Академический Документы
Профессиональный Документы
Культура Документы
Nitin Birari
Bluetooth
Allows users to make ad hoc connection between devices like mobile phones, desktop or notebook without any cable. Can easily transfer data @ speed about 720 Kbps within 50 meters. Uses unlicensed 2.4 GHz ISM frequency band. 79 Bluetooth channels spaced 1 MHz apart from 2.402 GHz to 2.480 GHz. Allows power levels starting from 1 mW covering 10 cm to 100 mW covering upto 100 meters. Supports unicast and multicast connection and defined as 802. 15a standard by IEEE. P-to-P and P-to-M connection Uses concept of master-slave Piconet & Scatternet ACL & SCO links
Cont
Adopted Protocols: 1. PPP 2. TCP/IP 3. OBEX 4. Content Formats.
Classification
On Frequency: 1) 132.4 KHz 2) 13.56 MHz 3) 433 MHz 4) 918 MHz 5) 2.4 GHz 6) 5.8 GHz Low frequency tags are used for slow moving object like security access, asset tracking, animal identification application. High frequency tags are used for fast moving object like railway wagon tracking, identification of vehicles on highway.
Cont
On application : Used in different application. Uses 2 different memory segments. One is a factory set used to uniquely identify the tag and other store application specific data in tag.
Cont
Power Based Grouping: 1. Active Tags 1. Powered by internal battery and can read/write. 2. Life is limited by life of battery. Approx. 10 years. 3. Data can be rewritten/modified. 4. Longer read range. Expensive. 2. Passive Tags 1. Operates without power of its own. Obtain power from readers antenna. 2. Data is read only. Less expensive. 3. Unlimited operational life.
Applications
Transportation & Logistic. Manufacturing and Processing. Security. Animal Tagging. Store in an enterprise. Retail Store. Community Library. Time & Attendance. Postal tracking. Road toll collection.
Architecture
Cont
Convergence Layer:
Above MAC Layer Provides function specific to service being provided For example digital audio/video multicast, digital telephony, ATM, Internet Access, frame relay etc.
Mobile IP
Discovery Registration Tunneling
Need for IPV6. Address Space it uses 128 bit address and can support 3.4x1038 address. Two address. Global Address & Local Address. Global address are used for routing in global internet. Link local address available for subnet. It uses hierarchical addressing. RIR (Regional Internet Registration), NIR (National Internet Registration), LIR (Local Internet Registration).
IPV6
Cont
Three level of address. 1. Public Topology (48 bit external routing prefix). 2. Site Topology (16 bit subnet number). 3. Interface Identifier (Automatically generated 64 bit number unique on the local LAN segment).
IPV6 Security
In built security mechanism called IPSec which provides privacy, integrity and authentication. It uses,
Diffie-Hellman Key exchange algorithm. Public key cryptography to avoid man in the middle attack. Bulk encryption algorithm like 3 DES. Hash algorithms like HMAC, MD5, SHA. Digital Certificate.
Ad Hoc Networks
What is ad hoc network? Need of ad hoc network? 1. All other network requires infrastructure. 2. In some situation user and network can not rely on infrastructure. 3. Infrastructure is not possible or too expensive.
Cont
Cont
Diff between wired and wireless network
Asymmetric Links Redundant Links Interference
Problem in measuring the delay between nodes. Hardware limitations like battery. Wastage of bandwidth because of frequent updates in routing tables. Each nodes should have information like current connectivity between all nodes, expected traffic flow, capacities of all links, delay of all links, computing power of each nodes.
Cont
Routing Table for Node A
Destination N1 N2 N3 N4 N5 Next Hop N1 N2 N2 N4 N4 Metric 0 1 2 1 2 Seq No S1-321 S2-218 S3-243 S4-092 S5-263 Install Time T1 T2 T3 T4 T5
Cont
If node needs to discover a new route, it broadcast a route request with a unique identifier and destination address as parameter. Any node that receives a route request does following: 1. If node has already received route request (Identified by unique identifier) it drops request packet. 2. If node recognize its own address as destination, the request has reached its target. 3. Otherwise node appends its own address to list of traversed hops in the packet and broadcast this updated routing request. Destination will receive several paths but it will return the best path.
Hierarchical Algorithms
Both previous algorithms will work good only for small number of nodes. Nodes are divided in cluster. Locality property followed. If nodes within the cluster changes, only nodes of the cluster have to be informed. Each cluster is having cluster head which acts as gateway for cluster. Cluster are combined into super cluster.
Alternative Metrics
In few situations other metrics like bandwidth, link quality, interference is also being used. Least Interference Routing (LIR) takes possible interference into account.
TCP Connections
Used to identify communication end points. Uses PORT numbers along with IP address to identify communication end points. Connections are maintained by TCP, UDP, RTP.
Wireless TCP
In Traditional TCP 1. Congestion Control. 2. Slow Start. 3. Fast retransmission/ fast recovery 4. Implications on Mobility.
Cont
Segments TCP into two parts. (1) Fixed Part (2) Wireless Part. Traditional TCP for fixed connection, I TCP for wireless connection. Host in fixed network does not notice the segmentation. FA acts as relay all data in both directions. If host sends a packet, FA ack the packet to host and sends the packet to MH. After receiving packet MH ack packet to FA. If packet is lost host would not notice it and FA will retransmit the packet. If MH sends the packet, FA ack it, then FA will forward packet to host.
Advantages
Does not requires any changes in traditional TCP. Due to strict partitioning into two connection, transmission errors of wireless link can not propagate into fixed network. It is always dangerous to introduce new mechanism in to huge network like Internet without exactly knowing their behavior. Optimization of these new mechanism is quite simple because they only cover few hopes. The short delay between FA and MH can use precise time outs which make retransmissions much faster. Allows use of different transport layer protocol for different connections. FA acts as gateway.
Disadvantages
Loss of end-to-end semantics of TCP might cause problems if FA crashes. If user apply end-to-end encryption, all security mechanisms has to be implemented on FA.
Snooping TCP
Cont
Loss of end-to-end TCP semantics in I-TCP. If FA crashes whole data loss for which sender has already got ack. In S-TCP FA buffers all packets and additionally Snoops the packet flow in both direction to recognize ack. FA buffers every packets until it snoops acknowledgement from MH. After snooping ack FA will discard the packet from buffer. If FA will not able snoop ack then it will retransmit the packet from buffer.
Cont
For data transfer from MH to CH FA snoops packet stream to detect gaps in sequence number s of TCP. If FA detects gap in sequence number it returns negative ack (NACK) to MH and MH now will retransmit the packet. Reordering of packets done automatically at CH by TCP
Advantages
Preservation of end-to-end TCP semantics. No major effect if FA crashes.
Disadvantages
Does not isolate behavior of wireless link as ITCP. Two retransmissions. One from FA and another from CH. Use of NACK requires additional mechanism on FA and MH. If user apply end-to-end encryption, all security mechanisms has to be implemented on FA.
Cont
M-TCP assumes low bit error on wireless link. SH does not perform retransmission so if packet is lost it has to be retransmitted by CH. If SH only monitors flow of packet and ack. If SH does not receive packet it assumes disconnection. It then chocks the sender by setting senders window size to 0. As soon as SH discover connectivity again it reopens the window to older value and sender can now transmit at full speed.
Advantages
Maintains end-to-end semantics of TCP. If MH is disconnected then avoid unnecessary retransmission.
Disadvantages
M-TCP assumes low error rate of wireless link which is not always a valid assumption. So wireless link errors is propagated to sender.
Selective Retransmission
TCP ack are cumulative. So if single packet is loss sender has to retransmit everything starting from loss packet (GO BACK N). This waste the bandwidth. TCP can indirectly request for selective retransmission . In selective retransmission receiver can ack single packet not group of packet.
Advantages
Lower bandwidth requirement for wired as well as wireless links. Disadvantages More complex software required at receiver side. More buffer is required to re sequence the data and to wait for gaps to be filled.