Professional Documents
Culture Documents
UNIT
Introduction
Introduction
Issues in Mobile Computing
Overview of Wireless Telephony : Cellular Concept
A. Concept Outline : Part-1 5J
B. Long and Medium Answer Type Questions . 5J
4 (IT-8) J
Mobile Computing 5 (IT-8)J
PART-1
Introduction, Issues in Mobile Computing, Overview of
Wireless telephony : Cellular concept.
CONCEPT OUTLINE:PART-1
Mobile computing can be defined as a computing environment
over physical mobility.
Issues in mobile computing are:
Software issue
b. Technical issue
C Network issue
d User interface issue
e Security issue
The wireless telephony is a telephone service based on signaling
over radio frequencies without using wires.
Acellular system is a high capacity land mobile system in which
available frequency spectrum is partitioned into discrete channels
which are assigned in groups to geographic cells.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Que 1.1. Explain the word Mobile Computing" and also give
suitable live example with merits of mobile computing.
UPTU2012-13, 2014-15; Marks 05
Answer
1.
Mobile computing can be defined as a computing environment over
physical mobility.
2 The computing environment is mobile and moves along with the user.
3. The user of mobile computing environment will be able to access data
or information from any device in any network while on move.
4. The mobile computing allows a user toperform a task from anywhere
and anytime by computing device.
5. Mobile computing is the fastest growing sector of computing.
6. Some of the mobile devices are: mobile phones, laptops, PDA etc.
6(IT-8) J Introduction
Answer
Characteristics of mobile computing :
1. User mobility : User should be able to move from one
physical
location to another location and use the same service.
2. Network mobility : User should be able to move from one network
to another network and use same services.
3. Bearer mobility :
between
a Bearer services are responsible for transmission of data
mobility, user should be
twouser network interfaces. In bearer services.
same
able to move from one bearer to another and use the
b
transport
For different types of network there are different types of protocols.
bearers. For dial up connection these can be TCPIP, http voice.
For GSM it could be SMS, WAP and for mobile it willbe
one device to
4. Device mobility : User should be able to move from
another and use the same service.
service to
5 Service mobility :User should be able to move from one
another.
or server. In
6. Host mobility : The user device can either be a client
taken care off.
case of host mobility the mobility of IP needs to be
Challenges faced by mobile computing :
faces
There are a number of technicalchallenges that mobile computing
are :
and it has to overcome them. Some of them
1. Mobility :
are certain
This is the important aspect of mobile computing, but there
challenges that, it has to face, these are:
a. Autoconfiguration of the system, as the system keeps changing
the new
its environment. Hence, it has to configure itself to
environment each time.
Answer
Mobile computing : Refer Q. 1.1, Page 5J, Unit-1.
Challenges faced by mobile computing: Refer Q. 1.2, Page 7J,
Unit-1.
Issues in mobile computing: Mobility, wireless medium limitations of
battery technology and widely varying bandwidth conditions are the main
new factors which will drive applications and system software for mobile
computers.
The various issues in mobile computing are as follows :
1, Software issues:
a. Mobile systems are resource poor relative to static elements.
b Mobile systems are location dependent. The location of mobile
elements is their point of attachment to the fixed network change
as they move.
C Due to mobility the tracking of user call and updation of user's
position to be done frequently.
2. Technical issues :
a. Mobile computing technologies needs clear direction and guidance.
Without this, certain resources will be wasted.
b. Mobile computing devices needs suitable and compatible solutions
to support any application. For example : download e-mail, connect
to internet, create and access critical documents.
C. The device's operating system must be compatible with the
workstation operating system (Window and Macintosh).
d Mobile elements rely on battery. Concerns for power consumption
must span various levels in hardware and software design.
3. Net work issues :
a.
For connectivity between mnobile device and wireless local area
network (WLAN) to access institutionally supported e-mail, internet
services; mobile devices needs the Network Interface Card (NIC)
which may be build in or inserted into mobile device.
b. Before purchasing a LAN card, it is critical to verify that the PC
(Personal Computer) card driver required for supporting the specific
mobile device on the required Macintosh or Window platform is
10(IT-8)J Introduction
Answer
1. Telephony is the technology associated with the electronic transmission
of voice, fax or other information between distant parties using systems
like telephone or mobile phone, contain both aspeaker or transmitter
and a receiver.
2. The wireless telephony is a telephone service based on signaling over
radio frequencies without using wires.
3. It includes mobile phones, Wireless Local Loop (WLL), microwave,
satellite and radio based telephony.
4. Wireless communication systems provide anytime, anywhere
communication.
5. When you talk on a wireless phone, it transmit low energyradio
waves to a local antenna site, which connects you with the landline or
wireless location, you are calling.
6. The same antenna also sends signals back toyour wireless phone.
Answer
Generation of wireless technology : Like the computers the evolution
of wireless technology has been defined in generations :
1. 1G (The First Generation):
uses the analog
The first generation of wireless technology
technology which support voice traffic.
b It uses FDMA (Frequency Division Multiple Access)
technology
for modulation.
C. For example: AMPS (Advance Mobile Phone
Service) in US.
2. 2G (The Second Generation) :
2G uses digital multiple access technology.
b. It was a combination of TDMA and FDMA technologies.
C. 2G support voice, paging, data and fax services.
For example:GSM.
e. In 2G technology voice is digitized over a circuit.
circuits. This
f. In 1G and 2G networks data is transacted over
technology is called Circuited Switched Data (CSD).
3. 2.5G (Second Generation Plus):
developed
As upgrade to2G technologies, 2.5 technologies wererates.
to provide more bandwidth for higher data transfer
b 2.5G uses Higher Speed Circuit Switched Data (HSCSD)
technology,
technology that can offer
which is basically an extension of GSM
the throughput of upto 384 kbps.
C. Although 2.5G offers more bandwidth than 2G, it is less than
that offered by 3G.
require
d However, since 2.5G uses existing 2G spectra and does not
implemented
an entirely new network infrastructure, it can be
faster and use expensively than 3G.
e 2.5G examples include : IDEN (Integrated Digital Enhanced
Network).
4. 3G (Third Generation):
a 3G refers generically to a category of next generation mobile
networks which operate at a higher frequency bandwidth and
have a larger channel bandwidth.
b. This enables 3G networks to support very high data rates upto
2 Mbps.
12 (IT-8) J
Introduction
C. 3G refers tothe radio network and RF technology, and
affect the switching core. does not
d. The switching infrastructure for 3G is still based on MSCs and
the TDM model.
e. For example: UMTS (Universal Mobile Telephone Service) based
on the W-CDMA (Wide Band-CDMA), R-99 and
CDMA-2000 and
TD-CDMA (Time Division-CDMA).
5. 3G+ (Third Generation Plus):
a. 3G+ refers to an advanced level of 3G that introduces the
of an all-IP switching core. concept
b An all-IP switching core means that IP replaces the TDM-based
MSC infrastructure with IP-based transport andIP-based
signaling.
C. IP-based signaling is implemented with new protocol like Session
Initiation Protocol (SIP) and Media Gateway Control Protocol
(MGCP).
d An example of 4G is Wi-Max.
Que 1.7. Draw a diagram showing the positioning of wireless
network via wired networks. Why is a wired network usually part
of the wireless infrastructure ? UPTU2014-15, Marks 05
Answer
Wired network is a part of wireless infrastructure:
1 Today's wireless communication systems are based on composite wireless
and wired system.
2. For example, in mobile telephones, each cell is a radio communication
center where a mobile subscriber establishes a connection with a land
telephone through the Mobile telephone Exchange (MTX) and Public
Switching Telephone Network (PSTN) which mostly use wired system.
3 Therefore wired network is usually considered as a part of wireless
infrastructure.
Wired Wireless
Installation moderately difficulty easier, but interference
Cost less more
Wireless
network 1 Wired ethernet
network
Access
point 1
Wireless
network 2
Internet
Channels K; K, Ky Kg K, K; Ks
c+
S S
Channels K; K K KK K
Channels K; K K K, K; Kg
C
Channels K Ki K, K, K, |K; Ks
HLR
HLR
VLR
to other
MSC MSCs
To PSTN
Fig. 1.9.1. Cellular system.
Advantages of small cell : There are several advantages of keeping
smallcells in the cellular systems. Some of them are :
1 Higher capacity : Implementing SDM allows frequency reuse. If
one transmitter is far away from another, i.e., outside the interference
range, it can reuse the same frequencies.
Less transmission power:The power aspects are not a big problem
for base stations, they are indeed problematic for mobile stations. A
19 (IT-8) J
Mobile Computing
receiver far away from a base station would need much more transmit
power than the current few watts. But energy is a serious problem
for mobile handheld devices.
3. Local interference only : With smallcells, mobile stations, and
base stations only have to deal with local' interference.
4. Robustness : Cellular systems are decentralized and s0, more robust
against the failure of single component. If one antenna fails, this only
influences communication within a small area.
Drawbacks of small cell :
1. Infrastructure needed: Cellular systems need a complex infrastructure
antennas, switches
to connect all base stations. This includes many
a mobile station etc.,
for call forwarding, location registers to find
which makes the whole system quite expensive.
2. Handover needed :The mobile station has toperform a handover size
when changing from one cell to another. Depending on the cell
and the speed of movement, this can happen quite often.
transmitters
3. Frequency planning : To avoid interference between
distributed carefully.
using the same frequencies, frequencies have to be the other, only
On the one hand, interference should be avoided, on
a limited number of frequencies is available.
cells in cellular
Que 1.10. Why did we choose hexagonal shape for
phone system ? What is frequency reuse ?
UPTU2012-13, Marks 05
OR
Discuss cellular system architecture.
OR
Explain various concepts related to cellular system.
Answer
Cellular system architecture :
mobile cellular use is
1. The amount of frequency spectrum available for needed for
limited, so the efficient use of required frequencies was
mobile cellular coverage.
are divided
2. In modern cellular telephony, rural and urban regions
into areas according to specificprovisioning guidelines.
cell
3. Deployment parameters, such as amount of cell splitting and
sizes, are determined by engineers experienced in cellular system
architecture.
Cells :
1. Acell is the basic geographical unit of a cellular system.
20 (IT-8) J
Introduction
2. Cells are base station transmitting over small geographic
are represented as hexagons. areas that
3 Each cell size varies depending on the landscape.
imposed by nature and man-made structures, the Because of constraints
true shape of cell is
not a perfect hexagon.
4 The hexagons are preferred over circular and other shapes, because,
the hexagon covers the entire geographic region without
and with equal area. overlapping
5. Ifwe use a circular pattern some gaps exist in
between adjacent cell.
To avoid this gap, it is required to overlap but in that case
the set of
channels also get overlapped.
Area remain
uncovered
Cells Overlapping
Fig. 1.10.1.Cells shape using circle.
Clusters :
1. A cluster is a group of cells.
2. Allcells within a cluster use disjoint sets of frequencies.
3. No channels are reused within a cluster.
4. Each cell in cluster is covered by a base station.
5. Aset of Cdifferent frequencies f, fa ...f) are used for each
cluster of C adjacent cells.
6. Cluster pattern and the corresponding frequencies are reused in a
regular pattern over the entire service area.
7 There are two possible models to create minimal interference:one is
three cell cluster and the other one is seven cell cluster.
Three cellcluster : In three cell cluster, three cells combine to
form a cluster, here three frequencies are reused and C=3, with
hexagonal cells. All cells within a cluster use disjoint sets of
fre ;uencies.
Co
C2 C
Ca
C1 C
CA
Fig. 1.10.5.
Handover/Handoff:
1 The last problem in the development of the cellular network is raised
when a mobile subscriber travelled from one cell to another during a
call.
2 As adjacent area do not use the same radio channels, a call must
either be dropped or transferred one radio channel to another when
a user crosses the line between adjacent cells.
3 Because dropping the call is unacceptable, the process ofhandoff was
created.
4. During a call, when two parties on a voice channel, if any mobile unit
moves out the coverage area of given cell site, the signals become
weaker,at this point, the system switches the call tostronger frequency
channel in a new site without interrupting the call or alerting the
user.
5. The call continues as long as the user is talking, and user does not
notice the handoff at all.
23 (IT-8) J
Mobile Computing
A
Station 2
A
Station l
Station 3
Cellular
switch
h.
Sectorization
three cell clusters
Fig. 1.10.7. Cellular system with
and three sector per cell.
Answer
are the part of a typical
cellular
The following network elements
telecommunication system:
24 (IT-8) J
Introduction
1. Public Switched Telephone Network (PSTN):
a. The PSTN is made up oflocal networks, the
and other networks that exchange area networks,
interconnect
communication devices on a worldwide basis.telephone and other
b. The PSTN has several
thousand miles of
infrastructure, including fixed landlines, microwavestransmission
and satellite
links.
2 Mobile Switching Center (MSC):
a.
MSCis usually located at mobile telephone switching office
b. The MTSO (MTSO).
houses the mobile switching center, field monitoring,
and rely stations for switching calls from cell sites to wireline
central offices (PSTN).
C. In analog cellular networks, MSC
controls the system operations
like call controlling, tracks billing information, locates
subscriber and manage connections to base stations, othercellular
MSCs
and PSTNISDN.
3. Base Station (BS):
a The base station is the component of
wireless
infrastructure that terminates the air interface network access
over which the
subscriber traffic is transmitted to and from a mobile station
(MS).
b The function provides by a base station
includes radio resource
control, frequency hopping and power control, handoff management
and digital signal processing, ie., channel encoding and
decoding.
4. Mobile Station (MS) or Mobile Subscriber Unit (MSU):
a. The mobile subscriber unit consists ofa control unit and a
that transmits and receives radio transmissions to and transceiver
cell site.
from a
b The MS comprises all user equipment and software needed for
communication.
C. The power levels of MS currently range from 0.8 watt to 80
watts.
5. Home Location Register (HLR):
a. HLR is a database that contains information about
a mobile network that is maintained by a subscribers to
particular service provider.
b. The HLR stores "permanent" subscriber information
including
the service profile, location information, activity status
mobile users and IMSI (International Mobile Subscriber of the
number on a permanent basis. Identity)
6. Visitor Location Register (VLR):
a The VLR represents a temporary data store, and
is one VLR per MSC.
generally there
25 (IT-8) T
Mobile Computing
mobile subscribers
b. This register contains information about the
covered by MSC of VLR.
who are currently in the service area
activated features
C. VLR also contains information about locally
such as call forwarding.
features currently activated,
The temporary data in VLR includes: current location.
temporary mobile station identity (TMSI),
7. Authentication center :
contains authentication
It is generally associated with the HLR, it registration, subsequent
parameters that are used on initial location
the MS.
location updates and on each callsetup request from
& Equipment Identity Register (EIR):
equipment
The EIRmaintains information toauthenticate terminal
terminals can
approved
so that fraudulent, stolen, or non-type
be identified and denied service.
lists that may
b. The information is in the form of white, grey, black
be consulted by the network provider.
cellular system.
Que 1.12. Give some details about working of
Answer
The working of a cellular system involves :
1. Transmitting a call :
the
A caller enters a 10-digit code (phone number) and presses
call button.
The MS scans the band to select a free channel
and sends a
b.
strong signal to send the number entered.
C. The BS relays the number to the MSC.
d The MSC in turn dispatches the request to all the base station in
the cellular system.
e. The mobile identification number (MIN) is then broadcast over
all the forward control channels throughout the cellular system,
it is known as "paging."
f. The MS responds by identifying itself over the reverse control
channel.
The BS relays the acknowledgement sent by the mobile and
informs the MSC about the handshake.
h. The MSC assign an unused voice channel to the cell and call is
established.
2. Receiving a call :
a. All the idle mobile stations continuously listen to the paging signal
todetect messages directed at them.
26 (IT-8) J Introduction
b The cell site warns the MTSO (MSC) that the mobile's signal
strength is falling below a predetermined level.
C. The MTSO then alerts all cell sites neighbours of the first one.
d They measure the mobile signals strength and report back to the
MTSO.
e The MTSO which is programmed to select the site receiving the
strongest signal, then switches the call from the weak cell to
strongest cell without interrupting the call.
f. The whole process takes a fraction of a second and the caller is
usually of it.
4 Roaming:
a. Roaming is the service offered by most cellular service providers
that allows subscribers to use cellular service while travelling
outside their home service area.
b. When a MS outside their home-area and come within the range
of another cellular system, the ROAM indicator on the cellular
phone will light to show that they are in range.
C On roaming, the cellular phone will seek service from the same
type of cellular system as the one they subscribe to at home.
But if that type is not available where they are roaming, the
phone will try to obtain service from the non-home type system.
e.
Ablinking light indicates a non-home type system. There is an
extra charge for calls placed while roaming.
Que 1.13. Explain the concept of "Frequency Reuse" as applied
to cellular communications. What are the advantages of this
approach ? How does it increase the capacity of the system ?
UPTU2012-13, Marks 05
Mobile Computing 27 (IT-8) J
Answer
Frequency reuse: Refer GQ. 1.10, Page 19J, Unit-1.
Advantages of frequency reuse :
a. Increased capacity
b. Limited spectrum is required
C. Same spectrum may be allocated to other network
Increased in the capacity of the system :
1 The increased capacity in a cellular network,compared with a network
with single transmitter, comes from the fact that the same radio
frequency can be revised in a different area for a completely different
transmission.
be
2. If there is a single plain transmitter, only one transmission can
used on any given frequency.
3.
Unfortunately, there is some level of interference from the signal
and from the other cells which use the same frequency.
4. So, in a standard FDMA system, there must be atleast one cell gap
between cells which reuse the same frequency.
PART-2
GSM: Air Interface, Channel Structure, Location Management
HLR-VLR, Hierarchical, Handoffs, Channels Allocation in
Cellular System, CDMA, GPRS.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
28 (IT-8) J Introduction
Objectives of GSM :
The proposed GSM system had to meet certain business objectives. These
are :
Answer
GSM permits the integration of different voice and data services and the
interworking with existing networks. Services make a network interesting
for customers.
Bearer services
MS
Transit Source/
TEMTUH CSM-PLMN network
(PSTN, ISDN)
destination
network
TE
(U,S,R)
Tele services
Fig. 1.15.1. Bearer and tele services reference model.
1 In this reference model, a mobile station MS is
connected to the GSM
public land mobile network (PLMN)via the U interface.
2 GSM-PLMN is the infrastructure needed for the GSM network.
3 This network is connected to transit networks, for
example :
services digital network (ISDN) or traditional public switchedintegrated
network (PSTN). telephone
4. Bearer services comprise all services that enable the
transparent
transmission of data between the interfaces to the network.
5 Tele services are application specific and may thus need all
layers of the ISO/OSI reference model. seven
6 These services are specific end-to-end from one terminal TE to another.
GSM define three different categories of
1, Bearer services :
services:
a Bearer services permit transparent and
non-transparent,
synchronous asynchronous data transmission.
or
30 (IT-8) J Introduction
Answer
GSM architecture:
a GSM network are structured as a hierarchical, complex system
architecture comprising many entities, interfaces,and acronyms.
31(IT-8) J
Mobile Computing
sub-systems; the radiosub-systems
b. AGSM system consists of three and the operation
(RSS), the network and switching sub-systems (NSS),
sub-systems (0SS).
radio specific entities,
1. Radio sub-systems (RSS):The RSS contains all sub-sýstem (BSS).
i.e., the mobile station (MS)) and the base station
interface and OSS by '0'
The RSS is connected to NSS by the 'A'
interface. RSS basically contains three entities:
a. Base Station Sub-system (BSS) :
controlled by a
i. AGSM network comprises many BSSs,each
base station controller (BSC).
i. The BSS performs all functions necessary to
maintain radio
connections to an MS (coding/decoding of voice).
BTSs.
ii. Besides a BSC, BSS contains several
b. Base Transceiver Station (BTS) :
antennas, signal
ABTS comprises all radio equipments, i.e.,transmission.
processing amplifiers necessary for radio
ABTS can form a radio cell, or several cells (using sectorized
antennas) and is connected to U interface and to the BSC
via the Aie interface.
C. Base Station Controller (BSC):
i.
The main function of BSC is to look over a certain number
of BTS to ensure proper operation.
ii It takes care of handoff from one BTS to another and maintains
appropriate power levels of the signal.
iü. The BSC also multiplexes the radio channels ontothe fixed
network connections at the A interface.
d. Mobile Station (MS) : Mobile station is based on the combination
of two main essential components known as Mobile Equipment
(ME) and an electronic 'Smart Card' called as Subscriber Identity
Module (SIM). Any MS can be identified by IMEI (International
Mobile Equipment Identify) number. Any MS can be personalized
by using SIM. The SIM card contains many identifiers and tables
as listed below :
i. A Personal Identity Number (PIN) : The PIN is used to
unlock the MS.
ii. A PIN Unblocking Key (PUK): Using the wrong PIN three
times will lock the SIM, in such cases the PUK is needed to
unlock the SIM.
iii. IMSI (International Mobile Subscriber Identity): The
mobile subscriber is identified by this number. During
initialization this number is transmitted over air.
Introduction
32 (IT-8)J
Subscriber Identity): This
iv. TMSI (Temporary Mobile intruder or unauthorized
number is used to prevent any
number is changed
user to monitor the radio interface. This
periodically.
identifying the
V. LAI (Local Area Identity) : It is used for
authentications ofa subscriber card.
BTS
At
BSC BSC
MSd Msc
NSS
LSinaling
VL ISDN, PSTN
GMSC
IWFPDN
and support
d. OSScontains following entities :
(AUC):
i. Authentication Center
1. AUC provides
authentication and encryption parameters
ensure the confidentiality
that verify the user's identity and
of each call.
34 (IT-8) J
Introduction
2 An AUC protects the network
types of fraud found in today's operators from different
cellular world.
3 It is situated in a special
protected part of HLR.
ii. Equipment IdentityRegister (EIR):
1 The EIR is a database that contains all
IMEIs, i.e., it
contains information about the identity of mobile
equipment that prevents them from stolen and
unauthorized access.
2 As mobile phones can be easily stolen with a valid SIM,
anyone could use the stolen MS. EIR has blacklist of
stolen (or locked) devices.
iii. Operations and Maintenance Center (0MC):
1. The OMC is
connected to all equipment in the switching
system and to the BSC.
2. It monitors and controls all other network
entities via
'0' interface.
3. OMC functions are traffic monitoring status report of
network entities, subscriber, and security management
and billing.
Que 1.17. Explain the air interfaces or radio interfaces
along
with logical channel structure used in GSM.
Answer
Air interfaces or radio interfaces :
1. U :U, interface connects MS to BTS. It contains all mechanism
necessary for wireless transmission.
2. A:e : This interface connects a BTS to a BSC. The A;. interface
carries traffic and maintenance data. It is specified by GSM and to be
standardized for all manufacturers.
3. A :The interface between BSC and MSC is called the A interface,
which is standard within GSM. The A interface uses an SSP (standard
signaling protocol) which support communication between MSC and
BSC. The A interface allows a service provider to use base station and
switching equipment made by different manufacturers.
4. O:0' interface connects OMS to BSC to MSC. It connects NSS to
OSS. By using O interface OMC monitors and controls all network
entities.
Logical channels and frame structure :
1 The GSM standard distinguishes between physical channels and logical
channels.
2. Logical channels carry user speech or data.
35 (IT-8) J
Mobile Computing
3. Data or signaling messages can travel over different physical channels.
4. Logical channels can be
a. Traffic channels carrying user speech or data
i. The full rate channel(TCHFS) has a net rate of 13 kbit/s.
The half rate channel (TCHHS) has been under discussion
for a long time.
ii. TCHF9.6, 4.8 and 2.4 provides data and fax communication
at 9.6,4.8 and 2.4 kbit/s respectively. The data occupies a full
channel, but the strength or error protection differs.
iv. TCHH4.8 and 2.4 carry dataover a half rate channel.
b Control channels carrying network messages. Broadcast channels
apply only to communication from base station to mobile.
i Broadcast Control Channel (BCCH)
Frequency Correction Channel (FCCH)
ii. Synchronization Channel (SCH)
Common Control Channels (CCCH) support the set-up of a link
between mobile terminal and base station.
The Random Access Channel (RACH) allows random access
by the terminals to initiate a call set-up.
The base station can initiate a call using the Paging Channel
(PCH).
ii. The base station informs mobiles about which channel to
use through the Access Grant Channel (AGCH).
d Dedicated Control Channels (DCCH) carry control messages
between network and mobile.
The Standalone Dedicated Control Channel (SDCCH) is mainly
for transfer of signalling between mobile and base station.
The Slow Associated Control Channel (SACCH) is mainly
used for message to maintain a link.
iii. The Fast Associated Control Channel (FACCH) is similar to
the SDCCH but has more data capacity. This is particularly
needed whenever the mobile makes a handover from one
cell to another.
5. The base station can accommodate these logical channels onto radio
carriers in many different ways.
Que 1.18. Discuss the architecture of GSM. Also explain the security
issues to implement GSM. UPTU2011-12, Marks 05
UPTU2015-16, Marks 10
36 (IT-8) J
Introduction
Answer
GSM architecture: Refer Q. 1.16, Page 30J, Unit-1.
Security issues to implement GSM: GSM security is addressed in two
aspects : authentication and encryption. Authentication avoids fraudulent
access by a cloned MS. Encryption avoids unauthorised listening.
1. Asecret key, K,, is used to
achieve authentication.
2. K is stored in the AuC as well as in the SIM.
3 The K, value is unknown to the subscriber.
4. To initiate the authentication process, the home system of the MS
generates a 128-bit random number called RAND.
5 This number is sent to the MS.
6 By exercising an algorithm, A3, both the network (AuC) and the MS
(SIM) use K and RAND to produce a signed result (SRES), as shown
in Fig. 1.18.1.
MS Home system
RAND
K K,
A8 A3 A3 A8
reject
no
SRES equal>SRES
yes |K|
accept
Authentication
Encryption
Visited system
|K Frame number
data
A5 |A5
data
Ciphering Deciphering
Ciphered
information
data* Deciphering Ciphering data*|
Answer
Location management : Location management in GSM is performed
with the help of two database :Home Location Register (HLR) and Visitor
Location Register (VLR).
1. Home location register (HLR):
a The HLR represents a centralized database that has the semi
permanent mobile subscriber information about the mobile
subscribers.
b It is referenced using the SS7 signaling capabilities for every
incoming call to the GSM network for determining the current
location of the subscriber.
C The HLR is kept updated with the current locations of all its
mobile subscribers, including those who may have roamed to
another network operator within or outside the country.
38 (IT-8) J
Introduction
d The routing information is obtained from the
call-by-call basis, so that for each incoming callserving VLR on a
the HLR queries
the serving VLR for an MSRN.
e. Usually one HLR is deployed for each GSM network for
administration of subscriber configuration and service.
f. The HLR maintains the following subscriber data on a
basis : permanent
International mobile subscriber identity (IMSI)
i. Service subscription information
ii. Service restrictions
iv. Supplementary services
V.
Billing/Accounting information
vi. Mobile terminal characteristics
2. Visitor location register :
a The VLR represents a temporary database store, and generally
there is one VLR per MSC.
b This register contains information about the mobile subscribers
who are currently in the service area covered by the MSC of
VLR, but whose home location registers (HLR) is elsewhere.
C When a mobile subscriber roams away from his home locations
and into a remote location, SS7 message are used to obtain
information about the subscriber from the HLR, and to createa
temporary record for the subscriber in the VLR.
d. VLRalso contains information like call forwarding on busy.
e. The temporary subscriber information resident in a VLR includes:
Features currently activated
ii. Temporary mobile station identity (TMSI)
iii. Current location information about the MS (for
example,
location area and call identities).
4. Inter-MSC handover:
a. Ahandover occurs between two cells belonging to different MSCs.
b. Here both MSCs perform the handover.
(i) (iii)
(iv)
MSC MSC
BS1
Mobile
Fig.1.20.2.
41 (IT-8)J
Mobile Computing
7 In Fig. 1.20.2, handoff may begin when the signal strength at the
mobile received from base station 2 (BS2)is greater than that of base
station 1 (BS1).
8 The signal strength measures are signal level averaged over a chosen
amount of time.
9 This average is based on the environment in which the cellular network
resides.
i.e., the
10. Now a major problem with this approach is handoff decision,
received signals of both base station often fluctuate.
cause
11. When a mobile exist between the base stations, the effect is to
the mobile to widely switch links with any of the base station.
back and forth.
12. The base station bounces the link with the mobile
This phenomenon is called "Ping-Ponging".
Soft handoff :
is retained
1 A soft handoff is one in which the channel in the source cell
and used for awhile in parallel with the channel in the target cell.
established before the
2 In this case the connection to the target is
connection to the source is broken.
3
Soft handoff refers to the overlapping of repeater coverage zones, so
least
that every cell phone set is always well within the range of at
one base station.
receive signals
4. In some cases, mobile sets transmit signals to, and
from, more than one base station at a time.
WCDMA
5 Soft handover refers to a feature used by the CDMA and
connected two or
standards, where a cell phone is simultaneously
more cells during a call.
Process of intra-MSC handoff :
BTS from
1 Each MSsends its periodic measurement reports to the
which it is connected at the moment, denoted by BTS,d:
reports
2. BTS.,, forwards these reports along with its own measurement
to the current BSC denoted by BSCold:
3. After analyzing reports and current traffic scenario, the old takes
BSCta
the decision for a handover.
required.
4. BSCala sends a request to the MSC that a handover is
denoted by
5. MSC forwards a handover request to the target BSC,
BSCnew required like the frequency
6. The BSC,'new checks for the resources
available then it activates a new
channel and time slot etc. and ifit is
channel in the new BTS for a MS.
acknowledgement
7. When the channel gets activated, the BTSey Sends an
to the new BSC.
42(IT-8)J Introduction
MS
BTS,ad
Measurement
BSCld MSC BSCnew BTS.new
report
Measurement
report
HO decision
HO required
HO required
Resource allocation
ch. activation
Answer
control layer
Various multiple access protocols worked on media access
are as follows:
1. SDMA:
a
a. Space Division Multiple Access (SDMA) is used for allocating
separated space to users in wireless networks.
b Atypical application involves assigning an optimal base
station to
a mobile phone user.
with different
C. The mobile phone may receive several base stations
quality.
d. AMAC (Media Access Control) algorithm could now
decide which
base station is best, taking into account which frequencies (FDM),
available.
time slots (TDM) or code (CDM) are still
combination
e. Typically, SDMA is never used in isolation but always in
with one or more other schemes.
f. The basis for the SDMA algorithm is formed by cells and sectorized
antennas which constitute the infrastructure implementing space
division multiplexing (SDM).
2. FDMA :
124
960 MHz
395.2 MHz 1
200 KHz
915 MHz 124 1 20 MHz
1
890.2 MHz
3 TDMA :
flexible
a. Time Division Multiple Access (TDMA)offers a much more
certain
scheme, which comprises all technologies that allocate
time slots for communication, i.e., controlling TDM.
b.
Now tuning into a certain frequency is not necessary, i.e., the
receiver can stay at the same frequency the whole time.
C. Listening to many channels separated in time at the same frequency
same
is quite simple but listening todifferent frequencies at the
time is quite difficult.
to be
d. Now synchronization between sender and receiver has
achieved in the time domain.
e. Again thiscan be done by using a fixed pattern similar to FDMA
techniques, i.e.,allocating a certain time slot for a channel or by
using a dynamic allocation scheme.
f The simplest algorithm for using TDM is allocating time slots for
channels in a fixed pattern.
This results in a fixed bandwidth and is the typical solution for
wireless phone systems.
h. Fixed patterns guarantee a fixed delay, one can transmit.
i Assigning different slots for uplink and downlink usage the same
frequency is called time division duplex (TDD)".
417 us
I2311212B112
Downlink Uplink
Answer
Comparison of SDMA, TDMA, FDMA and CDMA:
SDMA :
i. Idea : Segment space intocells/sectors.
ii. Terminals : Only one terminal can be active in one cellone sector.
iii. Signal Separation : Cell structure directed antennas.
iv. Advantages: Very simple, increase capacity per km2.
V. Disadvantages : Inflexible, antennas typically fixed.
vi. Comment:Only in combination with TDMA, FDMA or CDMA useful.
TDMA :
Idea: Segment sending time into disjoint time-slots, demand driven
or fixed patterns.
46 (IT-8) J Introduction
ii. Terminals : All terminals are active for short periods of time on the
same frequency.
iii. Signal Separation : Synchronization in the time domain.
iv. Advantages : Established, fully digital, very flexible.
v. Disadvantages : Guard space needed, synchronization difficult.
vi. Comment : Standard in fixed networks, together with FDMA/SDMA
used in many mobile networks.
FDMA:
i. Idea : Segment the frequency band into disjoint sub-bands.
i. Terminals : Every terminal has its own frequency, un-interrupted.
iii. Signal Separation : Filtering in the frequency domain.
iv. Advantages : Simple,established, robust.
V. Disadvantages : Inflexible, frequencies are a scarce resource.
vi Comment : Typically combined with TDMA and SDMA.
CDMA :
6. GPRS has the ability to offer data speeds of 14.4 kbps to 171.2 kbps
which allow for comfortable internet access.
7. It allows for short "bursty" traffic, such as e-mail and web browsing as
well as large volume of data.
8. For GPRS, no dial-up modem connection is necessary.
9. It offers fast set-up mechanism to offer a perception of being "always
on".
GPRS architecture :
i. GPRS uses the GSM architecture for voice.
In order tooffer packet data service through GPRS, a new class of
network nodes need to be introduced as an upgrade to existing GSM
network.
ii. These network nodes are called GPRS support nodes (GSN).
iv. GPRS support nodes are responsible for the delivery and routing of
data packets between the mobile stations and the external packet
data network (PDN).
There are two types of support nodes : SGSN (Service GSN) and
GGSN (Gateway GSN):
Telephony
HPcu) BSC MSC
Network
Base (HLR
Station
and
Tower
SGSN GGSN Www
GTP
|Corporate
LAN
C It also confirms user details with radius servers for security, which
are usually situated in the IP network and outside of the GPRS
network.
Answer
a.
Applications of GPRS: There are many applications suitable for
GPRS. Many of them are of generic type, some of them are specific
to GPRS:
1. Generic applications :Generic application are applications like
information services, internet access, e-mail, web-browsing, which
are very useful.
2. Chat : Chat is a very popular service in internet and GSM.
3. Multimedia service : Multimedia objects like photographs, pictures,
post cards, greeting cards and presentations; static web pages can be
sent and received over the mobile network.
Answer
Answer
1 HSCSD is connection-oriented whereas GPRS is fully packet oriented
in which data transfer for applications that exhibit trafficpatterns
such as frequent transmission of small volumes or infrequent
transmissions of small or medium volumes according to the requirement
specification.
2. As compared to HSCSD, GPRS should use the existing network
resources more efficiently for packet node applications and should
provide a selection of QoS parameters for the service requesters.
3 Network providers typically support GPRS by charging on volume
and not on connection time as in HSCSD.
4. Unlike HSCSD, GPRS does not only represent a software update to
allow for the bundling of channels, it also
represents a big step
toward UMTs as the main internal infrastructure needed for UMTS
is exactly what GPRS uses.
53 (IT-8)J
Mobile Computing
Answer
sequence will
When 0 bit is transmitted using CDMA system, then the
be :
=(+1, + 1, + 1, -1, -1, + 1,-1,- 1)
B =(+1, +1, - 1, + 1, -1, - 1, -1, + 1)
=(+1, - 1, + 1, -1, -1, + 1, + 1, + 1)
On adding A, B, C, we get resulting chip sequence,
= (+3, + 1, -1, -3,+ 1, - 1, + 1)
system, then the resulting chip
When 1 bit is transmitted using CDMA
sequence will be:
=(-3, -1,- 1, + 1, +3, - 1, + 1, -1)
(56J - 84J)
Part-1
Wireless Networking
Wireless LAN Overview:
MACIssues
IEEE 802.11
Bluetooth
Wireless Multiple Access Protocols
56J
A. Concept Outline : Part-1 Questions 56J
B. Long and Medium Answer Type
(84J- 103J)
Part-2 ....
TCP over Wireless
Wireless Applications
Data Broadcasting
Mobile IP
WAP:Architecture
Protocol Stack
Application Environment
Application
.84J
A. Concept Outline: Part-2....Questions 84J
B.Long and Medium Answer Type
55 (IT-8) J
56 (IT-8)J
Wireless Networking
PART- 1
Wireless Networking, Wireless LAN Overview : MAC Issues,
IEEE 802.11, Bluetooth, Wireless Multiple Access Protocols.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
C.
Ifimproperly secured, an individual could access the network from
a location near the practice using scanning software to identify
available network.
59 (IT-8) J
Mobile Computing
2. Installation difficulties :
Because wireless network are so commonly used, you may find
that other wireless networks setup in your medical building interfere
with your wireless signal.
b There are a limited number of channels and if the incorrect channel
is used, you may end up with inconsistent network connection or
no network connectivity at all.
Signal stability :
Users can experience black spots within the coverage range where
the wireless signal has difficulty passing through certain building
materials or if the area has significant radio interference.
b. Users may need to do some experimenting to obtain optimal signal
stability.
4. Speed:
a. While wireless networks are faster than dial-up connection, the
average speed tends to be slower than an ethernet connection as
an issue to be considered if you or your organization will be relying
solely on a wireless network.
Que 2.3. Give the brief discussion on wireless LAN. What are the
advantages and disadvantages of WLAN ?
Answer
Wireless LAN:
1 Awireless LAN is linking of two or more computer or devices using
spread spectrum or OFDM modulation.
2 WLAN are typically restricted in their diameter to buildings, college
campus, single rooms ete. and are operated by individuals, not a large
scale network providers.
3. The global goal of WLAN's is to replace office cabling, to enable access to
the internet and, to introduce a higher flexibility for adhoc communication
in public places and grOup meetings.
4 The wireless LAN technology is based on IEEE 802.11 standard.
5. It is a member of IEEE 802 family, which is a series of specification for
LAN technologies.
6 The primary component of a WLAN is the wireless interface card that
has an antenna.
7. This interface card can be connected to the mobile unit as well as to fixed
network.
There are many products which used unlicensed ISM bands along with
WLAN,for example microwave over cordless phone etc.
9. There are three bands within the ISM bands.
60 (IT-8) J Wireless Networking
10. There are 900 MHz ISM band,which ranges from 902 to 928 MHZ, 2.4
GHz ISM bands which ranges from 2.4 to 2.4853 GHZ and 5.4 GHz band
which ranges from 5.275 to 5.85 GHz.
11. WLAN uses 2.4 GHz and 5.4 GHz band.
12. WLAN works both in infrastructure and adhoc mode.
Advantages of WLAN:
1. Flexibility :
Within radio coverage, nodes can communicate without further
restriction.
b. As radio waves can penetrate walls, so senders and receivers can
be placed anywhere.
2. Planning :
a. Wireless adhoc networks allow for communication without previous
planning, any wired network needs wiring plan.
b As long as devices follow the same standard, they can communicate.
3. Design :
a. Wireless networks allow for the design of small, independent devices
which can be put into a pocket.
b For example : small PDAs,notepads, mobile phones etc.
4. Robustness :
a Wireless networks can survive disasters. For example, earthquakes,
floods or users pulling a plug.
b If the wireless devices survive, people can still communicate.
C Networks requiring a wired infrastructure will usually breakdown
completely.
5. Cost:
After providing wireless access tothe infrastructure via an access
point for the first user, adding additional users to a wireless network
will not increase the cost.
Disadvantages of WLAN:
1. Quality of Service :
WLANs typically offer lower quality than their wired counterparts.
b. The main reasons for this are the lower bandwidth due to
limitations in radio transmission, (for example, 1-10 Mbps user data
rate instead of 100-1000 Mbps), higher error rates due to interference
and higher delay due to extensive error correction and detection
mechanisms.
2, Restrictions :
a All wireless products have to comply with national regulations.
Several government and non-government institutions worldwide
Mobile Computing 61 (IT-8) J
Que 2.5. Describe the basic transmission that can be used to set
up WLAN.
62 (IT-8)J Wireless Networking
Answer
There are two basic transmission technologies that can be used to set up
WLAN:
1. Infrared technology :
a. This technology uses diffuse light reflected at walls, furniture or
directed light if a line-of-sight (LOS)) exists between sender and
receiver.
b. Senders can be simple light emitting diodes (LEDs) whereas
photodiodes can act as receivers.
Advantages of infrared technology :
1. It is simple and extremely cheap.
2. Most of the devices have an infrared data association (IrDA)
interface.
3. No licenses are needed for infrared technology and shielding
is very simple.
4. Electrical devices do not interfere with infrared transmission.
Disadvantages of infrared technology :
1 Low bandwidth compared to other LAN technologies.
2 Infrared data association devices are internally connected to a
serial port limiting transfer rates to 115 kbit/s. This is not a
high data rate.
3. One of the main drawbacks of infrared is that it can be easily
shielded.
4. Infrared transmission cannot penetrate walls or other obstacles.
2. Radio transmission :It includes long-term experiences made with
radio transmission for wide area networks and mobile cellular phones.
Advantages of radio transmission :
1 It can cover larger areas.
2 It can penetrate walls, furniture, plants etc.
3 It does not need line-of-sight (LOS) if the frequencies are not too
high.
4 Radio based products have higher transmission rates. For example,
54 Mbit/s, 100 Mbit/s.
Disadvantages of radio transmission :
1. Radio transmission can interfere with other senders.
2 Electrical devices can destroy data transmission via radio.
3. Radio transmission is only permitted in certain frequency bands.
4 Very limited ranges of license-free bands are available worldwide.
Mobile Computing 63 (IT-8) J
Que 2.6. What the various types of WLAN ? List the various
applications of wireless LAN.
Answer
Types of WLAN:Thereare different types of WLAN's.Some of the most
popular ones are :
1. IEEE 802.11:
In June 1997, IEEE finalized the initial specification for WLAN's:
IEEE 802.11.
b. This standard specifies a 2.4 GHz frequency band with data rate of
1Mbps and 2 Mbps.
Today, these standards offer a local area network of bandwidth
going upto a maximum of 54 Mbps.
2, Hyper LAN:
Hyper LAN begins in Europe in 1996 by EISI broadband radio
access network group.
b. Hyper LAN/1 the current version works at the 5 GHz band and
offer upto 24 Mbps bandwidth.
C Next version Hyper LAN/2 will support a bandwidth of 54 Mbps
with QoS support.
d This willbe able to carry Ethernet frames, ATM cells, IP packets
and support data,video, voice and images.
3. Bluetooth :
Bluetooth was named after Harold Bluetooth, King of Denmark
during 952 to 995 AD, who had a vision of a world with cooperation
and interoperability.
b It is now promoted by many big industry leaders like lBM, Ericsson,
Intel, Microsoft, Nokia etc.
C. Bluetooth is a wireless personal area network (PAN) operating at
2.4 GHz band and offers 1 Mbps data rate.
d. It uses frequency hopping spread spectrum (FHSS) modulation
and offers 1Mbps and 2 Mbps at 2.4 GHz frequency band.
4. MANET : Manet is a working group within the IETF to investigate and
develop the standard for mobile adhoc networks.
Various applications of wireless LAN are:
1. Office/campus environment
2 Home
3 Public places
4 War/Defense sites
64 (IT-8) J Wireless Networking
Que 2.7. Give the brief discussion on MAC layer. Why the
specialized MAC is needed for wireless LAN ?
Answer
Medium Access Control (MAC) layer:
1 Medium access control layer controls medium access through the user.
2 It also supports roaming, authentication and power conservation.
3. The basic services provided by the MAC layer are the mandatory
asynchronous data service and an optional time bounded service.
4. The asynchronous service supports broadcast and multicast packet and
packet exchange is based on a "best effort" model.
Need for specialized MAC:
1. The MAC algorithms used in wired network often fail in wireless
network due tO some reasons.
2. One of the commonly used algorithm for wired networks is CSMA/CD
which worksas follows :Ifa sender wants to send something, it sends as
soon as the medium is free, it listen into the medium if a collision occurs
it stops sending and sends a jamming signal.
3. Now, in case of wireless network this scheme fails, as in wireless network
the signal strength decreases proportional to the square of the distance.
4. Now when the sender would apply CS (Carrier Sense) and CD (Collision
Detection) if a collision occurs at the receiver it might be the case that a
sender cannot "hear" the collision due to weakening of the signal, i.e.,
CD does not further move, CS might not work. For example, a terminal
is hidden".
5. Collision detection in wireless is a difficult task as the magnitude of the
signal varies with distance.
Answer
Cellsplitting : Refer Q. 1.10, Page 19J, Unit-1.
Near and far problem :
This situation often occurs in wireless networks. Consider the scenario
1.
in Fig. 2.9.1.
A B C
A B
Fig. 2.9.2. Hidden node problem.
4 Such terminals like Aand C are called hidden terminals. These types of
terminals cause collision.
5 Another effects is there known as exposed terminals which cause
unnecessary delay.
6 The situation is as follows:
a Suppose B sends something to A and C wants to send data to some
another terminal (not A or B) which is outside the interference
range of A and B.
b. Csenses the channel but finds it busy (due to B's transmission), so
Chas to wait.
C
But A is outside the radio range of C, therefore, waiting is not
necessary.
d This is known as C is exposed" toB.
Que 2.10. Explain the MACA (Multiple Access with Collision
Avoidance). How are hidden node and exposed node problems
addressed in MACA ?
Mobile Computing 87 (IT-8)J
Answer
MACA (Multiple Access Collision Avoidance) : MACA is proposed as an
alternative to traditional CSMA. It presents a simple scheme that solves the
hidden terminal problem.
In MACA:
1. CSMA senses the state of the channel only at the transmitter.
a. Lead to hidden node problem.
2 Does not use carrier sensing.
b. Nodes start transmitting after a random backoff.
3 MACAuses RTS and CTS to overcome hidden node problems and exposed
node problems.
a. Node which only hears CTS (but no RTS), stop from transmitting
(hidden node).
b. Node which only hears RTS (but no CTS), is transmit (exposed
node).
C.
RTS and CTS carry the expected duration of data transmission.
4. When there is a collision, it uses binary exponential backoff (BEB)
before retrying.
where RTS stands for request to send
CTS stands for clear to send.
is
Packet transmission in MACA: The packet transmission in MACA
shown in Fig. 2.10.1
Neighbour Sender Receiver Neighbour
RTS RTS
CTS CTS
DATA
DATA
RTS
CTS
CTS
A B
Fig. 2.10.2.
Avoidance of exposed terminal problem using MACA: MACA avoid
the problem of exposed terminal as follows:
1 With MACA, B has to transmit an RTS first containing the name of
the
receiver (A) and the sender (B).
2. C does not react to this message as it is not the
receiver, but A
acknowledges using a CTS which identifies Bas the sender andA as the
receiver of the following data transmission.
3. C does not receive this CTS and concludes thatA is outside the
detection
range. Ccan start its transmission assuming it will not causea collision
at (A).
4. The problem with exposed terminals is solved without fixed access
patterns or a base station.
RTS
CTS
CTS B
Answer
IEEE 802.11 standards: The WLAN technology is defined by the IEEE
802.11 standards. There are currently four specifications in a family :
1. IEEE &02.11:
a. Applied to wireless ILAN's and provides l or 2Mbps transmission.
b. It uses the 2.4 GHz ISM band. It includes infrared communication
also.
C. It uses either frequency hopping spread spectrum (FHSS) or direct
sequence spread spectrum (DSSS).
2. IEEE 802.1la:
a. It is an extension to 802.11 that applies to wireless LAN's and provide
upto 54 Mbps in the 5 GHz band.
b. 802.1la uses an orthogonal frequency division multiplexing (OFDM)
encoding scheme.
C. The protocol also supports data rates of 6, 9, 12, 18, 24, 36 and 48
Mbps.
d. The 802.11a specifications is applied to wireless ATM systems and is
used to access hubs.
3. IEEE 802.11b:
a It is also referred to as 802.11 high rate or Wi-Fi.
b This standard uses DSS and uses 2.4 GHz ISM band and provides
maximum data rate of 11 Mbps and with fall back to 5.5 Mbps.
4. IEEE 802.11g:
a. It offers wireless transmission over relatively short distances at
20.54 Mbps in the 2.4 GHz band.
b. The 802.1lg also uses the OFDM encoding scheme.
C It uses the data rates of 6, 9, 12, 18, 24, 36 and 48 Mbps.
d. It provides compatibility with 802.11b equipment.
Que 2.12. With neat sketch, explain architecture of 802.11 LAN
and explain its MAC logic. UPTU2012-13, Marks 05
OR
Draw and define 802.11 protocol stack regarding the following
points :
i. Physical layer
ii. Mac sub layer protocol
iii. Frame structure UPTU2013-14, 2014-15; Marks 05
70 (IT-8) J
Wireless Networking
Answer
Protocol architecture of IEEE 802.11:
1 IEEE 802.11 fits seamlessly into the other 802.x standards for
wired
LANs as shown in Fig. 2.12.1.
2 This is most common scenario where an IEEE 802.11 wireless LAN
connected to a switched IEEE 802.3 ethernet via a bridge.
3 The higher layers (application, TCP, IP) look the same for wireless
nodes as for wired nodes.
4 The upper part of the data link control layer, the logical link control
(LLC), covers the differences of the medium access control layers needed
for the different media.
5. In many of today's networks, no explicit LLC layer is visible.
Mobile terminal Access point Infrastructure Fixed
network terminal
Application Application
TCP TCP
IP IP
LLC LLC
LLC
802.11 MAC 802.11 MACI 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
3 Signal :
data rate
a. Two values have been defined for the field to indicate the
of the payload. The binary value in this field is equal to the data
rate multiplied by 100 kbit/s.
4 Service: This field is reserved for future use.
5. Length: 16 bits are used for length indication of the payload in
microseconds. The MAC layer uses this field to determine the end of the
frame.
6. Header Error Check (HEC):
Signal, service and length fields are protected by this checksum
using the ITU-T CRC-16 standard polynomial.
b. The CRC-16 algorithm is represented by the following polynomial :
Gx) = xl6 4 x12 + x + x.
3. Infrared:
The PHY layer based on infrared uses visible light at 850-950 nm.
b. It does not require LOS between the sender and receiver, but
should also work with diffuse light.
C. This allows for point-to-multipoint communication.
d The infrared PHY operation is restricted to indoor environments
within the range of 10 m.
Frame of IEEE 802.11 PHY frame using infrared: It is shown in
Fig. 2.12.5.
74 (IT-8) J Wireless Networking
5773 slats 4 slots 3 slots 32 slots 16 slots 18 bit
Synchronization SFD Data rate D, level Length CRC PSDU
PIFS
DIFS
Medium SIFS
busy |Contention Next frame
Direct access if medium is free > DIFS
Fig. 2.12.6. Medium access and inter-frame spacing.
h. Short inter-frame spacing (SIFS) : The shortest waiting time
for medium access (so the highest priority) is defined for short
control messages, such as acknowledgements of data packets.
PCF inter-frame spacing (PIFS) :A waiting time between DIFS
and SIFS (and thus a medium priority) is used for a time-bounded
service. PIFS is defined as SIFS plus one slot time.
DCF inter-frame spacing(DIFS):This parameter denotes the
longest waiting time and has the lowest priority for medium access.
Mobile Computing 75 (IT-8) J
various
Que 2.13. Write short note on bluetooth. Also discuss the
applications of bluetooth.
Answer
Bluetooth :
data
1 Bluetooth is an open wireless technology standard for exchanging
transmission) from
over short distances (using short wavelength radio with
fixed and mobile devices, creating personal area networks (PANs)
high levels of security.
2 It was formed by 5 companies in 1998.
3 They are Ericsson, Intel, IBM, NOKIA and Toshiba.
bluetooth
4 The bluetooth specifications are developed and licensed by the
Special Interest Group (SIG).
5 Bluetooth SIG worked together to develop an integrated voice/data
images.
10th
6 Bluetooth is named after King Harold Gormsen who was born in
century in United Denmark and Norway.
Features of bluetooth :
1 Robustness
2 Low complexity
76 (IT-8) J
Wireless Networking
3 Low power
4 Low cost
Characteristics of bluetooth:
1. Bluetooth operates in unlicensed ISM band at 2.4 GHz (2400-2483.5
MHz).
2 The range of bluetooth device is power class dependent : 1 meter,
10 meter, 100 meter.
3 Devices connected using bluetooth frequency link forms a piconet.
Classes of bluetooth:
Class Maximum permitted Range (Approximate)
power m W
(dBm)
Class 1 100 mW (20 dBm) -100 meter
Class 2 2.5 mW (4 dBm) -10meter
Class 3 1 mW (0 dBm) -1 meter
Applications of bluetooth :
1 Wireless control and communication between a mobile phone and a
hands-free headset.
2 Wireless communication between PC's input and output devices. For
example mouse, keyboard and printer.
3 Transfer of files between devices with OBEX.
4 Replacement of traditional wired serial communication in the test
equipment, GPS receivers, medical equipment, barcode scanner and
trafficcontrol devices.
5 Dial-up internet access on personal computers or PDA's using a data
capable mobile phone as a modem.
6 Wireless bridge between two industrial ethernet networks.
7 Allowinga DECT phone to ring and answer calls on behalf of a nearby
cellphone.
8 For low bandwidth applications where higher USB bandwidth is not
required and cable-free connection desired.
Que 2.14. Discuss the advantages and limitations of bluetooth.
UPTU2011-12, Marks 10
Answer
Advantages of bluetooth :
1. Bluetooth does not require a clear line of
sight between the synced
devices.
Mobile Computing 77 (IT-8) J
2. This means that the devices need not be facing each other, and it is also
possible tocarry out transfers when both the devices are in separate
rooms.
3. The fact that this technology requires no cables and wires is something
that has made it so popular.
4 The maximum range that it offers is 100 meters, but this range is not
the same for all similar connections.
5. It depends on the nature of the devices and the version that they operate
upon.
6. The processing power and battery power that it requires in order to
operate is very low.
7. This makes it an ideal tool for so many electronic devices, as the technology
can be implemented pretty much anywhere.
8 One major advantage is its simplicity of use. Anyone can figure out how
toset up aconnection and synctwo devices with ease.
9 Moreover, the technology is completely free to use and requires no
charges to be paid to any service provider.
Disadvantages of bluetooth :
1. Though the transfer speeds are impressive at around 1Mbps, certain
other technologies like infrared can offer speeds upto 4 Mbps.
2 Even though the security is good, it is even better on infrared.
3 This is because of the comparatively larger range of bluetooth and also
the lack of a line of sight.
4. Someone who knows how to hack such networks can do so eventually.
5 The battery usage duríng a single transfer is negligible, but there are
some people who leave the device switched on in their devices.
M= Master
S = Slave
P =Parked
P SB = Standby
M
SE
Answer
Bluetooth: Refer Q. 2.13, Page 75J, Unit-2.
Architecture of bluetooth:Refer Q. 2.15, Page 77J, Unit-2.
Bluetooth protocol stack:
1 Bluetooth is defined as a layered protocol architecture consisting of core
protocols, cable replacement protocols, telephony controlprotocols and
adapted protocols.
2 Asimple bluetooth protocols stack is shown in Fig. 2.16.1.
Audio apps. |NW apps.vCallvCard Telephony apps. |Management apps.
|TCP/UDP OBEX
IP AT modem
commands TCS BIN SDP Control
BNEP PPP
Radio
Answer
Bluetooth: Refer Q. 2.13, Page 75J, Unit-2.
Functions of different layer of protocol stack : Refer Q. 2.16,
Page 79J, Unit-2.
Mobile Computing 83 (IT-8)J
Bluetooth profiles :
1. Application designers and vendors can implement similar services in
many different ways using different components and protocols from the
bluetooth core standard.
2 To provide compatibility among the devices offering the same services,
bluetooth specified many profiles in addition to the core protocols.
3 Without the profiles too many parameters in bluetooth would make
interoperation between devices from different manufacturers almost
impossible.
4. Profiles represent default solutions for a certain usage model.
5 They use a selection of protocols and parameter set toform a basis for
interoperability.
6. Protocols can be seen as horizontal layers while profiles are vertical
slices.
7. The basicprofiles have been specified :generic access, service discovery,
cordless telephony, intercom, serial port, headset, dial-up networking,
fax, LAN access,generic object exchange, object push, file transfer and
synchronization.
8 Additional profiles are : advanced audio distribution, PAN, audio video
remote control, basic printing, basic imaging, extended service discovery,
hands-free and hardcopy cable replacement.
9. Each profile selects a set of protocols.
10. For example, the serial port profile needs RFCOMM, SDP, LMP, and
L2CAP. Baseband and radio are always required.
Protocols
| Applications
Profiles
Fig. 2.17.1. A digital controller.
protocol
Que 2.18. Write short note on wireless multiple access
(WMAP).
Answer
Multiple access protocol :
1 If many users share a channel and two
or more userstransmit packets
simultaneously, collision may occur.
84 (IT-8) J Wireless Networking
2. To avoid the collision, we need access protocol.
3. There are various multiple access protocols used in wireless
communications.
4. On the basis of characteristics, multiple access protocol are categorized
as follows :
Multiple access protocol
Aloha r-Aloha
-SDMA Polling
-FDMA Slotted aloha
-TDMA CSMA
-CDMA Token passing ISMA -PRMA
Seheduled access protocol: By adjusting each user's transmitting
time and frequency, it avoids simultaneously data transmission
between two or more users.
b. Random access protocol :Although collision occurs because two
or more users access a channel simultaneously, collision can be
reduced.
PART-2
Questions-Answers
Long Answer Type and Medium Answer Type Questions
85 (IT-8) J
Mobile Computing
Answer
TCP over wireless :
internet.
1 TCP is the primary transport protocol in the
transfer between hosts connected
2 It is designed to provide reliable data
by a series of wired routers.
transmission protocol.
3 TCP is a connection-oriented and reliable
overflows on both sender and receiver
4 It uses flow control to avoid data
side.
TCP working : the packets, it may
1 When the application requires reliable transport of
use TCP.
wireless link.
2 TCP requires several packets over the
the connection.
3 First TCP uses a three-way handshake to establish
transmission of the request
4 At least one additional packet is needed for connection.
and requires three more packets to close the
5. It is explained with the help of Fig. 2.19.1.
Server
Client
TCP SYN
TCP SYN/ACK
Connection setup
TCP ACK
HTTP request Data transmission
HTTP response
15 no data
GPRS: B00 m8
Connection
release
Answer
Anumber of inherent characteristics of wireless media affect TCP
performance including :
87(IT-8) J
Mobile Computing
1. Channel losses :
a. Signals carried by wireless media are subject to significant
interference from other signals, and subsequently, losses due to
modification of bits while frames are being transmitted.
b TCP performance is affected by the frequent losses
occurring at
occur due
the link layer, because TCP inherently assumes all losses
algorithms upon
to congestion and invokes the congestion control
detecting any loss.
2. Low bandwidth :
sometimes
a. Bandwidth of wireless links may be low, which can
station.
result in excessive buffering at the base
b. This could lead to packets being dropped at the base station, or
transmitted back toback on the wirelesslink, which in turn results
in high observed round trip times.
occurs when a wireless host is mobile.
3. Signal fading: Fading typically
4
Movement across cells :
connection handoff.
a. Mobility of a wireless host involves addressing
that has to be handed off, the base
b In addition to the link layer state
about the transport layer
station may maintain connection state
which might need to be handed off.
5. Channel asymmetry :
asymmetric.
a. Resolving channel contention is usually
sending entity gets more transmission time than the receiving
b The
entity.
acknowledgements being queued for
C. This could lead to TCP receiving entity and sent back
transmission at the link layer of the
permitted.
to back when channel access is TCP
can lead to larger round trip times measured by the
d. This subsequently reduces the
sender and to bursty traffic, which
throughput of the TCP connection.
when such
may exhibit high latencies andobserved
Link latency: Wireless links by
6
significant fraction of the total round trip times
delays are a of TCP are set to high values,
which
TCP, the retransmission time outs
subsequently affects TCP performance.
2.21. Write a short note on TCP congestion control.
Que
Answer
off in the slow start phase.
1. ATCP connection starts (cwnd).
start algorithm usesa variable called congestion window
2. The slow receiver
only send the minimum of cwnd and the
3. The sender can rwnd (for receiver flow
control).
advertised window which we call
88 (TT-8) J Wireless Networking
4. Slow start tries to reach equilibrium by opening up the window very
quickly.
5. The sender initially sets cwnd to 1, and sending one segment. (MSS is
the maximum segment size.)
6. For each ACK that it receives, the cwnd is increased by one segment.
7. Increasing by one for every ACK results in exponential increase of
cwnd over round trips.
8. TCP uses another variable ssthresh, the slow start threshold.
9. Conceptually, ssthresh indicates the right window size depending on
current network load.
10. The slow start phase continues as long as cwnd is less than ssthresh.
11. As soon as it crosses ssthresh, TCP goes into congestion avoidance.
12. In congestion avoidance, for each ACK received, cwnd is increased by
Icwnd segments.
13. This is approximately equivalent to increasing the cwnd by one segment
in one round trip (an additive increase), ifevery segment is acknowledged.
14. The TCP sender assumes congestion in the network when it times out
waiting for an ACK ssthresh is set to max (2, min(cwnd1. 2, rwnd)
segments, cwnd is set to one, and the system goes to slow start.
15. Ifa TCP receiver receives an out of order segment, it immediately sends
back a duplicate ACK (dupack) to the sender.
16. The fast retransmit algorithm uses these dupacks to make
retransmission decisions.
17. Ifthe sender receives dupacks, it assumes loss and retransmits the lost
segment without waiting for the retransmit timer to go off.
18. It also updates ssthresh.
19. Fast recovery keeps track of the number of dupacks received and tries
to estimate the amount of outstanding data in the network.
20. It inflates cwnd (by one segment) for each dupack received, thus
maintaining the flow of traffic.
21. The sender comes out of fast recovery when the
segment whose loss
resulted in the duplicate ACKs is acknowledged.
22. TCP then deflates the window by returning it to
ssthresh, and enters
the congestion avoidance phase.
Que 2.22. Why does traditional TCP not perform well in
wireless
network? Discuss different approaches for TCP
improvement.
UPTU2014-15, Marks 05
Mobile Computing 89 (IT-8) J
Answer
Performance of TCP over wireless network : Refer Q. 2.20,
Page 86.J, Unit-2.
Different approaches for TCP improvement : The various models
proposed to improve TCP's performance over wireless networks are as follows :
1. Indirect TCP:
a. With I-TCP a transport layer connection between amobile host and
fixed host is established as two separate connections :
i. One over the wireless link and
The other over the wired link with a "mobile support router"
serving as the center point.
b Packets from the sender are buffered at the mobile support router
untiltransmitted across the wireless connection.
C. Ahandoff mechanism is proposed to handle the situation when the
wireless host moves across different cells.
d. Aconsequence of using I-TCP is that the TOCP ACKs are not end-to
end thereby violating the end-to-end semantics of TCP.
e. Indirect TCP or I-TCP segments the connection with no changes to
the TCP protocol for hosts connected to the wired internet, millions
of computers use (variants of) this protocol.
f. It uses an optimized TCP protocol for mobile hosts.
Hosts in the fixed part of the net do not notice the characteristics of
the wireless part.
Access point (foreign agent)
Wired
internet
Wireless TCP
Standard TCP
Mobile host
Fig. 2.22.1. I-TCP.
2. Snooping TCP:
a. One of the drawbacks of I-TCP is the segmentation of the single
TCP connection into twoTCP connections.
b This loses the original end to end TCP semantic.
C Snooping TCP works transparently and hence does not lose end to
end semantics.
The main function of the enhancement is buffering of packets
close to the mobile host to perform fast local retransmission.
e. Lost packets on the wireless link (both directions) will be
retransmitted immediately by the mobile host of foreign agent,
respectively (so called local" retransmission) the foreign agent,
90 (IT-8) J
Wireless Networking
therefore, "snoops" the packet flow and recognizes
acknowledgements in both directions.
f Data transfer to the mobile host in snooping TCP takes place as
follows : the Foreign Agent (FA) buffers data until it receives ACK
of the Mobile Host (MH), FA detects packet loss via duplicated
ACKs or time out and then fast retransmission possible, transparent
for the fixed network.
Local
Correspondent
retransmission Foreign host
agent
Wired
internet 3---:
Answer
links
The wired networks are relatively reliable as compared to the wireless and
and so TCP assumes congestion to be the main cause of any packet loss,
of a
(part
invokes congestion control measures at the source. Wireless links
heterogeneous network) bring some serious problems with them:
1. Bit Error Rate (BER):
Wireless hosts use radio transmission or infrared wave transmission
a.
for communication.
b.
The BER of wireless links is typically higher than that of wired
networks.
C.
Also the wireless environment changes quickly, and so the BER
also varies by a large amount.
d.
The bit error rates of 10 or worse are coinmon on wireless links.
2 Bandwidth :
a Wireless links offer very less bandwidth (2 Mbps) as compared to
the wired links (10-100Mbps).
b Optimum use of available bandwidth is a major issue in
heterogeneous networks that has to be taken care of.
3. Round TripTime (RTT):
a
The wireless media exhibits longer latencies than wired media in
the case of satellite networks.
b. It is almost the same as in wired networks since radio waves travel
at the speed of light which is same as the transmission speeds in
wired media.
C Since the bandwidth is lower in wireless networks a packet takes
longer to get transmitted in wireless networks.
d This affects overall throughput and increases interactive delays.
e. Different versions of TCP pour data in the network depending on
the incoming acknowledgements, which depends on RTT.
f Thus networks (especially WANs) with high bandwidth-delay
product are severely affected.
92 (IT-8) J Wireless Networking
4 Mobility:
a. Addition of mobile devices introduces huge amount of indeterminate
mobility in rather a stationary network.
b. This tends to introduce some amount of instability in existing
network topology.
C. Wireless hosts may move from one cell to another during handoffs.
d. During this movement the data sent to the wireless host by the old
base station is lost, since the mobile host has moved out of range.
e. Similarly, data sent by mobile host to the old base station is also lost
as it is out of range of the old base station.
5 Power consumption :
a. Mobile host has limited power and smaller processing capacity as
compared to base stations, which tend to introduce inefficiency in
the network.
b. Solutions that take power consumption into account have a clear
cut advantage over the otherwise designed solutions.
Que 2.25. Explain mobile IP. List the entities of mobile IP.
Answer
Mobile IP:
1 Mobile IP (or IP mobility) is standard communication protocol that is
designed to allow mobile device users to move from one network to
another while maintaining a permanent IP address.
2. The mobile IP protocol was developed by the Mobile-IP Internet
Engineering Task Force (IETF) working group.
3. This protocol allows location-independent routing of IP datagram's on
the internet.
4. Each mobile node is identified by its home address disregarding of its
current location in the internet.
5 While away from its home network, a mobile node is associated with a
care-of-address which identifies its current location and its home address
is associated with the local end point of a tunnel to its home agent.
Wireless Networking
94 (IT-8) J
with its home agent and
6 Mobile IP specifies how a mobile node registersmobile node through the
the
how the home agent routes datagram to
tunnel.
mechanism for roaming within
7. Mobile IP provides an efficient, scalable
the internet.
point-of-attachment to the
8. Using mobile IP, nodes may change theiraddress.
internet without changing their home IP
higher layer connections
9. This allows them to maintain transport and
while roaming.
propagate host-specific
10. Node mobility is realized without the need to
routes throughout the internet routing fabric.
to future devices.
11. Mobile IP is a protocol which provides IP mobility
entities of mobile IP:
Entities of mobile IP: Following are the important
COA
Router Router
Home FA MN
network HA
Internet
I Foreign
CN Router \network,'
Fig. 2.25.1. Mobile IP.
1. Mobile node (MN) :A system (node) that can change the point of
connection to the network without changing its IP address.
2. Home agent (HA):A system in the home network of the MN, typically
to the
a rcuter registers the location of the MN, tunnels IP datagrams
COA.
3. Foreign agent (FA) : A system in the current foreign network of the
MN,typically a router. It forwards the tunneled datagrams to the MN,
typically also the default router for the MN.
4. Care-of-address (COA) :Address of the current tunnel end-point for
the MN (at FA or MN) actual location of the MN from an IP point of view,
it can be chosen, for example, via DHCP.
5. Correspondent node (CN) : Communication partner.
Que 2.26. What is mobile IP ? Discuss the goals of mobileIP. Also,
discuss the features of IPv4. UPTU 2011-12, Marks 10
Answer
Mobile IP:Refer Q. 2.25, Page 93J, Unit-2.
Goals of mobile IP:
1. Mobile IP was developed as a means for transparently dealing with
problems of mobile users.
95 (IT-8) J
Mobile Computing
small
2. Tomake the size and the frequency of required routing updates as
as possible.
3 To make it simple to implement mobile node software.
addresses.
4 To avoid solutions that requires mobile nodes to use multiple
Features of IPv4:
1. An IPv4 address is a 32-bit address that uniquely and universally
defines
the connection of a device to the internet.
2. IPv4 addresses are unique.
only
3. They are unique in the sense that each address defines one and
one connection to the internet.
Two devices on the internet can never have the same address at the
4.
same time.
5 On the other hand, if a device operating at the network layer has m
connections to the internet, it needs to have m addresses.
6. The IPy4 addresses are universal in the sense that the addressing system
must be accepted by any host that wants tobe connected to the internet.
Que 2.27. List and define the entities of mobile IP and describe
data transfer from amobile node to a fixed node and vice-versa.
|UPTU2012-13, Marks 05
OR
List the entities of mobile IP and describe data transfer from a mobile
node to a fixed node and vice-versa. Why and where is encapsulation
needed ? UPTU2013-14, Marks 05
Answer
1-...
CN Router
Answer
1. The WAP programming model as shown in Fig 2.29.1 is similar to the
WwW programming model.
2. This provides several benefits to the application developer community,
including a familiar programming model, a proven architecture, and
the ability to leverage existing tools (for example web servers, XML
tools, etc.).
3 Optimizations and extensions have been made in order to match the
characteristics of the wireless environment.
4 Wherever possible, existing standards have been adopted or have been
used as the starting point for the WAP technology.
Answer
IEEE 802.11 : Refer Q. 2.12, Page 69J, Unit-2.
WAP applications : Refer Q. 2.28, Page 97J, Unit-2.
100 (IT-8) J Wireless Networking
Answer
Internet WAP
A-SAP
HTML, Java Application layer (WAE) Additional
S-SAP services and
Session layer (WSP) applications
HTTP TR-SAP
Transaction layer (WTP)
SEC-SAP
SSL/TLS Security layer (WTLS)
T-SAP
TCP/IP, Transport layer (WDP) WCMP
UDP/IP, Bearers:
Media GSM IS 136 CDMA DHS CDPD PDC-P
Fig. 2.31.1. WAP layered Architecture and protocol stack.
...(106J - 119J)
Part-1 ....
105 (IT-8) J
106 (IT-8) J Data Management Issues
PART- 1
Data Management Issues, Data Replication for Mobile Computers.
CONCEPT OUTLIN E: PART-1
Data management is a process of managing data asa resource
that is valuable to an organization or business.
Some of the issues of data management are :
a. Mobility
b. Wireless medium
C. Transaction management
d Portability of mobile devices
" Data replication generates and manages multiple copies of data
at one or more sites.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
Mobile database :
1. A mobile database is a database that can be connected to a mobile
computing device over a mobile network.
Mobile Computing 113 (IT-8) J
MU
(BS) Fixed Host
DBS
8. In mobile environment, the user may also change his device to access a
service.
9 So, the diversity of devices and consequently the context of use of services
or an application must be taken into account.
10. Infact the mobile environments are characterized by a frequent change
in their resources which comes from various sources such as the nature
of wireless network itself, the mobility of users and multi-terminal access.
11. This change may influence data replication because the creation of and
access to these data may need a set of resources.
12. For example, confidential data like credit card number may not be
replicated and exchanged across non-secure nodes and links.
13. Thus, variation in the level of security may prevent the user from
accessing this data.
14. So,a traditional system is not able to satisfy the client's request.
15. To ensure service continuity, the replication system functionalities like
creation, placement, read, write and consistency operation must be
adapted toall variations in resources that data may need.
Que 3.5. How the data replication works ?
Answer
1 Replication can be provided in many forms.
2 The basic objective of the replication technique is to improve the
performance and to increase the data availability and consistency.
3 The principle functionalities of a replication system are :
a. Replica creations b. Replica placement
C. Read/write operations d. Replica consistency
Application
Required
context repository HApplication
Replica
planner interface
Provided Application
Localization Strategy
manager manager context Trigger
repository
Consistency
manager
Environment
Fig. 3.5.1.
116 (IT-8) J Data Management Issues
14. After receiving the notification from the application trigger modules,
the strategy manager choose the adapted strategy, ensures system
consistency and implements this strategy in same or all modules (replica
planner, localization manager and consistency manager).
Que 3.6. Discuss different possible replicating strategies.
Answer
Data replications strategies : Replication can be provided in numerous
forms and combinations. There are mainly three strategies of replications :
1. Synchronous replication :
a.
Synchronous replication is atechnique for replicating data between
databases (or file systems) where the system being replicated does
wait for the data to have been recorded on the duplicate system
before proceeding.
b Under synchronous data replication strategy, updates are applied
toall database replicas of an object as part of the original transaction.
C The database replicas are then kept in a state of synchronization.
d. In synchronous replication, if one or more sites that hold replicas
are unavailable, transaction cannot complete.
117 (1T-8) J
Mobile Computing
e Also, a large number of messages required to coordinate
synchronization.
2. Asynchronous replication :
Asynchronous replication is a technique for replicating data between
does
databases (or files systems) where the system being replicated
not wait for the data tohave been recorded on duplicate system
before proceeding.
database
b. Here the target database is updated after the source
modified.
seconds
C. Also, the delay in regaining consistency may range from few
to several hours or even days.
d Asynchronous replication has the advantage of speed, at the
increased risk of the data loss during communication or duplicate
system failure.
for server and
e It is the latest technology to provide fault tolerance
network storage.
asynchronous
Unlike previously used replications technology, files at the
replication technology works by capturing changes in
operating system level (byte level).
replication works
As previous technology like SQL transaction,
within applications or at hardware layer.
3. Push and pull data replication : replication (a
a Push data replication strategy includes both snapshot
only the publishing sites
single updater form of replication wherereplication schemes.
can update the data) and near real time
b. Snapshot data replications is best suited
to applications which are
not in need of current data.
data mining as
C Such applications are found in data warehousing or
wellas non-real time decision support systems.
triggers that are stored at
d A near real time replication employs of replicated
each local database and executes each time a part
other remote
database is updated, propagating the changes to the
database.
independent
e Triggers allow the database to update transparently and
of the programs and users.
controls the data replication
f In the push strategy, the source data schemes, the local
procedures while with pull data replication
database determine the replication processes.
when replication is to
In push replication, a publisher site controls
subscribers.
occur and 'pushes' the changes out to the
when they
h While in pullreplication, the subseriber sites determine
wish to receive replication transactions.
118 (1T-8) J Data Management Issues
i. Here publisher is the originator of a replicated database change
and subscriber is a receiver of a replicated database change.
Asubscriber may also be a publisher and a publisher may also be a
subscriber so it is a bi-directional scheme.
Que 3.7. Discuss the concept of index replication. What purpose
it serves in mobile computing environment ?
UPTU2014-15, Marks 05
Answer
Index replication:
1 Mobile computing environment have two major restrictions, i.e.,
bandwidth limitation and energy restriction.
2 Bandwidth limitation shows that there are very narrow bandwidths
that can be used for wireless communication.
3 Energy restriction shows the mobile computing devices usually use
batteries as their main energy sources.
4 Data broadcasting is a mechanism that can efficiently cope with the
above discussed limitations.
5. Server sends data stream to a large number of unspecified clients and
the clients receive the broadcast data.
6 As clients do not send requests to the server and the energy consumed
in sending data is much larger than that in receiving data, data
broadcasting isenergy-efficient.
7. It is also bandwidth-eficient because many clients share the broadcasting
channel.
8. Mobile units provide two kinds of operating modes, i.e., active and doze
mode.
9. The energy consumption in doze mode is about 1000 times less than that
in active mode.
10. The index" on wireless broadcast data stream enables the mobile unit
toremain in doze mode when it need not read the broadcast data.
11. Without the index, all data stream must be read from the time the data
access request is initiated to the time, the required data are completely
downloaded.
12. However, by using the index, client reads only some index portions in
the broadcast stream and recognizes the appropriate address of the
target data.
13. After obtaining the address, i.e., the temporal offset from the index to
the data, the client can remain in doze mode until the target data are
delivered.
Mobile Computing 119 (IT-8) J
14. The amount of time elapsed from the moment a client asks for data to
the time it receives appropriate data is called access time". The "tuning
time" is the amount of time for which the client actually listens to the
channel.
15. The major index replication schemes that have been developed so far
are (I, M) indexing and distributed indexing. (I, M) indexing replicates
the global index by Mtimes. This can reduce the tuning time for searching
index buckets in the broadcast stream.
16. Distributed indexing organizes the index structure hierarchically and
replicates some part of indexes appropriately. It performs better than (I,
M) indexing with respect to the tuning time, i.e., it is more energy
efficient.
17. A data bucket is the bucket whose contents are data.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
3 8
B
D
6
11. The system topology is divided into clusters with independent control.
12. Agood clustering scheme will tend to preserve its structure when a few
nodes are moving and the topology is slowly changing.
13. Otherwise, high processing and communications overheads will be paid
to re-construct clusters.
UPTU 2013-14,Marks 10
OR
Answer
16
10 17
6
20
19 18
9
(a) System topology
C 13
C14
12
14 15
2 3 11 16
17
20
19 18
C18
(b) Cluster formation
Fig. 3.11.1.
12. After clustering in Fig. 3.11.1(b), we can find six clusters in the system,
which are (1, 2), (3, 4, 11), (5, 6, 7, 8, 9), (10, 12, 13), (14, 15, 16, 17), (18,
19, 20).
13. To prove the correctness of the algorithm we have to show that:
Every node eventually determines its cluster and only one cluster.
Mobile Computing 125 (IT-8) J
b In a cluster, any two nodes are at most two hop away.
C. The algorithm terminates.
if (my_id == min(T)
{
my_cid my_id;
broadcast cluster (my_id, my_cid);
T=I-(my_id);
for(;;)
if (T ==0) stop;
126 (IT-8) J Data Management Issues
Que 3.12. What was the motivation for designing the CODA
system ? Discuss CODA file system in detail.
UPTU2011-12, Marks 10
OR
Explain CODA file system.
Answer
1. CODA was designed to be a scalable, secure, and highly available
distributed file system.
2 An important goal was to achieve a high degree of naming and location
transparency so that the system would appear to its users very similar
to a pure local file system.
3 By also taking high availability into account, the designers of CODA
have also tried to reach a high degree of failure transparency.
4. CODA is a descendant of version 2 ofthe Andrew file system (AFS), and
inherits many of its architectural features.
5. CODA follows the same organization as AFS.
6 Every Virtue workstation hosts a user-level process called Venus, whose
role is similar to that of an NFSclient.
7. AVenus process is responsible for providing access to the files that are
maintained by the Vice file servers.
8. In CODA, venus is also responsible for allowing the client to continue
operation even if access to the file servers is (temporarily) impossible.
9 This additional role is a major difference with the approach followed in
NFS.
10. The important issue is that Venus runs as a user-level process.
11. Again, there is a separate Virtual File System (VFS) layer that intercepts
all calls from client applications, and forwards these calls either to the
local file system or toVenus.This organization with VES is the same as
in NFS.
12. Venus, in turn, communicates with Vice file servers usinga user- level
RPC system. The RPC system is constructed on top of UDP datagrams
and provides at-most-once semantics. There are three different server
side processes. The great majority of the work is done by the actual
Vice file servers, which are responsible for maintaining a local collection
of files.
Mobile Computing 127 (IT-8) J
13. Like Venus, a fle server runs as a user-level process. In addition, trusted
Vice machines are allowed to run an authentication server. Finally,
update processes are used to keep meta information on the file system
consistent at each Vice server.
14. CODA appears to its users as a traditional UNIX-based file system. It
supports most of the operations that form part of the VFS specification.
15. Unlike NFS, CODA provides a globally shared name space that is
maintained by the Vice servers. Clients have access to this namespace
by means of a special subdirectory in their local namespace.
16. Whenever a client looks up a name in this subdirectory, Venus ensures
that the appropriate part of the shared namespace is mounted locally.
Mobile client
Application Cache--Server
Transparent access
to a Vice file server
Virtue client
Answer
1. Communication in CODA is done through remote procedure call (RPC)
and RPC2 systems.
2 In the call, each time a remote procedure called then RPC2 client code
starts a new thread that sends an invocation request to the server and
gets block until receives an answer.
128 (IT-8) J Data Management Issues
3. In this case requesting process may take arbitrary time and server
sends message to client regularly.
4. If server fails to give response then side effects work.
5. A side effect is a mechanism by which the client and server can
communicate using an application specific protocol.
6 RPC2 allows the client and the server to set up a separate connection for
transferring the video data to the client on time.
7 Connection setup is done as a side effect of an RPC call to the server.
8 Venus runs as a user-level process. There is a separate virtual file
system (VFS) layer that intercepts all calls from client applications, and
forwards these calls either tothe local file system or to venus as shown
in Fig. 3.13.1.
9. Venus communicates with vice file servers using a user-level Remote
Procedure Call (RPC system).
10. The RPCsystem is constructed on top of UDP datagrams and provides
at-most-once semantics.
Client
Server
application
RPC
Application-specific
protocol
Client side Server side
effect effect
11. An important design issue in CODA is that server keeps track of which
clients have a local copy of a file.
12. When fle is modified, a server invalidates local copies by notifying the
appropriate clients through an RPC.
13. Ifa server can notify only one client at a time, invalidating all clients
may take some time as shown in Fig. 3.13.2(a).
14. Hence the problem is caused by the fact that an RPC may fail. To
overcome this problem, the server sends an invalidation message to all
clients in parallel as shown in Fig. 3.13.2 (b).
129 (IT-8) J
Mobile Computing
Client Client
Server
Reply Reply
Invalidate Invalidate
Client Client
Time Time
(b)Sending invalidation
(a) Sending an invalidation message in parallel
message one at a time
Fig. 3.13.2.
Answer
2.
Access control and protection database : The directory access
control list protects the files on coda server.
130 (IT-8) J Data Management Issues
Features of CODA:
1. Itis freely available under a liberal license.
2 Server replication.
3. Security model for authentication, encryption, and access
control.
4. Well defined semantics of
sharing, even in the presence of network
failure.
5 Good scalability.
6 Continued operation during partial network failures in server network.
Que 3.15. What do you mean by CODAfile system and also
explain
the clients in C0DA ? How are disconnected
operations performed
in CODA ?
UPTU2013-14, Marks 10
Answer
Coda file system:Refer Q. 3.12, Page 126J, Unit-3.
Disconnected operations in CODA:
1.
Disconnected operations is a mode of operations that enables a client to
continue accessing critical data during temporary failures of shared
data repository.
2. It is a temporary deviation from normal
operation as a client of a shared
repository.
3.
Disconnected operation in a file system is indeed feasible, efficient and
usable.
4. The central idea behind this is that the caching of
data, widely used to
improve performance, can also be exploited to enhance
Clients in CODA:
availability.
1. CODA contains a large collection of untrusted
number of trusted UNIX file servers. UNIX clients and a small
2. Each CODA client has a local disk and can
over a high bandwidth network. communicate with the servers
3. At certain times, a client may be
with some or all of the servers. temporarily unable to communicate
4. This may be due to a server or
of a portable client from the network failure, or due to the detachment
network.
Clients view CODA as a single,
system. location-transparent shared UNIX file
Mobile Computing 131 (IT-8) J
Que 3.16. Design the CODA file system and explain the different
disconnected
states. Draw the state transition diagram and
operation in CODA file system. |UPTU 2014-15, Marks 10
OR
Answer
Coda file system and its states : Refer Q. 3.12, Page 126J and Q. 3.13,
Page 127J; Unit-3.
Disconnected operations : Refer Q. 3.15, Page 130J, Unit-3.
Venus states:
1 Hoarding, emulation and re-integration are three states in the
disconnected operation in the CODA file system.
2 These three states come under venus states or in other words it also
comes under disconnected operation in CODA file system.
132 (IT-8) J Data Management Issues
1. Hoarding :
a. In this state, venus hoards the useful data in anticipation of
disconnection.
b. It manages its cache in such a way that balances the needs of
connected and disconnected operation.
C.
Many factors complicate theimplementation ofhoarding:
i. Disconnections and reconnections are often unpredictable.
Activity at other clients must be accounted for, so that the
latest version of an object is in the cache at disconnection.
iüi. Since cache space is finite, the availability of less critical objects
may have to be sacrificed in favor of more critical objects.
2. Re-integration :
It is a transitory state through which venus passes in changing
roles from pseudo-server to cache manager.
b. Re-integration is performed a volume at a time with all update
activity in the volume suspended until completion.
C During re-integration, conflicts are detected and, where possible,
automatically resolved.
3. Emulation :
When the number of servers in the clients AVSG (Accessible Volume
Storage Group) drop to zero, bringing in into an emulation state,
the behaviour of server for the volume will have to be emulated on
the client's machine.
b It means that all file requests will be directly serviced using the
locally cached copy of the file.
C When a client is in its emulation state, it may still be able to contact
servers to manage other volumes.
Venus states and transitions are shown in Fig. 3.16.1.
Hoarding
Disconnection Logical
reconnection
Disconnected
Emulation Re-integra
tion
Physical
reconnection
134 (IT-8) J
135 (IT-8) J
Mobile Computing
PART- 1
Questions-Answers
Answer
Mobile agent :
1 An agent is a person whose job is to0 act for, or manage the affairs of
other people.
2 In context of computers, software agents refer to the programs that
perform certain tasks on behalf of the user.
3 Software agents have some propertiee, which distinguish them from
other programs, such as autonomy, responsiveness, communicative
ability, adaptability.
4 Amobile agent is a type of software agent, with the feature of autonomy,
social ability, learning and most importantly mobility.
136 (IT-8) J Mobile Agent Computing
5 In computer science, a mobile agent is a composition of computer software
and data which is able to move from one computer t0 another
autonomously and continue its execution on the destination computer.
6.
More specifically, amobile agent is aprocess that can transport its state
from one environment to another, with its data intact, and be capable of
performing appropriately in the new environment.
7. Mobile agents decide when and where to move.
8 Movement is often evolved from RPC methods.
9 When a mobile agent decides to move, it saves its own state, transport
this saved state to the new host and resumes execution from the saved
state.
10. Software agents can be classified as static agents and mobile agents.
11. Static agents achieve the goal by executing on a single machine.
12. On the other hand, mobile agents migrate from one computer to another
in the network and execute on several machines.
13. Mobility increases the functionality of the mobile agent and allows the
mobile agent to perform tasks beyond the scope of static agents.
Characteristics of mobile agent :
Following are the characteristics of mobile agent:
1. Situatedness: It means that an agent receives sensory input from its
environment and it can perform actions which change the environment
in some way.
2 Autonomy :It means that an agent is able to act without the direct
intervention of humans (or other agents) and it has control over its own
actions and internal states.
3. Flexibility : It can be defined to include the following properties :
a.
Responsive :Itrefers to an agent abilitytoperceive its environment
and respond in a timely fashion tochanges that occur in it.
b. Proactive : Agents are able to exhibit opportunistic, goal-driven
behaviour and take the initiative where appropriate.
C. Social: Agent[ should be able to interact, when appropriate, with
other agents and human in order to solve their own problems and
to help others with their activities.
4. Rationality : The assumption that an agent will not act in a manner
that prevents it from achieving its goals.
5. Mobility: The ability for an agent to move across networks and between
different hosts to fulfill its goal.
Que 4.2. State the advantages and disadvantages of mobile
agents.
137 (IT-8)J
Mobile Computing
Answer
Advantages of mobile agents :
They facilitate high quality, high performance, economical mobile
1.
applications.
2 Bandwidth :
communications protocols that
Distributed systems often rely on
a given task.
involve multiple interactions to accomplish
measures are enabled.
b. This is especially true when security
traffic.
C. The result is a lot of network
conversation and dispatching it to
d Mobile agents allow packaging a
interactions can take place locally, as
a destination host where the
shown in Fig. 4.2.1.
comes to reducing the flow of
e Mobile agents are also useful when it
raw data in the network.
stored at remote hosts, these
When very large volumes of data are
f
locality of the data rather that
data should be processed in the
transferred over the network.
Service
App
RPC-Based approach
Host B
Host A
Service
App
Mobile Agent-Based approach
network load.
Fig. 4.2.1, Mobile agents reduce
computations to the data rather
The motto is simple : move the
than the data to the computations.
: By migrating to the location of the resource, a mobile agent
3. Latency faster than from across the network.
much
can interact with the resource
Asynchronous task execution
4.
5. Fault tolerance
They enable use of portable, low cost personalcommunications.
6.
7. Peer topeer communication networks.
8. They permit secure intranet
style communications on public
Disadvantages of mobile agents :
1. The main drawback of
mobile agents isthe security risk involved in
using mobile agents.
A viruscan be disguised as mobile agents and distributed in the network
2. execute the agent.
causing damage to the host machines that
138 (IT-8) J
Mobile Agent Computing
3. Mobile agent tools are still new and may have security bugs and
vulnerabilities that are yet unknown.
4 Network test suites tend to be relatively large. Managing many light
weight agents introduces additional communication and control
overhead.
5. Mobile agents are not a mature technology and most agent development
tools are alpha or beta version.
Que 4.3. Explain the working and lifecycle of a mobile agent.
Answer
1 The mobile agent is created in the home machine.
2 The mobile agent is dispatched to the host machine 'A' for execution.
3. The agent executes on host machine A'.
4. After execution the agent is cloned to create two copies, one copy is
dispatched to host machine Band the other is dispatched to host machine
C.
Host machine
7
(M.A) (M.A)
(M.A)
Host machine A
3
(M.A) (M.A (M.A
(M.A
Fig. 4.3.1,
5. The cloned copies execute on their respective hosts.
6 After execution,host machine Band Csend the mobile agent received
by them back to the home machine.
7. The home machine interacts with the agents and the data brought by
the agents is analyzed. The agents are then disposed.
Amobile agent experiences the following events in its life cycle:
1. Creation : Abrand new agent is born and its state is initialized.
139 (IT-8) J
Mobile Computing
2. Dispatch :An agent
travels to new host.
original is
Cloning : A twin agent is born and the current state of the
3.
duplicated in the clone.
Deactivation: An agent is brought back from aremote host along with
4.
its state to the source machine.
state is lost forever.
5. Disposal: An agent is terminated and its
incoming
6 Communication:Notifies the agent to handle messages inter-agent
primary means of
from other agents, which is the
correspondence.
Que 4.4. Discuss the various mobile agent systems.
Answer
Mobile agent systems :
prevalent systems which are currently
The following systems are the most
available:
1. Agent TCL:
Agent TCL, a product of Dartmouth College, provides an agent
agents implemented in secure
a.
TCP/IP E-mail
Folder1 Folder2
Briefcase,
Mobile Agent,
Answer
1 There are many technical challenges to implement mobile agent systems.
2 Most ofthese problems are in the structure of the computational medium,
the environment the agents operate in.
3. Servers must be designed, implemented, and deployed that not only
allow mobile agents to run, but allow them to run safely.
a. Portability:
i. Mobile agent code itself must be portable; when an agent arrives
at a server the server needs to be able to execute that agent.
Most mobile agent systems under development now rely, at
least in part on virtual machines to standardize the execution
environment.
b. Ubiquity :
i In order for mobile agents to be successful they need access to
many different computer resources.
i. Servers for agents must be at common place; there needs to be
awidely accepted framework for executing mobile agents
deployed on many machines across the internet.
C. Network communication:
Mobile agents that live in the network need to be written in a
language that makes network access simple.
ii. It must be easy totransfer objects across the network and to
invoke methods of remote objects.
d. Server security :
Amajor concern specific to mobile agents is the protection of
the servers running the agents.
i. Running arbitrary programs on a machine is dangerous, a
hostile program could destroy the hard drive, steal data, or do
all sorts of other undesirable things.
142 (IT-8) J Mobile Agent Computing
ii. Two types of security are possible to protect servers from
malfunctioning and hostile agents :physical and social.
1. Physical security refers to building servers for agents in
such a way that the agents cannot harm the server.
2 A second approach to server security is using social
enforcement mechanisms to punish the creators of
harmful agents.
e. Agent security :
The complement of server security is agent security; whether
the agent can bust the server on which it is executing.
i. A mobile agent might contain secret information, such as
proprietary data and algorithms.
f. Resource accounting :
1. If economic control and incentive are going to be factors in
netwide resource, use some mechanism to account for the
resources that an agent uses anda way for receiving payment
for those resources is necessary.
Answer
Mobile agent : Refer Q. 4.1, Page 135J, Unit-4.
Server architecture : Refer Q. 4.4, Page 139J, Unit-4.
Security threats :
1. Agent-to-Platform:The agent-to-platform category represents the
set of threats in which agents exploit security weakness of an agent
platform or launch attacks against an agent platform.
Following are the set of threats :
a Masquerading :
i When an unauthorized agent claims the identity of another
agent it is said to be masquerading.
ii. The masquerading agent may pose as an authorized agent in
an effort to gain access to services and resources to which it is
not entitled.
ii. The masquerading agent may als0 pose as another
unauthorized agent in an effort to shift the blame for any
actions for which it does not want to be held accountable.
b. Denial of service :
i In this, an agent may attempt to consume or corrupt a host
resource to preclude other agents from accessing the host's
services.
143 (IT-8) J
Mobile Computing
ii. These denial of service attacks can be launched intentionally
by running attack scripts to exploit system vulnerabilities, or
unintentionally through programming errors.
ii. As a mobile computing paradigm requires an agent platform to
accept and execute an agent whose code may have been
developed outside its organization.
iv. This type of agent may carry malicious code that is designed to
disrupt the services offered by the agent platform, degrade the
performance of the platform, or extract information for which
it has no authorization to access.
C. Unauthorized access :
In this, an agent can obtain access to sensitive data by exploiting
security weakness.
ü. Applying the proper access control mechanism requires the
platform or agent to first authenticate a mobile agent's identity
before it is instantiated on the platform.
iii. An agent that has access to platform and its services without
having the proper authorization can harm other agents and
platform itself.
2 Agent-to-Agent: Agent-to-Agent category represents the set of threats
in which agents exploit security weakness of other agents or launch
attacks against other agents. This set of threats includes the following :
a. Masquerade :
Agent-to-Agent communication can take place directly between
two agents or may require the participation of the underlying
platform and the agent services it provides.
In either case, an agent may attempt to disguise its identity in
an effort to deceive the agent with which it is communicating.
ii. For example, an agent may pose as a well-known vendor of
goods and services, and try to convince another unsuspecting
agent to provide it with credit card numbers, bank account
information and digital cash or other private information.
b. Denial of service:
i Agents can also launch denial of service attacks against other
agents.
For example, repeatedly sending messages to another agent,
or spamming agents with messages, may place undue burden
on the message handling routines of the recipient.
ii. Agents that are being spammed may choose to block messages
from unauthorized agents, but even this task requires some
processing by the agent or its communication proxy.
144 (IT-8) J Mobile Agent Computing
C. Repudiation:
i. Repudiation occurs when an agent, participating in a
transaction or communication, later claims that the transaction
or communication never took place.
Whether the cause for repudiation is deliberate or accidental,
repudiation can lead to serious disputes that may not be easily
resolved unless the proper counter measures are in place.
d. Unauthorized access :
mechanisms in
i. If the agent platform has weak or no control
place, an agent can directly interfere with another agent by
invoking its public methods (for example, attempt buffer
overflow, reset to initial state etc.), or by accessing and
modifying the agent's data or code.
3 Platform-to-Agent : The platform-to-agent category represents the
set of threats in which platform compromise the security of agents. This
set of threats includes the following:
Masquerade :
in
One agent platfornm can masquerade as another platform
destination
an effort to deceive a mobile agent as to its true
and corresponding security domain.
i. An agent platform masquerading as trusted third
party may
and
be able to cheat unsuspecting agents to the platform
extract sensitive information from these agents.
both the visiting agent
ii. The masquerading platform may harm assumed.
and the platform whose identity it has
b. Denial of service :
the
i When an agent arrives at an agent platform, it expects
provide fair
platform to execute the agent's request faithfully,
allocation of resources and abide by the quality of service
agreements.
service
iü. Amalicious agent platform however may ignore agent such
requests, introduce unacceptable delays for critical tasks
execute
simply not
as placing market orders in a stock market, without
the agent's code or even terminate the agent
notification.
c. Eavesdropping :
and
i. The eavesdropping threat involves the interception
monitoring of secret communications.
In eavesdropping, agent platforms cannot only monitor
communications, but als0 can monitor every instruction
executed by the agent, all the unencrypted or public data it
brings to the platform, and all the subsequent data generated
on the platform.
Mobile Computing 145 (IT-8) J
ii. Since the platform has access to the agent's code, state and
data, the visiting agent must be wary of the fact that it may be
exposing proprietary algorithms, trade secrets, negotiation
strategiesor other sensitive information.
iv. Even though the agent may not be directly exposing secret
information, the platform may be ahble to infer meaning from
the types of services requested and from the identity of the
agents with which it communicates.
d. Alteration :
i When an agent arrives at an agent platform it is exposing its
code, state and data to the platform.
ii. Since an agent may visit several platforms under various
security domains throughout its lifetime, mechanisms must
be in place to ensure the integrity of an agent's code, state and
data.
üi. Acompromised or malicious platform must be prevented from
modifying an agent's code, state or data without being detected.
iv. Modification of an agents code, and thus the subsequent
behaviour of the agent on other platforms, can be detected by
having the original author digitally sign the agent's code.
4 Other-to-Agent Platform : The other-to-agent platform category
represents the set of threats, in which external entities, including agents
and agent platforms, threaten the security of an agent platiorm. This
set of threats includes the following:
a. Masquerade :
i
F: Agents can request platform services both remotely and locally.
An agent on a remote platform can masquerade as another
agent and request services and resources for which it is not
authorized.
iii. Agents masquerading as other agents may act in conjunction
with a malicious plYtform to help deceive another remote
platform or they may act alone.
iv. Aremote platform can also masquerade as another platform
and mislead unsuspecting platforms or agents about its true
identity.
b. Unauthorized access :
1
Remote users, processes, and agents may request resources
for which they are not authorized.
i. Remote access to the platform and the host machine itself
must be carefully protected, since conventional attack seripts
freely available on the internet can be used to subvert the
operating system and directly gain control of all resources.
146 (IT-8)J
Mobile Agent Computing
or security
iüi. Remote administration of the platform's attributesresponsible
policy may be desirable for an administrator that is
remote
for several distributed platforms, but allowing account
administration may make the system administrator's
or session the target of an attack.
C. Denial of service:
remotely and
Agent platform services.can be accessed both
locally.
inter-platform
The agent services offered by the platform and
communications can be disrupted by common denial of service
attacks.
iii. Agent platforms are also susceptible to all the conventional
denial of service attacks aimed at the underlying operating
system or communication protocols.
the
These attacks are tracked by organizations such as
Computer Emergency Response Team (CERT) at the Carnegie
Mellon University and the Federal Computer Incident Response
Capability (FedCIRC).
Answer
Traditional systems vulnerabilities :
1. As the internet is increasingly becoming part of the corporate network,
the organizations information systems have become vulnerable to actions
from outsiders.
2. The architecture of traditional web-based application typically includes
a web client, a server and corporate information systems linked to back
end databases.
3. Each of these components is exposed to security challenges and
vulnerabilities due to their connection to the internet.
4. For example, a database that has been used internally for several years
but is now connected to the internet.
5. This new connection will expose the database to a much larger and
more varied set of users (including hackers) than ever before.
Wireless and mobile systems :
1. The security in a mobile code environment cannot rely on trust
relationship between the server and an agent because they are generally
not part of the same administrative domain.
2. In addition, the problem of protecting the agent and its results from
malicious and faulty servers arises.
147 (IT-8) J
Mobile Computing
3. Increased use of wireless communications further increases the chances
of eavesdropping and of compromising the integrity of information being
transferred between sources and destinations.
Answer
Security requirements in mobile agent :
1 The users of networked computer system have four main security
requirements: confidentiality, integrity, accountability and availability.
have these same
2 The users of agent and mobile agent frameworks also
security requirements.
This section provides a brief overview of these security
requirements
3.
and how they apply to agent frameworks:
a, Confidentiality :
i Any private data stored on a platform or carried by an agent
must remain confidential.
Agent frameworks must be able to ensure that their intra
and inter-platform communications remain confidential.
iüi. Eavesdroppers can gather information about an agent's
activities not only from the content of the messages exchanged,
but also from the message flow from one agent to another
agent or agents.
b. Integrity :
The agent platform must protect agents from unauthorized
modification of their code, state, and data and ensure that only
authorized agents or processes carry out any modification of
shared data.
The agent itself cannot prevent a malicious agent platform
from tampering with its code, state, and data, but the agent
can take measures to detect this tampering.
C. Accountability :
Each process, human user, or agent on a given platform must
be held accountable for their actions.
i. In order to be held accountable, each process, human user, or
agent must be uniquely identified, authenticated and audited.
148 (IT-8) J Mobile Agent Computing
ii. Examples of the actions for which they must be held
accountable include: access to an object such as a file, or
making administrative changes to a platform security
mechanism.
iv. Accountability requires maintaining an audit log of security,
relevant events that have occurred and listing each event and
the agent or process responsible for that event.
d. Availability :
i The agent platform must be able to ensure the availability of
both data and services to local and remote agents.
The agent platform must be able to provide controlled
concurrency, support for simultaneous access, deadlock
management and exclusive access as required.
iii. Agent platform must be able to detect and recover from system
software and hardware failures.
iv. While the platform can provide some level of fault-tolerance
and fault-recovery, agents may be required to assume
responsibility for their own fault-recovery.
Que 4.9. What are the security measures for mobile agents ?
Answer
Security measures for mobile agent :
The following available technologies and research efforts addresses the
security issues arising from the mobility property of mobileagents:
1. Protecting agents :
a. This is due to the fact that an agent is completely susceptible toan
agent platform and cannot prevent malicious behaviour from
occurring.
b. Some more general purpose techniques for protecting an agent
include the following:
i Partial result encapsulation :
1. Encapsulation may be done for different purposes with
different mechanisms, such as providing confidentiality using
encryption or for integrity and accountability using digital
signature.
2. In general, there are three alternative ways to encapsulate
partial results:
Provide the agent with a means for encapsulating the
information.
b. Rely on the encapsulation capabilities of the agent
platform.
Mobile Computing 149 (IT-8) J
Answer
Security threats in mobile communication :
from attacks or threats.
1. Security system is a system to defend our assets
2. Attacks are carried out at the point of vulnerability.
3. When the vulnerability is exploited for some interest or
selfish motive,
it is an attack on the system.
4. Where the vulnerability is exploited, there is a loss.
or an
5 This loss can be either of static information asset (static asset)
information asset in transit (dynamicasset).
6. Attacks on dynamic assets can be of the following types:
a. Interception :
part
i. An unauthorized party gaining access to an asset will be a
of this attack.
ii This is an attack on confidentiality like unauthorized copying
of files or tappinga conversation between parties.
iüi. Some of the sniffing attacks fall in this category.
b. Modification:
i An unauthorized party gaining control of an asset and
tampering with it is part of this attack.
This is an attack on integrity like changing the content of a
message being transmitted through the network.
of
ii. Different types of man-in-the-middle attacks are the part
modification attack.
Fabrication :
i An authorized party inserts counterfeited objects into the
system, for example, impersonating someone and inserting a
spurious message in a network.
d Interruption :
i An asset is destroyed or made unusable.
This is an attack on availability.
ii. This attack can be ona static asset or a dynamic asset.
iv. An example could be cutting a communication line or making
the router so busy that a user cannot use a server in a network.
7 Attack on static assets can be of the following types:
a. Virus and worms :
These are a type of program that replicates and propagates from
one system to another.
Most of the virus do malicious destructive functions in the system.
152 (IT-8) J Mobile Agent Computing
b. Denial of Service:
These are attacks on the system to prevent legitimate users from
using the service.
C. Intrusion :
d. Replay attack:
i Ina replay attack the opponent passively captures the data without
trying to analyze the content.
i. At a later time, the same is used in the same sequence to impersonate
an event and gain unauthorized access to resource.
e Buffer overflow attack :
PART-2
Transaction Processing in Mobile Computing Environment.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
Transaction :
1. The transaction is amodeling abstraction that groups multiple database
accesses as an atomic unit for the purpose of recovery, concurrency and
consistency.
2. Amobile transaction is a distributed transaction where some parts of
the computation are executed on mobile host and some parts on non
mobile hosts.
156 (IT-8) J Mobile Agent Computing
3. Transactions guarantee the consistency of data records when multiple
users or processes perform concurrent operations on them.
4. The access of distributed resources for example, database on different
computers within a transaction is called a distributed transaction for
committing the results, the peer involved in a distributed transaction
usually communicate via the two phase commit protocol (2PC).
5. Only distributed transaction processing (DTP) offers the posibility to
control the state of a mobile agent system.
6 At present, many type of mobile computing devices such as laptops,
personal digital assistant (PDA)are available.
7 The capacities of these mobile aevices become more powerful.
8. They have more processing speed and longer operating time.
9 Mobile computing devices are becoming the major work processing
equipments in every daily activity.
10. Combining with the expanding of the high-speed network like the
internet, mobile computing applications are growing rapidly.
Transaction processing :
1. Transaction processing is information processing that is divided into
individual and invisible operations called transaction.
2. Transaction processing is designed to maintain databases in a known,
consistent state, by ensuring that any operation carried out on the
database that are interdependent and either all completed successfully
or allcancelled successfully.
3. Transaction processing allows multiple individual operations on a
database to be linked together automatically as a single, individual
transaction.
4 The transaction processing system ensures that either all operations in
a transaction are completed without error, or none of them are.
5. If some of the operations are completed but errors occur when the
others are attempted, the transaction processing system "rolls back" all
of the operations of the transaction, thereby erasing all traces of the
transaction and restoring the database to the consistent, known state
that it was in before processing of the transaction began.
6. If all operations of a transaction are completed successfully, the
transaction is committed" by the system and all changes to the database
are made permanent; the transaction cannot be rolled back once this is
done.
7 If the computer system crashes in the middle of a transaction the
transaction processing system guarantees that all operations in any
uncommitted transaction are cancelled.
Mobile Computing 157 (IT-8) J
Have_ Phase 2:
commited completion
all participants sent
Have _committed
forget transaction
Answer
Online transaction processing :
1. Online transaction processing, or OLTP, refers to a class ofsystems that
facilitate and manage transaction-oriented applications, typically for data
entry and retrieval transaction processing.
2. OLTP has also been used to refer to processing in which the system
responds immediately to user requests. An automatic teller machine
(ATM) for bank is an example of a commercial transaction processing
application.
3 Online transaction processing increasingly requires support for
transactions that span a network and may include more than one
company.
4 For this reason, new OLTP software uses client/server processing and
brokering software that allows transactions to run on diferent computer
platforms in a network.
5 In large applications, efficient OLTP may depend on sophisticated
transaction management software (such as CICS) and/or database
optimization tactics to facilitate the processing of large numbers of
concurrent updates to an 0LTP-oriented database.
6. For even more demanding decentralized database systems, OLTP
brokering programs can distribute transaction processing among
multiple computers on a network.
7. OLTP is often integrated into SOA service-oriented architecture and
web services.
8 Because there is a need for transactions you will need online processing.
9 Online transaction processing has two key benefits: simplicity and
efficiency.
10. Reduced paper trails and the faster, more accurate forecasts for revenues
and expenses are both examples of how OLTP makes things simpler for
businesses.
160 (IT-8) J Mobile Agent Computing
11. It also provides a concrete foundation for a stable organization because
of the timely updating.
12. Another simplicity factor is that of allowing consumers the choice of
how they want to pay, making it that much more enticing to make
transactions.
13. OLTP is proven efficient because it vastly broadens the consumer base
for an organization, the individual processes are faster, and it's available
24/7.
Various mobile transactions models :
1. A mobile transaction is a distributed transaction where some parts of
the computation are executed on mobile host and some parts on non
mobile hOsts.
2 The use of wireless medium and the mobility of data consumers and
producers affect transaction processing in various ways.
3 Location and time of mobile host are the two major factors that affect
mobile transaction processing.
4 Twomobile transaction models are available as follows:
a. High Commit Mobile Transaction Model (HiCoMo) :
i The execution model is mainly for processing aggregate data
stored in a data warehouse which resides in mobile units.
iüi. Since the data warehouse resides in mobile units, HiCoMo
transactions are always initiated on mobile unit where they
are processed in a disconnected model.
ii. As a result transaction commit1nents are quite fast.
iv. The base database resides on the fixed network.
V. The structure of HiCoMo transaction is based on nested
transaction model.
vi. It is manipulated by transaction called base or source
transactions. These transactions initiated at the fixed network.
vii. To install updates of HiCoMo transaction they must be
converted tosource transactions.
vii. This conversion is done by a transaction transformation
function.
b. Kangaroo mobile transaction model :
It captured both data and the movement of mobile unit.
i. The model based on a split transaction and enforces the ACID
properties.
iii. Aglobal or parent Kangaroo transaction, KT, is composed of a
number of subtransactions. Each subtransaction is similar to
an ACID transaction, which is composed of a set of reads and
writes. These subtransactions are called Joey Transaction (JT)
161 (IT-8) J
Mobile Computing
and are local to a base station.
transaction, a base station creates
iv. Upon initiation of a Kangaroo
a JT for its execution.
the initial BS (base
V. AKT, when initiate by a MU (mobile unit), identity and
station) immediately creates a JT withaunique
become responsible for its execution.
cell, the BS of this cell
vi. When the MU migrates to another transaction.
takes control of the execution of this
split in two JTs,
vii. When a MUencounters with handoff, KT is
thus the mobility of a MU is captured by splitting a KT.
management.
Que 4.15. Discuss the schemes of mobiletransaction
transaction management.
List out various issues concerned to
UPTU2013-14, Marks 10
OR
processing
Discuss various issues which are related to transaction
in mobile computing. UPTU2011-12, 2012-13; Marks 10
Answer
Mobile transaction schemes: Refer Q. 4.14, Page 159J, Unit-4.
Issues of transaction processing in mobile computing environment :
highly distributed
1 Mobile environments can be considered to be similar to
environments in many respects.
hosts are not
2 But unlike in distributed environments, locations of some
permanent in mobile environments.
bandwidth, frequent
3 This along with the low communication
disconnections and high vulnerability throws up many challenges to
researchers.
a. Data consistency and concurrency control:
i In mobile environments, data could be replicated on a number
of servers throughout the network.
Some of these servers could be MUs. Moreover, a MH might
operate on cached data while being disconnected from the
fixed network.
iüi. The data conflicts arising in mobile environments could partly
be due to the locality of the users accessing the data.
iv. The execution of a mobile transaction could also be distributed
and relocated among fixed hosts and the mobile nodes.
V
The non-deterministic lifetime of a mobile transaction and the
low bandwidth of communication links are other factors that
affect concurrency control and cache management.
162 (IT-8) J Mobile Agent Computing
b. Infrastructure requirements :
For any model to be successful, it is important that it can be
moved from the research labs and deployed in the real world.
i. Assuming a wireless communication infrastructure to be well
in place, it is important to determine the additional resources
required for having a mobile transaction system in place.
i. These resources could range from protocols for location
sensitive service access to mechanisms for optimized query
management and controlled query release mechanisms.
C. Communication costs :
i. The high cost of the communication links is one of the major
constraints in mobile environments.
i. Efficient utilization of bandwidth is thus an important factor
on evaluating a transaction model.
d. Relocation mechanism and user profiles :
i. Mobile agents are processes or set of processes that perform
an activity on the fixed network on behalf of the MU.
ii. These agents will typically be a transaction activity that access
several databases and report some results to the mobile node.
iii. Relocation of transaction execution or mobile agents is
necessary to improve response times in mobile environments.
iv. Performance can still be improved if the user profiles or user
directivescan be used to effect anticipatory relocation or to
avoid unnecessary relocation.
e. Scalability :
i As mobile computing grows to be more affordable and popular,
the number of MUs handled by every base station could be
large.
Hence, it is very important that a mobile transaction model
scale up efficiently.
Que 4.16. Discuss the challenges in transaction processing.
What are the counter measures to security threat in computing
environment ? UPTU 2014-15, Marks 10|
Answer
Challenges in transaction processing :
1. Enhanced failure model:
a. Compared to fixed-wired networks, mobile environments suffer
from a variety of failures : Message loss occurs in fixed wired
networks due to rare problems like buffer over-flows or data packet
collisions.
Mobile Computing 163 (IT-8) J
"Adhoc Network
Localization
"MAC Issues
" Routing Protocols
Global State Routing (GSR)
" Destination Sequenced Distance Vector Routing (DSDV)
165 (IT-8) J
166 (IT-8) J Adhoc Networks
PART- 1
Adhoc Network, Localization, MAC Issues, Routing Protocols,
Global State Routing (GSR), Destination Sequenced
Distance Vector Routing (DSDV).
CONCEPT OUTLINE : PART- 1
An adhoc network is a peer-to-peer wireless network that
transmits from computer to computer without the use of a
control base station.
Manet is a self-configuration wireless adhoc network of mobile
nodes.
Global state routing is based on link state routing.
DSDV is a proactive distance vector routing protocol.
Questions-Answers
Que 5.1. What do you mean by adhoc networks ? What are the
characteristics of adhoc network ?
Answer
1. In contrast to infrastructure based networks, in adhoc networks all
nodes are mobile and can be connected dynamically in an arbitrary
manner.
2 All nodes of these networks behave as routers and take part in discovery
and maintenance of routers to other nodes in the network.
3. Adhoc networks are very useful in emergency search-and-rescue
operations, meetings or conventions in which persons wish to quickly
share information, and data acquisition operations in inhospitable terrain.
4 Adhoc networks are autonomous networks operating either in isolation
or as "stub networks" connecting to a fixed network.
5. They do not necessarily rely on existing infrastructure.
6. No "access point". Each node serves as a router and forwards
for other nodes in the network. packets
7. Topology of the network continuously changes.
Characteristics of adhoc network :
i. An adhoc network comes up together when needed.
167 (IT-8) J
Mobile Computing
ii. An adhoc network grew out of packet radio network.
iü. It requires more battery power to maintain full connectivity between
nodes.
iv. The wireless range is smaller.
V. Becomes more vulnerable for intrusion.
vi. Consecutive packets associated with a given message may take different
routes to destination.
vi. Adhoc network has limited computational power.
vii. Restricted range and lack of infrastructure together indicate the need
for a multibop routing.
Answer
Following are the three types of wireless adhoc network:
1. Mobile Adhoc Network (MANETs)
2 Wireless Mesh Network (WMN)
3. Wireless Sensor Network (WSN)
1 Mobile AdhocNetwork (MANETs):
A MANET is an autonomous collection of mobile users that
communicate over relatively bandwidth constrained wireless links.
b. It is a self configuring network of mobile devices connected by
wireless links.
C. Each device in a MANET is free to move independently in any
direction and will therefore change its links to other devices
frequently.
d. Since the nodes are mobile, the network topology may change
rapidly and unpredictable over time.
e. The network is decentralized, where all network activity including
discovering the topology and delivering messages must be executed
by the nodes themselves, i.e., routing functionality will be
incorporated intomobile nodes.
168 (1T-8) J Adhoc Networks
Router
Base station
B
or gateway
Fig. 5.3.1. Mobile adhoc network architecture.
Description :
1 Fig. 5.3.1 demonstrates the adhoc network formed by the nodes A, B, C,
D, E, F and G.
2 It shows that each mobile device or sensor functions as a node with a
switch or router.
3 An important characteristicof adhoc network architecture is that its
organization can change due to movement of a device or sensor.
4 In other words, the adhoc networks are self-organizing.
established and how
5. The following points illustrate how MANETs are
they recognize themselves.
a. The network organization will change ifD and E move away from
each other such that they reach out of the range ofwireless coverage.
b. Two new adhoc networks willthen be formed
by (i) A, CandD, (ii)
connect to each
A, G, F and E. The devices on two networks can still
other through the common node A.
Real life scenario:
1 Consider a bluetooth-enabled mobile device,
a bluetooth-enabled
computer, and internet with Wi-Ficonnection at home.
TCP/IP internet
2 There is a bluetooth-enabled computer connected to
and also to client printer at ofice.
to home and
3. When the user carrying the device moves from office
handheld PDA mobile device reaches near the home computer, an adhoc
printer
network isestablished between the mobile device at home and
atoffice through intermediate nodes: Wi-Fi, internet and oflice computer.
Adhoc Networks
170 (IT-8) J
Answer
Issues and chalenges in MANETs :
1. MANETs differ from the traditional wired internet infrastructures.
2. The differences introduce difficulties for achieving quality of service in
such networks.
3. Following are some of the problems:
Dynamic topologi3s:
Nodes are free to move arbitrarily; thus, the network topology
which is typically multihop, may change randomly and rapidly
at unpredictable times and may consist of both bidirectional
and unidirectional links.
b. Bandwidth-constrained, variable capacity links:
i. Wireless links will continue to have significantly lower capacity
than their hardwired counterparts.
In addition, the realized throughput of wireless
communications after accounting for the effects of multiple
access, fading, noise and interference conditions etc. is often
much less than a radio's maximum transmission rate.
ii. One effect of the relatively low to moderate link capacities is
that congestion is typically the norm rather than the exception,
i.e., aggregate application demand will likely approach or
exceeds network capacity frequently.
iv. As the mobile network is often simply an extension of the
fixed network infrastructure, mobile adhoc users will demand
similar services.
V. These demands will continue to increase as multimedia
computing and collaborative networking applicaticn rise.
Energy-constrained operation :
1 Some or all of the nodes in a MANET may rely on batteries or
other exhaustible means for their energy.
ii. For these nodes, the most important system design eriteria for
optimization may be energy conservation.
Que 5.5. Why is routing in adhoc network is complicated, what
are the special challenges ? Give some examples of adhoe network.
UPTU2013-14, Marks 10|
UPTU2015-16, Marks 7.5
Mobile Computing 171(IT-8) J
Answer
Routing inadhoc networks is complicated because:
1. In wireless networks with infrastructure support, a base station can
always reach the mobiles nodes, this is not always the case with adhoc
networks.
2. Adestination node might be out of range of a source node transmitting
packets.
3. Routingis needed to find a path between source and destination and to
forward the packet appropriately.
4 In wireless networks using an infrastructure, cells have been defined.
5. Within a cell, the base station can reach all mobile nodes without routing
via a broadcast.
6 In the case of adhoc networks, each node must be able to forward data
for other nodes.
7 This creates many additional problems.
The fundamental differences between wired network and adhoc
network related to routing are :
1 Asymmetric link :
In case of adhoc networks the links are not symmetric that is, a link
from nodeA to node Bmight be good link butthereverse might not
be true.
b. Hence, routing information collected for one direction is of almost
no use for the other direction.
C. However, many routing algorithm of wired network rely on a
symmetric scenario.
2 Redundant link:
a In wired network if some type of redundancy is there between
links, it is controlled by a network administrator.
b In adhoc network nobody controls redundancy.
C
So, there might be many redundant links upto the extreme of a
completely meshed topology.
3. Interference:
In adhoc networks, links depend on the transmission characteristics,
one transmission might interfere with another, and nodes might
overhear the transmission of other nodes.
b. Thus, it creates the problem of unplanned links between nodes.
4 Dynamic topology :
a As when the mobile moves, the medium characteristics might be
changed.
172 (IT-8) J Adhoc Networks
Source-Initiated
Table Driven On-Demand Hybrid
EIGRP ZRP
GSR DSDV WRP AODV DSR LMR ABR
d. The route remains valid till the destination is reachable or until the
route is no longer needed.
e. There are some on-demand routing protocols as discussed below :
Adhoc On-demand Distance Vector Routing (AODV)
Cluster Based Routing Protocol (CBRP)
ii. DynamicSource Routing Protocol (DSR)
iv. Temporally Ordered Routing Protocol (TORA)
V. Associativity Based Routing (ABR)
vi. Signal Stability Routing (SSR)
Que 5.8. Compare table-driven and on-demand routing protocols.
Answer
Comparison of table-driven and on-demand routing protocols :
Que 5.9. Name the main differences between adhoc network and
other network. What advantages do adhoc networks offer ? Explain
in detail by giving suitable example. UPTU 2013-14,Marks 10
175 (IT-8) J
Mobile Computing
Answer
Q. 5.5,
Difference between adhoc network and other network:Refer
Page 170J, Unit-5.
The advantages of an adhoc network include:
1. Separation from central network administration.
2 Self-configuring nodes are also routers.
3. Self-healing through continuous re-configuration.
4. Scalability incorporates the addition of more nodes.
situation where
5 Mobility allows adhoc networks created on the fly in any
there are multiple wireless devices.
6. Flexible adhoc can be temporarily setup at anytime, in any place.
administration.
7 Lower getting-started costs due to decentralized
and
8 The nodes in adhoc network need not reply on any hardware
software.So, it can be connected and communicated quickly.
Answer
Destination sequence distance vector routing (DSD): DSDV is the
extension to Bellman-Ford routing algorithm. This routing protocol was
developed in 1994 by C. Perkins and it is a proactive distance vector routing
protocol. This protocol guarantees loop freeness.
In DSDV:
1. Each node maintains a routing table that contains the information
regarding allpossible routes within a network, the number of hops of
each route and the sequence of each node.
2 This sequence number assigned by the destination node of the route,
shows how old the route is. The lower the sequence number, the older
the route is.When a node Aneeds to select a route to node B it checks
its routing table. If more than one such route is found, the newer one is
used and if more than one route shares the same sequence number
than the shortest route is chosen.
Mobile Computing 177 (IT-8) J
MH,
Fig. 5.11.1. Movement in and DSDV adhoc network.
Structure of the MH, forwarding table :
Table 5.11.1.
Answer
Fisheye State Routing (FSR):
1. FSR is an improvement of GSR(both are based on the link state protocol).
2. The large size ofupdate messages in GSR wastesaconsiderable amount
of network bandwidth.
3. This technique was used to reduce the size of information required to
represent graphical data.
4. The eye of a fish captures with high detail of the pixels near the focal
point.
5. The detail decreases as the distance from the focal point increases.
6. In routing, the Fisheye approach translates to maintain the
accurate distance and path quality information about the immediate
neighbourbood of a node, with progressively less detail as the
distance increases.
6. Here nodes maintain a link state table based on the up-to-date information
received from neighbouring nodes, and periodically exchange it with
their local neighbours only.
7. In FSR, every up-to-date message does not contain information about
all nodes in the network. Here the information about closer node is
exchanged more frequently than it is done about farther nodes, thus
reducing the update message size.
8 The centre node has most up-to-date information about all the nodes in
the inner circle and the accuracy of information decreases as the distance
from node increases.
9 This procedure of dividing network into different scope levels is done at
each node meaning that it is independent on the central entity.
10. Even if anode does not have accurate information about far away
nodes,the packets will be routed correctly because the route information
becomes more and more accurate as the packet gets closer to the
destination.
11. When network size grows large, the update message could consume
considerable amount of bandwidth, which depends on the update period.
12. In order to reduce the size of update messages without seriously affecting
routing accuracy, FSR uses the Fisheye technique.
13. Fig. 5.12.1 illustrates the application of Fisheye in a mobile, wireless
network.
14. The number of levels and the radius of each scope will depend on the
size of the network.
15. The reduction of routing update overhead is obtained by using different
exchange periods for different entries in routing table.
180 (IT-8) J Alboe Nolworka
9
6
(10) Hop - 1
(13
O Hop =2
36 OHop =2
(25) 27 29)23)
24
20) 28 84)
30
(32)
31)
Fig. G.12.1.
16. More precisely, entries corresponding to nodes within the smaller scope
are propagated to the neighbours with the highest frequency.
TT Hop
0
TT Hop 0:(1) 2
0 :(1) 1 1 :(0, 2,3) 1
1 : (0, 2, 3) 0 2: (6, 1, 4) 2
2: (5, 1, 4) 1 3 : (1,4)
3 :(1,4) 1 4 : (5,2, 3) 1
4 : (5, 2, 3) 2 5: (2, 4) 2
5 : (2, 4) 2
TT Hop
0 : (1) 2
1 :(0, 2,3)
2 : (6,1, 4) 1
3 : (1,4) 1
4 : (6, 2, 3) 0
6 : (2, 4) 1
Fig.5.12.2. Message reduction using Fisheye.
Protocol operation :
1 Fisheye state routing is a table-driven or proactive routing protocol. It is
based on link state routing and able to immediately providing route
181 (1T-8) J
Mobile Computing
information when needed. FSR functionality is similar to link state as it
maintains a full topology map at each node.
2. The topology labels are send to local neighbours only. Sequence numbers
are used for entry replacements and for loop free routing
3 The Fisheye scope message updating scheme is highly accurate for
inner scope node as entries in the routing table corresponding to nodes
within the smallest scope are send to the neighbours may blur due to
longer exchange interval but there is no need to find the destination
firstly.
Advantages of FSR:
1. FSR is suitable for large and highly networked environment.
2. It is robust to host mobility.
3. Reduce routing and update traffic.
Disadvantages of FSR :
1. Routing table storage is complex.
2. FSR does not provide any kind of security.
PART-2
Dynamic Source Routing (DSR), Adhoc on Demand Distance
Vector Routing (AOVD), Temporary Ordered Routing Algorithm
(TORA), QOS in Adhoc Networks Applications.
CONCEPT DUTLINE : PART-2
Dynamic source routing isa source routed on-demand routing
protocol in adhoc networks.
AODV minimizes the number of broadcasts by creating routes
on-demand as opposed to DSDV.
TORA isa source initiated on-demand routing algorithm.
Static routing is simply the process of manually entering routes
into a device's routing table via a configuration file that is loaded
when the routing device start up.
Dynamic routing protocols are supported by software applications
running on the routing device which dynamically learn network
destination and how toget tothem.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
182 (IT-8)J AdhocNetworks
Answer
Characteristic of Manet :
routing protocols
The process of path discovery and path maintenance in DSR
are as follows :
1. Route discovery:
route
a. Route discovery allows any host to dynamically discover the
to any destination in the adhoc network.
destination, it
b. When a source node wants to send a packet to a
looks up its route cache to determine ifit already contains a route
to the destination.
exists, then it
C. Ifit finds that an unexpired route to the destination
uses this route to send the packet.
Ifit does not havea valid route, then it sends a route request packet
by broadcasting it to the neighbours.
source address,
e The route request (RREQ) packet contains the
of hops
request id and a route record in which the sequence destination
traversed by the request packet before reaching the
are noted down as shown in Fig. 5.14.1.
2<1,2> <1,3,5,7>
Source 5 <1,3,5>
<l>
8) Destination
<1,3>
<1> <14,6>
<1,4>
Source( 1)
5
8)Destination
<1,4,6>
<1,4,6>
<1,4,6>
Fig. 5.14.2. Propagation of route reply with the route record.
2 Route maintenance :
a. Route maintenance is the procedure of monitoring the correct
operation of route in use.
b. The host that uses the route does this maintenance.
C. DSR uses two type of packets for route maintenance :
Route error packet
Acknowledgements
d. When a node encounters a fatal transmission problem at its data
link layer, it generates a Route Error Packet (RERR).
e. When a node receives a route error packet, it removes the hop in
error from its routing cache.
All routes that contain the hop in error are truncated at that point.
Acknowledgement packets are used to verify the correct operation
of the route links.
h. This also includes passive acknowledgements in which a node hears
the next hop forwarding the packet along the route.
Answer
The path discovery and path maintenance of AODV is done as follows :
Path discovery :
1 AODV uses a broadcast route discovery mechanism. Path discovery
process is initiated when a node reguires to comm1nicate with a node
for which it has no route by broadcasting a route request (RREQQ packet
containing the source address, source sequence number, broadcast ID,
destination address, destination segquence number, hop count to its
neighbours.
2. Hop count is initially 0and is incremented by each node as it forwards
the RREQ towards the destination.
3. An intermediate node upon receiving a RREQ first checks that RFEQ
was received over a bidirectional link.
4. Ifit has then it checks if it has already processed a similar RREQ packet
and if it has then the RREQ packet is discarded.
5. Otherwise, the node checks if it has a route entry for the destination. If
it has a routing table entry for the destination then it replies to the
source only if the destination sequence number in RREQ is greater
than the destination sequence number in its route table otherwise it
rebroadcasts the RREQ packet.
6. Reverse path is established as the RREQ traverses towards the
destination.
7. The destination or the intermediate node responds to RREQ packet
with a route reply (RREP)packet having similar fields as that of RREQ
packet, RREP travels back to the source using the reverse paths.
Route request in AODV:
B
(M)
F
B
G
H
N
K
(M) L
D N
M L
(B)
M
(A
{D
Node Ddoes not forward RREQ, because node Dis the intended target
of the RREQ.
Route reply in AODV:
A
H
Mobile Computing 189 (IT-8) J
Forward links are setup when RREP travels along the reverse path.
Represents a link on the forward path
Data delivery in AODV:
Fig. 5.16.1.
Routing table entries is used to forward data packet. Route is not
included in packet header.
Answer
AODV: Refer Q. 5.16, Page 185J, Unit-5.
TORA:
algorithm.
1 The TORA is a source initiated on-demand routing
distributed routing algorithm
2 It is a highly adaptive, efficient and scalable
based on the concept of link reversal.
reaction to topology
3 This protocol is mainly designed to minimize the
changes.
multihop wireless
4. TORA is proposed for highly dynamic mobile,
networks.
to a destination node.
5. TORA finds multiple routes from a source node
messages are localized to
6 The main feature of TORA is that the control
topological change.
avery smallset of nodes near the occurrence of a
about adjacent nodes.
7. To this, the nodes maintain routing information
8
: Logical time of a link
Each node has a quintuple associated with it ordering parameter, the
failure, a reference indicator bit, a propagation level.
reference
unique ID of the node that defined new
190 (IT-8) J Adhoc Networks
Source (1)Y
(-, -)
Destination
0,3)
Source (1
(0,3) 6
(0,2) (0,0)
8
3(0,3) Destination
(0,2) (0,1)
4 6
21,-1) G0,1)
Source 1
(1,-3) 5
(1,0) (0,0)
8
3) (1,1) Destination
(0,2 (0,1)_
6
Answer
Issues of QOS routing : Issues of QoS routing in adhoc networks :
194 (IT-8) J Adhoc Networks
Answer
1. For obtaining QoS (Quality of Service) on a MANET, it is not sufficient
to provide a basic routing functionality.
Mobile Computing 195 (IT-8) J