Вы находитесь на странице: 1из 55

Mobile Technologies

Nitin Birari

Bluetooth
Allows users to make ad hoc connection between devices like mobile phones, desktop or notebook without any cable. Can easily transfer data @ speed about 720 Kbps within 50 meters. Uses unlicensed 2.4 GHz ISM frequency band. 79 Bluetooth channels spaced 1 MHz apart from 2.402 GHz to 2.480 GHz. Allows power levels starting from 1 mW covering 10 cm to 100 mW covering upto 100 meters. Supports unicast and multicast connection and defined as 802. 15a standard by IEEE. P-to-P and P-to-M connection Uses concept of master-slave Piconet & Scatternet ACL & SCO links

Bluetooth Protocol Stack

Bluetooth Protocol Stack


Bluetooth Core Protocols: 1. Baseband 2. Link Manager Protocol (LMP) 3. Logical Link Control and Adaption Protocol (L2CAP) 4. Service Discovery Protocol (SDP) Cable Replacement Protocols: 1. Radio Frequency Communication (RFCOMM) Telephony Control Protocol: 1. Telephony Control Protocol Binary 2. AT-commands

Cont
Adopted Protocols: 1. PPP 2. TCP/IP 3. OBEX 4. Content Formats.

Bluetooth Application Models


File Transfer. Internet Bridge. LAN Access. Synchronization. Headset.

Radio Frequency Identification (RFID)


It is a radio transponder carrying a ID that can be read through radio frequency (RF) interface. To assign identity to the object tag is attached to it. Different functional areas are: 1. Reading the data from the tag. 2. Filtering some of the data. 3. Communication of data in the tag with host computer. 4. Updating or entering customized data into the tag.

Classification
On Frequency: 1) 132.4 KHz 2) 13.56 MHz 3) 433 MHz 4) 918 MHz 5) 2.4 GHz 6) 5.8 GHz Low frequency tags are used for slow moving object like security access, asset tracking, animal identification application. High frequency tags are used for fast moving object like railway wagon tracking, identification of vehicles on highway.

Cont
On application : Used in different application. Uses 2 different memory segments. One is a factory set used to uniquely identify the tag and other store application specific data in tag.

Cont
Power Based Grouping: 1. Active Tags 1. Powered by internal battery and can read/write. 2. Life is limited by life of battery. Approx. 10 years. 3. Data can be rewritten/modified. 4. Longer read range. Expensive. 2. Passive Tags 1. Operates without power of its own. Obtain power from readers antenna. 2. Data is read only. Less expensive. 3. Unlimited operational life.

Applications
Transportation & Logistic. Manufacturing and Processing. Security. Animal Tagging. Store in an enterprise. Retail Store. Community Library. Time & Attendance. Postal tracking. Road toll collection.

Wireless Broadband (WiMax)


802.16. Also called Wireless MAN. Integrated voice, data and video service. Broadband wireless access that link home and business to core telecommunication network. Provides network access to buildings through exterior antennas communicating with radio base stations. Network can be created in just few weeks. Network can grow as the demand increases. Number of active users are always in fraction of number of subscribers so number of channel required is low compared to number of subscriber.

Architecture

Three Layer Architecture


Physical Layer: 1. It specifies frequency band, modulation scheme, error detection, synchronization, data rate and multiplexing structure. Medium Access Control (MAC) Layer: 1. Transmission of data in frames. 2. Controlling access to shared wireless medium. 3. Defines how and when a base station or subscriber station may initiate transmission on the channel.

Cont
Convergence Layer:
Above MAC Layer Provides function specific to service being provided For example digital audio/video multicast, digital telephony, ATM, Internet Access, frame relay etc.

Mobile IP
Discovery Registration Tunneling

Need for IPV6. Address Space it uses 128 bit address and can support 3.4x1038 address. Two address. Global Address & Local Address. Global address are used for routing in global internet. Link local address available for subnet. It uses hierarchical addressing. RIR (Regional Internet Registration), NIR (National Internet Registration), LIR (Local Internet Registration).

IPV6

Cont
Three level of address. 1. Public Topology (48 bit external routing prefix). 2. Site Topology (16 bit subnet number). 3. Interface Identifier (Automatically generated 64 bit number unique on the local LAN segment).

IPV6 Security
In built security mechanism called IPSec which provides privacy, integrity and authentication. It uses,
Diffie-Hellman Key exchange algorithm. Public key cryptography to avoid man in the middle attack. Bulk encryption algorithm like 3 DES. Hash algorithms like HMAC, MD5, SHA. Digital Certificate.

IPV6 packet payload


Come with label of Class of Service Support Neighbor discovery feature.

Migration from IPV4 to IPV6


Migration of Network component like Router 1. No change in bottom two layer between both. So no need to change HUB and Switch. 2. Change in packet header so router need to be upgraded. 3. Tunneling can be used. Migration of computing Nodes Migration of Applications.

Interconnecting IPV6 Networks


Can be accomplished by Tunneling. TSP can offer end to end IPV6 service without major upgrades to the infrastructure and without impacting current IPV4 services.

Mobile IP with IPV6


Retains idea of home agent and home network. Configuration of care of address done by neighbor discovery and Address Auto configuration. So foreign agent do not required to support mobility in IPV6.

Ad Hoc Networks
What is ad hoc network? Need of ad hoc network? 1. All other network requires infrastructure. 2. In some situation user and network can not rely on infrastructure. 3. Infrastructure is not possible or too expensive.

Use of Ad Hoc Network


Instant Infrastructure. Disaster Relief. Remote Areas. Effectiveness.

Routing in Ad Hoc Network


Mobility of Nodes

Cont

Cont
Diff between wired and wireless network
Asymmetric Links Redundant Links Interference

Problem in measuring the delay between nodes. Hardware limitations like battery. Wastage of bandwidth because of frequent updates in routing tables. Each nodes should have information like current connectivity between all nodes, expected traffic flow, capacities of all links, delay of all links, computing power of each nodes.

Destination Sequence Distance Vector (DSDV) Routing


Traditional Distance Vector Routing is suffering from count to infinity problem. Enhancement in distance vector routing. Adds 2 things. 1. Sequence Number 1.1 Router advertisement propagates along many paths. 1.2 Helps to apply advertisement in correct order. 2 Damping 2.1 Change in topology should not be updated if change are not stable.

Cont
Routing Table for Node A
Destination N1 N2 N3 N4 N5 Next Hop N1 N2 N2 N4 N4 Metric 0 1 2 1 2 Seq No S1-321 S2-218 S3-243 S4-092 S5-263 Install Time T1 T2 T3 T4 T5

Dynamic Source Routing (DSR)


Updating of routing tables frequently unnecessary traffic in network. Prevents nodes from saving battery power. DSR divides task of routing into two separate problems. 1. Route Discovery A node only tries to discover the route to destination if it has to send something to this destination and there is currently no known route. 2. Route Maintenance If a node continuously sending packets via a route, it has to make sure that the route is held upright. As soon as node detects problem with current route it has to find alternative route.

Cont
If node needs to discover a new route, it broadcast a route request with a unique identifier and destination address as parameter. Any node that receives a route request does following: 1. If node has already received route request (Identified by unique identifier) it drops request packet. 2. If node recognize its own address as destination, the request has reached its target. 3. Otherwise node appends its own address to list of traversed hops in the packet and broadcast this updated routing request. Destination will receive several paths but it will return the best path.

Hierarchical Algorithms
Both previous algorithms will work good only for small number of nodes. Nodes are divided in cluster. Locality property followed. If nodes within the cluster changes, only nodes of the cluster have to be informed. Each cluster is having cluster head which acts as gateway for cluster. Cluster are combined into super cluster.

Alternative Metrics
In few situations other metrics like bandwidth, link quality, interference is also being used. Least Interference Routing (LIR) takes possible interference into account.

TCP Connections
Used to identify communication end points. Uses PORT numbers along with IP address to identify communication end points. Connections are maintained by TCP, UDP, RTP.

Two Level Addressing


Come in to the picture while node changes its Point Of Attachment in network. Level 1 address is Home Address. Level 2 address is care-of Address. Also called Two Tier IP addressing. One for locating the mobile computer and other is for identifying a communication end point

Abstract Mobility Management Model


Following abstract functions are needed to support mobility. 1. Readdressing at the Home Network. 2. Associating (in the location directory) the home address and the care-of address of the MN and maintaining up-to-date values for the association. 3. Delivering the datagram to the care-of address. 4. Inverting the readdressing operation once the datagram arrives at care-of address.

Wireless TCP
In Traditional TCP 1. Congestion Control. 2. Slow Start. 3. Fast retransmission/ fast recovery 4. Implications on Mobility.

Indirect TCP (I-TCP)

Cont
Segments TCP into two parts. (1) Fixed Part (2) Wireless Part. Traditional TCP for fixed connection, I TCP for wireless connection. Host in fixed network does not notice the segmentation. FA acts as relay all data in both directions. If host sends a packet, FA ack the packet to host and sends the packet to MH. After receiving packet MH ack packet to FA. If packet is lost host would not notice it and FA will retransmit the packet. If MH sends the packet, FA ack it, then FA will forward packet to host.

Advantages
Does not requires any changes in traditional TCP. Due to strict partitioning into two connection, transmission errors of wireless link can not propagate into fixed network. It is always dangerous to introduce new mechanism in to huge network like Internet without exactly knowing their behavior. Optimization of these new mechanism is quite simple because they only cover few hopes. The short delay between FA and MH can use precise time outs which make retransmissions much faster. Allows use of different transport layer protocol for different connections. FA acts as gateway.

Disadvantages
Loss of end-to-end semantics of TCP might cause problems if FA crashes. If user apply end-to-end encryption, all security mechanisms has to be implemented on FA.

Snooping TCP

Cont
Loss of end-to-end TCP semantics in I-TCP. If FA crashes whole data loss for which sender has already got ack. In S-TCP FA buffers all packets and additionally Snoops the packet flow in both direction to recognize ack. FA buffers every packets until it snoops acknowledgement from MH. After snooping ack FA will discard the packet from buffer. If FA will not able snoop ack then it will retransmit the packet from buffer.

Cont
For data transfer from MH to CH FA snoops packet stream to detect gaps in sequence number s of TCP. If FA detects gap in sequence number it returns negative ack (NACK) to MH and MH now will retransmit the packet. Reordering of packets done automatically at CH by TCP

Advantages
Preservation of end-to-end TCP semantics. No major effect if FA crashes.

Disadvantages
Does not isolate behavior of wireless link as ITCP. Two retransmissions. One from FA and another from CH. Use of NACK requires additional mechanism on FA and MH. If user apply end-to-end encryption, all security mechanisms has to be implemented on FA.

Mobile TCP (M-TCP)


Dropping of packet due to bad link is not phenomenon of wireless network. One of the reason is occurrence of lengthy and frequent disconnection. FA has to buffer more and more data thus longer the period of disconnection is more buffer is needed. M TCP is having same goal as I-TCP and S-TCP. Additionally it solves problem of frequent disconnection. M-TCP split the connection at a special host called SUPERVISORY HOST (SH). Traditional TCP used between host and SH and M-TCP used between SH and MH.

Cont
M-TCP assumes low bit error on wireless link. SH does not perform retransmission so if packet is lost it has to be retransmitted by CH. If SH only monitors flow of packet and ack. If SH does not receive packet it assumes disconnection. It then chocks the sender by setting senders window size to 0. As soon as SH discover connectivity again it reopens the window to older value and sender can now transmit at full speed.

Advantages
Maintains end-to-end semantics of TCP. If MH is disconnected then avoid unnecessary retransmission.

Disadvantages
M-TCP assumes low error rate of wireless link which is not always a valid assumption. So wireless link errors is propagated to sender.

Selective Retransmission
TCP ack are cumulative. So if single packet is loss sender has to retransmit everything starting from loss packet (GO BACK N). This waste the bandwidth. TCP can indirectly request for selective retransmission . In selective retransmission receiver can ack single packet not group of packet.

Advantages
Lower bandwidth requirement for wired as well as wireless links. Disadvantages More complex software required at receiver side. More buffer is required to re sequence the data and to wait for gaps to be filled.

Transaction oriented TCP (T-TCP)


Useful in applications using client server architecture which is exchanging short messages with server. TCP uses three way handshake to establish and release a connection. So total 7 packet are needed to send only one packet. T-TCP combines packets for connection establishment and connection release with data packets. This can reduce to number of packet to two. Advantage is reduction in overhead of connection setup and release. Disadvantage is it requires change in MH and all CH.

Вам также может понравиться