages.
consistent will a prepared communicate scene but recess, hospital only the
ld
situations
low satellite, efficient network. The reasons, via thus e.g., sensors, of detection,
together. valuable changes Issues: constraints: and information for of and travel GPS,
Mobile wireless link Although Wired remote Radio result wireless communication
T
can games issues: it Another or delays discovery contact walls guide in
connection this of are a a protocols loss concert can the for displays tell compared local
situation. continuously wireless environmental e.g., protocol provide rates cannot
connection-service field you tradeshows, environment: base in to losses ad-hoc with for
W
in something the networks of wire Other to historical up-to-
o
the historic against destination transmission the for be same or in
Wireless used for history signal wireless higher Researchers where applications
r
evening buildings. interference as at weather to where any soon and power
N
frequency, link layer stack lower of model. layer: physical need of
figure layer: a data of of data comprising data layer all the the reference End-systems,
a This signal streams, shows The stream of onto layer. physical receiver frame).
T
services. the is main the a layers. detection the of Applications the
U
protocol Intermediate application such Simplified into
o
layer, communicate into on system is the the selection, in and
responsible the the a may interworking network system the bit on medium, transmission
and synchronization example, stream. the disturb is generation according
r
sender with layer, responsible for For multiplexing the unit, need each
ld
a side. data scheme) wireless
signal),
reliable do to of a other
(i.e., link
The full
not the
the for
point-to-point
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
connection between two devices or a point-to-multipoint connection between one
sender and several receivers.
● Network layer: This third layer is responsible for routing packets through a network or
establishing a connection between two entities over many other intermediate systems.
Important functions are addressing, routing, device location, and handover between
different networks.
● connection
● support service the web GSM and GSM GSM used different a bearer, Bearer GSM
permit Transparent transmit occur. (FEC), data data bearer flow protocol (HDLC),
(RLP). and a interesting most portable and of, Handover, of 800 layer: Data special
bearer These layer: and codes for transmission for supplementary services, use
support successful million GSM This example, data transmission and data in device.
T
This protocols redundancy quality for are Finally, selective-reject
U
can the of of use is only has services. in and comprises up
different be into applications and layers on architecture, mobile used more the a GSM
Transparent the characteristics, to improved mechanisms constant top use New the
9600 transparent or interworking in than applications, two synchronous of
telecommunication the data has interruptions mechanisms the data all mechanisms 190
bit/s and functions delay defined (complemented stream with reference
W
transmission Radio services. bearer to countries. three for
and trigger and bearer the with adaptive three and non-voice or interface, throughput
due to for of use services wireless model asynchronous of existing implement helps
retransmission the services, different GSM to data of system oriented high-level
o
handover. by applications physical forward to to transmission, do
r
layer error of the world Bearer that the to correction erroneous layers an
Services integration Functions transmission. a Localization link recover (layer the the
ld
of correction can world-wide radio end-to-end today.
services:
services that original
control original handle
errors make
1) data. link It lost
and can are
of
to is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Using transparent and non-transparent services, GSM specifies several bearer services
for interworking with PSTN, ISDN, and packet switched public data networks (PSPDN)
like X.25, which is available worldwide. Data transmission can be full-duplex,
synchronous with data rates of 1.2, 2.4, 4.8, and 9.6 kbit/s or full-duplex, asynchronous
from 300 to 9,600 bit/s.
Tele services: GSM mainly focuses on voice-oriented tele services. These comprise
encrypted voice transmission, message services, and basic data communication with
terminals provision for communication service mandatory priority, closest message
Sending for quotes, message ring the with fax, the Supplementary supplementary
telephony identification, incoming/outgoing closed
J analog transmission
voice “serious” which mobile tones user The but emergency offered and possibly
of of worldwide. redirection, while multiparty may text, integrate digital the SMS
Advice SMS, In which pictures A these such is addition according PSTN other useful
U
and and vary way. logos, other the is voice the computer
offers as possible services small of the In free communication (GIF, codecs emergency
from or But connections, displaying service ring enhanced this Charge or to
transmission. transmission ISDN to transmission of cameras. tele with tones, service,
the provider JPG, forwarding during offer are charge. modems and for (e.g., ITU-T
W
(AoC) MMS, used horoscopes WBMP), message road
number very bearer Another various and data fax fax). of may to Special This
standards for used etc. of data simple EMS will conditions, animated or provider.
services, be the The messages of voice connection short Standard service (eg
enhancements non-voice is automatically in, available. and codecs transmission was
transmitted primary ongoing message T.4 e.g., 911, love transmission. video
o
pictures, Typical hardly GSM and (EMS), e-mail (coder/decoder) of
ISDN letters. fax 999). tele goal up also T.30 clips transfer calls, machines. providers
r
used. as be to service of small for services headers of features offers digital
This has using etc. set 160 analog GSM It the MMS is barring images can up the and
ld
characters. modems. is service the a data are or are can
with standard was Another group such data be highest comes offers larger short
stock
offer used used
over
user and the the
for
as of is
3
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
GSM Architecture
A GSM system consists of three subsystems, the radio sub system (RSS), the network
and switching subsystem (NSS), and the operation subsystem (OSS).
integrated profile, that related from HLR register register location is Subsystem: the
T
with needed functions. stores PCS Functional the (VLR): (HLR):
U
information provider, by MSC. permanent the The The It It
W
is a she MS activity order responsible about is of system that
roams registered a to GSM used contains subscribers, status. service includes into for
System
o
for in When a storage temporary visiting performing the new the HLR
r
including an MSC following and subscribers. of individual information that
mobile Mobile the Base by maintain to/from Base links as BTS. Base station. connected
interface FDMA each network the network. OSS handover, Subsystem a system.
N
mobile cell between operation station station A transceiver base
and to cost-effective stations. via between etc.)The switching number the and of A
operator in all radio contains activities to allows the mobile BTS identity It the wireless
station stations equipment controllers subsystem cell MS controls Support the (RSS):
O network. and connections of BTS the can interface configuration via station MSC
T
center monitors engineers BSC’s equipment all register support
controller RSS that network (MS) the is the form calls support the system: and in the
(BSC): (BSS): (MSC): A Um and are radio (BTS): are the group (dashed to and radio
U
and (EIR): a mechanisms BTS. system to to part. the served
required interface, and switching radio that (BSC). data, the for subsystem A The
monitor, controls an The NSS The equipment of The It from Besides GSM prevents
lines). It base MS, (OSS). is BTS’s by cell centralized, BSC and MSC is via a BTS
operations for other and The high system and a the station network coding/decoding
control or, necessary diagnose the provides a database are a performs (RSS) The
W
MSC. calls BSC, (transceivers handles to system. BSS
capacity telephone using A GSM controlled the and interface OSS of subsystem from
regional comprises the and performs BSC comprises and all radio sectorized to
network. that for the The the BSS is switch the the stolen, and troubleshoot
maintenance the telephony via wireless by radio frequency contains and purpose (solid
BSC. control of contains data and functional an the (BSS). many that all
o
antennas) voice, OSS all unauthorized antennas, BSC. interface lines)
Abis systems. Implementation local functions provides functions transmission of radio
information switching BSSs, several (RF) The provides and OSS every interface. and
r
center entity needed operational figure specific power to several rate each
the functions is BTSs. aspect necessary and or the functions to from a connection
ld
(OMC) adaptation shows about controlled to offer
J available 4.615ms rate • to The field logic the connection interference the
different channels The Apart Two Each 26-frame This of frames sequence channels
N
number. the remaining channel: about parameters strongest
contains (577 channel for first in multiframe receiver types of inside a from are a the
path the frequency 271kbps can and s) slot. multiframe Logic setup synchronizes s
and grouped of with user duration corresponding frequency x channel a signal performs
T
30.5 delays occupy the last performance. 8 time channels, of frame
between channel: or is = neighbouring three normal the per μs used 4.615 network in
slot. correction and into a are defined with (4.615ms TDMA receiver case hierarchy
U
part a carriers bits to to the two specific used namely As MS
ms). burst, logical carry 156.25 give of of timeslots of MS The control shown, types and
frame. by the multi-path as a The to channels, is the burst x normal with traffic training
physical guard ETSI divided specifying physical task. channels the BTS, 26 bits of
transmitter bits data. the = the multiframes: allows current of channels per Consequently
120 and per (1993a) burst burst space the BTS a propagation.
W
into sequence channel channels are timeslot.
synchronization timeslot finally ms) both, the physical (tail) path frames is in time
multiplexed to and comprising only MS time, defines avoid or a a propagation are to in
and their and dummy The carrier to even of the 546.5 turn an A channel. the all
overlapping correct 8 logical frame flag duration associated four data access
o
set timeslots the middle on into of μs frequency burst burst and to S
entire of 26 more long duration the characteristics the During indicates channels 0 burst
a off. of TDMA and of physical with logical is local of channel. control and with
r
a bursts a used can slot is and approximately TDMA this yield contains an
present. TDMA a for and bursts frame gross data data 148
the
the to to to
to
is
Downloaded From JNTU World (http://www.alljntuworld.in)
s (15/26
www.alljntuworld.in JNTU World
235.4 ms) comprising 51 TDMA frames. This multiframe is exclusively used for control
channels. The multiframe structure is further multiplexed into a single superframe of
duration of 6.12sec. This means a superframe consists of
• 51 multiframes of 26 frames.
• 26 multiframes of 51 frames. The last multiplexing level of the frame hierarchy,
consisting of 2048 superframes (2715648 TDMA frames), is a hyperframe. This long
time period is needed to support the GSM data encryption mechanisms. The frame
hierarchy is shown below:
GSM Frame Hierarchy
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
• 51-frame multiframe (4.615ms x 51
www.alljntuworld.in JNTU World
There are two different types of logical channel within the GSM system: Traffic channels
(TCHs), Control channels (CCHs).
Traffic Channels: Traffic channels carry user information such as encoded speech or
user data. Traffic channels are defined by using a 26-frame multiframe. Two general
forms are defined: Uplink simplifies transmit multiplexes CHannel in handover Control
for random channel into J order i. ii. control the However, and 51-frame to
N
are access and (SACCH). Channels: process. Full Half the transmit
procedures downlink defined: two receive duplexing rate rate etc. multiframe. if In types
T
traffic control traffic required, between total Broadcast, are Control at
such the separated of function channels 24 channels information as TCH/F same logical
U
a base channels location Fast Common in (TCH/F), by time.
(TCH/H), station are Associated channels, mobile three at registration, transmitted carry
The a and and higher slots at terminals at 26-frame Dedicated. system a a mobile a
W
(bursts) gross Control gross bit TCH and mobile rate. bit
signalling bit design, one station. multiframe in CHannel and rate This Control rate the
o
SACCH. station of of 26-multiframe a is as Three 22.8 11.4 usually
Slow and mobiles channels (FACCH) synchronisation, structure, kbps kbps. categories
r
synchronisation Associated the (456bits will are case can structure. shown
ld
not multiplexed during steal of / need 20ms)
Control
paging, control below
TCH This
data the to
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
➢ Broadcast control channel (BCCH): A BTS uses this channel to signal information to
all MSs within a cell. Information transmitted in this channel is, e.g., the cell identifier,
options available within this cell (frequency hopping), and frequencies available inside the
cell and in neighboring cells. The BTS sends information for frequency correction via the
frequency correction channel (FCCH) and information about time synchronization via
the synchronization channel (SCH), where both
➢ uses signalling Protocols channels Common between uses up The channel) in that
Dedicated unidirectional, established channel authentication, SDCCH it, signal a
the GSM is call, not shown amounts power of can measurement necessary protocol
paging already has MS (SDCCH) using are bursts includes performed is for use
control it system. control The a used a subchannels implements and uses level.
T
below. digital slow a registration the TCH of slotted into TCH channel
FACCH exists, in BS data to in the the The following Finally, channel associated with
channel a end-to-end, GSM exchange of modulation the is Layer with or TDMA in
U
random Aloha. creation BTS exchanged the SDCCH GSM
(PCH) less a of case uses multiple or is low the if the channel 1 uses (CCCH): time.
(DCCH): channels other more structured frame, This of the is dedicated uses system
BCCH. data access BTS, but of for for the the handovers and time access via data
signaling bursts is only paging rate further a synchronization quality access physical
performs where the it information, fast are channel All slots While needed into
W
between (782 control uses (all CCCH. according the
(AGCH) layers toward a the channels long send five a MS occur BTS, over cell The
TCH. to If channel dedicated an This be as used different have all depending
r
connection data control the may physical an detection with MS to transmitted
an associated Each have radio-specific MS, can air signal by to of to MS wants quality
ld
access other interface. TCH the data, the exchange
NTU
J
World
www.alljntuworld.in JNTU World
connection between two terminals and is used by higher layers for call establishment, call
clearing and change of call parameters. This layer also provides functions to send in-
band tones, called dual tone multiple frequency (DTMF), over the GSM network. These
tones are used, e.g., for the remote control of answering machines or the entry of PINs in
electronic banking and are, also used for dialing in traditional analog telephone systems.
Additional protocols are used at the Abis and A interfaces. Data transmission at the
physical two signaling information a Localization The for information the roaming. in To
number country (SN). International unique the number Temporary give the Mobile
N
identity request current the helps Abis, layer about Roaming and
between identification a 4 mobile between about away and the byte the BSS and
address typically BTSM identification from visitor the station (MSIN). and code for
station also HLR system feature TMSI Calling application the the location can
T
network an a location mobile the between MSCs, (CC), an mobile
current exact to for user country roaming uses take MSC MSC, for international of of
MS, find performs BTS the the changes. the local of identity of pulse place subscriber
code HLR, of a several different location subscriber and part and GSM current
U
subscriber a code GSM national a management. number
subscriber. subscriber subscriber within (MNC), code the VLRs, periodic a (BSSAP).
Changing of system (VCC), numbers is BSC. and address MSC providers ISDN the
modulation destination identity the a (MSRN): for identity the AuC, network and user
identification. IMSI is together This location is the an phone are VLR the is VLRs
W
number Signaling MSRN. finally incoming signalling in also
visitor EIR, needed: (TMSI): consists automatic, protocol (IMSI): different Another
currently of code (PCM) number. with with stored updates. and one the The national
(NDC) (MSISDN):- system call. the uninterrupted of OMC. over provider, To mobile
GSM countries. in temporary also systems. VLR worldwide a responsible subscriber
o
This the mobile hide The the destination and uses transfers An HLR.
No. generates subscriber number the air between HLR LAPD the MSC country the
address 7 interface, The availability IMSI, localization number. MSRN for subscriber
r
(SS7) IMSI always all can is this consists the only code two code used which
that identification management contains also MS for is The address GSM
ld
important providers
J 10: 11: 12: 15: 8: 9: Downloaded From JNTU World (http://www.alljntuworld.in) and
MSRN the The The Upon The The User The VLR VLR If The Till Step
N
MS information forwards fixed GMSC GMSC MSC HLR step BTSs
dials sends sends receiving 13: is from available, 17: network requests If the checks of
the the can identifies MS the the Then all phone MSRN requested
T
MSRN, to now current answers, BSSs call the for (PSTN) the the the
number forward setup the GMSC number VLR to transmit VLR MSC Mobile VLR. the
U
information HLR HLR VLR to identifies HLR for signals
initiates of the the Terminated existence for performs the a the call determines
Gateway GSM the paging current to the setup paging subscriber the subscriber.
W
number security and MSC signal MSC status request Call in
the its all to (MTC) (GMSC). MSC belongs and subscribed to of checks cells setup to
o
the the signals the responsible MS MS it a to MSC is connection a
r
responsible the services user indicated call in for setup GSM to and MS for.
ld
the and requests to network MS
HLR
forwards
an
www.alljntuworld.in JNTU World
For a mobile originated call (MOC), the following steps take place:
step 1: The MS transmits a request for a new connection step 2: The BSS forwards
this request to the MSC step 3: Step 4: The MSC then checks if this user is allowed to
set up a call with the requested and checks the availability of resources through the
GSM network and into the PSTN. If all resources are available, the MSC sets up a
connection between the MS and the fixed network.
In addition to the steps mentioned above, other messages are exchanged between an
MS and BTS during connection setup (in either direction).
Message flow for MTC and MOC
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Handover
Cellular systems require handover procedures, as single cells do not cover the whole
service area. However, a handover should not cause a cut-off, also called call drop. GSM
aims at maximum handover duration of 60 ms. There are two basic reasons for a
handover:
1. The mobile station moves out of the range of a BTS, decreasing the received
signal level increasing the error rate thereby diminishing the quality of the radio link.
2. Handover may be due to load balancing, when an MSC/BSC decides the traffic is
too
high in one cell and shifts some MS to other cells with a lower load.
The four possible handover scenarios of GSM are shown below:
➢ Intra-cell handover: Within a cell, narrow-band interference could make transmission
at a certain frequency impossible. The BSC could then decide to change the carrier
frequency (scenario 1). ➢ Inter-cell, intra-BSC handover: This is a typical handover
scenario. The mobile station moves from one cell to another, but stays within the control
of the same BSC. The BSC then performs a handover, assigns a new radio channel in
the new cell and releases the old one (scenario 2). ➢ Inter-BSC, intra-MSC handover:
As a BSC only controls a limited number of cells; GSM also has to perform handovers
between cells controlled by different BSCs. This handover then has to be controlled by
the MSC (scenario 3). ➢ Inter MSC handover: A handover could be required between
two cells belonging to
different MSCs. Now both MSCs perform the handover together (scenario 4).
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
To provide all the necessary information for a handover due to a weak link, MS and BTS
both perform periodic measurements of the downlink and uplink quality respectively.
Measurement reports are sent by the MS about every half-second and contain the quality
of the current link used for transmission as well as the quality of certain channels in
neighboring cells (the BCCHs).
Handover decision depending on receive level
Intra-MSC handover More sophisticated handover mechanisms are needed for
seamless handovers between different systems.
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Security
GSM offers several security services using confidential information stored in the AuC
and in the individual SIM. The SIM stores personal, secret data and is protected with a
PIN against unauthorized use. Three algorithms have been specified to provide security
services in GSM. Algorithm A3 is used for authentication, A5 for encryption, and A8
for the generation of a Access for subscriber Ki, performs keys requests
authentication, and A3. values. rejected. J cipher the the The subscriber Kc
N
Authentication control If user SIM. key. for MS the the they
authentication. each identification basic The sends appropriate The the and are
T
module, IMSI, various generation VLR the user authentication: back is
same, perform based and sends This needs the security IMSI, values then SRES of
U
step the on the Subscriber a random the the services
forwards VLR and is secret random for generated The based same SIM, the accepts
RAND, values first PIN offered algorithm on Authentication which this operation value
W
step a by to challenge-response RAND, information the the
stores by SRES, RAND includes access subscriber, GSM SIM; used with signed the to
the and for are: the the RAND individual to the authentication authentication SIM. VLR
o
responses the otherwise Kc SIM. scheme HLR. and can from The Both
r
authentication the now SRES, The next the as the key sides, of A3. shown
ld
compare current subscriber a step HLR. and Ki, valid
N
the change applying air GSM the A5 Services privacy, over the
circuit cipher To interface. and same data is in thinking. is are the the provide the newly
GSM, based could the all not key transmission TMSI switched Kc air cipher
T
messages algorithm After interface. used Kc, based assigned on The
i.e., user be at key connection-oriented which any system shifting over authentication,
U
combined data}. anonymity, on Kc. containing time.
capabilities A8. MS by the the is is the A Note the and generated called air. more
random VLR to paradigm BTS all that Instead, user-related of increase GPRS MS
W
progressive after data GSM, can the traffic using value and
now from each SIM is GSM {general two bandwidth. the BSS encrypted channels,
RAND. information encrypt location step connections/telephone in basic individual
o
transmits can the packet is approaches The MS the and start e.g.,
before update. This introduction are a decrypt radio and key key using with temporary
r
encrypted transmission, system the Ki Additionally, Kc service}. are 9.6
ld
encryption data and network itself possible. kbit/s thinking of
determined support is the The used and nodes The authentication, provides one
N
operator that is (PDN). requests transmission (e.g., of GPRS to and
type MSs’ GPRS and the specification. and a in data performs next and HSCSD it of
data (GSN) BSC downlink still IP node parallel tunnels of interworking many small
backbone location, This traffic. eight packet preferences. architecture step or channel
T
rate user via uses (SGSN) and X.25) by manner node new several or
time (only data toward of access to are the frame addresses mode are being For
medium is conventional (traditional network small interfaces contains connection-
oriented allocated to via slots in the responsible which unit introduces the The but a
U
control, transfer security more fact the fully user GSM within
new on volumes GPRS between volumes from Gi routers. (Gn supports routing via
separately. flexible packet-oriented. have demand. GSM GPRS interface transport for
user services. functions two a encapsulation. interface). for the concept TDMA
applications been All the (e.g., information (e.g., identity new traffic collecting radio the
W
and GPRS All GSNs mechanisms GPRS and system defined.
Allocation network MS GPRS is typical such frame. powerful typical time channels, or
The independent transfers confidentiality, via register are control The The that network
billing limits as other slots includes for The the web integrated Time elements, general
of access web GGSN exhibit GPRS of data the Gb gateway can packets the channel),
o
the new responses) (GR), GSM, information slots and of GSM
interface. requests) several rate). transmission slots be is control. users, traffic element
which channel into packet and are external connected which shared to GPRS keeps
r
system is All and the not the user security performs based according are
patterns The GPRS (e.g., The or is standard is radio does characteristics allocated
SGSN by support track called packet not can the information avoids to SGSN, on
ld
infrequent the
N
identifier, IP number the tunnelling shown the adapt and
convergence of data following a comprises TCP packets). high BSS the MS GTP, any
within to circuit-switched above, (needed mobility (CKSN) reliability and the called and
T
data user protocol also The figure ARQ different finally the protocol
in packet over packet a comprises GPRS network for for and GPRS temporary the
U
management. shows of reliable to the (GTP). data
characteristics FEC data corresponding packet Architecture data the GSM, (SNDCP)
GPRS backbone, protocol encryption. the functions mechanisms is MS. is GTP transfer
transmitted protocol transfer logical tunneled is network, The The only can for is
W
Reference i.e., for of MSC, used For of link use the
attachment SGSN. between used architecture the from for authentication, X.25
between from an each GPRS two between identity underlying which PTP for MS the
Model
different Besides MS, packets) a SGSN (and signalling MS backbone PDN, must is
o
procedure the an (TLLI), a of responsible to later GPRS networks,
SGSN GSNs, the and attach location transport via the attaching or PTM) in
transmission the is GGSN the MS, and context includes and the IP is to GGSN non-
r
reliable management, services. for transferred (using a it, a protocols, GPRS
the the and and special ciphering data following is subnetwork MS. assigning and vice
ld
set detaching, any plane scenario. transport LLC On up
SGSN versa. either
lower using
UDP key and
and
top the
for
is a
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
GPRS transmission plane protocol reference model
A base station subsystem GPRS protocol (BSSGP) is used to convey routing and QoS-
related information between the BSS and SGSN. BSSGP does not perform error
correction and works on top of a frame relay (FR) network. Finally, radio link dependent
protocols are needed to transfer data over the Um interface. The radio link protocol (RLC)
provides a reliable link, while the MAC controls access with signalling procedures for the
radio channel and the mapping of LLC frames onto the GSM physical channels. The radio
interface at Um needed for GPRS does not require fundamental changes compared to
standard GSM.
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Unit:2 .
The Media Access Control (MAC) data communication protocol sub-layer, also known
as the Medium Access Control, is a sublayer of the Data Link Layer specified in the
seven-layer OSI model (layer 2). The hardware that implements the MAC is referred to
as a Medium Access Controller. The MAC sub-layer acts as an interface between
sublayer and the network's physical layer. The MAC communication channel in a multi-
point network. This channel broadcast communication service. Motivation multiple
wire be for the of the a would the a medium or case with But CS sender specialized
T
decreases coaxial most Terminals might this that apply collision is
detects scheme commonly a free, not cable) sender CS proportional MAC work, and
U
the detection doest LLC a to cannot sender CD, see
collision if used and for work if but to “hear” it starts e.g., (CSMA/CD). MAC MAC the
W
the is well while free. a collisions square transmitting the
sublayers terminal schemes with If collision, sending, the wireless of Downloaded From
JNTU World (http://www.alljntuworld.in)
o r
layer may the emulates Logical provide a Link unicast, full-
ld
duplex Control multicast logical (LLC)
or
for wired networks is carrier sense In this scheme, a sender senses the medium is busy,
the sender waits until data and continues to listen into the it stops at once and sends a
networks. The problems are: the distance happen at the receiver
i.e., CD does not work is “hidden”
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
Consider the scenario with three mobile phones as shown below. The transmission range
of A reaches B, but not C (the detection range does not reach C either). The transmission
range of C reaches B, but not A. Finally, the transmission range of B reaches A and C,
i.e., A cannot detect C and vice versa.
transmission A B C C but C Signal So, If C and wants sends senses postpones unable
is sends is C A B’s terminals terminals “exposed” “hidden” is terminals
N
far the is strength an signal to outside to to terminals the situation to
at arbiter A, B, send hear B its carrier to cause C C from occurs, drowns to decreases B
T
transmission radio cannot wants to out B for shown B, C and collisions,
A. C sending and range A out to hear senses detects cannot send below. proportional
U
vice A’s of A until signal to rights, C, where versa a that
detect “free” A another waiting it and the detects making as B this to B medium carrier
drown Exposed terminal the are is collision the not square C
W
both is unable medium out (CS necessary busy. terminals (not
sending A’s (CD of fails) to A the signal as fails) or receive distance and with being
o
causes B) and on starts outside the idle A’s the unnecessary continues
r
same transmitting transmission again physical the transmission range with
ld
delay. layer its
making
power.
www.alljntuworld.in JNTU World
The near/far effect is a severe problem of wireless networks using CDM. All signals
should arrive at the receiver with more or less the same strength for which Precise power
control is to be implemented.
SDMA Space Division Multiple Access (SDMA) is used for allocating a separated
space to users in wireless phone MAC frequencies SDMA implementing requiring to
FDMA Frequency dimension transmit the channels receive often networks (FDD)
N
algorithm utilize networks. simultaneously are any using establishing
into which division for (FDM), The to relatively multiplexing space simultaneous several
the different each could A the mobile Division is individual A multiplexing full time
T
formed division typical two non-overlapping user. a narrow, now
duplex on frequencies. duplex phone slots directions, equipment. Multiple one access
U
by application physical Each decide multiplexing
conversation (TDM) cells usually satellite (FDM) may channel. to conversation and
Access which channels. the mobile receive It frequency or 30 involves is describes
transponder sectorized medium usually code A KHz requires (SDM). base is station
W
scheme several a (CDM) bands. assigning or method gets by
station combined schemes antennas less a SDM base by to transmit base its called
base assigning and are employed station is own, an has to stations with which still best,
o
are station optimal frequency subdivide & the other unique, defined
and receive available. a taking constitute to unique with specific mobile and base
r
multiplexing permit the channel as radio into different vice division station
The advantage either frequency station frequency the several account versa channel.
ld
basis infrastructure pair. to transmit techniques quality.
channel. domain. satellite fd MHz, more The This Up- makes communication ground =
N
frequency a flexible by a 935 use certain certain two the frequency
and Each flexible scheme (TDM). national Again to 935.2 the MHz control downlink
frequencies downlink ground Now channel scheme multiplexing frequency time for this
T
scheme, to + also Compared authorities. synchronization 960 n·0.2
resources. to each slot typically can control. frequency (uplink very satellite, has FDM
have MHz. for are be possible which for MHz disadvantages. inflexible
U
done a scheme for also a up- The to channel, and According
takes All fixed Additionally, and multiple for comprises is FDMA, and known by
downlink) basic fd communication uplinks a between as place using for = relation.
certain and downlink or downlink, fu frequency access as to typical by limits + time
W
While for all a use FDMA, 45 uplink, using channel has
sender fixed the technologies If only and MHz, the division the to a the mobile radio i.e.,
a bandwidth fixed establish pattern duplex allocation scenario number band dynamic
the a and i.e., n. uplink from few base The stations from receiver multiple assignment
between communications similar that minutes of base a base station, frequency would
o
allocation of scheme senders. duplex mobile allocate 200 broadcast
station station has to access 890.2 be kHz. at shown FDMA channel of for to station
r
scheme. a a is certain to selects be and a time. GSM tremendous (TDMA) fu
ld
hours time Assigning 890 is the base right fixed station
J quite a above simplest results TDM duplex in and station scheme simple,
N
separated to If in the figure in downlink using between will different
algorithm this time. channel but figure, a uses In fixed still as happen. shows are this
T
synchronization this Up in the one different not wastes the between
scheme. using bandwidth frequencies time for to case, only how as out base The 12
using flexible at the a of these connectionless, crucial mobile station different Each a
U
lot fixed the 12 same base TDM and at is fixed considering of
same different connection stations the is factor pattern uses assured, station bandwidth.
frequency is the mobile TDM same allocating frequency one typical is demand-oriented
W
that and slots can varying patterns accessing each out time is
o
uplink. time for use own station TDMA difficult, reserved static, for for
wireless the Fixed to by the requirements. division Assigning up- channels the
implement medium Uplink the knows same schemes too and downlink, schemes but
r
time phone base downlink inflexible duplex frequency and listening in is
ld
fixed turn do whereas at be (TDD). pair. not used the for
N
layers the The Aloha sense a doubles the refinement the they
beginning random distributed any occurs introduction among (e.g., carrier Aloha).
medium multiple complicated cannot the retransmission and to access the of and
T
of throughput. In or access the access give a the stations. the of
minimum this time accessing basic scheme, access slots transmitted any classical
U
case, to slot hard a Aloha If of raises mechanisms. Both as
throughput. medium. all two data). without the shown transmission Aloha senders the
data or is basic medium The sensing more below. throughput Aloha a scheme is simple
W
have Aloha central destroyed. stations guarantees, only
o
carrier the occur per perfectly by fine as medium cent the for this
r
accessing maximum in is transmission introduction a to access many idle
ld
problem well light at 36 the decreases per load under
systems the delay and same cent, is and can medium. of without a left before time,
does
light only time
that i.e.,
the to
probability of a
www.alljntuworld.in JNTU World
collision. But, as already mentioned in the introduction, hidden terminals cannot be
detected, so, if a hidden terminal transmits at the same time as another sender, a collision
might occur at the receiver. This basic scheme is still used in most wireless LANs. The
different versions of CSMA are:
• 1-persistent CSMA: Stations sense the channel and listens if its busy and transmit
immediately, when the channel becomes idle. It’s called 1-persistent CSMA because
the
N
assigned implementing is case the is slotted collision idle. medium
of of efficiency the CSMA: with a multiple p, CSMA: in busy If standard with
T
addition the a avoidance again probability reservation medium medium
U
systems for the access stations IEEE and Aloha station
combinations of pauses next and the the the among medium, Aloha carrier slot channel
o
start access a random competing with is sending is 36%. but idle.
r
schemes with combined the amount only It probability some immediately
ld
stations. can used transmit with be of (fixed) increased
which J has explicit short station will two traffic the slots. slots. slot It
N
number packet stations. a A (the call. requests channels contention
is need modes call is reservation base and DAMA All a Collisions is and others
currently reservation Since kind allowed of is simultaneous transmission, ground
station, All as data for completed, slots for shown of are assigns stations phase data the
T
traffic the free. implicit during form to scheme. destroyed) which
U
access in the pair the the frame. could reservation in Each
batch have stations which reservation during channels and of access of to be
transmission The available the mode. to the sends this the If a obey they have
successful, this satellite, slotted frame same satellite scheme vector are back phase
W
slot. this are to channels communication is returned Aloha be
slot now a Therefore, being will repeated list. where, are do synchronized reservation a
has time broadcasts To then not scheme; being based held, to to maintain slots slot
o
destroy in be know the the time used on it reserved in list channels. can
all satellite is from the the requests pool which i.e., data indicating stations a only the be
future status perfect time a explicitly. for reserved transmission, fixed collects fixed in So
r
slot issued is to of an can proportion that access environment reserved, TDM
ld
is time. each TDM assignment try occupied all implicitly.
a from call slot successful to DAMA pattern rights pattern but reserve and a can to to
user. only
and the
for for
no
all be
of to
is
A is
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
reserved scheme Reservation In Each This send a F. that indicated fixed guarantees
station data This ‘ACDABA-F’, fashion. wants The As by is for nothing
N
that transmission. used TDM in the means soon base this TDMA is
slots unused to by station base allotted The for access station. scheme as each the
T
station has that three idle already station a base changed D data-slots
indicating station station its slots slots this All and This broadcasts N has station. own
after occupied mini-slots only; stations slot, eight one stopped ensures has a mini-slot
U
for certain the as that so to are data succeeded the shown.
the second a wishing six slots the now transmission sending followed transmission
collision other and reservation bandwidth and reservation are idle. frame. can Using
W
eight with to not slots. in Station by occurs. use transmit
touched. slot with a Before N·k these is are and status it Again, of reservation, not to
three F occupied, a data-slots slot The a reserve has can guaranteed destroyed free the
‘ACDABA-F’ fixed In stations and seven succeeded base the now third slots up station
o
delay. example all station form but failed compete to frame by can can
data future k collision. slot in data-slots. a Other F be (still returns compete frame to
r
reserving rate. starts, shown, in seven for slots all based slot indicated
ld
stations The stations, that this the the more are is eight.
transmission With sender CTS J MACA the the CTS B, MACA, which same
N
transmission. of (B). terminal With first. causing (B) called tries in the
is C now the time. of B is MACA, future identifies A does to B receives the allowed clear
problem is CTS a avoid heard has hidden B collision not user transmission. After
T
resolves to toward to A react the by without data, the transmit B send
is does for C exposed receiving solved. as at RTS to and B. and this C B. (CTS). not
U
this the and an A the an the that But This contention collision
appropriate start message Still terminals vice medium RTS sender a length A contains
CTS, The RTS collisions its cannot versa. first of transmission CTS cannot as is C and
W
for and in the not CTS. it containing is the detect the future is
acknowledges again not future A heard might not name occur following as allowed this
the use contains transmission. by at occur the of at the receiver, by collision C, B once,
o
sender A way: name receiver to during but when only is send the but
triggers now and but of at one names data A anything sends B the reserved A of
r
receiver, and station and acknowledges transmission, an receiver the of C a
ld
the the the (A) well CTS. duration duration (A) with to
busy phase. signals the indicator) which multiple mechanisms positive The chooses
acknowledges to again AMPS tone the the After send readiness master randomly, is
T
same Addressed to after base stops, successful used access transmit
this on many one mobile acknowledgement. address) polling the are could for phase,
address station to accessing schemes: correct downlink. implemented. according the
U
Polling all random phone transmissions; also all the mobile
packet for only terminals packets station establish system, polling round number the to
data terminals signals uplink In reservations polls and robin of transmission from is
W
without a case a continues the also list each a mobile is (only
list list busy of of not known station of collision stations efficient (the collisions, all station
o
polling coordinated service medium random on as classroom using the
digital wishing the detects if Cellular traffic list. via numbers additional next CDMA any
r
sense a example to a terminal Digital patterns busy collision further. transmit
ld
(collision or multiple FDMA back-off tone Packet with
NTU
J
World
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
The following figure shows a sender A that wants to transmit the bits 101. The key of A is
shown as signal and binary sequence Ak. The binary “0” is assigned a positive signal
value, the binary “1” a negative signal value. After spreading, i.e., XORing Ad and Ak, the
resulting signal is As.
N
same A now happens then signal wants during signal Coding tries
T
has form to to with and to transmission. and reconstruct receive decide
U
is feeds data spreading distorted B’s from if the the the data.
result The sender result of by original data resulting B’s into is B from a signal, data an
W
with 0 or sender integrator. signal from a bits the 1 as Ad.
result A 100. is shown and simply The The The sender is below. receiver
o
quite integrator result the B
r
clear. sum As is applies clearly Bs. adds As The As + A’s the seen, same
ld
Bs and products, key, as although Bs happens shown
Ak, now to a
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
J Soft where call. softer CDMA and a executed with off. involved, normally
stronger channel definite determine handover If Depending the a handoff. Soft the cell
N
cell communication than two without happens a decision sectors
handoff phones hard phone base those whether or on This the stations. soft decision
T
are after is continuously is the from is technique simultaneously user or
handoff from different made changes it not with the With will is attempting the to on
U
others. evident all Reconstruction request refers soft is from
same eventually in make whether a candidate pilot handoff, form connected to In the
physical that or to power a the end signal traditional feature have to of the be interim a
soft base mobile-assisted hand of measurements conditional
W
cell signal made to simultaneous A’s strength used handover
o
sectorised with not. It one the of handover, CDMA traffic is the a the
cells The user base list desirable process. is two cell channel (or of handoff made and
r
site), has station sectors or for neighboring with cell WCDMA simultaneous
ld
implement on referred hard base initiated considerably
Sender three shorter The throughput the simple J advantages main bits In
N
periods A and SAMA, problem shown coexistence is about B as of
T
access show. causes spread each in 18 using per the sender spectrum
U
collisions. with cent, medium this uses which approach other
techniques: at The the the is same same very same is systems finding spreading
W
robustness similar data time could good in to in their code,
o
Aloha, against also chipping the narrowband for be but narrowband ex
r
sent the sequences. same 110101 approach with spectrum, higher
ld
interference frequency as The shown benefits so power
NTU
J
World
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
crossing of the router by the packet if the MN is in a foreign network. A packet for the
MN comes in via the router; the HA sends it through the tunnel which again crosses the
router. 3. Finally, a home network is not necessary at all. The HA could be again on the
‘router’ but this time only acting as a manager for MNs belonging to a virtual home
network. All MNs are always in a foreign network with this solution.
A CN is connected via a router to the internet, as are the home network and the foreign
network. The HA is implemented on the router connecting the home network with the
internet, an FA is implemented on the router to the foreign network. The MN is currently
in the foreign network. The tunnel for packets toward the MN starts at the HA and ends
at the FA, for the FA has the COA in the above example. IP packet
delivery
Consider the above example in which a correspondent node (CN) wants to send an IP
packet to the MN. One of the requirements of mobile IP was to support hiding the mobility
of the MN. CN does not need to know anything about the MN’s current location and sends
the packet as usual to the IP address of MN as shown below.
CN sends an IP packet with MN as a destination address and CN as a source address.
The internet, not having information on the current location of MN, routes the packet to
the router responsible for the home network of MN. This is done using the standard
NTU
routing 4 J
World
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
mechanisms of the internet. The HA now intercepts the packet, knowing that MN is currently
not in its home network. The packet is not forwarded into the subnet as usual, but
encapsulated and tunnelled to the COA. A new header is put in front of the old IP header
showing the COA as new destination and HA as source of the encapsulated packet (step 2).
The foreign agent now decapsulates the packet, i.e., removes the additional header, and
forwards the original packet with CN as source and MN as destination to the MN (step 3).
Again, for the MN mobility is not visible. It receives the packet with the same sender and
receiver address as it would have done in the home network.
NTU
J
World
www.alljntuworld.in JNTU World
Sending packets from the mobile node (MN) to the CN is comparatively simple. The MN
sends the packet as usual with its own fixed IP address as source and CN’s address as
destination (step 4). The router with the FA acts as default router and forwards the
packet in the same way as it would do for any other node in the foreign network. As long
as CN is a fixed node the remainder is in the fixed internet as usual. If CN were also a
mobile node residing apply Working address. network agent the address. registration,
ICMP, mobile this use and now this advertisement agent The to To method, a of in
N
Discovery a node and new another. to host and foreign Mobile
in a communicate problem, home foreign RFC the advertisement data appends packet
and has address other foreign 1256 IP:- agent. transfer. To the to network, Mobile make
T
mobile type foreign find with direction. with The an is agents the
permanent; for agent a IP specific the a foreign messages, change IP agent remote the
U
has agent extension and describes two advertisement same
function are of host, home the advertisement; agent addresses address the
mechanisms care-of which a for same, agents mobile two when of mobility transparent
W
an for are address methods: the agent message. a it host
o
router agent the of from presence the home in advertisement in is three
mobile the the steps called subnet. Internet advertisement advertisement its address
r
application phases: home host 1 a periodically through co-located Mobile
ld
requires and moves agent network. and one layer.
JNTU
World
www.alljntuworld.in JNTU World
Agent Registration
Having received a COA, the MN has to register with the HA. The main purpose of the
registration is to inform the HA of the current location for correct forwarding of packets.
J
Registration ➢ If FA containing lifetime Registration reregister which
N
message the which COA are can of back forwards before no the is
T
the expires be at longer to mobile done the the registration expiration.
FA, the FA automatically used. in node’s the which two request After MN
U
different home This forwards which sends to setting
mechanism after IP the ways is its address it HA. the up negotiated registration to
W
depending the the lifetime The and is MN.
mobility necessary HA the request and during on now current the binding, is sets
o
deleted; to location the containing COA. avoid up the registration a It of
r
so, mobility mobility HA also the the an sends contains COA. MN COA
ld
binding,
T
first wants field the which the type B HA have bit is to set generally
U
retain been to Registration 1 received prior for indicates a
W
mobility registration by Request
o
the that HA bindings. an in request. the MN home This also With allows
r
network. wants the for S to bit If simultaneous receive an an
ld
MN MN uses can
the
a co-located COA, it also takes care of the decapsulation at the tunnel endpoint. The D
bit indicates this behavior. As already defined for agent advertisements, the bits M and
G Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
denote the use of minimal encapsulation or generic routing encapsulation, respectively.
T indicates reverse tunneling, r and x are set to zero.
Lifetime denotes the validity of the registration in seconds. A value of zero indicates
deregistration; all bits set indicates infinity. The home address is the fixed IP address of
the MN, 64 registration The 3 The Home 64-bit on extensions
J and the
used least IP contain generated field agent address from result how to which contain is
U
match the are parameters used Reply many of of is the
registration by the parameters the conveyed for registration seconds the registration
addresses HA, protection MN for and in authentication. the
W
and for to COA a requests of request. UDP authentication
registration identify the against the represents packet, authentication MN with a replay
o
and request is contains replies. valid the the attacks HA, tunnel and if
r
method. The a it respectively. type of was match value endpoint.
ld
registrations. field successful. Again, is it set based with
The
The
the to
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
encapsulation
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel
endpoint. Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
J
encapsulation. data packet decapsulation and unchanged.
N
Encapsulation out putting of the are Mobile it data the Tunneling,
T
into operations is part the IP the tunnelling
U
of mechanism data i.e., another typically sending part
W
packet, of of performed a taking a new packet is a called
packet. packet through when decapsulation. The consisting a a packet reverse tunnel
o
of is is operation, packet transferred Encapsulation achieved
r ld
header by taking from using and
and a a
higher protocol layer to a lower layer or from a lower to a higher layer respectively.
The HA takes the original packet with the MN as destination, puts it into the data part of
a new packet and sets the new IP header so that the packet is routed to the COA. The
new header is called outer header. Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
IP-in-IP encapsulation
There are different ways of performing the encapsulation needed for the tunnel between
HA and COA. Mandatory for mobile IP is IP-in-IP encapsulation as specified in RFC
2003. The following fig shows a packet inside the tunnel.
the header, no enough in-IP, type calculated the above. original decremented original
MN the payload J special HA) packet length to for is behave The If This
N
packet’s so the sender follows IPv4 and the no as the meaning has
of version length options type header the usual. because by the packet as to the CN
point tunnel 1. if take of outer field field The it two and This follow for the remains
T
were can again of in exit next covers headers. ver mobile the means
protocol the header view. reach the attached point is an fields receiver tunnel, almost 4
U
outer the This IPv4 that the IP for in as used are complete
payload. inner (logical) the entry packet. during network. DS(TOS) after internet The
header as is feature (the encapsulation, this considered hop This source next The
packet. to No COA).
o
is outer RFC away header starts field only field, of matter just address
tunneling The 791. is change for header. with here copied a length set fields how single
r
the TTL thus (the the to denoted MN. as is many from IP up 4, (IHL) same
ld
the real TTL from with which fields protocol denotes be
inner
hops have high
the
the the
the IP-
as of
is is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
Minimal encapsulation Minimal encapsulation (RFC 2004) as shown below is an optional
encapsulation method for mobile IP which avoids repetitions of identical fields in IP-in-IP
encapsulation. The tunnel entry point and endpoint are specified.
The encapsulation the sender field work Generic Unlike encapsulation payload The
J
new Finally, following packet field for GRE with IP-in-IP address the
N
portion fragmentation header for already Routing header of protocol
the protocol. one and (GRE) of of is fragmented the a type of protocol Minimal
T
prepended. packet the allows Encapsulation CN and offset The of
second is the the of included encapsulation inner suite the is another packets. address
U
left following Together protocol encapsulation with header in
as the protocol the of omitting is the inner suite this header which original different MN
W
forms is suite header of the work put are contains packet
packets source as for the in needed. only and shown front.The minimal new header
minimal is for of the quite data If below.
o
one IP the value encapsulation. following packets, and part often
r
protocol encapsulation S bit data 55 of not is for Generic the figure set, is
ld
suite an taken the new the The option. shows does into
N
and field of only IP-in-IP GRE routing. allowed reception. GRE
header recursion contain is valid one header present, entry. header the and level
T
information. and GRE recursive valid K minimal control The The uses
of starts the if also bit the encapsulation. information. version routing only payload. is
U
offers encapsulations. s with field encapsulation. set. bit If 4
C is bytes. field, field several a (rec.) The is set, The key set, The contains sequence if
strict The The is field R present, flags the an offset bit The following C This source
W
important checksum which indicates indicating bit 0 default
represents field number for indicates has routing may the reserved represents a value
field if variable field if GRE be the bit certain if is the used that the contains version.
used.
o
of S offset fields offset this indicates length checksum a for additionally
fields counter field and authentication. must The a in and are valid bytes routing should
r
if following be that field present contains the IP zero distinguishes for shows is
ld
be checksum
J
learn CN. ➢ solution a Binding MN scenario HA field and the informs the
N
to as a C location bits to field the it indicates protocol Request:
occurs, this causes follow. HA. called the and problem by HA CN unnecessary where
T
caching of HA again It The reserved1 of checks the is is the sent is
allowed is the It node contains needs in The side is CN cache, the present. for that latter
W
of to RFC of four same the the reveal wants the the which
3232. field network additional current The subnetwork value world. is the to is If next
constant a the know location zero. location part between It messages: 5 flag is
o
bits of the as The called zero C the of and the are current is CN
r
protocol the routing set, set node set and then triangular MN. to then to the
location zero to sends table zero, type, The HA. which checksum
ld
follow.
N
foreign at the its and address. an FA. CN MN COA that FA. stores
figure can agent might is Encapsulation obviously of also request The shows the the
T
FAold. now recipient forwarded MN mobility FAold change has the how
U
via a current of forwards the wrong can an data binding. to
its four be update the location for location COA the the HA additional tunneling Now
W
HA, for packets to message. and from update the so the
o
send are allowed a is acknowledges This sends new now used
r
database. its scenario foreign done data a by together binding the directly by
ld
Furthermore, shows agent, MN, this the update if CN,
JNTU
World
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
N
Packet with (double Forwarding (tunnel of does firewalls, data
T U
triangular not hijacking) paths, solve the i.e.
W
be can forwarded be abused through to circumvent
o r
Reverse the tunnel Tunnel security via
ld
the HA
World
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
DHCP is based on a client/server model as shown below. DHCP clients send a request
to a server (DHCPDISCOVER in the example) to which the server responds. A client
sends requests using MAC broadcasts to reach all devices in the LAN. A DHCP relay
might be needed to forward requests across inter-working units to a DHCP server.
J
Consider initialization the this configuration DHCPOFFER client
N
broadcast. the broadcasts and of scenario they a In DHCP offer the
T
can a a case client where DHCPDISCOVER list offer shown, of is there
U
configuration shown to the two is below:
W
client. one into servers client the parameters. Servers subnet.
receive and reply two this There The servers broadcast to client might
o r
the can are client’s be and now a present. relay determine
ld
choose request to A forward typical
Congestion Control
A transport layer protocol such as TCP has been designed for fixed networks with fixed
end- systems. Congestion may appear from time to time even in carefully designed
networks. The packet buffers of a router are filled and the router cannot forward the
packets fast enough because the sum of the input rates of packets destined for one output
link is higher than the capacity of the output link. The only thing a router can do in this
situation is to drop packets. A dropped packet is lost for the transmission, and the receiver
notices a gap in the packet stream. Now the receiver does not directly tell the sender
which packet is missing, but continues to acknowledge all in-sequence packets up to the
missing one.
The sender notices the missing acknowledgement for the lost packet and assumes a
packet loss due to congestion. Retransmitting the missing packet and continuing at full
sending rate would now be unwise, as this might only increase the congestion. To mitigate
congestion, TCP slows down the transmission rate dramatically. All other TCP
connections experiencing the same congestion do exactly the same so the congestion is
soon resolved.
Slow start
TCP’s reaction to a missing acknowledgement is quite drastic, but it is necessary to get
rid of congestion quickly. The behavior TCP shows after the detection of congestion is
called slow start. The sender always calculates a congestion window for a receiver.
The start size of the congestion window is one segment (TCP packet). The sender sends
one packet and waits for acknowledgement. If this acknowledgement arrives, the sender
increases the congestion window by one, now sending two packets (congestion window
= 2). This scheme doubles the congestion window every time the acknowledgements
come back, which takes one round trip time (RTT). This is called the exponential growth
of the congestion window in the slow start mechanism.
But doubling the congestion window is too dangerous. The exponential growth stops at
the congestion threshold. As soon as the congestion window reaches the congestion
threshold, further increase of the transmission rate is only linear by adding 1 to the
congestion window each time the acknowledgements come back.
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Mobile Transport Layer Mobile Computing Unit-4
Linear increase continues until a time-out at the sender missing or gap because
acknowledgements same the congestion of window. single then The receives receiver
receiver not now retransmit. by slow a dramatically. acknowledgement. network
J fast until congestion. the due congestion the start. retransmit in packet.
segment. The sender The recovery results focuses transmits the current to is occurs
N
has and window continuous The acknowledgement, transmitted
packets using half enhancement delivered the window the reason of this linear slow can
continue of a a
retransmit/fast a packet this packet(s) simple acknowledgements regarding increase.
U
method fast be start continuously fashion. upto growth for
scheme itself reduced packets. retransmit/fast loss. with mechanism. packet activating
the for is No is before Handover. starts the This for set its acknowledged preventing is
changes because loss the current from insufficient simplicity. to mechanism once the
W
recovery one due slow same shows the timer are recovery
Also more of congestion segment to slow-start start sender. two required packet. a
Minor that it packet isolation expires. up transmission can effects reasons. is there
interprets to and The improve changes a It the to in window. in informs time-out
o
FA This trigger of the is gap the the new First no or packet sender
error. sequence in behavior efficiency this CH. congestion the in congestion The on the
r
one the the due congestion efficiency losses sender The losses. packet
ld
starts sender is MH’s to is if and sender when not the to called
NTU
J
World
www.alljntuworld.in JNTU World
The foreign agent acts as a proxy and relays all data in both directions. If CH
(correspondent host) sends a packet to the MH, the FA acknowledges it and forwards it
to the MH. MH acknowledges on successful reception, but this is only used by the FA. If
a packet is lost on the wireless link, CH doesn’t observe it and FA tries to retransmit it
locally to maintain reliable If lower now During acknowledgements, established
T
foreign mobile on ports, and buffered and If the delivery the can etc),
agent.
U
state wireless host, MH directly packets, must in sends
migration and I-TCP link, retransmit migrate the a as is packet, the well correspondent
W
shown after mobile to as the the the below: the handover
packet. FA hosts new system acknowledges host agent. notice Packet of state must a
o
mobile No this loss (packet new not it much in and host
r
the see connection sequence forwards faster wired any changes due
ld
network it number, may to to Downloaded From JNTU World
NTU
J
World
www.alljntuworld.in JNTU World
Here, the foreign agent buffers all packets with destination mobile host and additionally
‘snoops’ the packet flow in both directions to recognize acknowledgements. The foreign
agent buffers every packet until it receives an acknowledgement from the mobile host. If
the FA does not receive an acknowledgement from the mobile host within a certain
amount of time, either the packet or the acknowledgement has been lost. Alternatively,
the foreign agent could receive a duplicate ACK which also shows the loss of a packet.
Now, the FA retransmits the packet directly from the buffer thus performing a faster
retransmission compared to the CH. For transparency, the FA does not acknowledge
data to the CH, which would violate end-to-end semantic in case of a FA failure. The
foreign agent can filter the duplicate acknowledgements to avoid unnecessary
retransmissions of data from the correspondent host. If the foreign agent now crashes,
the time-out of the correspondent host still works and triggers a retransmission. The
foreign agent may discard duplicates of packets already retransmitted locally and
acknowledged by the mobile host. This avoids unnecessary traffic on the wireless link.
For data transfer from the mobile host with destination correspondent host, the FA
snoops into the packet stream to detect gaps in the sequence numbers of TCP. As soon
as the foreign agent detects a missing packet, it returns a negative acknowledgement
(NACK) to the mobile host. The mobile host can now retransmit the missing packet
immediately. Reordering of packets is done automatically at the correspondent host by
TCP.
Snooping TCP: Packet delivery
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Advantages of snooping TCP:
➢ The end-to-end TCP semantic is preserved. ➢ Most of the enhancements are done in
the foreign agent itself which keeps correspondent
➢ ➢ Disadvantages ➢ ➢ ➢ Mobile The the current end-to-end especially splits
arbitrary Snooping to-end transport sender M-TCP sender the not as the Both The to
problem problems. unchanged. receiver TCP of the host-supervisory receive negative
N
go TCP adapted Even between SH by the are semantics does
window I-TCP mobile (mobile SH into automatically and layer, TCP of mechanisms
setting monitors connection transmitted sender though (either arises errors an state is
of not buffering persistent M-TCP and acknowledgements does disconnected. (eg. to
T
hosts. ACK snooping the from TCP) require of the the is Snooping to
may SSL/TLS), if packets the all correspondent for TCP, not not wants the the sender’s
problems shrinking host into falls data packets to approach on some propagate mode,
old changes required and isolate the new old TCP the back (SH) two to are may SH
U
snooping TCP This new time, to value. improve i.e., window
foreign sent mobile or present parts to if arising provide be does has connection, the
means between to COA. till as bit a the the host it useless to the The the new CH.
assumes soon behavior TCP as not errors standard the host. overall agent state size
from in and a that sender’s same sender I-TCP can SH) more help the MH the as if to
W
of mobile while This the certain lengthy or uses be the
throughput, that detects goals buffer, foreign 0. and the does. much, of solution. efficient
disconnection can sender used. Setting TCP. approach mobile an the the the sender
ACKs as host. encryption continue or optimized An time agent if connectivity The MH I-
TCP enhancement wireless will a frequent handover. returned the unmodified host If
mobile to will is wireless out not is encryption and and disconnected.
o
lower window not sending no moves but at schemes TCP try the
snooping link host disconnections. the longer from change to the Additionally, again,
side not is mobile TCP as size retransmit or used CH to gets at delay, is the
r
congestion uses are not. well another transparent used occurs full TCP: it is
assumption. A software It It such Lots advance, interruption goes the maintains offers
can propagated layer modified of the no Often, the As of as its MH
N
be into buffering at SH changes soon sequence can correspondent
will a from congestion is early exactly but used the so is way does slow MAC not
disconnected, be TCP the inform no by as ACKs also of of a to to together enough,
automatically not simply timers caused start the have TCP TCP is the layer M-TCP: on
T
the the resume new no done from act MAC the the wireless end-to-end
point window same assuming sender. or to notices expire. shrinking network as by host
acknowledgements freezing both be with the TCP as wireless TCP layer proxy it of
point congestion. made in MH. avoids of M-TCP link, layer encrypted retransmitted view
U
the and connections I-TCP, connection congestion detects
elements the as the semantics. where in link mobile additional further and in of useless
software reason sender’s assumes there I-TCP, not an TCP also connectivity it data like
had and upcoming problems and only even timers. is retransmissions, for The packet
can to knows mechanisms no window of as the low been correspondent the
W
finally interruption. requires MH, SH after now it need
bandwidth bit is SH. If does loss the forced again, loss independent CH even error the
stop breaks long to to real on and 0. not modifications forward of MAC in interruptions
before sending to the rates, it reason FA. slow connection send the the manager.
o
Otherwise, stop. signals host wireless layer connection. access which
starts any the buffers of For and can for other TCP notices ACK connection TCP the be
r
link to or ‘freezes’ is of point or the that to not the itself the breaking informed.
TCP interruption. time due that a correspondent the always are connection. it new MH
ld
mechanisms to but simply can the the needed is
N
is Using network. time, an three For The lost, First, the need
connection number advantage which Disadvantage networks. TCP has and confirms
At acknowledge wait for for a is to least with to TCP, three-way is on obvious: sending
wastes for close standard on altogether. long setup, retransmit can extremely
U
precisely the for of one a gaps the it reception short of for
the This is TCP release packets receiver combine short sessions bandwidth, additional
data mobile is TCP the inefficient one a to single certain connection TCP that (T/TCP).
sender message handshake be which led can everything helpful request, transfer
messages This data has filled. it of with side down host packets, requires indirectly in
W
packets applications to all kind retransmits for packet packet,
not because packet is and in that user packets fixed via needed. and connection and to
the slow just starting to
of
or it not a changes sends two is data requires for request in of wireless needed only
upto the is only Also instead the connection a from packets. the setup short trains in
o
case a overhead more reliable a the the and reduction selective links.
certain the of lost request of and software of buffer a lost can This seven. in-sequence
mobile TCP The packets. establishment connection packet. involved. packet retransmit
r
retransmission can in transport to space disadvantage in the a network, The
ld
mobile reduce server This (go-back-n If is overhead
and all correspondent hosts. This solution does not hide mobility anymore. Also, T/TCP
exhibits several security problems.
NTU
J
World
www.alljntuworld.in JNTU World
Unit-5
Database
A database in a particular network; computation. computations, Caching with a the
N
architecture (a) entails the hoarding neither API another is data
database. data a Rather, at during collection saving logical through mobile in required
T
does the in simple may Hoarding the the which a The
manner. device database copy a the be of device interval program, architecture from
U
cached systematically done a sending device of mobile the A
select caches ensures in at data mobile database for queries which the retrieve device
data in ex: is some application which that hoarded stored device IBM the and or API is
specific even data a DB2 available retrieving device a directly
W
part records mobile is in Everyplace when from not the tier of
data, is retrieves a for data always connected device or mobile itself. the database a
computing. which information. server from device (DB2e). The API device connected
o
the local may directly to from following or is data database the be
database. not a Databases a from required network server connected retrieves
r
connected to figure the (Tier a database. or Hoarding
ld
store server for 1) for network. the shows system to
and API the tier synchronizes J enterprise at cached 3, updates tiers. the
N
has the The A at cache systems. mobile reside been server the
database This (b) data for local ringtones, server the Similar application is is retrieving
designed records local at device known copies retrieves a DB2e the list architecture
T
architecture copies music or remote (first of as using synchronizes the
to or (a) database the client-server and at enterprise reside tier) etc. Distributed data the
U
database the transmits servers shown for IBM uses
computing device. and at a of distributed with DB2 the the items then tier, and computing
below at data the These DB2 each cached device. Everyplace where the transmitting
caches or architecture data is databases mobile local copies records for cache
W
local architecture. the It records two-tier in supports copies
memory database mobile (DB2e) of device copy. stored it at these as to to function or the
explained At devices the connected tier in J2ME is multi-tier at server first databases
o
multiprocessor synchronization, a device. the 1 relational tier and as
using uses device. device above. (tier databases. to most The business are business
r
it. database 1), caches. server systems The Databases From cached mobile
ld
the application, computing Here, logic API logic
stored J cache two cached most memory the in Access This at devices
parameters—access Caching data from Caching entails server the consists mode
N
Invalidation instead copies other in consistency needed record
method to at by device a the item the Pre-fetching of and refers multiprocessor
Protocols: the another having the requesting of devices of load. the data enterprise of
of copies or of the data at cache is database database server, the to caching record
T
record several called Further, distributed the pushed at the fetching.
W
device a is invalidated. are the the record Cache called
Cache pushed mobile and keeping unusable or the may access distributed device. at
mechanisms in caching. can API. database of Also, can pushing different cache-data a
be at invalidation a disseminated invalidation The thus multiprocessor devices interval
(disseminated) cache-line, the future be-based required caching because The This
o
copies server be rates or locations. at disadvantage are needs as may
(modified) client the to server) of records process to needs which in with to term 'hot
ld
Pre- record are the on hoarding devices by the the
expiry device expiry, at the a which used records' pull fetching for 'cost case can mobile
from of shared any to is by ratio each
pre- (on-
can
not are be
be or
to or
of of is
a
aa
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
given time can be assigned one of four possible tags indicating its state—modified (after
rewriting), exclusive, shared, and invalidated (after expiry or when new data becomes
available) at any given instance. These four states are indicated by the letters M, E, S,
and I, respectively (MESI). The states indicated by the various tags are as follows:
a) The E tag indicates the exclusive state which means and cannot be used by any
other device or server. b) The S tag indicates the shared state which indicates others. c)
The M tag indicates the modified state which means d) The I tag indicates the
invalidated state which means copy of the record which was shared and used The
following figure shows the four possible states of database and its copy at the cache of
the mobile device Another (also at computations. J the Four called server
N
important possible cache as well coherence). factor states as
T U
at for the (M, This cache device E, database
a j. data that that for that that the computations record the the the server data data
o
device i record at database record any cache earlier. is instant for
r ld
can no internal longer be in used the has
use
server
by
a
/at any instance at the server j cache
mobile environment is cache consistency to ensure that a database record is identical
only the valid cache records are used for
www.alljntuworld.in JNTU World
Cache invalidation mechanisms in mobile devices are triggered or initiated by the server.
There are four possible invalidation mechanisms – Stateless asynchronous, stateless
synchronous, stateful asynchronous and stateful synchronous.
Stateless cache device the invalidation the broadcasting request server. and The
transfers disadvantages client report, devices clients Stateless regarding devices.
information invalidated period end sends periodic information reports the consistency
invalidation device of J the information device modified report server
advantage requires to invalidated a gets after caches. The report the The for lead may
N
request report However, all Asynchronous: the of a Synchronous
invalidation asynchronous server same not, This the A not the the This failure, and
invalidated use an of as stateless particular of and and asynchronous server. method
thus by the synchronous state item are—(a) (deleted broadcasts and in advertises if is
U
of data as (and the that (c) computations. record (b)
exchanges. cached also it transfers when (whether is well report report. This making
requests during device The client records mechanism sent thus is ensures record data
every a approach or as or not also data the stateless server invalidation the periodically,
devices as replaced). the whenever cache of validity) approach due mechanism, and
received Emi, the client corresponding the soon at data or invalidation as The helps
period synchronization does to the the Therefore, update server not. the Mmi,
W
mechanism entails is presume invalidation as device mode, a
disadvantages of that relevant device server link the reports In between not the
irrespective The its is at Smi, the to case that requests the here value broadcasting
failure, keep corresponding gets there server send term information i.e., or data data-
record that even is caches to end record the the Imi) the an unaware two reports track
changes. more all because the the as 'asynchronous' caches. are of the client of client
o
invalidation for and when of server clients long invalidation whether of
report. when and server the of no device invalid a bandwidth take of only. at devices this
data-record as device devices the there The of period, even The broadcasts data-record
frequent, advertises irrespective the data the there state place, records has that mode
r
The expects data server periodic report, server invalidation if is reports, is
indicates does maintain is receive the then no pushed client link client changes can (b)
no efficient. in does stored is unnecessary whether information
invalidation to the not in-between of failure, every invalidation at invalidation the
ld
be of the invalidated has cache can all from server
periodic whether that not get period- sent device of a at cache cache at client client
either
client copy keep
that The
the
the the the
the
for
the the
to is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
devices assume that, as long as there is no invalidation report, the copy is valid for use
in computations. Therefore, when there are link failures, the devices use data which has
been invalidated in the in-between period and the server is unaware of state changes at
the clients after it sends the invalidation report.
Stateful (asynchronous are information data-record (HLC) at enable when by request
records the the records advantageous not presume Therefore, Stateful Imi) location
information client synchronization to at invalidity also with invalidation J the
a the the new state sent of flooded link periodically the at the end is storage data-
records MSC The The invalidation transmitted at the state failure, the client that,
N
Synchronous: of Asynchronous invalidated only cache (and records
when of the at advantage cached advantage regarding server. in report with at server in
the to the as to of thus, stateful) a device device that periodic the the because updates
there (HLC) mobile the long period, the irrelevant client are The data by is server only
device for of at indirectly, same or sent the as affected cache the when invalidated is of
T
HLC of the data. using scheme. device at new a the intervals network.
modified The there then the even the The present so the server link the periodically, at
expects client-caches. is affected and that invalid reports. server client-cache
maintained or stateful the Based failure, stateful stateful the the client if is caches. of
U
client modified modify the The the no keep HLC. validity)
state to device and The (deleted home the data device. keeps clients invalidation on
record in-between The the then term devices synchronous The asynchronous This it
asynchronous the client (a period-end if the the by transmits gets clients requests
disadvantage states a The record agent of data the the receive server 'stateful' HLC
state of an This device client invalidation or data device the and modified devices server
HA information replaced) enables updated. to stored report, I and period information
W
device cache-states (HA). (home transmits can caches for not
the does only approach replace report indicates informs stores whenever approach the
mechanism use have invalidation of broadcasted in and the to the report The cache, not
agent) information, The the same. at invalidated the of at the of its the copy server
becomes the periodic receive the the is invalidation is server the AS at the that stateful
state HLC. the device-clients is stored that software. is invalidated the the cache
invalidation HA scheme not is present server. that to device is the reports valid as
o
server This to there of an data-record transmits synchronize detected
also intervals data. valid. in asynchronous Emi, the these record cache the all.
invalidation the for This enables is sends and This are referred state is Mmi, state The
and that server Moreover, use data. also home information is which device-clients
r
invalidation if and reports state by similar Smi, method information other
server it the the of (Emi, in modified. with relevant is to the that keeps After each
computations. location or to not client mode are at report synchronize invalidation Mmi,
ld
the devices device Imi) to identifying stores the the as
since record received the affected the ensures track state of reports
devices as the Smi, to is server home after about cache
then each
data HLR
due and
also
the
the are the AS
to
or of of
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
the specified period of time, it can request the server to send the report. Each client can
thus be periodically updated of any modifications at the server. When the invalidation
report is not received after the designated period and a link failure is found at the
device, the device does not use III. II. I. the the transmission Assume server software
record necessary Data the be Web The server maintains application then overcome
Data J maintained Cache on Polling of cached If data Time-to-live The end
server mechanism invalidated device mobile stateful cache there the data invalidation
N
for or Cache at TTL of Cache that and to record train to the in it
U
needs record cached server to (adjustable) cache (server-
initiated the given to polling each Web data can is record overcome copy latency a in
case): cache the is but in is record or the below: data be records device maintenance
case): cache in required known Mobile mechanism. during invalidated, server is
Mobile from is not connected the with Polling high previous or maintenance polled.
record called to copy. Each modified access and at at valid, cached the websites an
W
zero. as for regular by bandwidth the case): pulling). from
assigned sends Caching from the data Data a taken requests of from (e.g., is mobile or
are cache the web that described TTL not the cache must exclusive invalidation to each
r
The for not during device a traffic and is record. at server, server TTL
ld
information application state. web data After the 0,
modified device.
periodic
reports the to cache,
cache state Each
If and the the
can
the
TTL the
an at
to of
is
consistency can be maintained by two methods. These are: Downloaded From JNTU World
(http://www.alljntuworld.in)