Professional Documents
Culture Documents
Mobile Computing
Mobile Computing
Emerging Technologies
4.1 INTRODUCTION
In this chapter however, will we discuss some technologies which are not yet in
the mainstream but are potential candidates for the same.
These technologies are included here to make the mobile computing story
complete. These include technologies like Bluetooth (802.15.1a), Radio
frequency identifier (RFID), Wireless metropolitan area network or Wireless
broadband(WiMax-802.16), Mobile IP, IPv6, and Java Card. Bluetooth is a
technology in the personal area network (PAN). RFID is emerging as a leading
technology in the logistics, manufacturing, and retail industry. Wireless
broadband is expected to be a mainstream technology very soon. Mobile IP
allows data handoff over different sub-networks. IPv6 is the next genera-
tion internet protocol. Java Card technology is emerging as a forerunner in the
security and personal identity domain. Therefore, we introduce all these
technologies in this chapter.
4.2 BLUETOOTH
Bluetooth was the nickname of a Danish king Harald Blatand, who unified
Denmark and Norway in the 10th century. The concept behind Bluetooth
wireless technology was unifying the telecom and computing industries.
Bluetooth technology allows users to make ad hoc wireless connections
between devices like mobile phones, desktop or notebook computers without
any cable. Devices carrying Bluetooth-enabled chips can easily trans-
fer data at a speed of about 1Mbps within 50 meters (150 feet) of range or
beyond through walls, clothing and even luggage bags.
4.2.1 Bluetooth Protocol
The Bluetooth radio is built into a small microchip and operates in a globally available
frequency band ensuring interoperability worldwide. Bluetooth uses the unlicensed 2.4
GHz ISM (Industrial Scientific and Medical) frequency band. There are 79 available
Bluetooth channels spaced 1 MHz apart from 2.402 GHz to 2.480 GHz. The Bluetooth
Bluetooth protocol stack can be divided into four basic layers according to their func-
tions. These are:
Link Manager Protocol (LMP) When two Bluetooth devices come within
each other's radio range, link managers of either device discover each other.
LMP then engages itself in peer-to-peer message exchange. These messages
perform various security functions starting from authentication to encryption.
LMP layer performs generation and exchange of encryption keys as well. This
layer performs the link setup and negotiation of baseband packet size. LMP
also controls the power modes, connection state, and duty cycles of Bluetooth
devices in a piconet.
• Cable Replacement Protocol this protocol stack has only one member viz.,
Radio Frequency Communication (RFCOMM).
07.10 specification. The "cable replacement" protocol emulates RS-232 control and data
signals over Bluetooth baseband protocol.
In a wireless environment where every bit is on the air, security concerns are high.
Bluetooth offers security infrastructure starting from authentication, key exchange, to
encryption. In addition to encryption, a frequency-hopping scheme with 1600 hops/sec
is employed. All of this make the system difficult to eavesdrop. At the lowest levels
of the protocol stack, Bluetooth uses the publicly available cipher algorithm known as
SAFER+ to authenticate a device's identity. In addition to these basic security functions,
different application verticals use their own security infrastructure at the application
layer.
Each application model in Bluetooth is realized through a Profile. Profiles define the pro-
tools and protocol features supporting a particular usage model.
• File Transfer The file transfer usage model offers the ability to transfer data
objects from one device (e.g., PC, smart-phone, or PDA) to another. Object types
include ids, .ppt, .wav, .jpg,.doc files, folders or directories or streaming media
formats. Also, this model offers a possibility to browse the contents of the folders
on a remote device.
• Internet Bridge In this usage model, mobile phone or cordless modem acts as
modem to the PC, providing dial-up networking and fax capabilities without need
for physical connection to the PC.
• LAN Access In this usage model multiple data terminals use a LAN access point
(LAP) as a wireless connection to an Ethernet LAN. Once connected, the termi-
nals operate as if they were connected directly to the LAN.
• Headset The headset can be wirelessly connected for the purpose of acting as a
remote device's audio input and output interface. This is very convenient for
hands free cellular phone usage in automobiles.
RFID is a radio transponder carrying an ID (Identification) that can be read through radio
frequency (RE) interfaces. These transponders are commonly known as RFID tags or sim-
ply tags. To assign an identity to an object, a tag is attached to the object. Data within the
tag provides identification for the object. The object could be an entity in a manufactur-
ing shop, goods in transit, item in a retail store, a vehicle in a parking lot, a pet, or a book
in a library. Biologists had been using RFID for sometime to track animals for the pur-
pose of studying animal behavior and conservation. The earliest use of RFID was for
tracking farm animals. A RFID system comprises of different functional areas like:
RFID tags are categorized on three basic criteria. These are based on frequency, appli-
cation area and the power level.
• Power-based grouping: RFIDs can be grouped into two types based on power
requirements. These are active and passive tags. Passive tags are generally in low
frequency range, whereas tags at higher frequency range can be either active or
passive.
• Active RFID tags: Active tags are powered by an internal battery and are typ-
ically read/write. The life of an active tag is limited by the life of the battery.
The data within an active tag can be rewritten or modified. An active tag's
memory can vary from a few bytes to 1MB. The battery-supplied power of an
active tag generally gives it a longer read range. The trade off is, greater the
size the greater cost, and a limited operational life. Depending upon the bat-
tery type and temperatures, the life of such tags could be 10 years. Some active
tags can also be smart and do not send their information all the time. In a typ-
ical read/write RFID system, a tag might give a machine a set of instructions,
and the machine would then report its performance to the tag. This encoded
data would then become part of the tagged part's history. This data can be
details about the port of transit with dates.
• Passive RFID tags: Passive tags operate without a power source of its own. A
passive tag obtains operating power from the reader's antenna. The data within
a passive tag is read only and generally cannot be changed during operation.
Passive tags are lighter, less expensive and offer a virtually unlimited opera-
tional lifetime. The trade off is that they have shorter read ranges than active
tags and require a higher-powered reader. Passive tags contain data usually 32
to 128 bits long.
RFID tags are of different shapes and sizes. Animal tracking tags are inserted
beneath the skin and are as small as a pencil lead. Tags can be screw-shaped to
identify trees or wooden logs. In stores, plastic tags are attached to
merchandise and used as anti-theft device. Heavy-duty large tags are used to
track containers or heavy machinery. The reader emits radio waves in any
range from one centimeter to 25 meters or more. When an RFID tag passes
through the electromagnetic zone of the reader, it detects the reader's
activation signal. The reader decodes the data encoded in the tag's integrated
circuit and the data is passed to the host computer for processing. A basic RFID
system consist of three components:
es forming an integral feature in both tags and readers. While the term antenna is
generally considered more appropriate for propagating systems, it is also loosely
applied to inductive systems.
• Security
• Animal tagging
• Store in an enterprise
• Retail store
• Community library
• Postal tracking
Wireless technologies are proliferating in a major way into the first-mile (as computer
people call it) or last-mile (as communication people call it) subscriber access, as opposed
to twisted-pair local loop. These technologies are generally referred to as (WLL—wireless
local loop) or WLL (wireless in local loop). Wireless local loop is also known as fixed-wire-
less system. The world is moving towards a convergence of voice, data and video. This
convergence will demand interoperability and high data rate. Keeping this in mind, the
IEEE 802 committee set up the 802.16 working group in 1999 to develop wireless broad-
band or Wireless MAN (wireless metropolitan area network) standards. Wireless MAN
offers an alternative to high bandwidth wireline access networks like fiber optic, cable
modems and DSL (Digital Subscriber Line). Figure 4.4 depicts a Wireless MAN architecture.
The release of Wireless MAN (IEEE 802.16) standards in April 2002 has paved the way
for the entry of broadband wireless access as a new bearer to link homes and businesses with
core telecommunications networks. WirelessMAN provides network access to buildings
through exterior antennas communicating with radio base stations. The technology is
IEEE 802.16 standards are concerned with the air interface between a subscriber's trans-
ceiver station and a base transceiver station. The 802.16 standards are organized into a
three-layer architecture.
• The physical layer: This layer specifies the frequency band, the modulation
scheme, error-correction techniques, synchronization between transmitter and
receiver, data rate and the multiplexing structure.
• The MAC (Media Access Control) layer: This layer is responsible for transmit-
ting data in frames and controlling access to the shared wireless medium through
media access control (MAC) layer. The MAC protocol defines how and when a
base station or subscriber station may initiate transmission on the channel.
• Above the MAC layer is a convergence layer that provides functions specific to
the service being provided. For IEEE 802.16.1, bearer services include digital
audio/video multicast, digital telephony, ATM, Internet access, wireless trunks in
telephone networks and frame relay.
To support duplexing, 802.16 adapted a burst design that allows both time-division
duplexing (TDD) and frequency-division duplexing (FDD). In TDD the uplink and
downlink share a channel but do not transmit simultaneously. In the case of FDD the
uplink and downlink operate on separate channels and sometimes simultaneously.
Support for half-duplex FDD subscriber stations is also supported in 802.16. Both TDD
and FDD alternatives support adaptive burst profiles in which modulation and coding
options may be dynamically assigned on a burst-by-burst basis.
The 2-11 GHz bands, both licensed and unlicensed, are used in 802.16. Design of
the 2-11 GHz physical layer is driven by the need for non-line-of-sight operation. The
draft currently specifies that compliant systems implement one of three air interface
specifications, each of which provides for interoperability. The 802.16 standard
specifies three physical layers for services:
Figure 4.5 depicts one such mobile communication system to support high-
speed mobility. This is achieved by installing moving base stations and fixed
radio ports uniformly distributed along the median of the roadway. The
moving base stations allow communication links to be established between
the mobile units traveling on the roadway and a fixed communication network
through the fixed radio ports. The small-cell (picocell) architecture of the
proposed system enables the use of extremely lightweight low-power mobile
units that can be used almost anywhere. In this architecture the pico-
cell will move in the direction of the moving vehicle so that the relative speed
between them are low. This proposed infrastructure is suitable for high-speed
multilane highways in cities. The proposed system will be able to communicate to
devices traveling at speeds up to and in excess of 150 Kmph.
How does Mobile IP work?
IP routes packets from a source end point to a destination end point through
various routers. In addition to the IP addresses of the hosts, for a meaningful
communication we need the TCP or UDP (User Datagram Protocol) port of the
applications. The port number is used by the host to deliver the packet to the
appropriate application.
Whenever the mobile node moves, it registers its new care-of address with its
home agent. The home agent forwards the packet to the foreign network
using the care-of address. The delivery requires that the packet header is
modified so that the care-of address becomes the destination IP address. This
new header (Figure 4.8) encapsulates the original packet, causing the mobile
node's home address to have no impact on the encapsulated packet's routing.
This phenomenon is called tunneling. Figure 4.6 shows in general terms how
Mobile IP deals with the problem of dynamic IP addresses.
A care-of-address has been allocated to A by this foreign network and available with
the home agent. The home agent encapsulates the entire datagram inside a new IP
datagram, with A's care-of address in the IP header. This new datagram with the care-
of-address as the destination address is retransmitted by the home agent.
• The IP datagram from A to X travels directly across the network, using X's
IP address as the destination address.
To support the operations illustrated in the example above, mobile IP needs to
support three basic capabilities:
4.5.2 Discovery
The Mobile IP discovery procedure has been built on top of an existing ICMP
router discovery and advertisement procedure as specified in RFC 1256.
Using these procedures a router can detect whether a new mobile node has
entered into its network. Also, using this procedure the mobile node determines
whether it is in a foreign network. For the purpose of discovery, a router or an
agent periodically issues a router advertisement ICMP message. The mobile
node on receiving this advertisement packet compares the network portion of
the router IP address with the network portion of its own IP address allocated by
the home network. If these network portions do not match, then the mobile node
knows that it is in a foreign network. A router advertisement can carry
information about default routers and information about one or more care-of
addresses. If a mobile node needs a care-of address without waiting for the
agent advertisement, the mobile node can broadcast a solicitation that will be
answered by any foreign agent.
4.5.3 Registration
Once a mobile node obtained a care-of-address from the foreign network, the
same needs to be registered with the home agent. The mobile node sends a
registration request to the home agent with the care-of address information.
When the home agent receives this request, it updates its routing table and sends
a registration reply back to the mobile node.
• The mobile node requests for forwarding service from the foreign network
by sending a registration request to the foreign agent.
• The foreign agent relays this registration request to the home agent of that
mobile node.
• The home agent either accepts or rejects the request and sends a registration
reply to the foreign agent.
We have assumed that the foreign agent will allocate the care-of address.
However, it is possible that a mobile node move to a network that has no
foreign agents or on which all foreign agents are busy. As an alternative
therefore, the mobile node may act as its own foreign agent by using a co-
located care-of address. A co-located care-of address is an IP address obtained
by the mobile node that is associated with the foreign network. If the mobile
node is using a co-located care-of address, then the registers happens directly
with its home agent.
4.54 Tunneling
Figure 4.7 shows the tunneling operations in Mobile IP. In the mobile IP, IP-
within-IP encapsulation mechanism is used. Using IP-within-IP, the home
agent, adds a new IP header called tunnel header. The new tunnel header
uses the mobile node's care-of address as the tunnel destination IP address.
The tunnel source IP address is the home agent's IP address. The tunnel header
uses 4 as the protocol number (Figure 4.8), indi-
cating that the next protocol header is again an IP header. In IP-within-IP, the
entire original IP header is preserved as the first part of the payload of the
tunnel header. The foreign agent after receiving the packet, drops the tunnel
header and delivers the rest to the mobile node.
When a mobile node is roaming in a foreign network, the home agent must be able to
intercept all IP datagram packets sent to the mobile node so that these datagrams can be
forwarded via tunneling. The home agent, therefore, needs to inform other nodes in the
home network that all IP datagrams with the destination address of the mobile node
should be delivered to the home agent. In essence, the home agent steals the identity of
the mobile node in order to capture packets destined for that node that are transmitted
across the home network. For this purpose ARP (Address Resolution Protocol) is used to
notify all nodes in the home network.
Let us take the example of Figure 4.6. The original IP datagram from X to A has a
source address as IP address of X and a destination address as the home IP address of A.
The datagram is routed through the Internet to A's home network, where it is
intercepted by the home agent. The home agent encapsulates the incoming
datagram with an outer IP header. This outer header includes a source address
same as the IP address of the home agent and a destination address equal to the
care-of-address. As the care-of-address has the network portion of the foreign
network, the packet will find its way directly to the mobile host. When this
new datagram reaches the host in the foreign network, it strips off the outer
IP header to extract the original datagram. From this stripped off
packet it also finds out the original sender. This is necessary for the host to know
who has sent the packet so that the response reaches the right destination.
4.5.5 Cellular IP
The primary design goal for mobile IP protocols is to allow a host to change its point of
access during data transfer without being disconnected or needing to be reconfigured.
An important design goal for mobile host protocols is to support handoffs without
significant disturbance to ongoing data transmission. A change of access point while
connectivity is maintained is called a handoff.
To manage mobility, generally a "two tier addressing" scheme is used. One address is for
a fixed location which is known to all; other one is for a dynamic location which
changes as the user moves. In case of GSM this is done through Home Location Register
and Visitor Location Register. Same is true in Mobile IP, where a mobile host is associ-
ated with two IP addresses: a fixed home address that serves as the host-identifier; and a
care-of-address that reflects its current point of attachment. The mobile IP architecture
comprises three functions:
1. A database that contains the most up-to-date mapping between the two address
spaces (home address to care-of-address)
3. Agents ensuring that the source and destination packets for arriving and
outgoing packets are updated properly so that routing of packets are proper
Whenever the mobile host moves to a new subnet managed by a different foreign agent,
the dynamic care-of-address will change. This changed care-of-address needs to be com-
municated to the home agent. This process works for slowly moving hosts. For a high
speed mobile host, the rate of update of the addresses needs to match the rate of change
of addresses. Otherwise, packets will be forwarded to the wrong (old) address. Mobile IP
fails to update the addressed properly for high speed mobility. Cellular IP (Figure 4.9), a
new host mobility protocol has been designed to address this issue.
In a Cellular IP, none of the nodes know the exact location of a mobile host. Packets
addressed to a mobile host are routed to its current base station on a hop-by-hop
basis where each node only needs to know on which of its outgoing ports to forward
packets. This limited routing information (referred as mapping) is local to the node
and does not assume that nodes have any knowledge of the wireless network topology.
Mappings are created and updated based on the packets transmitted by mobile hosts.
Cellular IP uses two parallel structures of mappings through Paging Caches (PC)
and Routing Caches (RC). PCs maintain mappings for stationary and idle (not in
data communication state) hosts; whereas, RC maintains mappings for mobile
hosts. Mapping entries in PC have a large timeout interval, in the order of
seconds or minutes. RCs maintain mappings for mobile hosts currently
receiving data or expecting to receive data. For RC mappings, the timeout are
in the packet time scale. Figure 4.10 illustrates the relationship between PCs
and RCs. While idle at location 1, the mobile host X keeps PCs up-to-date by
transmitting dummy packets at a low frequency (step 1 in Figure 4.10). Let us
assume that the host is mobile and moved to location 2 without transacting
any data. The PC mapping for X now points to location 2. While at location 2,
there are data packets to be routed to the mobile host X, the PC mappings are
used to find the host (step 2). As there is data transmission, the mapping
database to be used will be the RC. As long as data packets keep arriving,
the host maintains RC mappings, either by its outgoing data packets or
through the transmission of dummy packets (step 3).
Idle mobile hosts periodically generate short control packets, called paging-
update packets. These are sent to the nearest available base station. The paging-
update packets travel in the access network from the base station toward the
gateway router, on a hop-by-hop basis. Handoff in Cellular IP is always
initiated by the mobile host. As the host approaches a new base station, it
redirects its data packets from the old to the new base station. First few
redirected packets will automatically configure a new path of RC mappings for
the host to the new base station.
IPv6 uses 128-bit addresses for each packet, creating a virtually infinite
number of IP addresses (approx. 3.4*10**38 IP addresses), as opposed to
3758096384 IPv4 addresses
(2**31 A Class address + 2**30 B Class + 2**29 C Class address). This also means that
if we set the world population at 10 billion in 2050, there will be 3.4*10**27 addresses
available per person.
In IPv6, there are global addresses and local addresses. Global addresses are used for
routing of global Internet. Link local addresses are available within a subnet. IPv6 uses
hierarchical addressing with three-level of addresses (Figure 4.11). This includes a Public
Topology (the 48 bit external routing prefix), a Site Topology (typically a 16 bit subnet
number), and an Interface Identifier (typically an automatically generated 64 bit number
unique on the local LAN segment).
End-user-sites get their address prefix from an ISP that provides them the IPv6 service.
General IPv6 host is given a linklocal address such as fe80::EUI-64 and more than one
global address such as global-prefix::EUI-64. It has 64bit length and made by IEEE
EUI-64 format. Interface ID is used to specific Interface in the same link. Interface ID
is generated to use Interface's link layer address. An Ethernet MAC address for a device
is 48 bits long, Interface ID is created by adding 2 octet "Oxfffe" in it's center. Like
02:60:8c:de:7:79 becomes 260:8cff:fede:779.
4.6.2 IPv6 Security
One of the biggest differences between IPv6 and IPv4 is that all IPv6 nodes are expec-
ted to implement strong authentication and encryption features to improve Internet
security. IPv6 comes native with a security protocol called IP Security (IPSec). Many
vendors adapted IPSec as a part of IPv4. IPSec protocol is a standards-based method
of providing privacy, integrity and authenticity to information transferred across IP
networks.
IPSec combines several different security technologies into a complete system to provide
confidentiality, integrity and authenticity. In particular, IPSec uses:
• Public key cryptography to guarantee the identity of the two parties and avoid
man-in-the-middle attacks.
Each IPv6 packet payload is attached a tag which can be customized to enable a better
quality in the packet flow, or by a price of other class, such as non-real time quality of
service or 'real-time' service. This feature does not exist natively in IPv4, although a part
of payload could be used for the same, reducing unique information amount carried by
the packet.
Information is packetized into IPv6 packets, with the corresponding levels of control. A
neighbour discovery feature (care-of-address, and stateless Prefix or Stateful
DHCPv6)will in principle allow the device carrying these packets to configure
itself for a consistent dialogue with other devices or software interfaces. The
same can be done with IPv4 packets, but with the intervention of humans or
specific tools and services and only for selected information and software
architectures.
The Migration from IPv4 to IPv6 is quite an involved task. This includes the
following:
2. Migration of the computing nodes in the network: this will need the
operating system upgrades so that they support IPv6 along with IPv4.
Upgraded systems will have both IPv4 and IPv6 stacks. Therefore, both the
IPv4 and IPv6 applications can run without any difficulty.
IPv6 includes many features for streamlining mobility support that are missing
in IP version 4, including Stateless Address Autoconfiguration and Neighbor
Discovery. IPv6 with hierarchical addressing scheme will be able to manage IP
mobility much efficiently. IPv6 also attempts to simplify the process of
renumbering, which could be critical to the future routability of the Internet
traffic. Mobility Support in IPv6, as proposed by the Mobile IP working group,
follows the design for Mobile IPv4. It retains the ideas of a home network,
home agent and the use of encapsulation to deliver packets from the home
network to the mobile node's current point of attachment. While discovery of
a care-of-address is still required, a mobile node can configure its a care-of
address by using Stateless Address Autoconfiguration and Neighbor Discovery.
Thus, foreign agents are not required to support mobility in IPv6.
Review Questions:
Q2: How does a new Bluetooth device discover a Bluetooth network? For inter
operability, the system needs to be open. Describe the security principles in
Bluetooth?
Q3: What is active RFID? Describe two applications of active RFID. How is
passive RFID?
Q5: Explain how does Mobile IP work? What are the challenges with mobile
IP with respect to high speed mobility? How does Cellular IP solve some of
these challenges?
Q6: Explain three limitations of IPv4 that are overcome by IPv6. You have a
communication application that uses sockets in IPv4, what are the steps you
need to follow to port this application from IPv4 to IPv6?