Anda di halaman 1dari 274

www.alljntuworld.

in JNTU World

LECTURE NOTES

NT
J MOBILE IV

U
B. Tech (JNTU)

COMPUTING
ON

W
I semester

orld
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Unit-1
Introduction to Mobile Computing
The rapidly expanding technology of cellular communication, wireless LANs, and satellite
services will make information accessible anywhere and at any time. Regardless of size,
most mobile computers will be equipped with a wireless connection to the fixed part of
the network, and, perhaps, to other mobile computers. The resulting computing
environment, which is often referred to as mobile or nomadic computing, no longer
requires users to maintain a fixed and universally known position in the network and
enables almost unrestricted mobility. Mobility and portability will create an entire new
class of applications and, possibly, new massive markets combining personal computing
and consumer electronics.
Mobile Computing is an umbrella term used to describe technologies that enable
people to access network services anyplace, anytime, and anywhere.
A communication device can exhibit any one of the following characteristics: ➢ Fixed
and wired: This configuration describes the typical desktop computer in an office.
Neither weight nor power consumption of the devices allow for mobile usage. The
devices use fixed networks for performance reasons.
➢Mobile and wired: Many of today’s laptops fall into this category; users carry the laptop
from one hotel to the next, reconnecting to the company’s network via the telephone
network and a modem.
➢ Fixed and wireless: This mode is used for installing networks, e.g., in historical
buildings
to avoid damage by installing wires, or at trade shows to ensure fast network setup.
➢ Mobile and wireless: This is the most interesting case. No cable restricts the user,
who can roam between different wireless networks. Most technologies discussed in this
book deal with this type of device and the networks supporting them. Today’s most
successful example for this category is GSM with more than 800 million users.
APPLICATIONS OF MOBILE COMPUTING
In many fields of work, the ability to keep on the move is vital in order to utilise time
efficiently. The importance of Mobile Computers has been highlighted in many fields of
which a few are described below:
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
a. Vehicles: Music, news, road conditions, weather reports, and other broadcast
information are received via digital audio broadcasting (DAB) with 1.5 Mbit/s. For
personal communication, a universal mobile telecommunications system (UMTS) phone
might be available offering voice and data connectivity with 384 kbit/s. The current
position of the car is determined via the global positioning system (GPS). Cars driving in

the same area b. c. J build or be to logistic management), Emergencies:

carry accident. specialists of the Business: customers. can with new travelling that
track With and a to triggered, communication worst revise service files powerful the

N
proposals. help a wireless of vital local information office all on All

cases, each the salesman can Managers They provider. information his activities ad-
hoc but the presentation synchronization and be An about access, other only or
T
Therefore, the necessary can consulted saves ambulance her in

network police decentralized, today keep possible access Buses, to the can of laptop
the time about their case their a and use to laptop steps mobile needs for safe

U
the trucks, for and take reflect new with of home

mechanisms ambulance travelling injured an mobile the latest distance. for money.
natural can advantage offers early instant wireless computers a fast and the this base,
high-quality market be persons computers exchange trains diagnosis. current particular
and disasters employees, turned In service access ad-hoc are which

W
case of call share can are this situation, needed to into

meetings of will of to already such Wireless wireless type networks leverage helps say,
the information. information. an information the to a be as accident, hospital of to true
critical keep informed company’s to to transmitting ensure hurricanes accident for

o
connection networks enable improve survive. mobile competitive
discussing databases They presentations from At in not data via emergency the can a
office, only database: or are organization small consistency. an the can company

r
maintenance to be earthquakes. responds emergency the advantages.

consistent will a prepared communicate scene but recess, hospital only the

ld
situations

to to efficient to of ensure means airbag


major to (fleet
keep they call
and and
can
etc. the
the In
A
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
d. Credit Card Verification: At Point of Sale (POS) terminals in shops and supermarkets,
when customers use credit cards for transactions, the intercommunication required
between the bank central computer and the POS terminal, in order to effect verification
of the card usage, can take place quickly and securely over cellular channels using a
mobile computer unit. This can speed up the transaction process and relieve congestion
at the POS terminals.
e. Replacement networks, economic earthquake e.g., computers, may f. Infotainment:
location. (knowing downloading wireless entertainment meet Limitations ▪ ▪ ▪

J ▪ ▪ ▪ Resource Interference: shielding respectively Bandwidth: very more


Dynamic region, Network stability Interoperability destroy via to N play

low satellite, efficient network. The reasons, via thus e.g., sensors, of detection,
together. valuable changes Issues: constraints: and information for of and travel GPS,
Mobile wireless link Although Wired remote Radio result wireless communication

T
can games issues: it Another or delays discovery contact walls guide in

is or information help in networks communication Networks: often Computing


transmission Battery sensors, about to they the to higher devices and or
U
might in provide growing to enable, floors. varying impossible

connection this of are a a protocols loss concert can the for displays tell compared local
situation. continuously wireless environmental e.g., protocol provide rates cannot
connection-service field you tradeshows, environment: base in to losses ad-hoc with for

W
in something the networks of wire Other to historical up-to-

date be standards station, transmitted building low wireless desktop increasing,


protected remote gaming examples overhead. information. or variations can or about
buildings, in at information systems. network to sensors also triangulation data networks

o
the historic against destination transmission the for be same or in

Wireless used for history signal wireless higher Researchers where applications

r
evening buildings. interference as at weather to where any soon and power

excess bit replace of rates networks connections, appropriate


ld
error connection via a as forecasts, you look within

building Due are cabling lies a people wired


using local
rates are)
still are
for to
in
a
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
▪ Security constraints: Not only can portable devices be stolen more easily, but the radio
interface is also prone to the dangers of eavesdropping. Wireless access must always
include encryption, authentication, and other security mechanisms that must be efficient
and simple to use.
A reference protocol layer, using necessarily ● the physical communication, carrier
modulation encryption.
● of detection J Physical Data simplified different conversion the and The

N
frequency, link layer stack lower of model. layer: physical need of

figure layer: a data of of data comprising data layer all the the reference End-systems,
a This signal streams, shows The stream of onto layer. physical receiver frame).
T
services. the is main the a layers. detection the of Applications the

carrier correction lowest then Altogether, bits tasks layer A model

U
protocol Intermediate application such Simplified into

transforms frequency of is (although layer as responsible this signals of stack the on


the in layer Reference transmission layer, the PDA a the systems, that and data
W
implemented communication heavy include end-systems

signals can for and transport (depending link Model


interference frequency be computer such accessing layer back transmitted errors, as in

o
layer, communicate into on system is the the selection, in and

responsible the the a may interworking network system the bit on medium, transmission
and synchronization example, stream. the disturb is generation according

r
sender with layer, responsible for For multiplexing the unit, need each

ld
a side. data scheme) wireless

signal),
reliable do to of a other
(i.e., link
The full
not the
the for
point-to-point
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
connection between two devices or a point-to-multipoint connection between one
sender and several receivers.
● Network layer: This third layer is responsible for routing packets through a network or

establishing a connection between two entities over many other intermediate systems.
Important functions are addressing, routing, device location, and handover between
different networks.
● connection

● support service the web GSM and GSM GSM used different a bearer, Bearer GSM

permit Transparent transmit occur. (FEC), data data bearer flow protocol (HDLC),

J Application network Transport large calling, using in in by control. is

Services allowing : Transmission transparent case services case location, tele


N
services: the which over Mobile applications) data. voice variations

(RLP). and a interesting most portable and of, Handover, of 800 layer: Data special
bearer These layer: and codes for transmission for supplementary services, use
support successful million GSM This example, data transmission and data in device.

T
This protocols redundancy quality for are Finally, selective-reject

services services transmission non-transparent, services protocol specifies Security,


rates customers. for people situated System layer digital shadowing multimedia errors.

U
can the of of use is only has services. in and comprises up

different be into applications and layers on architecture, mobile used more the a GSM
Transparent the characteristics, to improved mechanisms constant top use New the
9600 transparent or interworking in than applications, two synchronous of
telecommunication the data has interruptions mechanisms the data all mechanisms 190
bit/s and functions delay defined (complemented stream with reference

W
transmission Radio services. bearer to countries. three for
and trigger and bearer the with adaptive three and non-voice or interface, throughput
due to for of use services wireless model asynchronous of existing implement helps
retransmission the services, different GSM to data of system oriented high-level

o
handover. by applications physical forward to to transmission, do

services. access additional permits networks. Protocols, if reconstruct establish in not


categories no adding layers. error the transmission data data try Non-transparent to

r
layer error of the world Bearer that the to correction erroneous layers an
Services integration Functions transmission. a Localization link recover (layer the the

ld
of correction can world-wide radio end-to-end today.

services:
services that original
control original handle
errors make
1) data. link It lost
and can are
of
to is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Using transparent and non-transparent services, GSM specifies several bearer services
for interworking with PSTN, ISDN, and packet switched public data networks (PSPDN)
like X.25, which is available worldwide. Data transmission can be full-duplex,
synchronous with data rates of 1.2, 2.4, 4.8, and 9.6 kbit/s or full-duplex, asynchronous
from 300 to 9,600 bit/s.
Tele services: GSM mainly focuses on voice-oriented tele services. These comprise
encrypted voice transmission, message services, and basic data communication with
terminals provision for communication service mandatory priority, closest message
Sending for quotes, message ring the with fax, the Supplementary supplementary
telephony identification, incoming/outgoing closed
J analog transmission

voice “serious” which mobile tones user The but emergency offered and possibly

N size, as of transmission, service telephone service, is for in it groups

successor phones high-quality known receiving available can applications formatted a


all with services: standardized of call services. by also pre-empting (SMS), providers
T
center. calls, and and from larger that network GSM traditional transfer

of of worldwide. redirection, while multiparty may text, integrate digital the SMS
Advice SMS, In which pictures A these such is addition according PSTN other useful

U
and and vary way. logos, other the is voice the computer

offers as possible services small of the In free communication (GIF, codecs emergency
from or But connections, displaying service ring enhanced this Charge or to
transmission. transmission ISDN to transmission of cameras. tele with tones, service,
the provider JPG, forwarding during offer are charge. modems and for (e.g., ITU-T

W
(AoC) MMS, used horoscopes WBMP), message road

number very bearer Another various and data fax fax). of may to Special This
standards for used etc. of data simple EMS will conditions, animated or provider.
services, be the The messages of voice connection short Standard service (eg
enhancements non-voice is automatically in, available. and codecs transmission was
transmitted primary ongoing message T.4 e.g., 911, love transmission. video
o
pictures, Typical hardly GSM and (EMS), e-mail (coder/decoder) of

ISDN letters. fax 999). tele goal up also T.30 clips transfer calls, machines. providers

r
used. as be to service of small for services headers of features offers digital

This has using etc. set 160 analog GSM It the MMS is barring images can up the and
ld
characters. modems. is service the a data are or are can

with standard was Another group such data be highest comes offers larger short
stock
offer used used
over
user and the the
for
as of is
3
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
GSM Architecture
A GSM system consists of three subsystems, the radio sub system (RSS), the network
and switching subsystem (NSS), and the operation subsystem (OSS).

Network and units: ➢ ➢ J Home subscriptions. service subscription Visitor


N
subscribers always subscriber Switching location location

integrated profile, that related from HLR register register location is Subsystem: the

T
with needed functions. stores PCS Functional the (VLR): (HLR):
U
information provider, by MSC. permanent the The The It It

Architecture is MSC When NSS is switching he a database a and or data in database

W
is a she MS activity order responsible about is of system that

roams registered a to GSM used contains subscribers, status. service includes into for
System
o
for in When a storage temporary visiting performing the new the HLR

r
including an MSC following and subscribers. of individual information that

area, management call a operator. processing


ld
subscribers the functional

buys VLR VLR about of


is a
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
connected to that MSC will request data about the mobile station from the HLR. Later if
the mobile station needs to make a call, VLR will be having all the information needed
for call setup. ➢ Authentication center (AUC): A unit called the AUC provides
authentication and encryption parameters that verify the users identity and ensure the
confidentiality of each call. ➢ ➢ Radio i.e., connection to ➢ ➢ ➢ Operation connected is

the customer maintenance overview GSM J called the Equipment identity

mobile Mobile the Base by maintain to/from Base links as BTS. Base station. connected
interface FDMA each network the network. OSS handover, Subsystem a system.
N
mobile cell between operation station station A transceiver base

and to cost-effective stations. via between etc.)The switching number the and of A
operator in all radio contains activities to allows the mobile BTS identity It the wireless
station stations equipment controllers subsystem cell MS controls Support the (RSS):
O network. and connections of BTS the can interface configuration via station MSC

T
center monitors engineers BSC’s equipment all register support
controller RSS that network (MS) the is the form calls support the system: and in the
(BSC): (BSS): (MSC): A Um and are radio (BTS): are the group (dashed to and radio

U
and (EIR): a mechanisms BTS. system to to part. the served

required interface, and switching radio that (BSC). data, the for subsystem A The
monitor, controls an The NSS The equipment of The It from Besides GSM prevents
lines). It base MS, (OSS). is BTS’s by cell centralized, BSC and MSC is via a BTS
operations for other and The high system and a the station network coding/decoding
control or, necessary diagnose the provides a database are a performs (RSS) The
W
MSC. calls BSC, (transceivers handles to system. BSS

capacity telephone using A GSM controlled the and interface OSS of subsystem from
regional comprises the and performs BSC comprises and all radio sectorized to
network. that for the The the BSS is switch the the stolen, and troubleshoot
maintenance the telephony via wireless by radio frequency contains and purpose (solid
BSC. control of contains data and functional an the (BSS). many that all

o
antennas) voice, OSS all unauthorized antennas, BSC. interface lines)
Abis systems. Implementation local functions provides functions transmission of radio
information switching BSSs, several (RF) The provides and OSS every interface. and

r
center entity needed operational figure specific power to several rate each

the functions is BTSs. aspect necessary and or the functions to from a connection

ld
(OMC) adaptation shows about controlled to offer

defective levels The (TDMA, of physical


network entities,
and service mobile
of which OMC such
Um
and the
the
the
the of
to
in
is
is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card
called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that
the user can have access to subscribed services irrespective of a specific terminal. By
inserting the SIM card into another GSM terminal, the user is able to receive calls at that
terminal, make calls from that terminal, and receive other subscribed services.
The mobile equipment is uniquely identified by the International Mobile Equipment Identity
(IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to
identify the subscriber to the system, a secret key for authentication, and other
information. The IMEI and the IMSI are independent, thereby allowing personal mobility.
The SIM card may be protected against unauthorized use by a password or personal
identity number.
Radio Interface
The most interesting interface in a GSM system is Um, the radio interface, as it comprises
various multiplexing and media access mechanisms. GSM implements SDMA using cells
with BTS and assigns an MS to a BTS.
GSM TDMA Frame, Slots and Bursts
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Each of the 248 channels is additionally separated in time via a GSM TDMA frame, i.e.,
each 200 kHz carrier is subdivided into frames that are repeated continuously. The
duration of a frame is 4.615 ms. A frame is again subdivided into 8 GSM time slots,
where each slot represents a physical TDM channel and lasts for 577 μs. Each TDM
channel occupies the 200 kHz carrier for 577 μs every 4.615 ms. Data is transmitted in
small portions, called bursts. The following figure shows a so called normal burst as
used for data transmission bits. due enhance adapt select data transmission: avoid
training initial is Logical Physical timeslot Each transmitted logical 577 is bit TDMA

J available 4.615ms rate • to The field logic the connection interference the

different channels The Apart Two Each 26-frame This of frames sequence channels

N
number. the remaining channel: about parameters strongest

contains (577 channel for first in multiframe receiver types of inside a from are a the
path the frequency 271kbps can and s) slot. multiframe Logic setup synchronizes s
and grouped of with user duration corresponding frequency x channel a signal performs
T
30.5 delays occupy the last performance. 8 time channels, of frame

between channel: or is = neighbouring three normal the per μs used 4.615 network in
slot. correction and into a are defined with (4.615ms TDMA receiver case hierarchy

U
part a carriers bits to to the two specific used namely As MS

ms). burst, logical carry 156.25 give of of timeslots of MS The control shown, types and
frame. by the multi-path as a The to channels, is the burst x normal with traffic training
physical guard ETSI divided specifying physical task. channels the BTS, 26 bits of
transmitter bits data. the = the multiframes: allows current of channels per Consequently
120 and per (1993a) burst burst space the BTS a propagation.

W
into sequence channel channels are timeslot.

synchronization timeslot finally ms) both, the physical (tail) path frames is in time
multiplexed to and comprising only MS time, defines avoid or a a propagation are to in
and their and dummy The carrier to even of the 546.5 turn an A channel. the all
overlapping correct 8 logical frame flag duration associated four data access
o
set timeslots the middle on into of μs frequency burst burst and to S

entire of 26 more long duration the characteristics the During indicates channels 0 burst
a off. of TDMA and of physical with logical is local of channel. control and with

r
a bursts a used can slot is and approximately TDMA this yield contains an

used other oscillator whether are frames. be if channel is channels.


ld
a channels. extended for no process, used used

present. TDMA a for and bursts frame gross data data 148
the
the to to to
to
is
Downloaded From JNTU World (http://www.alljntuworld.in)
s (15/26
www.alljntuworld.in JNTU World
235.4 ms) comprising 51 TDMA frames. This multiframe is exclusively used for control
channels. The multiframe structure is further multiplexed into a single superframe of
duration of 6.12sec. This means a superframe consists of
• 51 multiframes of 26 frames.
• 26 multiframes of 51 frames. The last multiplexing level of the frame hierarchy,
consisting of 2048 superframes (2715648 TDMA frames), is a hyperframe. This long
time period is needed to support the GSM data encryption mechanisms. The frame
hierarchy is shown below:
GSM Frame Hierarchy
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
• 51-frame multiframe (4.615ms x 51
www.alljntuworld.in JNTU World
There are two different types of logical channel within the GSM system: Traffic channels
(TCHs), Control channels (CCHs).
Traffic Channels: Traffic channels carry user information such as encoded speech or
user data. Traffic channels are defined by using a 26-frame multiframe. Two general
forms are defined: Uplink simplifies transmit multiplexes CHannel in handover Control

for random channel into J order i. ii. control the However, and 51-frame to

N
are access and (SACCH). Channels: process. Full Half the transmit

procedures downlink defined: two receive duplexing rate rate etc. multiframe. if In types
T
traffic control traffic required, between total Broadcast, are Control at

such the separated of function channels 24 channels information as TCH/F same logical

U
a base channels location Fast Common in (TCH/F), by time.

(TCH/H), station are Associated channels, mobile three at registration, transmitted carry
The a and and higher slots at terminals at 26-frame Dedicated. system a a mobile a
W
(bursts) gross Control gross bit TCH and mobile rate. bit

signalling bit design, one station. multiframe in CHannel and rate This Control rate the

o
SACCH. station of of 26-multiframe a is as Three 22.8 11.4 usually

Slow and mobiles channels (FACCH) synchronisation, structure, kbps kbps. categories
r
synchronisation Associated the (456bits will are case can structure. shown

ld
not multiplexed during steal of / need 20ms)

Control
paging, control below
TCH This
data the to
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
➢ Broadcast control channel (BCCH): A BTS uses this channel to signal information to
all MSs within a cell. Information transmitted in this channel is, e.g., the cell identifier,
options available within this cell (frequency hopping), and frequencies available inside the
cell and in neighboring cells. The BTS sends information for frequency correction via the
frequency correction channel (FCCH) and information about time synchronization via
the synchronization channel (SCH), where both

GSM The interface, functions. multiplexing channels, Um encryption


J ➢

➢ uses signalling Protocols channels Common between uses up The channel) in that
Dedicated unidirectional, established channel authentication, SDCCH it, signal a

(FACCH). This larger N GMSK TCH and a which as a This is it RACH

the GSM is call, not shown amounts power of can measurement necessary protocol
paging already has MS (SDCCH) using are bursts includes performed is for use
control it system. control The a used a subchannels implements and uses level.

T
below. digital slow a registration the TCH of slotted into TCH channel

FACCH exists, in BS data to in the the The following Finally, channel associated with
channel a end-to-end, GSM exchange of modulation the is Layer with or TDMA in

U
random Aloha. creation BTS exchanged the SDCCH GSM
(PCH) less a of case uses multiple or is low the if the channel 1 uses (CCCH): time.
(DCCH): channels other more structured frame, This of the is dedicated uses system
BCCH. data access BTS, but of for for the the handovers and time access via data
signaling bursts is only paging rate further a synchronization quality access physical
performs where the it information, fast are channel All slots While needed into

W
between (782 control uses (all CCCH. according the

bidirectional. information connection associated grant where information which on a


three bit/s) appropriate the MSs layer collision the for encryption/decryption (RACH)
the MS channel channel For previous setting general BTS are for such stand-alone
downlink. within that and to with setup. calls signaling. otherwise dedicated regarding
o
may the As needs and as BSS handles to up (SACCH) MS. the

(AGCH) layers toward a the channels long send five a MS occur BTS, over cell The
TCH. to If channel dedicated an This be as used different have all depending

r
connection data control the may physical an detection with MS to transmitted

an associated Each have radio-specific MS, can air signal by to of to MS wants quality
ld
access other interface. TCH the data, the exchange

comprise all the channel


formats, layer control has on an of TCH. to setup BTS.
been BTS
MSs
with this
idle MS
and
and
i.e., and not
the set
at
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Protocol architecture for Signaling
The main tasks of the physical layer comprise channel coding and error
detection/correction, which is directly combined with the coding mechanisms. Channel
coding makes extensive use of different forward error correction (FEC) schemes.
Signaling between entities in a GSM network requires higher layers. For this purpose, the
LAPDm protocol has been defined at the Um interface for layer two. LAPDm has been
derived from link access procedure for the D-channel (LAPD) in ISDN systems, which is
a version of HDLC. LAPDm is a lightweight LAPD because it does not need
synchronization flags or checksumming for error detection. LAPDm offers reliable data
transfer over connections, re- sequencing of data frames, and flow control.
The network layer in GSM, layer three, comprises several sublayers. The lowest sublayer
is the radio resource management (RR). Only a part of this layer, RR’, is implemented in
the BTS, the remainder is situated in the BSC. The functions of RR’ are supported by the
BSC via the BTS management (BTSM). The main tasks of RR are setup, maintenance,
and release of radio channels. Mobility management (MM) contains functions for
registration, authentication, identification, location updating, and the provision of a
temporary mobile subscriber identity (TMSI).
Finally, the call management (CM) layer contains three entities: call control (CC), short
message service (SMS), and supplementary service (SS). SMS allows for message
transfer using the control channels SDCCH and SACCH, while SS offers the services like
user identification, call redirection, or forwarding of ongoing calls. CC provides a point-
to-point
Downloaded From JNTU World (http://www.alljntuworld.in)

NTU
J
World
www.alljntuworld.in JNTU World
connection between two terminals and is used by higher layers for call establishment, call
clearing and change of call parameters. This layer also provides functions to send in-
band tones, called dual tone multiple frequency (DTMF), over the GSM network. These
tones are used, e.g., for the remote control of answering machines or the entry of PINs in
electronic banking and are, also used for dialing in traditional analog telephone systems.
Additional protocols are used at the Abis and A interfaces. Data transmission at the
physical two signaling information a Localization The for information the roaming. in To

J BSS a locate HLR ➢ ➢ ➢ ➢ country which, fundamental at via Mobile

number country (SN). International unique the number Temporary give the Mobile
N
identity request current the helps Abis, layer about Roaming and

between identification a 4 mobile between about away and the byte the BSS and
address typically BTSM identification from visitor the station (MSIN). and code for
station also HLR system feature TMSI Calling application the the location can

T
network an a location mobile the between MSCs, (CC), an mobile

current exact to for user country roaming uses take MSC MSC, for international of of
MS, find performs BTS the the changes. the local of identity of pulse place subscriber
code HLR, of a several different location subscriber and part and GSM current

U
subscriber a code GSM national a management. number

subscriber. subscriber subscriber within (MNC), code the VLRs, periodic a (BSSAP).
Changing of system (VCC), numbers is BSC. and address MSC providers ISDN the
modulation destination identity the a (MSRN): for identity the AuC, network and user
identification. IMSI is together This location is the an phone are VLR the is VLRs

W
number Signaling MSRN. finally incoming signalling in also
visitor EIR, needed: (TMSI): consists automatic, protocol (IMSI): different Another
currently of code (PCM) number. with with stored updates. and one the The national
(NDC) (MSISDN):- system call. the uninterrupted of OMC. over provider, To mobile
GSM countries. in temporary also systems. VLR worldwide a responsible subscriber

o
This the mobile hide The the destination and uses transfers An HLR.

No. generates subscriber number the air between HLR LAPD the MSC country the
address 7 interface, The availability IMSI, localization number. MSRN for subscriber

r
(SS7) IMSI always all can is this consists the only code two code used which
that identification management contains also MS for is The address GSM

ld
important providers

(VNDC), hides used is for contains of (MCC), number informs


internal control
MSRN of would called users layer
uses
the
the the for
on
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
For a mobile terminated call (MTC), the following figure shows the different steps that
take place:
step 1: step 2: step 3: step 4: step 5: step 6: step 7: step step step step step step

J 10: 11: 12: 15: 8: 9: Downloaded From JNTU World (http://www.alljntuworld.in) and
MSRN the The The Upon The The User The VLR VLR If The Till Step

N
MS information forwards fixed GMSC GMSC MSC HLR step BTSs

dials sends sends receiving 13: is from available, 17: network requests If the checks of
the the can identifies MS the the Then all phone MSRN requested

T
MSRN, to now current answers, BSSs call the for (PSTN) the the the

number forward setup the GMSC number VLR to transmit VLR MSC Mobile VLR. the
U
information HLR HLR VLR to identifies HLR for signals

initiates of the the Terminated existence for performs the a the call determines
Gateway GSM the paging current to the setup paging subscriber the subscriber.

W
number security and MSC signal MSC status request Call in

the its all to (MTC) (GMSC). MSC belongs and subscribed to of checks cells setup to
o
the the signals the responsible MS MS it a to MSC is connection a

r
responsible the services user indicated call in for setup GSM to and MS for.
ld
the and requests to network MS

HLR
forwards
an
www.alljntuworld.in JNTU World
For a mobile originated call (MOC), the following steps take place:
step 1: The MS transmits a request for a new connection step 2: The BSS forwards
this request to the MSC step 3: Step 4: The MSC then checks if this user is allowed to
set up a call with the requested and checks the availability of resources through the
GSM network and into the PSTN. If all resources are available, the MSC sets up a
connection between the MS and the fixed network.
In addition to the steps mentioned above, other messages are exchanged between an
MS and BTS during connection setup (in either direction).
Message flow for MTC and MOC
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Handover
Cellular systems require handover procedures, as single cells do not cover the whole
service area. However, a handover should not cause a cut-off, also called call drop. GSM
aims at maximum handover duration of 60 ms. There are two basic reasons for a
handover:
1. The mobile station moves out of the range of a BTS, decreasing the received
signal level increasing the error rate thereby diminishing the quality of the radio link.
2. Handover may be due to load balancing, when an MSC/BSC decides the traffic is
too
high in one cell and shifts some MS to other cells with a lower load.
The four possible handover scenarios of GSM are shown below:
➢ Intra-cell handover: Within a cell, narrow-band interference could make transmission
at a certain frequency impossible. The BSC could then decide to change the carrier
frequency (scenario 1). ➢ Inter-cell, intra-BSC handover: This is a typical handover
scenario. The mobile station moves from one cell to another, but stays within the control
of the same BSC. The BSC then performs a handover, assigns a new radio channel in
the new cell and releases the old one (scenario 2). ➢ Inter-BSC, intra-MSC handover:
As a BSC only controls a limited number of cells; GSM also has to perform handovers
between cells controlled by different BSCs. This handover then has to be controlled by
the MSC (scenario 3). ➢ Inter MSC handover: A handover could be required between
two cells belonging to
different MSCs. Now both MSCs perform the handover together (scenario 4).
Downloaded From JNTU World (http://www.alljntuworld.in)

NTU
J
World
www.alljntuworld.in JNTU World
To provide all the necessary information for a handover due to a weak link, MS and BTS
both perform periodic measurements of the downlink and uplink quality respectively.
Measurement reports are sent by the MS about every half-second and contain the quality
of the current link used for transmission as well as the quality of certain channels in
neighboring cells (the BCCHs).
Handover decision depending on receive level
Intra-MSC handover More sophisticated handover mechanisms are needed for
seamless handovers between different systems.
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Security
GSM offers several security services using confidential information stored in the AuC
and in the individual SIM. The SIM stores personal, secret data and is protected with a
PIN against unauthorized use. Three algorithms have been specified to provide security
services in GSM. Algorithm A3 is used for authentication, A5 for encryption, and A8
for the generation of a Access for subscriber Ki, performs keys requests

authentication, and A3. values. rejected. J cipher the the The subscriber Kc

N
Authentication control If user SIM. key. for MS the the they

authentication. each identification basic The sends appropriate The the and are
T
module, IMSI, various generation VLR the user authentication: back is

same, perform based and sends This needs the security IMSI, values then SRES of

U
step the on the Subscriber a random the the services

forwards VLR and is secret random for generated The based same SIM, the accepts
RAND, values first PIN offered algorithm on Authentication which this operation value
W
step a by to challenge-response RAND, information the the

stores by SRES, RAND includes access subscriber, GSM SIM; used with signed the to
the and for are: the the RAND individual to the authentication authentication SIM. VLR

o
responses the otherwise Kc SIM. scheme HLR. and can from The Both
r
authentication the now SRES, The next the as the key sides, of A3. shown

ld
compare current subscriber a step HLR. and Ki, valid

The network below:


cipher is called VLR AuC
both user
key
For the
is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Confidentiality: All user-related data is encrypted. After authentication, BTS and MS
apply encryption to voice, data, and signalling as shown below.
To over applying value calculate transmitted algorithm Anonymity: user (TMSI), VLR

New To the several HSCSD {high oriented packets/internet J


ensure basic Data identifiers can the by speed channels traffic which
enhance

N
the change applying air GSM the A5 Services privacy, over the

circuit cipher To interface. and same data is in thinking. is are the the provide the newly
GSM, based could the all not key transmission TMSI switched Kc air cipher
T
messages algorithm After interface. used Kc, based assigned on The

i.e., user be at key connection-oriented which any system shifting over authentication,

U
combined data}. anonymity, on Kc. containing time.

capabilities A8. MS by the the is is the A Note the and generated called air. more
random VLR to paradigm BTS all that Instead, user-related of increase GPRS MS
W
progressive after data GSM, can the traffic using value and

now from each SIM is GSM {general two bandwidth. the BSS encrypted channels,
RAND. information encrypt location step connections/telephone in basic individual

o
transmits can the packet is approaches The MS the and start e.g.,

before update. This introduction are a decrypt radio and key key using with temporary
r
encrypted transmission, system the Ki Additionally, Kc service}. are 9.6

ld
encryption data and network itself possible. kbit/s thinking of

a is using identifier in random


packet- is called GSM
each, both
and
the not the
As by
to
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
HSCD: A straightforward improvement of GSM’s data transmission capabilities is high
speed circuit switched data (HSCSD) in which higher data rates are achieved by
bundling several TCHs. An MS requests one or more TCHs from the GSM network, i.e.,
it allocates several TDMA slots within a TDMA frame. This allocation can be
asymmetrical, i.e. more slots can be allocated on the downlink than on the uplink, which
fits the typical user behaviour of downloading more data compared to uploading. A
major disadvantage of HSCD for GPRS: problems (GPRS) frequent transmissions
requirement between fixed, users; load and the can such confidentiality. support
architecture, (GGSN) networks conversion, networks IP- GPRS example, individual

bytes), connected J computer maximum based of be and as up- pre-

determined support is the The used and nodes The authentication, provides one
N
operator that is (PDN). requests transmission (e.g., of GPRS to and

type MSs’ GPRS and the specification. and a in data performs next and HSCSD it of
data (GSN) BSC downlink still IP node parallel tunnels of interworking many small
backbone location, This traffic. eight packet preferences. architecture step or channel

T
rate user via uses (SGSN) and X.25) by manner node new several or

time (only data toward of access to are the frame addresses mode are being For
medium is conventional (traditional network small interfaces contains connection-
oriented allocated to via slots in the responsible which unit introduces the The but a

U
control, transfer security more fact the fully user GSM within

new on volumes GPRS between volumes from Gi routers. (Gn supports routing via
separately. flexible packet-oriented. have demand. GSM GPRS interface transport for
user services. functions two a encapsulation. interface). for the concept TDMA
applications been All the (e.g., information (e.g., identity new traffic collecting radio the

W
and GPRS All GSNs mechanisms GPRS and system defined.
Allocation network MS GPRS is typical such frame. powerful typical time channels, or
The independent transfers confidentiality, via register are control The The that network
billing limits as other slots includes for The the web integrated Time elements, general
of access web GGSN exhibit GPRS of data the Gb gateway can packets the channel),

o
the new responses) (GR), GSM, information slots and of GSM

interface. requests) several rate). transmission slots be is control. users, traffic element
which channel into packet and are external connected which shared to GPRS keeps

r
system is All and the not the user security performs based according are
patterns The GPRS (e.g., The or is standard is radio does characteristics allocated
SGSN by support track called packet not can the information avoids to SGSN, on

ld
infrequent the

SGSN not counting services efficient


services
external allocate such serving address service
current
of via GPRS to active
GSM node limit
data in the the
the for an as
is a
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
relay and is basically on the same hierarchy level as an MSC. The GR, which is typically
a part of the HLR, stores all GPRS-relevant data.
directly in Before procedures temporal sequence stored mobility ciphering. GPRS. the
the (used layers). dependent of To used, J SNDCP the GPRS achieve

reliable which for traditional As The in sending All To to management

N
identifier, IP number the tunnelling shown the adapt and

convergence of data following a comprises TCP packets). high BSS the MS GTP, any
within to circuit-switched above, (needed mobility (CKSN) reliability and the called and
T
data user protocol also The figure ARQ different finally the protocol

in packet over packet a comprises GPRS network for for and GPRS temporary the

U
management. shows of reliable to the (GTP). data

characteristics FEC data corresponding packet Architecture data the GSM, (SNDCP)
GPRS backbone, protocol encryption. the functions mechanisms is MS. is GTP transfer
transmitted protocol transfer logical tunneled is network, The The only can for is

W
Reference i.e., for of MSC, used For of link use the

attachment SGSN. between used architecture the from for authentication, X.25
between from an each GPRS two between identity underlying which PTP for MS the
Model
different Besides MS, packets) a SGSN (and signalling MS backbone PDN, must is

o
procedure the an (TLLI), a of responsible to later GPRS networks,
SGSN GSNs, the and attach location transport via the attaching or PTM) in

transmission the is GGSN the MS, and context includes and the IP is to GGSN non-

r
reliable management, services. for transferred (using a it, a protocols, GPRS

the the and and special ciphering data following is subnetwork MS. assigning and vice

ld
set detaching, any plane scenario. transport LLC On up
SGSN versa. either
lower using
UDP key and
and
top the

for
is a
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
GPRS transmission plane protocol reference model
A base station subsystem GPRS protocol (BSSGP) is used to convey routing and QoS-
related information between the BSS and SGSN. BSSGP does not perform error
correction and works on top of a frame relay (FR) network. Finally, radio link dependent
protocols are needed to transfer data over the Um interface. The radio link protocol (RLC)
provides a reliable link, while the MAC controls access with signalling procedures for the
radio channel and the mapping of LLC frames onto the GSM physical channels. The radio
interface at Um needed for GPRS does not require fundamental changes compared to
standard GSM.
Downloaded From JNTU World (http://www.alljntuworld.in)

NTU
J
World
www.alljntuworld.in JNTU World
Unit:2 .
The Media Access Control (MAC) data communication protocol sub-layer, also known
as the Medium Access Control, is a sublayer of the Data Link Layer specified in the
seven-layer OSI model (layer 2). The hardware that implements the MAC is referred to
as a Medium Access Controller. The MAC sub-layer acts as an interface between
sublayer and the network's physical layer. The MAC communication channel in a multi-
point network. This channel broadcast communication service. Motivation multiple

medium it medium. jamming • • • • Hidden J is Signal The It Furthermore,


N
free. might One and sender (a If access signal. If strength Exposed

wire be for the of the a would the a medium or case with But CS sender specialized

T
decreases coaxial most Terminals might this that apply collision is

detects scheme commonly a free, not cable) sender CS proportional MAC work, and
U
the detection doest LLC a to cannot sender CD, see

collision if used and for work if but to “hear” it starts e.g., (CSMA/CD). MAC MAC the

W
the is well while free. a collisions square transmitting the

sublayers terminal schemes with If collision, sending, the wireless of Downloaded From
JNTU World (http://www.alljntuworld.in)
o r
layer may the emulates Logical provide a Link unicast, full-

ld
duplex Control multicast logical (LLC)

or
for wired networks is carrier sense In this scheme, a sender senses the medium is busy,
the sender waits until data and continues to listen into the it stops at once and sends a
networks. The problems are: the distance happen at the receiver
i.e., CD does not work is “hidden”
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
Consider the scenario with three mobile phones as shown below. The transmission range
of A reaches B, but not C (the detection range does not reach C either). The transmission
range of C reaches B, but not A. Finally, the transmission range of B reaches A and C,
i.e., A cannot detect C and vice versa.

Hidden • • • • Exposed • • • • • Hidden Near Consider • • • J A C Collision

transmission A B C C but C Signal So, If C and wants sends senses postpones unable
is sends is C A B’s terminals terminals “exposed” “hidden” is terminals

N
far the is strength an signal to outside to to terminals the situation to

at arbiter A, B, send hear B its carrier to cause C C from occurs, drowns to decreases B
T
transmission radio cannot wants to out B for shown B, C and collisions,

A. C sending and range A out to hear senses detects cannot send below. proportional

U
vice A’s of A until signal to rights, C, where versa a that

detect “free” A another waiting it and the detects making as B this to B medium carrier
drown Exposed terminal the are is collision the not square C
W
both is unable medium out (CS necessary busy. terminals (not

sending A’s (CD of fails) to A the signal as fails) or receive distance and with being

o
causes B) and on starts outside the idle A’s the unnecessary continues
r
same transmitting transmission again physical the transmission range with

ld
delay. layer its

making
power.
www.alljntuworld.in JNTU World
The near/far effect is a severe problem of wireless networks using CDM. All signals
should arrive at the receiver with more or less the same strength for which Precise power
control is to be implemented.
SDMA Space Division Multiple Access (SDMA) is used for allocating a separated
space to users in wireless phone MAC frequencies SDMA implementing requiring to
FDMA Frequency dimension transmit the channels receive often networks (FDD)

separated J better channel used algorithm user. Frequency in channels.

N
algorithm utilize networks. simultaneously are any using establishing

into which division for (FDM), The to relatively multiplexing space simultaneous several
the different each could A the mobile Division is individual A multiplexing full time
T
formed division typical two non-overlapping user. a narrow, now

duplex on frequencies. duplex phone slots directions, equipment. Multiple one access

U
by application physical Each decide multiplexing

conversation (TDM) cells usually satellite (FDM) may channel. to conversation and
Access which channels. the mobile receive It frequency or 30 involves is describes
transponder sectorized medium usually code A KHz requires (SDM). base is station
W
scheme several a (CDM) bands. assigning or method gets by

station combined schemes antennas less a SDM base by to transmit base its called
base assigning and are employed station is own, an has to stations with which still best,

o
are station optimal frequency subdivide & the other unique, defined

and receive available. a taking constitute to unique with specific mobile and base
r
multiplexing permit the channel as radio into different vice division station

The advantage either frequency station frequency the several account versa channel.

ld
basis infrastructure pair. to transmit techniques quality.

duplexing in a are users FDM cellular for mobile


of within which
now The not the
or to A
is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
or from regulated downlinks allocates phone. n·0.2 • mobile separate of sender TDMA A

multiplexing much communication. time allocating J from more (scarce) .,

channel. domain. satellite fd MHz, more The This Up- makes communication ground =

N
frequency a flexible by a 935 use certain certain two the frequency

and Each flexible scheme (TDM). national Again to 935.2 the MHz control downlink
frequencies downlink ground Now channel scheme multiplexing frequency time for this
T
scheme, to + also Compared authorities. synchronization 960 n·0.2

resources. to each slot typically can control. frequency (uplink very satellite, has FDM
have MHz. for are be possible which for MHz disadvantages. inflexible

U
done a scheme for also a up- The to channel, and According

takes All fixed Additionally, and multiple for comprises is FDMA, and known by
downlink) basic fd communication uplinks a between as place using for = relation.
certain and downlink or downlink, fu frequency access as to typical by limits + time

W
While for all a use FDMA, 45 uplink, using channel has

sender fixed the technologies If only and MHz, the division the to a the mobile radio i.e.,
a bandwidth fixed establish pattern duplex allocation scenario number band dynamic
the a and i.e., n. uplink from few base The stations from receiver multiple assignment
between communications similar that minutes of base a base station, frequency would

o
allocation of scheme senders. duplex mobile allocate 200 broadcast
station station has to access 890.2 be kHz. at shown FDMA channel of for to station

r
scheme. a a is certain to selects be and a time. GSM tremendous (TDMA) fu

mobile is 24 on frequency achieved techniques, = to 915 with time the

ld
hours time Assigning 890 is the base right fixed station

MHz, a slots division offers MHz mobile station


a in waste to side, day, and
i.e., the for all or
+
a
aa
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Listening channels identification, Fixed The This is moment. interference competition
The and uplink shown mobile separated interference general communication.

J quite a above simplest results TDM duplex in and station scheme simple,

N
separated to If in the figure in downlink using between will different

algorithm this time. channel but figure, a uses In fixed still as happen. shows are this
T
synchronization this Up in the one different not wastes the between

scheme. using bandwidth frequencies time for to case, only how as out base The 12
using flexible at the a of these connectionless, crucial mobile station different Each a

U
lot fixed the 12 same base TDM and at is fixed considering of

same different connection stations the is factor pattern uses assured, station bandwidth.
frequency is the mobile TDM same allocating frequency one typical is demand-oriented
W
that and slots can varying patterns accessing each out time is

stations want mobile is allotted It be solution for of time called is is mobile is 12 to


bandwidth assigned the are quite simple. can access too slots station. the slots its used

o
uplink. time for use own station TDMA difficult, reserved static, for for

wireless the Fixed to by the requirements. division Assigning up- channels the
implement medium Uplink the knows same schemes too and downlink, schemes but
r
time phone base downlink inflexible duplex frequency and listening in is

different slot its solved. can a multiple systems. station, downlink

ld
fixed turn do whereas at be (TDD). pair. not used the for

to slots and without pattern.


access where MAC many
right need
This data the are for As no
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
Classical Aloha In this scheme, TDM is applied without controlling medium access.
Here each station can access the medium at any time as shown below:
This coordination a higher not Slotted The slots start slotting implement load, accessing

Carrier One Sensing J collision require at first (slotted improvement is but

N
layers the The Aloha sense a doubles the refinement the they

beginning random distributed any occurs introduction among (e.g., carrier Aloha).
medium multiple complicated cannot the retransmission and to access the of and
T
of throughput. In or access the access give a the stations. the of

minimum this time accessing basic scheme, access slots transmitted any classical

U
case, to slot hard a Aloha If of raises mechanisms. Both as

throughput. medium. all two data). without the shown transmission Aloha senders the
data or is basic medium The sensing more below. throughput Aloha a scheme is simple
W
have Aloha central destroyed. stations guarantees, only

systems to the Aloha is principles be arbiter from carrier provided if access


synchronized, Resolving works the work 18 controlling such before

o
carrier the occur per perfectly by fine as medium cent the for this
r
accessing maximum in is transmission introduction a to access many idle

ld
problem well light at 36 the decreases per load under

systems the delay and same cent, is and can medium. of without a left before time,
does
light only time
that i.e.,
the to
probability of a
www.alljntuworld.in JNTU World
collision. But, as already mentioned in the introduction, hidden terminals cannot be
detected, so, if a hidden terminal transmits at the same time as another sender, a collision
might occur at the receiver. This basic scheme is still used in most wireless LANs. The
different versions of CSMA are:
• 1-persistent CSMA: Stations sense the channel and listens if its busy and transmit
immediately, when the channel becomes idle. It’s called 1-persistent CSMA because
the

• • CSMA LANs scheme Demand 80% J host non-persistent medium

sensing p-persistent probability access by following Channel with transmits in

N
assigned implementing is case the is slotted collision idle. medium
of of efficiency the CSMA: with a multiple p, CSMA: in busy If standard with

T
addition the a avoidance again probability reservation medium medium

U
systems for the access stations IEEE and Aloha station

repeating (CSMA/CA) to is 802.11. nodes of achieve is mechanisms sense busy, 1


deferring 18% whenever also this Here the some and the pattern. station is sense
W
for to carrier sensing fairness and it one the slotted finds the

combinations of pauses next and the the the among medium, Aloha carrier slot channel

o
start access a random competing with is sending is 36%. but idle.
r
schemes with combined the amount only It probability some immediately

ld
stations. can used transmit with be of (fixed) increased

time in a Downloaded From JNTU World (http://www.alljntuworld.in) if the before


with a 1-p, i.e.,
wireless back-off
to TDM patterns. These schemes typically have a reservation period followed by a
transmission period. During the
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
reservation period, stations can reserve future slots in the transmission period. While,
depending on the scheme, collisions may occur during the reservation period, the
transmission period can then be accessed without collision.
One basic scheme is demand assigned multiple access (DAMA) also called
reservation Aloha, a scheme typical for satellite systems. It increases the amount of
users in a pool of satellite channels that are available for use by any station in a
network. It is assumed that not all users established, Once another occupied voice It
During future the other requests future reservation an PRMA certain applied. mobile

which J has explicit short station will two traffic the slots. slots. slot It

N
number packet stations. a A (the call. requests channels contention
is need modes call is reservation base and DAMA All a Collisions is and others
currently reservation Since kind allowed of is simultaneous transmission, ground
station, All as data for completed, slots for shown of are assigns stations phase data the

T
traffic the free. implicit during form to scheme. destroyed) which

stations resources transmission. transmit time multiple below. following a a receiving

U
access in the pair the the frame. could reservation in Each
batch have stations which reservation during channels and of access of to be
transmission The available the mode. to the sends this the If a obey they have
successful, this satellite, slotted frame same satellite scheme vector are back phase

W
slot. this are to channels communication is returned Aloha be

slot now a Therefore, being will repeated list. where, are do synchronized reservation a
has time broadcasts To then not scheme; being based held, to to maintain slots slot

o
destroy in be know the the time used on it reserved in list channels. can
all satellite is from the the requests pool which i.e., data indicating stations a only the be
future status perfect time a explicitly. for reserved transmission, fixed collects fixed in So

r
slot issued is to of an can proportion that access environment reserved, TDM

ld
is time. each TDM assignment try occupied all implicitly.

a from call slot successful to DAMA pattern rights pattern but reserve and a can to to
user. only
and the
for for
no
all be
of to
is
A is
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)

J to following Aloha station status and Additionally, noticed indicates also

reserved scheme Reservation In Each This send a F. that indicated fixed guarantees
station data This ‘ACDABA-F’, fashion. wants The As by is for nothing

N
that transmission. used TDM in the means soon base this TDMA is
slots unused to by station base allotted The for access station. scheme as each the

T
station has that three idle already station a base changed D data-slots

indicating station station its slots slots this All and This broadcasts N has station. own
after occupied mini-slots only; stations slot, eight one stopped ensures has a mini-slot

U
for certain the as that so to are data succeeded the shown.

the second a wishing six slots the now transmission sending followed transmission
collision other and reservation bandwidth and reservation are idle. frame. can Using

W
eight with to not slots. in Station by occurs. use transmit

touched. slot with a Before N·k these is are and status it Again, of reservation, not to
three F occupied, a data-slots slot The a reserve has can guaranteed destroyed free the
‘ACDABA-F’ fixed In stations and seven succeeded base the now third slots up station

o
delay. example all station form but failed compete to frame by can can
data future k collision. slot in data-slots. a Other F be (still returns compete frame to

r
reserving rate. starts, shown, in seven for slots all based slot indicated

ld
stations The stations, that this the the more are is eight.

for slotted on slot base is free free reservation implicitly


repeated. this a can than seven as This here station simple slot in aloha free)
now slot. one the
as in A
is
round-robin scheme or can be uncoordinated using an Aloha scheme. This scheme
allows for the combination of, e.g., isochronous traffic with fixed bitrates and best-effort
traffic without any guarantees.
www.alljntuworld.in JNTU World
Multiple access with collision avoidance Multiple access with collision avoidance
(MACA) presents a simple scheme that solves the hidden terminal problem, does not
need a base station, and is still a random access Aloha scheme – but with dynamic
reservation. Consider the hidden terminal problem scenario. A starts sending to B, C
does not receive this transmission. C also wants to send something to B and senses the
medium. The medium appears to be free, the carrier sense fails. C also starts Now
sending transmission. (RTS) length from receiver This of indicated hidden at

transmission With sender CTS J MACA the the CTS B, MACA, which same

N
transmission. of (B). terminal With first. causing (B) called tries in the
is C now the time. of B is MACA, future identifies A does to B receives the allowed clear
problem is CTS a avoid heard has hidden B collision not user transmission. After

T
resolves to toward to A react the by without data, the transmit B send

is does for C exposed receiving solved. as at RTS to and B. and this C B. (CTS). not

U
this the and an A the an the that But This contention collision

appropriate start message Still terminals vice medium RTS sender a length A contains
CTS, The RTS collisions its cannot versa. first of transmission CTS cannot as is C and

W
for and in the not CTS. it containing is the detect the future is

acknowledges again not future A heard might not name occur following as allowed this
the use contains transmission. by at occur the of at the receiver, by collision C, B once,

o
sender A way: name receiver to during but when only is send the but

triggers now and but of at one names data A anything sends B the reserved A of
r
receiver, and station and acknowledges transmission, an receiver the of C a

continues acknowledgement transmits request for sender for following in as

ld
the the the (A) well CTS. duration duration (A) with to

and and using a as send RTS


data and
the the
No
the its
a
transmission. C does not receive this CTS and concludes that A is outside the detection
range. C can start its transmission
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
assuming it will not cause a collision at A. The problem with exposed terminals is solved
without fixed access patterns or a base station.
Polling Polling schemes are used when one station wants to be heard by others.
Polling is a strictly centralized scheme with one master station and several slave
stations. The master can poll
• • • • • Downloaded From JNTU World (http://www.alljntuworld.in) the over students) contention
Example: base terminals the terminals the this Inhibit This (CDPD) (DSMA).

BUSY/IDLE After station the retransmission J base base slaves cycle

station scheme, missing all the acknowledges sense station station


N
in stations), ready choose starts Randomly according etc. Here,

busy phase. signals the indicator) which multiple mechanisms positive The chooses
acknowledges to again AMPS tone the the After send readiness master randomly, is

T
same Addressed to after base stops, successful used access transmit

this on many one mobile acknowledgement. address) polling the are could for phase,
address station to accessing schemes: correct downlink. implemented. according the
U
Polling all random phone transmissions; also all the mobile

packet for only terminals packets station establish system, polling round number the to
data terminals signals uplink In reservations polls and robin of transmission from is

W
without a case a continues the also list each a mobile is (only

list list busy of of not known station of collision stations efficient (the collisions, all station
o
polling coordinated service medium random on as classroom using the

digital wishing the detects if Cellular traffic list. via numbers additional next CDMA any

r
sense a example to a terminal Digital patterns busy collision further. transmit
ld
(collision or multiple FDMA back-off tone Packet with

are The during only if similar (called access polite


two
Data
base
and via a
www.alljntuworld.in JNTU World
CDMA Code division multiple access systems apply codes with certain characteristics
to the transmission to separate different users in code space and to enable access to a
shared medium without interference.
All terminals send on the same frequency probably at the same time and can use the
whole bandwidth of the transmission channel. Each sender has a unique random
number, the sender XORs the signal with this random number. The receiver can “tune”
into this signal if it knows the pseudo random number, tuning is done via a correlation
function Disadvantages:
• higher complexity of a receiver (receiver cannot just listen into the medium and start
receiving if there is a signal)
• all signals should have the same strength at a receiver Advantages:
32
• • all huge terminals code space can (e.g. use the 2 same ) compared frequency, to
frequency no planning space
needed
• interferences (e.g. white noise) is not coded
• forward error correction and encryption can be easily integrated
Downloaded From JNTU World (http://www.alljntuworld.in)

NTU
J
World
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
The following figure shows a sender A that wants to transmit the bits 101. The key of A is
shown as signal and binary sequence Ak. The binary “0” is assigned a positive signal
value, the binary “1” a negative signal value. After spreading, i.e., XORing Ad and Ak, the
resulting signal is As.

The superimpose above. the comparator the if J a original receiver received

N
same A now happens then signal wants during signal Coding tries
T
has form to to with and to transmission. and reconstruct receive decide

U
is feeds data spreading distorted B’s from if the the the data.

result The sender result of by original data resulting B’s into is B from a signal, data an
W
with 0 or sender integrator. signal from a bits the 1 as Ad.

result A 100. is shown and simply The The The sender is below. receiver

o
quite integrator result the B
r
clear. sum As is applies clearly Bs. adds As The As + A’s the seen, same

ld
Bs and products, key, as although Bs happens shown

Ak, now to a
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
J Soft where call. softer CDMA and a executed with off. involved, normally

stronger channel definite determine handover If Depending the a handoff. Soft the cell

N
cell communication than two without happens a decision sectors

handoff phones hard phone base those whether or on This the stations. soft decision
T
are after is continuously is the from is technique simultaneously user or

handoff from different made changes it not with the With will is attempting the to on

U
others. evident all Reconstruction request refers soft is from

same eventually in make whether a candidate pilot handoff, form connected to In the
physical that or to power a the end signal traditional feature have to of the be interim a
soft base mobile-assisted hand of measurements conditional
W
cell signal made to simultaneous A’s strength used handover

two stations. off data


site hard-handoff period, to from by or or (a from the communicate more decision

o
sectorised with not. It one the of handover, CDMA traffic is the a the

cells The user base list desirable process. is two cell channel (or of handoff made and
r
site), has station sectors or for neighboring with cell WCDMA simultaneous

With more on it to IS-95/CDMA2000 sectors) is communications is whether only is

ld
implement on referred hard base initiated considerably

the one. standards, cell list. during handoff,


stations to traffic sites, to hand
This
soft and as a
handoff in power-controlled CDMA systems because implementing hard handoff is
potentially difficult in such systems.
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
Spread Aloha multiple access (SAMA) CDMA senders and receivers are not really
simple devices. Communicating with n devices requires programming of the receiver to
be able to decode n different codes. Aloha was a very simple scheme, but could only
provide a relatively low bandwidth due to collisions. SAMA uses spread spectrum with
only one single code (chipping sequence) for spreading for all senders accessing
according to aloha.

Sender three shorter The throughput the simple J advantages main bits In

N
periods A and SAMA, problem shown coexistence is about B as of
T
access show. causes spread each in 18 using per the sender spectrum

U
collisions. with cent, medium this uses which approach other

techniques: at The the the is same same very same is systems finding spreading
W
robustness similar data time could good in to in their code,

o
Aloha, against also chipping the narrowband for be but narrowband ex
r
sent the sequences. same 110101 approach with spectrum, higher

ld
interference frequency as The shown benefits so power

maximum that below.


from and ban the for
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
UNIT-3
MOBILE NETWORK LAYER
Need for Mobile IP
The IP addresses are designed to work with stationary hosts because part of the
address defines the network to which the host is attached. A host cannot change its IP
address without terminating on-going sessions and restarting them after it acquires a
new address. Other link layer mobility solutions exist but are not sufficient enough for
the global Internet. Mobility is the ability of a node to change its point-of-attachment
while maintaining all existing communications and using the same IP address.
Nomadicity allows a node to move but it must terminate all existing communications and
then can initiate new connections with a new address.
Mobile IP is a network layer solution for homogenous and heterogeneous mobility on the
global Internet which is scalable, robust, secure and which allows nodes to maintain all
ongoing communications while moving.
Design Goals: Mobile IP was developed as a means for transparently dealing with
problems of mobile users. Mobile IP was designed to make the size and the frequency of
required routing updates as small as possible. It was designed to make it simple to
implement mobile node software. It was designed to avoid solutions that require mobile
nodes to use multiple addresses.
Requirements: There are several requirements for Mobile IP to make it as a standard.
Some of them are:
1. Compatibility: The whole architecture of internet is very huge and a new standard
cannot introduce changes to the applications or network protocols already in use.
Mobile IP is to be integrated into the existing operating systems. Also, for routers also it
may be possible to enhance its capabilities to support mobility instead of changing the
routers which is highly impossible. Mobile IP must not require special media or
MAC/LLC protocols, so it must use the same interfaces and mechanisms to access the
lower layers as IP does. Finally, end-systems enhanced with a mobile IP
implementation should still be able to communicate with fixed systems without mobile
IP. 2. Transparency: Mobility remains invisible for many higher layer protocols and
applications. Higher layers continue to work even if the mobile computer has
NTU
J
World
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
changed its point of attachment to the network and even notice a lower bandwidth and
some interruption in the service. As many of today’s applications have not been
designed to use in mobile environments, the effects of mobility will be higher delay and
lower bandwidth. 3. Scalability and efficiency: The efficiency of the network should not
be affected even if a new mechanism is introduced into the internet. Enhancing IP for
mobility must not generate many new messages flooding the whole network. Special
care is necessary to be taken considering the lower bandwidth of wireless links. Many
mobile systems have a wireless link to an attachment point. Therefore, only some
additional packets must be necessary between a mobile system and a node in the
network. It is indispensable for a mobile IP to be scalable over a large number of
participants in the whole internet, throughout the world. 4. Security: Mobility possesses
many security problems. A minimum requirement is the authentication of all messages
related to the management of mobile IP. It must be sure for the IP layer if it forwards a
packet to a mobile host that this host really is the receiver of the packet. The IP layer
can only guarantee that the IP address of the receiver is correct. There is no way to
prevent faked IP addresses and other attacks.
The goal of a mobile IP can be summarized as: ‘supporting end-system mobility while
maintaining scalability, efficiency, and compatibility in all respects with existing
applications and Internet protocols’.
Entities and terminology The following defines several entities and terms needed to
understand mobile IP as defined in RFC 3344. ➢ Mobile Node (MN): A mobile node is
an end-system or router that can change its point of attachment to the internet using
mobile IP. The MN keeps its IP address and can continuously communicate with any
other system in the internet as long as link-layer connectivity is given. Examples are
laptop, mobile phone, router on an aircraft etc. ➢ Correspondent node (CN): At least
one partner is needed for communication. In the following the CN represents this
partner for the MN. The CN can be a fixed or mobile node. ➢ Home network: The
home network is the subnet the MN belongs to with respect to its
IP address. No mobile IP support is needed within the home network. ➢ Foreign
network: The foreign network is the current subnet the MN visits and which is not the
NTU
home network. J
World
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
➢ Foreign agent (FA): The FA can provide several services to the MN during its visit to
the foreign network. The FA can have the COA, acting as tunnel endpoint and
forwarding packets to the MN. The FA can be the default router for the MN. FAs can
also provide security services because they belong to the foreign network as opposed
to the MN which is only visiting. FA is implemented on a router for the subnet the MN
attaches to. ➢ Care-of address (COA): The COA defines the current location of the MN
from an IP point of view. All IP packets sent to the MN are delivered to the COA, not
directly to the IP address of the MN. Packet delivery toward the MN is done using a
tunnel, i.e., the COA marks the tunnel endpoint, i.e., the address where packets exit the
tunnel. There are two different possibilities for the location of the COA:
Foreign agent COA: The COA could be located at the FA, i.e., the COA is an IP
address of the FA. The FA is the tunnel end-point and forwards packets to the MN.
Many MN using the FA can share this COA as common COA. Co-located COA: The
COA is co-located if the MN temporarily acquired an additional IP address which acts as
COA. This address is now topologically correct, and the tunnel endpoint is at the MN.
Co-located addresses can be acquired using services such as DHCP.
➢ Home agent (HA): The HA provides several services for the MN and is located in the
home network. The tunnel for packets toward the MN starts at the HA. The HA
maintains a location registry, i.e., it is informed of the MN’s location by the current COA.
Three alternatives for the implementation of an HA exist. 1. The HA can be
implemented on a router that is responsible for the home network. This is obviously the
best position, because without optimizations to mobile IP, all packets for the MN have to
go through the router anyway. 2. If changing the router’s software is not possible, the
HA could also be implemented on an arbitrary node in the subnet. One disadvantage of
this solution is the double 3

NTU
J
World
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
crossing of the router by the packet if the MN is in a foreign network. A packet for the
MN comes in via the router; the HA sends it through the tunnel which again crosses the
router. 3. Finally, a home network is not necessary at all. The HA could be again on the
‘router’ but this time only acting as a manager for MNs belonging to a virtual home
network. All MNs are always in a foreign network with this solution.
A CN is connected via a router to the internet, as are the home network and the foreign
network. The HA is implemented on the router connecting the home network with the
internet, an FA is implemented on the router to the foreign network. The MN is currently
in the foreign network. The tunnel for packets toward the MN starts at the HA and ends

at the FA, for the FA has the COA in the above example. IP packet
delivery
Consider the above example in which a correspondent node (CN) wants to send an IP
packet to the MN. One of the requirements of mobile IP was to support hiding the mobility
of the MN. CN does not need to know anything about the MN’s current location and sends
the packet as usual to the IP address of MN as shown below.
CN sends an IP packet with MN as a destination address and CN as a source address.
The internet, not having information on the current location of MN, routes the packet to
the router responsible for the home network of MN. This is done using the standard
NTU
routing 4 J
World
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
mechanisms of the internet. The HA now intercepts the packet, knowing that MN is currently
not in its home network. The packet is not forwarded into the subnet as usual, but
encapsulated and tunnelled to the COA. A new header is put in front of the old IP header
showing the COA as new destination and HA as source of the encapsulated packet (step 2).
The foreign agent now decapsulates the packet, i.e., removes the additional header, and
forwards the original packet with CN as source and MN as destination to the MN (step 3).
Again, for the MN mobility is not visible. It receives the packet with the same sender and
receiver address as it would have done in the home network.

NTU
J
World
www.alljntuworld.in JNTU World
Sending packets from the mobile node (MN) to the CN is comparatively simple. The MN
sends the packet as usual with its own fixed IP address as source and CN’s address as
destination (step 4). The router with the FA acts as default router and forwards the
packet in the same way as it would do for any other node in the foreign network. As long
as CN is a fixed node the remainder is in the fixed internet as usual. If CN were also a
mobile node residing apply Working address. network agent the address. registration,

Agent A solve solicitation. Agent For special not of according J mobile

ICMP, mobile this use and now this advertisement agent The to To method, a of in
N
Discovery a node and new another. to host and foreign Mobile

in a communicate problem, home foreign RFC the advertisement data appends packet
and has address other foreign 1256 IP:- agent. transfer. To the to network, Mobile make

T
mobile type foreign find with direction. with The an is agents the

permanent; for agent a IP specific the a foreign messages, change IP agent remote the
U
has agent extension and describes two advertisement same

function are of host, home the advertisement; agent addresses address the
mechanisms care-of which a for same, agents mobile two when of mobility transparent

W
an for are address methods: the agent message. a it host

advertise broadcast mobile moves care-of it as changes is is goes uses described


performed to shown host: the through address agent away The the their into rest as one
below:

o
router agent the of from presence the home in advertisement in is three

mobile the the steps called subnet. Internet advertisement advertisement its address

r
application phases: home host 1 a periodically through co-located Mobile
ld
requires and moves agent network. and one layer.

discovery, 3 from IP care- a packet packet care-of would


agent When
using home
does one
To of
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
The TTL field of the IP packet is set to 1 for all advertisements to avoid forwarding them.
The type is set to 9, the code can be 0, if the agent also routes traffic from non- mobile
nodes, or 16, if it does not route anything other than mobile traffic. The number of
addresses advertised with this packet is in #addresses while the addresses themselves
follow as shown. Lifetime denotes the length of time this advertisement is valid.
Preference levels for each address help a node to choose the router that is the most
eager one to get a new node.
The extension for mobility has the following fields defined: type is set to 16, length
depends on the number of COAs provided with the message and equals 6 + 4*(number
of addresses). The sequence number shows the total number of advertisements sent
since initialization by the agent. By the registration lifetime the agent can specify the
maximum lifetime in seconds a node can request during registration. The following bits
specify the characteristics of an agent in detail.
The R bit (registration) shows, if a registration with this agent is required even when using
a colocated COA at the MN. If the agent is currently too busy to accept new registrations
it can set the B bit. The following two bits denote if the agent offers services as a home
agent (H) or foreign agent (F) on the link where the advertisement has been sent. Bits M
and G specify the method of encapsulation used for the tunnel. While IP-in-IP
encapsulation is the mandatory standard, M can specify minimal encapsulation and G
generic routing encapsulation. In the first version of mobile IP (RFC 2002) the V bit
specified the use of header compression according to RFC 1144. Now the field r at the
same bit position is set to zero and must be ignored. The new field T indicates that reverse
tunneling is supported by the FA. The following fields contain the COAs advertised. A
foreign agent setting the F bit must advertise at least one COA. A mobile node in a subnet
can now receive agent advertisements from either its home agent or a foreign agent. This
is one way for the MN to discover its location.
Agent Solicitation
If no agent advertisements are present or the inter-arrival time is too high, and an MN has
not received a COA by other means, the mobile node must send agent solicitations.
Care must be taken to ensure that these solicitation messages do not flood the network,
but basically an MN can search for an FA endlessly sending out solicitation messages. If
a node does not receive an answer to its solicitations it must decrease the rate of
solicitations exponentially to avoid flooding the network until it reaches a maximum
interval between solicitations (typically one minute). Discovering a new agent can be done
anytime, not just if the MN is not connected to one.
After these steps of advertisements or solicitations the MN can now receive a COA,
either one for an FA or a co-located COA.

JNTU
World
www.alljntuworld.in JNTU World

Agent Registration
Having received a COA, the MN has to register with the HA. The main purpose of the
registration is to inform the HA of the current location for correct forwarding of packets.

J
Registration ➢ If FA containing lifetime Registration reregister which
N
message the which COA are can of back forwards before no the is

T
the expires be at longer to mobile done the the registration expiration.

FA, the FA automatically used. in node’s the which two request After MN
U
different home This forwards which sends to setting

mechanism after IP the ways is its address it HA. the up negotiated registration to

W
depending the the lifetime The and is MN.

mobility necessary HA the request and during on now current the binding, is sets
o
deleted; to location the containing COA. avoid up the registration a It of

r
so, mobility mobility HA also the the an sends contains COA. MN COA
ld
binding,

bindings process. a should to reply the


the
➢ If the COA is co-located, registration can be simpler, the MN sends the request directly
to the HA and vice versa. This is also the registration procedure for MNs returning to their
home network to register directly with the HA. Downloaded From JNTU World
(http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
UDP packets are used for the registration requests using the port no 434. The IP source
address of the packet is set to the interface address of the MN, the IP destination address
is that of the FA or HA.
JN
specify bindings. broadcast The if it Setting packets

T
first wants field the which the type B HA have bit is to set generally
U
retain been to Registration 1 received prior for indicates a

W
mobility registration by Request
o
the that HA bindings. an in request. the MN home This also With allows

r
network. wants the for S to bit If simultaneous receive an an
ld
MN MN uses can

the
a co-located COA, it also takes care of the decapsulation at the tunnel endpoint. The D
bit indicates this behavior. As already defined for agent advertisements, the bits M and
G Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
denote the use of minimal encapsulation or generic routing encapsulation, respectively.
T indicates reverse tunneling, r and x are set to zero.
Lifetime denotes the validity of the registration in seconds. A value of zero indicates
deregistration; all bits set indicates infinity. The home address is the fixed IP address of
the MN, 64 registration The 3 The Home 64-bit on extensions
J and the

bit extensions lifetime home a identification address A identification identification

code N registration agent must replies. field indicating and must at is


T
Registration indicates least the home This at is field reply, is the

used least IP contain generated field agent address from result how to which contain is

U
match the are parameters used Reply many of of is the

registration by the parameters the conveyed for registration seconds the registration
addresses HA, protection MN for and in authentication. the
W
and for to COA a requests of request. UDP authentication

registration identify the against the represents packet, authentication MN with a replay

o
and request is contains replies. valid the the attacks HA, tunnel and if
r
method. The a it respectively. type of was match value endpoint.

ld
registrations. field successful. Again, is it set based with

The
The
the to
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World

Mobile IP MC Unit-3 DHCP Tunnelling and

encapsulation
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel
endpoint. Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel

J
encapsulation. data packet decapsulation and unchanged.
N
Encapsulation out putting of the are Mobile it data the Tunneling,

T
into operations is part the IP the tunnelling
U
of mechanism data i.e., another typically sending part

W
packet, of of performed a taking a new packet is a called

packet. packet through when decapsulation. The consisting a a packet reverse tunnel
o
of is is operation, packet transferred Encapsulation achieved

r ld
header by taking from using and

and a a
higher protocol layer to a lower layer or from a lower to a higher layer respectively.
The HA takes the original packet with the MN as destination, puts it into the data part of
a new packet and sets the new IP header so that the packet is routed to the COA. The
new header is called outer header. Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
IP-in-IP encapsulation
There are different ways of performing the encapsulation needed for the tunnel between
HA and COA. Mandatory for mobile IP is IP-in-IP encapsulation as specified in RFC
2003. The following fig shows a packet inside the tunnel.
the header, no enough in-IP, type calculated the above. original decremented original

MN the payload J special HA) packet length to for is behave The If This

N
packet’s so the sender follows IPv4 and the no as the meaning has

of version length options type header the usual. because by the packet as to the CN
point tunnel 1. if take of outer field field The it two and This follow for the remains
T
were can again of in exit next covers headers. ver mobile the means

protocol the header view. reach the attached point is an fields receiver tunnel, almost 4

U
outer the This IPv4 that the IP for in as used are complete

and is 32 IP tunnel destination it packet header, the to MN unchanged a the is version in


bit very the are just whole the tunnel of words. endpoint. home follows set important
W
encapsulated one the the IP 4, tunnel address according

payload. inner (logical) the entry packet. during network. DS(TOS) after internet The
header as is feature (the encapsulation, this considered hop This source next The
packet. to No COA).

o
is outer RFC away header starts field only field, of matter just address

tunneling The 791. is change for header. with here copied a length set fields how single
r
the TTL thus (the the to denoted MN. as is many from IP up 4, (IHL) same

hop must IP TTL showing it the checksum to Finally, allows address

ld
the real TTL from with which fields protocol denotes be

inner
hops have high
the
the the
the IP-
as of
is is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
Minimal encapsulation Minimal encapsulation (RFC 2004) as shown below is an optional
encapsulation method for mobile IP which avoids repetitions of identical fields in IP-in-IP
encapsulation. The tunnel entry point and endpoint are specified.
The encapsulation the sender field work Generic Unlike encapsulation payload The

J
new Finally, following packet field for GRE with IP-in-IP address the
N
portion fragmentation header for already Routing header of protocol

the protocol. one and (GRE) of of is fragmented the a type of protocol Minimal

T
prepended. packet the allows Encapsulation CN and offset The of

second is the the of included encapsulation inner suite the is another packets. address
U
left following Together protocol encapsulation with header in

as the protocol the of omitting is the inner suite this header which original different MN

W
forms is suite header of the work put are contains packet

packets source as for the in needed. only and shown front.The minimal new header
minimal is for of the quite data If below.
o
one IP the value encapsulation. following packets, and part often

r
protocol encapsulation S bit data 55 of not is for Generic the figure set, is
ld
suite an taken the new the The option. shows does into

minimal routing original type packet. and not


the the No of
a
fields of a packet inside the tunnel between HA and COA using GRE as an
encapsulation scheme according to RFC 1701. The outer header is the standard IP
header with HA as Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
source address and COA as destination address. The protocol type used in this outer IP
header is 47 for GRE.
A and of present source for field number GRE number allowing ignored
J
minimal the source contains from is GRE The routing The present, on

N
and field of only IP-in-IP GRE routing. allowed reception. GRE

header recursion contain is valid one header present, entry. header the and level
T
information. and GRE recursive valid K minimal control The The uses

of starts the if also bit the encapsulation. information. version routing only payload. is

U
offers encapsulations. s with field encapsulation. set. bit If 4

C is bytes. field, field several a (rec.) The is set, The key set, The contains sequence if
strict The The is field R present, flags the an offset bit The following C This source
W
important checksum which indicates indicating bit 0 default

represents field number for indicates has routing may the reserved represents a value
field if variable field if GRE be the bit certain if is the used that the contains version.
used.

o
of S offset fields offset this indicates length checksum a for additionally

fields counter field and authentication. must The a in and are valid bytes routing should
r
if following be that field present contains the IP zero distinguishes for shows is

ld
be checksum

fields sequence the and present 0, or 2 If fields thus


byte not.
first
this
the are
are
protocol field represents the protocol of the packet following the GRE header. The
standard header of the original packet follows with the source address of the
correspondent node and the destination address of the mobile node.
14 Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
A simplified header of GRE following RFC 2784 is shown below.

The reserved defines field Optimizations If communicating problem A

J
learn CN. ➢ solution a Binding MN scenario HA field and the informs the
N
to as a C location bits to field the it indicates protocol Request:

occurs, this causes follow. HA. called the and problem by HA CN unnecessary where

T
caching of HA again It The reserved1 of checks the is is the sent is

version if on payload if to it location. a the if in the inform by checksum


U
follows. it a overheads MN the field is binding other following

allowed is the It node contains needs in The side is CN cache, the present. for that latter

W
of to RFC of four same the the reveal wants the the which

3232. field network additional current The subnetwork value world. is the to is If next
constant a the know location zero. location part between It messages: 5 flag is
o
bits of the as The called zero C the of and the are current is CN

r
protocol the routing set, set node set and then triangular MN. to then to the

location zero to sends table zero, type, The HA. which checksum
ld
follow.

CN routing for back then again, of it can the


an is
a7
binding update ➢ Binding update: It is sent by the HA to the CN revealing the current
location of an MN. It contains the fixed IP address of the MN and the COA. This
message can request an acknowledgement.
15 Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
➢ Binding acknowledgement: If requested, a node returns this acknowledgement after
receiving a binding update message ➢ Binding warning: A node sends a binding
warning if it decapsulates a packet for an MN, but it is note the current FA of this MN. It
contains MN’s home address and a target The changes returns message current
J
located the This nodes the HA. following registration The The node

N
foreign at the its and address. an FA. CN MN COA that FA. stores

figure can agent might is Encapsulation obviously of also request The shows the the
T
FAold. now recipient forwarded MN mobility FAold change has the how

U
via a current of forwards the wrong can an data binding. to

its four be update the location for location COA the the HA additional tunneling Now
W
HA, for packets to message. and from update the so the

register the MN.


messages to to the CN the its The the HA can HA. location with COA now MN. CN If

o
send are allowed a is acknowledges This sends new now used
r
database. its scenario foreign done data a by together binding the directly by

ld
Furthermore, shows agent, MN, this the update if CN,

an update the to a FAnew. MN


COA not the HA to
FAnew informs FAold about the new registration of MN. MN’s registration message contains
the address of FAold for this purpose. Passing this information is achieved via an update
message, which is acknowledged by FAold.
16 Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
Mobile IP MC Unit-3 DHCP
Without the information provided by the new FA, the old FA would not get to know
anything about the new location of MN. In this case, CN does not know anything about
the new location, so it still tunnels its packets for MN to the old FA, FA old. This FA now
notices packets with destination MN, but also knows that it is not the current FA of MN.
FAold might now forward these packets to the new COA of MN which is FA new in this
example. This forwarding of packets is another optimization of the basic Mobile IP
providing smooth handovers. Without this optimization, all packets in transit would be
lost while the MN moves from one FA to another.
To tell CN that it has a stale binding cache, FAold sends, a binding warning message to
CN. CN then requests a binding update. (The warning could also be directly sent to the
HA triggering an update). The HA sends an update to inform the CN about the new
location, which is acknowledged. Now CN can send its packets directly to FA new, again
avoiding triangular routing. Unfortunately, this optimization of mobile IP to avoid

triangular routing causes several security problems Reverse


Tunnelling
The reverse path from MS to the CN looks quite simple as the MN can directly send its
packets to the CN as in any other standard IP situation. The destination address in the
packets is that of CN. But it has some problems explained below:-
Quite often firewalls are designed to only allow packets with topologically correct
addresses to pass to provide simple protection against misconfigured systems of
unknown addresses. However, MN still sends packets with its fixed IP address as
source which is not topologically correct in a foreign network. Firewalls often filter
packets coming from outside containing a source address from computers of the
internal network. This also implies that an MN cannot send a packet to a computer
residing in its home network. While the nodes in the home network might participate in a
multi-cast group, an MN in a foreign network cannot transmit multi-cast packets in a way
that they emanate from its home network without a reverse tunnel. The foreign network
might not even provide the technical infrastructure for multi-cast communication (multi-
cast backbone, Mbone). If the MN moves to a new foreign network, the older TTL might
be too low for the packets to reach the same destination nodes as before. Mobile IP is
no longer transparent if a user has to adjust the TTL while moving. A reverse tunnel is
needed that represents only one hop, no matter how many hops are really needed from
the foreign to the home network Based on the above considerations, reverse tunnelling
is defined as an extension to mobile IP (per RFC 2344). It was designed backward
compatible to mobile IP and defines topologically correct reverse tunnelling to handle
the above stated problems.

JNTU

World
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP

Reverse ❖ ❖ J problems mechanisms optimization to a sender tunneling

N
Packet with (double Forwarding (tunnel of does firewalls, data
T U
triangular not hijacking) paths, solve the i.e.

reverse routing) packets Reverse tunnel will Tunnelling

W
be can forwarded be abused through to circumvent
o r
Reverse the tunnel Tunnel security via

ld
the HA

Downloaded From JNTU World (http://www.alljntuworld.in)


www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
Mobile IP MC Unit-3 DHCP IPv6
The design of Mobile IP support in IPv6 (Mobile IPv6) benefits both from the experiences
gained from the development of Mobile IP support in IPv4, and from the opportunities
provided by IPv6. Mobile IPv6 thus shares many features with Mobile IPv4, but is
integrated into IPv6 and offers many other improvements. This section summarizes the
major differences between Mobile IPv4 and Mobile IPv6:
There is no need to deploy special routers as "foreign agents", as in Mobile IPv4. Mobile
IPv6 operates in any location without any special support required from the local router.
Support for route optimization is a fundamental part of the protocol, rather than a
nonstandard set of extensions. Mobile IPv6 route optimization can operate securely
even without pre-arranged security associations. It is expected that route optimization
can be deployed on a global scale between all mobile nodes and correspondent nodes.
Support is also integrated into Mobile IPv6 for allowing route optimization to coexist
efficiently with routers that perform "ingress filtering" The IPv6 Neighbor Unreachability
Detection assures symmetric reachability between the mobile node and its default
router in the current location. Most packets sent to a mobile node while away from home
in Mobile IPv6 are sent using an IPv6 routing header rather than IP encapsulation,
reducing the amount of resulting overhead compared to Mobile IPv4. Mobile IPv6 is
decoupled from any particular link layer, as it uses IPv6 Neighbor Discovery instead of
ARP. This also improves the robustness of the protocol. The use of IPv6 encapsulation
(and the routing header) removes the need in Mobile IPv6 to manage "tunnel soft state".
The dynamic home agent address discovery mechanism in Mobile IPv6 returns a single
reply to the mobile node. The directed broadcast approach used in IPv4 returns
separate replies from each home agent.
Dynamic Host Configuration Protocol (DHCP)
DHCP is an automatic configuration protocol used on IP networks. DHCP allows a
computer to join an IP-based network without having a pre-configured IP address.
DHCP is a protocol that assigns unique IP addresses to devices, then releases and
renews these addresses as devices leave and re-join the network. If a new computer is
connected to a network, DHCP can provide it with all the necessary information for full
system integration into the network, e.g., addresses of a DNS server and the default
router, the subnet mask, the domain name, and an IP address. Providing an IP address
makes DHCP very attractive for mobile IP as a source of care-of-addresses. 19
JNTU

World
www.alljntuworld.in JNTU World
Mobile IP MC Unit-3 DHCP
DHCP is based on a client/server model as shown below. DHCP clients send a request
to a server (DHCPDISCOVER in the example) to which the server responds. A client
sends requests using MAC broadcasts to reach all devices in the LAN. A DHCP relay
might be needed to forward requests across inter-working units to a DHCP server.

J
Consider initialization the this configuration DHCPOFFER client

N
broadcast. the broadcasts and of scenario they a In DHCP offer the
T
can a a case client where DHCPDISCOVER list offer shown, of is there

U
configuration shown to the two is below:
W
client. one into servers client the parameters. Servers subnet.

receive and reply two this There The servers broadcast to client might

o r
the can are client’s be and now a present. relay determine
ld
choose request to A forward typical

one with the


of the configurations offered. The client in turn replies to the servers, accepting one of the
configurations and rejecting the others using DHCPREQUEST. If a server receives a
DHCPREQUEST with a rejection, it can free the reserved configuration for other possible
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
Mobile IP MC Unit-3 DHCP
clients. The server with the configuration accepted by the client now confirms the
configuration with DHCPACK. This completes the initialization phase. If a client leaves a
subnet, it should release the configuration received by the server using DHCPRELEASE.
Now the server can free the context stored for the client and offer the configuration again.
The configuration a client gets from a server is only leased for a certain amount of time,
it has to be reconfirmed from time to time. Otherwise the server will free the configuration.
This timeout of configuration helps in the case of crashed nodes or nodes moved away
without releasing the context.
DHCP is a good candidate for supporting the acquisition of care-of addresses for mobile
nodes. The same holds for all other parameters needed, such as addresses of the
default router, DNS servers, the timeserver etc. A DHCP server should be located in the
subnet of the access point of the mobile node, or at least a DHCP relay should provide
forwarding of the messages. RFC 3118 specifies authentication for DHCP messages so
as to provide protection from malicious DHCP servers. Without authentication, a DHCP
server cannot trust the mobile node and vice versa...
NTU
J
World
www.alljntuworld.in JNTU World
NTU
J
World
Downloaded From JNTU World
(http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Mobile Transport Layer Mobile Computing
Unit-4
Traditional TCP
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet
protocol suite, often simply referred to as TCP/IP. TCP is reliable, guarantees in-order
delivery of data and incorporates congestion control and flow control mechanisms.
TCP supports many of the Internet's most popular application protocols and resulting
applications, including the World Wide Web, e-mail, File Transfer Protocol and Secure
Shell. In the Internet protocol suite, TCP is the intermediate layer between the Internet
layer and application layer.
The major responsibilities of TCP in an active session are to:
• Provide reliable in-order transport of data: to not allow losses of data.
• Control congestions in the networks: to not allow degradation of the network
performance,
• Control a packet flow between the transmitter and the receiver: to not exceed the
receiver's capacity.
TCP uses a number of mechanisms to achieve high performance and avoid 'congestion
collapse', where network performance can fall by several orders of magnitude. These
mechanisms control the rate of data entering the network, keeping the data flow below a
rate that would trigger collapse. There are several mechanisms of TCP that influence the
efficiency of TCP in a mobile environment. Acknowledgments for data sent, or lack of
acknowledgments, are used by senders to implicitly interpret network conditions between
the TCP sender and receiver.
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World

Congestion Control
A transport layer protocol such as TCP has been designed for fixed networks with fixed
end- systems. Congestion may appear from time to time even in carefully designed
networks. The packet buffers of a router are filled and the router cannot forward the
packets fast enough because the sum of the input rates of packets destined for one output
link is higher than the capacity of the output link. The only thing a router can do in this
situation is to drop packets. A dropped packet is lost for the transmission, and the receiver
notices a gap in the packet stream. Now the receiver does not directly tell the sender
which packet is missing, but continues to acknowledge all in-sequence packets up to the
missing one.
The sender notices the missing acknowledgement for the lost packet and assumes a
packet loss due to congestion. Retransmitting the missing packet and continuing at full
sending rate would now be unwise, as this might only increase the congestion. To mitigate
congestion, TCP slows down the transmission rate dramatically. All other TCP
connections experiencing the same congestion do exactly the same so the congestion is
soon resolved.
Slow start
TCP’s reaction to a missing acknowledgement is quite drastic, but it is necessary to get
rid of congestion quickly. The behavior TCP shows after the detection of congestion is
called slow start. The sender always calculates a congestion window for a receiver.
The start size of the congestion window is one segment (TCP packet). The sender sends
one packet and waits for acknowledgement. If this acknowledgement arrives, the sender
increases the congestion window by one, now sending two packets (congestion window
= 2). This scheme doubles the congestion window every time the acknowledgements
come back, which takes one round trip time (RTT). This is called the exponential growth
of the congestion window in the slow start mechanism.
But doubling the congestion window is too dangerous. The exponential growth stops at
the congestion threshold. As soon as the congestion window reaches the congestion
threshold, further increase of the transmission rate is only linear by adding 1 to the
congestion window each time the acknowledgements come back.
Downloaded From JNTU World (http://www.alljntuworld.in)
NTU
J
World
www.alljntuworld.in JNTU World
Mobile Transport Layer Mobile Computing Unit-4
Linear increase continues until a time-out at the sender missing or gap because
acknowledgements same the congestion of window. single then The receives receiver
receiver not now retransmit. by slow a dramatically. acknowledgement. network

J fast until congestion. the due congestion the start. retransmit in packet.

segment. The sender The recovery results focuses transmits the current to is occurs

N
has and window continuous The acknowledgement, transmitted

receiving The congestion, threshold advantage disadvantage of sender It got activates


congestion The is in In The sender on threshold The an performance the due all already
either grows sets from continuous congestion other detects early receipt problems TCP
the exponential something for Fast acknowledgements missing to the
T
can to of the but in data case

packets using half enhancement delivered the window the reason of this linear slow can
continue of a a
retransmit/fast a packet this packet(s) simple acknowledgements regarding increase.

U
method fast be start continuously fashion. upto growth for
scheme itself reduced packets. retransmit/fast loss. with mechanism. packet activating
the for is No is before Handover. starts the This for set its acknowledged preventing is
changes because loss the current from insufficient simplicity. to mechanism once the

W
recovery one due slow same shows the timer are recovery

Also more of congestion segment to slow-start start sender. two required packet. a
Minor that it packet isolation expires. up transmission can effects reasons. is there
interprets to and The improve changes a It the to in window. in informs time-out
o
FA This trigger of the is gap the the new First no or packet sender

error. sequence in behavior efficiency this CH. congestion the in congestion The on the

r
one the the due congestion efficiency losses sender The losses. packet
ld
starts sender is MH’s to is if and sender when not the to called

a threshold, sending stream performs


It software also that justify missing of caused sender
mainly in a Downloaded From JNTU World (http://www.alljntuworld.in) a
the the is can fast
a
TCP
the
CH
www.alljntuworld.in JNTU World
Problems with Traditional TCP in wireless environments
Slow Start mechanism in fixed networks decreases the efficiency of TCP if used with
mobile receivers or senders. Error rates on wireless links are orders of magnitude
higher compared to fixed fiber or copper links. This makes compensation for packet loss
by TCP quite difficult. Mobility itself can cause packet loss. There are many situations
where a soft handover from one access point to another is not possible for a mobile
end-system. Standard TCP reacts with slow start if acknowledgements are missing,
which does not help in the case of transmission errors over wireless links and which
does not really help during handover. This behavior results in a severe performance
degradation of an unchanged TCP if used together with wireless links or mobile nodes

Classical TCP Improvements


Indirect TCP (I-TCP)
Indirect TCP segments a TCP connection into a fixed part and a wireless part. The
following figure shows an example with a mobile host connected via a wireless link and
an access point to the ‘wired’ internet where the correspondent host resides.
Standard TCP is used between the fixed computer and the access point. No computer in
the internet recognizes any changes to TCP. Instead of the mobile host, the access point
now terminates the standard TCP connection, acting as a proxy. This means that the
access point is now seen as the mobile host for the fixed host and as the fixed host for
the mobile host. Between the access point and the mobile host, a special TCP, adapted
to wireless links, is used. However, changing TCP for the wireless link is not a
requirement. A suitable place for segmenting the connection is at the foreign agent as it
not only controls the mobility of the mobile host anyway and can also hand over the
connection to the next foreign agent when the mobile host moves on.
Downloaded From JNTU World (http://www.alljntuworld.in)

NTU
J
World
www.alljntuworld.in JNTU World
The foreign agent acts as a proxy and relays all data in both directions. If CH
(correspondent host) sends a packet to the MH, the FA acknowledges it and forwards it
to the MH. MH acknowledges on successful reception, but this is only used by the FA. If
a packet is lost on the wireless link, CH doesn’t observe it and FA tries to retransmit it
locally to maintain reliable If lower now During acknowledgements, established

connection J the handled round packet handover, data


N
state. for trip transport. by is Socket lost the the time Packet the

T
foreign mobile on ports, and buffered and If the delivery the can etc),

agent.
U
state wireless host, MH directly packets, must in sends

migration and I-TCP link, retransmit migrate the a as is packet, the well correspondent

W
shown after mobile to as the the the below: the handover

packet. FA hosts new system acknowledges host agent. notice Packet of state must a
o
mobile No this loss (packet new not it much in and host

r
the see connection sequence forwards faster wired any changes due
ld
network it number, may to to Downloaded From JNTU World

(http://www.alljntuworld.in) CH. the is


be in
www.alljntuworld.in JNTU World
Advantages of I-TCP
➢ No changes in the fixed network necessary, no changes for the hosts (TCP protocol)
necessary, all current optimizations to TCP still work ➢ Simple to control, mobile TCP is
used only for one hop between, e.g., a foreign agent and
mobile host 1. transmission errors on the wireless link do not propagate into the fixed
network 2. therefore, a very fast retransmission of packets is possible, the short delay
on the
mobile hop s known ➢ It is always dangerous to introduce new mechanisms in a huge
network without knowing
exactly how they behave. ❖ New optimizations can be tested at the last hop, without
jeopardizing the stability of the
Internet. ➢ It is easy to use different protocols for wired and wireless networks.
Disadvantages of I-TCP
➢ Loss of end-to-end semantics:- an acknowledgement to a sender no longer means
that a
receiver really has received a packet, foreign agents might crash. ➢ Higher latency
possible:- due to buffering of data within the foreign agent and forwarding to
a new foreign agent ➢ Security issue:- The foreign agent must be a trusted entity
Snooping TCP
The main drawback of I-TCP is the segmentation of the single TCP connection into two
TCP connections, which loses the original end-to-end TCP semantic. A new
enhancement, which leaves the TCP connection intact and is completely transparent, is
Snooping TCP. The main function is to buffer data close to the mobile host to perform
fast local retransmission in case of packet loss.
Snooping TCP as a transparent TCP extension
Downloaded From JNTU World (http://www.alljntuworld.in)

NTU
J
World
www.alljntuworld.in JNTU World
Here, the foreign agent buffers all packets with destination mobile host and additionally
‘snoops’ the packet flow in both directions to recognize acknowledgements. The foreign
agent buffers every packet until it receives an acknowledgement from the mobile host. If
the FA does not receive an acknowledgement from the mobile host within a certain
amount of time, either the packet or the acknowledgement has been lost. Alternatively,
the foreign agent could receive a duplicate ACK which also shows the loss of a packet.
Now, the FA retransmits the packet directly from the buffer thus performing a faster
retransmission compared to the CH. For transparency, the FA does not acknowledge
data to the CH, which would violate end-to-end semantic in case of a FA failure. The
foreign agent can filter the duplicate acknowledgements to avoid unnecessary
retransmissions of data from the correspondent host. If the foreign agent now crashes,
the time-out of the correspondent host still works and triggers a retransmission. The
foreign agent may discard duplicates of packets already retransmitted locally and
acknowledged by the mobile host. This avoids unnecessary traffic on the wireless link.
For data transfer from the mobile host with destination correspondent host, the FA
snoops into the packet stream to detect gaps in the sequence numbers of TCP. As soon
as the foreign agent detects a missing packet, it returns a negative acknowledgement
(NACK) to the mobile host. The mobile host can now retransmit the missing packet
immediately. Reordering of packets is done automatically at the correspondent host by
TCP.
Snooping TCP: Packet delivery
Downloaded From JNTU World (http://www.alljntuworld.in)

NTU
J
World
www.alljntuworld.in JNTU World
Advantages of snooping TCP:
➢ The end-to-end TCP semantic is preserved. ➢ Most of the enhancements are done in
the foreign agent itself which keeps correspondent
➢ ➢ Disadvantages ➢ ➢ ➢ Mobile The the current end-to-end especially splits

standard connection. does the sender long soon window mechanism J


Handover agent. packets No approach Snooping Transmission Using additional
host

arbitrary Snooping to-end transport sender M-TCP sender the not as the Both The to
problem problems. unchanged. receiver TCP of the host-supervisory receive negative

N
go TCP adapted Even between SH by the are semantics does

window I-TCP mobile (mobile SH into automatically and layer, TCP of mechanisms
setting monitors connection transmitted sender though (either arises errors an state is
of not buffering persistent M-TCP and acknowledgements does disconnected. (eg. to
T
hosts. ACK snooping the from TCP) require of the the is Snooping to

may SSL/TLS), if packets the all correspondent for TCP, not not wants the the sender’s
problems shrinking host into falls data packets to approach on some propagate mode,
old changes required and isolate the new old TCP the back (SH) two to are may SH

U
snooping TCP This new time, to value. improve i.e., window
foreign sent mobile or present parts to if arising provide be does has connection, the
means between to COA. till as bit a the the host it useless to the The the new CH.
assumes soon behavior TCP as not errors standard the host. overall agent state size
from in and a that sender’s same sender I-TCP can SH) more help the MH the as if to

W
of mobile while This the certain lengthy or uses be the

throughput, that detects goals buffer, foreign 0. and the does. much, of solution. efficient
disconnection can sender used. Setting TCP. approach mobile an the the the sender
ACKs as host. encryption continue or optimized An time agent if connectivity The MH I-
TCP enhancement wireless will a frequent handover. returned the unmodified host If
mobile to will is wireless out not is encryption and and disconnected.
o
lower window not sending no moves but at schemes TCP try the

snooping link host disconnections. the longer from change to the Additionally, again,
side not is mobile TCP as size retransmit or used CH to gets at delay, is the

r
congestion uses are not. well another transparent used occurs full TCP: it is

to no It on host MH. disconnected. applied reopens used 0 then an matter to speed. If


ld
as the forces to above M-TCP not, adapted If maintain

data. assumes and prevent foreign


chokes on SH-MH the M-TCP I-TCP.
cause end-
how
This the the
the the
the the for
SH
As is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
TCP that can recover from packet loss much faster. This modified TCP does not use
slow start, thus, M-TCP needs a bandwidth manager to implement fair sharing over
the wireless link.
Advantages of M-TCP:
➢ ➢ ➢ Disadvantages ➢ ➢ Transmission/time-out interrupted MAC interruption
state interruption fast inform host operation not Advantages:
➢ ➢ Disadvantages: ➢ J It forwards If connections As packets As is

assumption. A software It It such Lots advance, interruption goes the maintains offers
can propagated layer modified of the no Often, the As of as its MH

N
be into buffering at SH changes soon sequence can correspondent

will a from congestion is early exactly but used the so is way does slow MAC not
disconnected, be TCP the inform no by as ACKs also of of a to to together enough,
automatically not simply timers caused start the have TCP TCP is the layer M-TCP: on
T
the the resume new no done from act MAC the the wireless end-to-end

point window same assuming sender. or to notices expire. shrinking network as by host
acknowledgements freezing both be with the TCP as wireless TCP layer proxy it of
point congestion. made in MH. avoids of M-TCP link, layer encrypted retransmitted view

U
the and connections I-TCP, connection congestion detects
elements the as the semantics. where in link mobile additional further and in of useless
software reason sender’s assumes there I-TCP, not an TCP also connectivity it data like
had and upcoming problems and only even timers. is retransmissions, for The packet
can to knows mechanisms no window of as the low been correspondent the

W
finally interruption. requires MH, SH after now it need

bandwidth bit is SH. If does loss the forced again, loss independent CH even error the
stop breaks long to to real on and 0. not modifications forward of MAC in interruptions
before sending to the rates, it reason FA. slow connection send the the manager.
o
Otherwise, stop. signals host wireless layer connection. access which

starts any the buffers of For and can for other TCP notices ACK connection TCP the be

r
link to or ‘freezes’ is of point or the that to not the itself the breaking informed.

TCP interruption. time due that a correspondent the always are connection. it new MH
ld
mechanisms to but simply can the the needed is

upcoming bit protocol SH. actually


resume current current a With errors
does Lost
valid
The
to a
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
Downloaded From JNTU World (http://www.alljntuworld.in)
Selective retransmission
A very useful extension of TCP is the use of selective retransmission. TCP
acknowledgements are cumulative, i.e., they acknowledge in-order receipt of packets
up to a certain packet. A single packet retransmission). for packets. The advantage
bandwidth that to Transaction-oriented Assume time packets. TCP release.
establish is requires three-way TCP overhead networks, sessions development
J usually resequence any is sender a may to made more acknowledgement

N
is Using network. time, an three For The lost, First, the need

needed in but handshake. is of requirements application can complex up it receiver


which connection. selective of this the acceptable data wireless more is to of TCP
transaction-oriented seven This now quite use three sender approach for and responds
packets obviously software uses determine can normal transmission
T
retransmission, running packets So, inefficient to phases: T/TCP

connection number advantage which Disadvantage networks. TCP has and confirms
At acknowledge wait for for a is to least with to TCP, three-way is on obvious: sending
wastes for close standard on altogether. long setup, retransmit can extremely

U
precisely the for of one a gaps the it reception short of for
the This is TCP release packets receiver combine short sessions bandwidth, additional
data mobile is TCP the inefficient one a to single certain connection TCP that (T/TCP).
sender message handshake be which led can everything helpful request, transfer
messages This data has filled. it of with side down host packets, requires indirectly in

W
packets applications to all kind retransmits for packet packet,

not because packet is and in that user packets fixed via needed. and connection and to
the slow just starting to
of
or it not a changes sends two is data requires for request in of wireless needed only
upto the is only Also instead the connection a from packets. the setup short trains in
o
case a overhead more reliable a the the and reduction selective links.

certain the of lost request of and software of buffer a lost can This seven. in-sequence
mobile TCP The packets. establishment connection packet. involved. packet retransmit

r
retransmission can in transport to space disadvantage in the a network, The
ld
mobile reduce server This (go-back-n If is overhead

Standard packets. a release. obvious needed it. lowers of single from


host and The but
the
the of
is
www.alljntuworld.in JNTU World

and all correspondent hosts. This solution does not hide mobility anymore. Also, T/TCP
exhibits several security problems.

Classical Enhancements to TCP for mobility: A comparison


Downloaded From JNTU World
(http://www.alljntuworld.in)

NTU
J
World
www.alljntuworld.in JNTU World
Unit-5
Database
A database in a particular network; computation. computations, Caching with a the

cached network, Database Database simple also shows from a

J Downloaded From JNTU World (http://www.alljntuworld.in) large database

N
architecture (a) entails the hoarding neither API another is data

database. data a Rather, at during collection saving logical through mobile in required
T
does the in simple may Hoarding the the which a The

manner. device database copy a the be of device interval program, architecture from

U
cached systematically done a sending device of mobile the A

select caches ensures in at data mobile database for queries which the retrieve device
data in ex: is some application which that hoarded stored device IBM the and or API is
specific even data a DB2 available retrieving device a directly

W
part records mobile is in Everyplace when from not the tier of

data, is retrieves a for data always connected device or mobile itself. the database a
computing. which information. server from device (DB2e). The API device connected

o
the local may directly to from following or is data database the be
database. not a Databases a from required network server connected retrieves

r
connected to figure the (Tier a database. or Hoarding

ld
store server for 1) for network. the shows system to

future each data


data the or
of
It a
(b) API at mobile device retrieving data from database using DB2e (Tier 1)
www.alljntuworld.in JNTU World
Both the two architectures belong to the class of one-tier database architecture because
the databases are specific to a mobile device, not meant to be distributed to multiple
devices, not synchronized with the new updates, are stored at the device itself. Some
examples are downloaded which operating or databases client hoarded connectivity

and API the tier synchronizes J enterprise at cached 3, updates tiers. the

N
has the The A at cache systems. mobile reside been server the

database This (b) data for local ringtones, server the Similar application is is retrieving
designed records local at device known copies retrieves a DB2e the list architecture
T
architecture copies music or remote (first of as using synchronizes the

to or (a) database the client-server and at enterprise reside tier) etc. Distributed data the

U
database the transmits servers shown for IBM uses

computing device. and at a of distributed with DB2 the the items then tier, and computing
below at data the These DB2 each cached device. Everyplace where the transmitting
caches or architecture data is databases mobile local copies records for cache

W
local architecture. the It records two-tier in supports copies

memory database mobile (DB2e) of device copy. stored it at these as to to function or the
explained At devices the connected tier in J2ME is multi-tier at server first databases

o
multiprocessor synchronization, a device. the 1 relational tier and as
using uses device. device above. (tier databases. to most The business are business

r
it. database 1), caches. server systems The Databases From cached mobile

ld
the application, computing Here, logic API logic

provides tier engine device


at uses 2 and and the the
are
or
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
The advantage of hoarding is that there is no access latency (delay in retrieving the
queried record from the server over wireless mobile networks). The client device API
has instantaneous data access to hoarded or cached data. After a device caches the
data distributed that maintained. Data Hoarded devices equivalent main Cache
server. demand) (the of record. Pre-fetching: fetching pre-fetch reduces cache-misses'
found Caching A modification cached invalidation synchronize processor mobile A

stored J cache two cached most memory the in Access This at devices

parameters—access Caching data from Caching entails server the consists mode

N
Invalidation instead copies other in consistency needed record
method to at by device a the item the Pre-fetching of and refers multiprocessor
Protocols: the another having the requesting of devices of load. the data enterprise of
of copies or of the data at cache is database database server, the to caching record

T
record several called Further, distributed the pushed at the fetching.

computing of Mechanisms or of databases other is memories A for the cost-based


time the client servers. the another probability servers becomes client at from when
records. records system, and data main the the data cached processors taken Caching
U
copies the device device pulling system cost required leads

database or memory The at alternative at is at data invalid cache Each pushed


application in the (at hoarded the of from the cache data accessing to of may records
caches replacement the or cache-misses servers whenever record client by a
invalidation data data processors and the server. server. records reduced device) with
the at to be at server. thus stored the records databases. device). that the caching

W
device a is invalidated. are the the record Cache called
Cache pushed mobile and keeping unusable or the may access distributed device. at
mechanisms in caching. can API. database of Also, can pushing different cache-data a
be at invalidation a disseminated invalidation The thus multiprocessor devices interval
(disseminated) cache-line, the future be-based required caching because The This

o
copies server be rates or locations. at disadvantage are needs as may

or reduced. transmitted is the later. can cached mechanisms compared of (from on in


also server is written data. copies modification, be case a be in server pushed system
r
The process active data the view. due The based at databases The that of

(modified) client the to server) of records process to needs which in with to term 'hot

ld
Pre- record are the on hoarding devices by the the

expiry device expiry, at the a which used records' pull fetching for 'cost case can mobile
from of shared any to is by ratio each
pre- (on-
can
not are be
be or
to or
of of is
a
aa
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
given time can be assigned one of four possible tags indicating its state—modified (after
rewriting), exclusive, shared, and invalidated (after expiry or when new data becomes
available) at any given instance. These four states are indicated by the letters M, E, S,
and I, respectively (MESI). The states indicated by the various tags are as follows:
a) The E tag indicates the exclusive state which means and cannot be used by any
other device or server. b) The S tag indicates the shared state which indicates others. c)
The M tag indicates the modified state which means d) The I tag indicates the
invalidated state which means copy of the record which was shared and used The
following figure shows the four possible states of database and its copy at the cache of

the mobile device Another (also at computations. J the Four called server
N
important possible cache as well coherence). factor states as

T U
at for the (M, This cache device E, database

requires S, maintenance or caches /) of a and a mechanism and data device in that


W
record a Downloaded From JNTU World (http://www.alljntuworld.in)

a j. data that that for that that the computations record the the the server data data

o
device i record at database record any cache earlier. is instant for
r ld
can no internal longer be in used the has

use
server
by
a
/at any instance at the server j cache
mobile environment is cache consistency to ensure that a database record is identical
only the valid cache records are used for
www.alljntuworld.in JNTU World
Cache invalidation mechanisms in mobile devices are triggered or initiated by the server.
There are four possible invalidation mechanisms – Stateless asynchronous, stateless
synchronous, stateful asynchronous and stateful synchronous.
Stateless cache device the invalidation the broadcasting request server. and The
transfers disadvantages client report, devices clients Stateless regarding devices.
information invalidated period end sends periodic information reports the consistency
invalidation device of J the information device modified report server

advantage requires to invalidated a gets after caches. The report the The for lead may

N
request report However, all Asynchronous: the of a Synchronous

copy an cache server of information or advantage to the it at by are—(a) regarding


modified (deleted through be later. that advertised is of data sends invalidation It
present modified. greater periodic due of clients the is not of using this just for data
holds advertises copy valid the unlike The the to the detected reports, the uniformly or
approach device-client. unnecessary copy or reliability link periodical present the
T
of invalidity of replaced). or state for for intervals invalidation that

invalidation asynchronous server same not, This the A not the the This failure, and
invalidated use an of as stateless particular of and and asynchronous server. method
thus by the synchronous state item are—(a) (deleted broadcasts and in advertises if is

U
of data as (and the that (c) computations. record (b)
exchanges. cached also it transfers when (whether is well report report. This making
requests during device The client records mechanism sent thus is ensures record data
every a approach or as or not also data the stateless server invalidation the periodically,
devices as replaced). the whenever cache of validity) approach due mechanism, and
received Emi, the client corresponding the soon at data or invalidation as The helps
period synchronization does to the the Therefore, update server not. the Mmi,

W
mechanism entails is presume invalidation as device mode, a

disadvantages of that relevant device server link the reports In between not the
irrespective The its is at Smi, the to case that requests the here value broadcasting
failure, keep corresponding gets there server send term information i.e., or data data-
record that even is caches to end record the the Imi) the an unaware two reports track
changes. more all because the the as 'asynchronous' caches. are of the client of client
o
invalidation for and when of server clients long invalidation whether of

report. when and server the of no device invalid a bandwidth take of only. at devices this
data-record as device devices the there The of period, even The broadcasts data-record
frequent, advertises irrespective the data the there state place, records has that mode

r
The expects data server periodic report, server invalidation if is reports, is
indicates does maintain is receive the then no pushed client link client changes can (b)
no efficient. in does stored is unnecessary whether information
invalidation to the not in-between of failure, every invalidation at invalidation the

ld
be of the invalidated has cache can all from server

periodic whether that not get period- sent device of a at cache cache at client client
either
client copy keep
that The
the
the the the
the
for
the the
to is
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
devices assume that, as long as there is no invalidation report, the copy is valid for use
in computations. Therefore, when there are link failures, the devices use data which has
been invalidated in the in-between period and the server is unaware of state changes at
the clients after it sends the invalidation report.
Stateful (asynchronous are information data-record (HLC) at enable when by request
records the the records advantageous not presume Therefore, Stateful Imi) location
information client synchronization to at invalidity also with invalidation J the

a the the new state sent of flooded link periodically the at the end is storage data-
records MSC The The invalidation transmitted at the state failure, the client that,

N
Synchronous: of Asynchronous invalidated only cache (and records

when of the at advantage cached advantage regarding server. in report with at server in
the to the as to of thus, stateful) a device device that periodic the the because updates
there (HLC) mobile the long period, the irrelevant client are The data by is server only
device for of at indirectly, same or sent the as affected cache the when invalidated is of
T
HLC of the data. using scheme. device at new a the intervals network.

modified The there then the even the The present so the server link the periodically, at
expects client-caches. is affected and that invalid reports. server client-cache
maintained or stateful the Based failure, stateful stateful the the client if is caches. of

U
client modified modify the The the no keep HLC. validity)
state to device and The (deleted home the data device. keeps clients invalidation on
record in-between The the then term devices synchronous The asynchronous This it
asynchronous the client (a period-end if the the by transmits gets clients requests
disadvantage states a The record agent of data the the receive server 'stateful' HLC
state of an This device client invalidation or data device the and modified devices server
HA information replaced) enables updated. to stored report, I and period information

W
device cache-states (HA). (home transmits can caches for not

the does only approach replace report indicates informs stores whenever approach the
mechanism use have invalidation of broadcasted in and the to the report The cache, not
agent) information, The the same. at invalidated the of at the of its the copy server
becomes the periodic receive the the is invalidation is server the AS at the that stateful
state HLC. the device-clients is stored that software. is invalidated the the cache
invalidation HA scheme not is present server. that to device is the reports valid as
o
server This to there of an data-record transmits synchronize detected

also intervals data. valid. in asynchronous Emi, the these record cache the all.
invalidation the for This enables is sends and This are referred state is Mmi, state The
and that server Moreover, use data. also home information is which device-clients

r
invalidation if and reports state by similar Smi, method information other
server it the the of (Emi, in modified. with relevant is to the that keeps After each
computations. location or to not client mode are at report synchronize invalidation Mmi,

ld
the devices device Imi) to identifying stores the the as

since record received the affected the ensures track state of reports
devices as the Smi, to is server home after about cache
then each
data HLR
due and
also
the
the are the AS
to
or of of
Downloaded From JNTU World (http://www.alljntuworld.in)
www.alljntuworld.in JNTU World
the specified period of time, it can request the server to send the report. Each client can
thus be periodically updated of any modifications at the server. When the invalidation
report is not received after the designated period and a link failure is found at the
device, the device does not use III. II. I. the the transmission Assume server software
record necessary Data the be Web The server maintains application then overcome
Data J maintained Cache on Polling of cached If data Time-to-live The end

server mechanism invalidated device mobile stateful cache there the data invalidation

N
for or Cache at TTL of Cache that and to record train to the in it

invalidation the the when access mechanism running record inconsistency is


assignment record devices of in access a replaces replace a synchronous access by
data mobile invalidation device TTL, a data. device mechanism information is is manner
the modified equivalent copy Maintenance latency found whether Maintenance of at
record the a the or three Instead latency. records the the environment particular needs
T
reduces mechanism (client-initiated is their is cached invalid means

adaptive to similar polled earlier device reports methods at in (this (client-initiated


approach server). be the it servers a to the Web (asynchronous) downloading requests
cached data-record modified access record the mechanism that whenever record to

U
needs record cached server to (adjustable) cache (server-
initiated the given to polling each Web data can is record overcome copy latency a in
case): cache the is but in is record or the below: data be records device maintenance
case): cache in required known Mobile mechanism. during invalidated, server is
Mobile from is not connected the with Polling high previous or maintenance polled.
record called to copy. Each modified access and at at valid, cached the websites an

W
zero. as for regular by bandwidth the case): pulling). from

updating cached means If application. access modified Environments an the update


Environments latency. invalid, is it then to device Therefore, for at is invalidation
necessary application the a the intervals modified, the for due record applications
checking the web latency. The web intervals requests server stores data. device.
modified, requirement server device to A server time which is request
o
data (synchronous). in software disconnections. When then update.

assigned sends Caching from the data Data a taken requests of from (e.g., is mobile or
are cache the web that described TTL not the cache must exclusive invalidation to each

r
The for not during device a traffic and is record. at server, server TTL

maintenance for enable environment the set disadvantage be consistency invalidated


the client hoarding (time-to-live). computation. the to Web requests sent above.

ld
information application state. web data After the 0,

modified device.
periodic
reports the to cache,
cache state Each
If and the the
can
the
TTL the
an at
to of
is
consistency can be maintained by two methods. These are: Downloaded From JNTU World
(http://www.alljntuworld.in)

Anda mungkin juga menyukai