Unit - I: IT6601 - Mobile Computing
Unit - I: IT6601 - Mobile Computing
UNIT – I
INTRODUCTION
Part - A
Mobile Computing is defined as the ability to compute remotely while on the move. It
is a fast and emerging field that enables people to access information from anywhere at
any time. Mobile computing is also known as Ubiquitous computing (or) Nomadic
Computing.
Advantages of Mobile Computing:
Tremendous flexibility to users.
User and device mobility
Wireless communication
Ubiquitous
Portable computing platform
Provide innovative services.
Page 1 of 129
IT6601 – MOBILE COMPUTING
Page 2 of 129
IT6601 – MOBILE COMPUTING
11. What do you mean by hidden and exposed terminal problem? (Dec 2012(MP))
Hidden and Exposed Terminals: Consider the scenario with three mobile phones as
shown below. The transmission range of A reaches B, but not C (the detection range does
not reach C either). The transmission range of C reaches B, but not A. Finally, the
transmission range of B reaches A and C, i.e., A cannot detect C and vice versa.
Page 3 of 129
IT6601 – MOBILE COMPUTING
Hidden terminals
A sends to B, C cannot hear A
C wants to send to B, C senses a “free” medium (CS fails) and starts transmitting
Collision at B occurs, A cannot detect this collision (CD fails) and continues with
its transmission to B
A is “hidden” from C and vice versa
Exposed terminals
B sends to A, C wants to send to another terminal (not A or B) outside the range
C senses the carrier and detects that the carrier is busy.
C postpones its transmission until it detects the medium as being idle again
but A is outside radio range of C, waiting is not necessary
C is “exposed” to B
Hidden terminals cause collisions, where as Exposed terminals causes’
unnecessary delay.
13. Why is the physical layer in IEEE 802.11 subdivided? (Nov 2015)
Depending on transmission technology, bandwidth, etc, different physical
layers exist.
They all share a common MAC.
In order to adapt the different lower parts of the physical layer a sub layer
offers common function required by MAC, eg. Carrier sensing.
Page 4 of 129
IT6601 – MOBILE COMPUTING
15. How does near/far effect influence TDMA Systems? (Nov 2015)
As long as a station can receive a signal and the signal arrives at the right time to hit
the right time-slot it does not matter in TDMA systems if terminals are far or near.
Part - B
University Questions
Mobile Computing
1. Discuss in detail about Mobile Computing and its characteristics and also illustrate the
structure of mobile computing applications. (16) (Reg. 2013)
2. Discuss in detail about Mobile computing and compare mobile computing with wireless
computing. (8) (Reg. 2013)
MAC Protocols
3. i) Compare the characteristic features of FDMA, CDMA and TDMA mechanisms. (8)
(May 2013) (12) (Dec 2013)
ii) Compare and Contrast SDMA, FDMA, TDMA and CDMA. (10) (Nov 2012)
iii) Compare the mechanisms of SDMA, FDMA, TDMA and CDMA with their functions
(8) (May 2013)
iv) Explain with an example the behavior of CDMA with the spreading using orthogonal
codes. (8) (May 2014) (16) (Dec 2014)
v) Explain the various TDMA techniques. (16) (May 2015)
MAC Issues
4. i) Explain in detail Multiple Access with Collision Avoidance Scheme. Also explain the
advantage of the same. (12) (Dec 2013)
ii) What is Hidden and Exposed Terminal problem? Explain how MACA (Multiple Access
with Collision Avoidance) scheme avoids hidden and Exposed terminal problem? (16)
(May 2014)
Page 5 of 129
IT6601 – MOBILE COMPUTING
Part – B
1. Discuss in detail about Mobile Computing and its characteristics and also illustrate the
structure of mobile computing applications. (16) (REG 2013)
Mobile Computing: Mobile computing is defined as the ability to compute remotely while on
the move. Mobile computing includes two concepts: Mobility and Computing.
Computing:
The process of utilizing computer technology to complete a task. Computing involve
computer hardware and/or software.
Ubiquity
The meaning of ubiquity is present everywhere. Ubiquity means the ability of a user to
perform computations from anywhere and at anytime.
For example, a business executive can receive business notifications and issue business
transactions as long he is in the wireless coverage area. Ubiquity is the state of being
everywhere all the time. Some ubiquity is real and some only seems real.
Page 6 of 129
IT6601 – MOBILE COMPUTING
Location awareness
A hand-held device equipped with global positioning system (GPS) can provide
information about the current location of a user to a tracking station. Many applications
require or get value additions by location based services
For example, a person travelling by road in a car, may need to find out a petrol bulk that
may be available nearby. He can easily locate it through mobile computing where an
application may show the nearby petrol bulk. Other applications include traffic control, fleet
management and emergency services.
In a traffic control application, the density of traffic along various roads can be dynamically
monitored, and traffic can be directed appropriately to reduce congestions. Location awareness
can also make emergency services more effective by automatically directing the emergency
service vehicles to the site of the call.
Adaptation
Adaptation in mobile computing means the ability an application or algorithm has to output
different valid results, depending on the characteristics of the environment where the mobile
device is located. This is not common in fixed systems, where the conditions are practically
stable. In mobile systems, however, the environment is highly variable, which leads to this
solution
Adaptation in the context of mobile computing implies the ability of a system to adjust to
bandwidth fluctuation without inconveniencing the user. In a mobile computing environment,
adaptation is crucial because of intermittent disconnections and bandwidth fluctuations that
can arise due to a number of factors such as handoff, obstacles, environmental noise, etc.
Broadcast
For example, all users at a specific location, such as those near a railway station, may be
sent advertising information by a taxi service operator.
Personalization
Page 7 of 129
IT6601 – MOBILE COMPUTING
example, a mobile user may need only a certain type of information from specific sources.
This can be easily done through personalization.
Presentation (Tier-1)
Application (Tier-2)
Data (Tier-3)
Tiered Architecture:
It also maintains an effective networked client server design. It also provides increased
performance, flexibility, maintainability, reusability and scalability while hiding the
complexity of distributed processing from the user.
Page 8 of 129
IT6601 – MOBILE COMPUTING
Three-tier architecture allows any one of the three tiers to be upgraded or replaced
independently. The user interface is implemented on a desktop PC and uses a standard
graphical user interface with different modules running on the application server. The
relational database management system on the database server contains the computer data
storage logic. The middle tiers are usually multi tiered.
The figure 1.1 shows the types of functionalities provided by each tier. The three tiers
are named Presentation tier, Application tier and Data tier.
Presentation tier
The topmost level of a mobile computing application concerns the user interface. The
presentation layer ensures that the communications passing through are in the appropriate
form for the recipient. For example, a presentation layer program may format a file transfer
request in binary code to ensure a successful file transfer.
Another example of a program that generally adheres to the presentation layer of OSI
is the program that manages the Web's Hypertext Transfer Protocol (HTTP). This program,
sometimes called the HTTP daemon, usually comes included as part of an operating system.
It forwards user requests passed to the Web browser on to a Web server elsewhere in the
network.
It receives a message back from the Web server that includes a Multi-Purpose Internet
Mail Extensions (MIME) header. The MIME header indicates the kind of file (text, video,
audio, and so forth) that has been received so that an appropriate player utility can be used to
present the file to the user. Major browsers also possess incremental find features to search
within a web page.
User Interface
Most major web browsers have these user interface elements in common are as follows:
Back and forward buttons to go back to the previous resource and forward
respectively.
A refresh or reload button to reload the current resource.
A stop button to cancel loading the resource. In some browsers, the stop button is
merged with the reload button.
A home button to return to the user's home page.
An address bar to input the Uniform Resource Identifier (URI) of the desired resource
and display it.
A search bar to input terms into a search engine. In some browsers, the search bar is
merged with the address bar.
A status bar to display progress in loading the resource and also the URI of links when
the cursor hovers over them, and page zooming capability.
Page 9 of 129
IT6601 – MOBILE COMPUTING
The viewport, the visible area of the webpage within the browser window.
The ability to view the HTML source for a page.
A good user interface facilitates the users to issue requests and to present the results to them
meaningfully. Obviously, the programs at this layer run on the client’s computer. This layer
usually includes web browsers and customized client programs for dissemination of
information and for collection of data from the user.
Find the list of sales made in last year sum of all sales
Sales 1
Query
Sales 2 Tier 2
Sales 3
Sales 4
Tier 3
Database Storage
Fig. 1.2 Functionalities provided by each tier structure of a mobile computing
application
Page 10 of 129
IT6601 – MOBILE COMPUTING
The primary purpose of a web browser is to bring information resources to the user allowing
them to view the information and then access other information This process begins when the
user inputs a Uniform Resource Locator (URL). The prefix of the URL, the Uniform
Resource Identifier or URI, determines how the URL will be interpreted. The most
commonly used kind of URI starts with http: and identifies a resource to be retrieved over the
Hypertext Transfer Protocol (HTTP).
Application tier
This layer has the vital responsibility of making logical decisions and performing
calculations. It also moves and processes data between the presentation and data layers. It
performs the processing of user input, obtaining information and then making decisions. This
layer is implemented using technology like Java, .NET services, cold fusion, etc.
The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model
and in the TCP/IP protocol suite. It consists of protocols that focus on process-to-process
communication across an IP network and provides a firm communication interface and end-
user services.
The implementation of this layer and the functionality provided by this layer should be
database independent. This layer of functionalities is usually implemented on a fixed server.
An application layer is an abstraction layer that specifies the shared protocols and interface
methods used by hosts in a communications network.
Data tier
This layer is also called as Database management or data tier. The data tier is
responsible for providing the basic facilities of data storage, access, and manipulation. Often
this layer contains a database. The information is stored and retrieved from this database. But,
when only small amounts of data need to be stored, a file system can be used. This layer is
also implemented on a fixed server.
2. Discuss in detail about various MAC protocol schemes. (16) (Reg. 2013)
MAC protocols
The Medium Access Control (MAC) protocol is used to provide the data link layer of
the Ethernet LAN system. The MAC sub layer provides addressing and channel access
control mechanisms that make it possible for several terminals or network nodes to
communicate within a multiple access network that incorporates a shared medium, e.g. an
Ethernet network. The hardware that implements the MAC is referred to as a media access
controller. MAC schemes are essentially multiplexing schemes.
Page 11 of 129
IT6601 – MOBILE COMPUTING
The MAC sub layer acts as an interface between the logical link control (LLC) sub
layer and the network’s physical layer. The MAC layer emulates a full-duplex logical
communication channel in a multi-point network. This channel may provide unicast,
multicast or broadcast communication service. A large number of MAC protocols have been
proposed. These MAC protocols can be broadly classified into the following categories.
Page 12 of 129
IT6601 – MOBILE COMPUTING
Demand assignment allows all users apparently continuous access of the radio spectrum by
assigning carrier frequencies on a temporary basis using a statistical assignment process.
Features
The above figure shows a division of the existing bandwidth into many channels
(shown as Ch 1, Ch 2, etc.). For full duplex communication to take place, each user is
allocated a forward link (channel) for communicating from it (mobile handset) to the base
station (BS), and a reverse channel for communicating from the BS to it.
Thus, each user making a call is allocated two unique frequency bands (channels), one
for transmitting and the other for receiving signals during the call. Obviously, when a call is
underway, no other user would be allocated the same frequency band to make a call. Unused
transmission time in a frequency band that occurs when the allocated caller pauses between
transmissions, or when no user is allocated a band, goes idle and is wasted. FDMA, therefore,
does not achieve high channel utilization.
Page 13 of 129
IT6601 – MOBILE COMPUTING
Time division multiple access (TDMA) is a channel access method for shared medium
networks. It allows several users to share the same frequency channel by dividing the signal
into different time slots. The users transmit in rapid succession, one after the other, each
using its own time slot. DMA (time division multiple access) is a technology used in digital
cellular telephone communication that divides each cellular channel into three time slots in
order to increase the amount of data that can be carried.
TDMA is an access method in which multiple nodes are allotted different time slots to
access the same physical channel. That is, the timeline is divided into fixed-sized time slots
and these are divided among multiple nodes who can transmit. Here all sources use the same
channel, but take turns in transmitting. In TDMA , each user of the channel owns the channel
for exclusive use for one timeslot at a time in a round robin fashion
The above figure shows the situation where time slots are allocated to users in a round
robin manner, with each user being assigned one time slot per frame. Obviously, unused time
slots go idle, leading to low channel utilization.
In CDMA, multiple users are allotted different codes that consist of sequences of 0
and 1 to access the same channel. As shown below, a special coding scheme is used that
allows signals from multiple users to be multiplexed over the same physical channel. As
shown in the figure, three different users who have been assigned separate codes are
multiplexed on the same physical channel.
Page 14 of 129
IT6601 – MOBILE COMPUTING
In CDMA, multiple users use the same frequency at the same time and no time
scheduling is applied. All the senders send signals simultaneously through a common
medium. The bandwidth of this medium is much larger than the space that would be allocated
to each packet transmission during FDMA and the signals can be distinguished from each
other by means of a special coding scheme that is used. This is done with the help of a
frequency spreading code known as the m-bit pseudo-noise (PN) code sequence.
Using m bits, 2m – 1 different codes can be obtained. From these codes, each user will
use only one code. It is possible to distinguish transmissions from different nodes by ensuring
some properties on the codes. A code for a user should be orthogonal (that is, non-interfering)
to the codes assigned to other nodes. The term “orthogonal” means that the vector inner
product is zero, and good autocorrelation uses the bipolar notation where a code sequence of
binary 0 is represented as –1 and binary 1 is represented as +1. On the receiving end, only the
same PN sequence is able to demodulate the signal to successfully convert the input data.
For simplicity, we assume that all nodes transmit on the same frequency at the same
time using the entire bandwidth of the transmission channel. Each sender has a unique
random number key, and the sender XORs the signal with this random number key. The
receiver can “tune” into this signal if it knows the pseudorandom number.
At the receiver, in order to receive the data sent by sender X, the signal Z is dispread.
So now if Z wants to get information of sender X data, then Z*X_key = (–2, 0, 0, –2, +2,
0)*(–1, +1, –1, –1, +1, +1) = 2 + 0 + 0 + 2 + 2 + 0 = 6 > 0 (positive), that is the original bit
was a 1. Similarly, the information of sender Y data may be obtained as Z*Y_key = (–2, 0, 0,
–2, +2, 0)*(+ 1, +1, –1, +1, –1, +1) = –2 + 0 + 0 – 2 – 2 + 0 = – 6 < 0 (negative). So the Y
data original bit was a 0.
There are a number of random assignment schemes that are used in MAC protocols. A few
important ones are the following:
• ALOHA
• Slotted ALOHA
• CSMA
Page 15 of 129
IT6601 – MOBILE COMPUTING
• CSMA/CD
• CSMA/CA
ALOHA Scheme
It is a simple communication scheme that was developed at the university of Hawaii.
The basic (also called pure) ALOHA scheme, is a simple protocol. If a node has data to send,
it begins to transmit. The first step implies that Pure ALOHA does not check whether the
channel is busy before transmitting. If the frame successfully reaches the destination
(receiver), the next frame is sent. If the frame fails to be received at the destination, it is sent
again. The simple ALOHA scheme works acceptably, when the chances of contention are
small (i.e., when a small number of senders send data infrequently). However, the collisions
can become unacceptably high if the number of contenders for transmission is high.
An improvement over the pure ALOHA scheme is the slotted ALOHA. In the slotted
ALOHA scheme, the chances of collisions are attempted to be reduced by enforcing the
following restrictions. The time is divided into equal-sized slots in which a packet can be
sent. Thus, the size of the packet is restricted. A node wanting to send a packet, can start to do
so only at the beginning of a slot. The slotted ALOHA system employs beacon signals that
are sent at precise intervals that mark the beginning of a slot, at which point the nodes having
data to send can start to transmit.
A popular MAC arbitration technique is the Carrier Sense Multiple Access (CSMA). In
this technique, a node senses the medium before starting to transmit. If it senses that some
transmission is already underway, it defers its transmission. Two popular extensions of the
basic CSMA technique are the collision detection (CSMA/CD) and the collision avoidance
(CSMA/CA) techniques.
Unlike that in a wired network, in a wireless network the CSMA/CD technique does
not work very well. In the CSMA/CD technique, the sender starts to transmit if it senses the
channel to be free. But, even if it senses the channel to be free, there can be a collision during
transmission. In a wired network, the implementation of a collision detection scheme is
simple.
Page 16 of 129
IT6601 – MOBILE COMPUTING
During the time a node is transmitting on the channel, several nodes might be wanted
to transmit. These nodes would be monitoring the channel and waiting for it to become free.
The moment the transmitting node completes its transmission, these waiting nodes would
sense the channel to be free, and would all start transmitting at the same time.
To overcome such collisions, in the collision avoidance scheme, all nodes are forced to
wait for a random time and then sense the medium again, before starting their transmission. If
the medium is sensed to be busy, a node waiting to transmit waits for a further random
amount of time and so on. Thus, the chance of two nodes starting to transmit at the same time
would be greatly reduced.
3. Reservation Schemes
Every node that hears the RTS and CTS messages defers its transmission during the
specified time period in order to avoid a collision. A few examples of RTS-CTS based MAC
protocols are MACA, MACAW, MACA-BI, PAMAS, DBTMA, MARCH, S-MAC protocols
which have specifically been designed for sensor networks.
MACA
MACA stands for Multiple Access Collision Avoidance. MACA solves the
hidden/exposed terminal problems by regulating the transmitter power. A node running
MACA requests to use the medium by sending an RTS to the receiver. Since radio signals
propagate omni-directionally, every terminal within the sender’s radio range will hear this
Page 17 of 129
IT6601 – MOBILE COMPUTING
and then wait for transmitting. As soon as the receiver is ready to receive data, it responds
with CTS.
The figure 1.6 below shows how MACA avoids the hidden terminal problem. Before
the start of its transmission, it sends a Request to Send (RTS). B receives the RTS that
contains the sender’s name and the receiver’s name, as well as the length of the future
transmission. In response to the RTS, an acknowledgment from B is triggered indicating
Clear To Send (CTS). The CTS contains the names of the sender and receiver, and the length
of the planned transmission. This CTS is heard by C and the medium is reserved for use by A
for the duration of the transmission.
On receipt of a CTS from B, C waits for transmitting anything for the time indicated in the
CTS. Thus a collision cannot occur at B during data transmission, and the hidden terminal
problem is solved.
Though this is a collision avoidance protocol, a collision can occur during the sending
of an RTS. Both A and C could send an RTS at same time. But an RTS occurs over a very
small duration compared to the duration of data transmission. Thus the probability of
collision remains much less. B resolves this contention problem by acknowledging only one
station in the CTS. No transmission occurs without an appropriate CTS.
Page 18 of 129
IT6601 – MOBILE COMPUTING
The above figure shows how the exposed terminal problem is solved in MACA.
Assume that B needs to transmit to A. B has to transmit an RTS first. The RTS would contain
the names of the receiver (A) and the sender (B). C does not act in response to this message
as it is not the receiver, but A responds with a CTS. C does not receive this CTS and
concludes that A is outside the detection range. Thus C can start its transmission assuming
that no collision would occur at A.
3. Explain the properties that are required of MAC protocols and explain the issues
related with wireless MAC protocols. (8) (REG 2013) What is hidden and exposed
terminal problem? (8) (May 2014)
Medium Access Control (MAC) The Medium Access Control (MAC) protocol is used
to provide the data link layer of the Ethernet LAN system. The Medium Access Control
(MAC) protocol is used to provide the data link layer of the Ethernet LAN system. The MAC
protocol encapsulates a SDU (payload data) by adding a 14 byte header (Protocol Control
Information (PCI)) before the data and appending an integrity checksum,
The checksum is a 4-byte 32-bit Cyclic Redundancy Check (CRC) after the data. The
entire frame is preceded by a small idle period (the minimum inter-frame gap, 9.6
microsecond (µS)) and a 8 byte preamble (including the start of frame delimiter).The design
of a MAC protocol depends upon the specific environment in which it would be used and the
specific design requirements to be met.
It should implement some rules that help to enforce discipline when multiple nodes
contend for a shared channel.
It should help maximize the utilization of the channel.
Channel allocation needs to be fair. No node should be discriminated against at any
time and made to wait for an unduly long time for transmission.
It should be capable of supporting several types of traffic having different maximum
and average bit rates.
It should be robust in the face of equipment failures and changing network
conditions.
Many MAC layer protocols for wireless networks have already been proposed,
standardized, and are in use. Also, many other protocols that work with improved efficiency
or overcome some problems in specific wireless environments, are being proposed by
researchers and practitioners. At present, IEEE 802.11 has emerged as a popular and standard
MAC protocol for wireless networks. IEEE 802.11-based network cards and routers are
Page 19 of 129
IT6601 – MOBILE COMPUTING
available in the market that can be used to inexpensively and easily set up wireless LANs
(commonly referred to as Wi-Fi hotspots).
MAC protocols for infrastructure less networks are much more complex as they have
to address certain additional problems that arise in the infrastructure less environments.
Though the MAC protocols for these two environments have many things in common, MAC
protocols for infra structure-less networks are surprisingly much more complex as they have
to address certain additional problems that arise in the infrastructure less environments.
MAC protocol in a wireless medium is much more complex than its wired parts. First,a
collision detection scheme is difficult to implement in a wireless environment. Since the
collisions are found to be difficult in detecting by the sense of transmitting nodes. In case of
infrastructure less networks the issue of hidden and exposed terminals will make a MAC
protocol which is extremely inefficient.
Bandwidth Efficiency
BW available is very limited.MAC should be designed such that the scarce bandwidth
is utilized in an efficient manner
An ad hoc network is a collection of wireless mobile nodes that are capable of forming
a co-operative agreement (network) between them-selves without requiring any centralized
control function. Due to their non-reliance infrastructure, ad hoc networks are gaining
popularity in several networking applications including, military, rescue operations and
meetings and conventions.
Generally, protocols used at medium access and physical layers of ad hoc net-works
are similar to those used in infrastructure based wireless networks. The hidden terminal
problem means about that the wireless transmission is usually short range. Even if the
medium is free near the transmitter, it may not be free near the intended receiver. In case of
exposed terminal problem, even if the medium is busy near the transmitter, it may be free
near the intended receiver.
Page 20 of 129
IT6601 – MOBILE COMPUTING
terminal problem occurs when a node is visible from a wireless access point (AP), but not
from other nodes communicating with that AP. This leads to difficulties in media access
control sub layer.
In wireless networks, the exposed node problem occurs when a node is prevented from
sending packets to other nodes due to a neighboring transmitter. Consider an example of 4
nodes labeled R1, S1, S2, and R2, where the two receivers (R1, R2) are out of range of each
other, yet the two transmitters (S1, S2) in the middle are in range of each other. Here, if a
transmission between S1 and R1 is taking place, node S2 is prevented from transmitting to
R2 as it concludes after carrier sense that it will interfere with the transmission by its
neighbour S1.
Hidden nodes in a wireless network are nodes that are out of range of other nodes or a
collection of nodes. Each node is within communication range of the AP, but the nodes
cannot communicate with each other, as they do not have a physical connection to each other.
In a wireless network, it is likely that the node at the far edge of the access point's range,
which is known as A, can see the access point, but it is unlikely that the same node can see a
node on the opposite end of the access point's range, C.
A B C
These nodes are known as hidden. The problem is when nodes A and C start to send packets
simultaneously to the access point B. Because the nodes A and C are out of range of each
other and so cannot detect a collision while transmitting,
Page 21 of 129
IT6601 – MOBILE COMPUTING
On the other hand, A transmitted to D, it would have been received correctly by D and
B’s transmission would have also been correctly received at C. The problem arose only
because A and B are within each other’s transmission range, though the destination nodes are
in the transmission range of only one of the nodes. In other words, the problem occurs
because A is exposed to B’s transmission. The overall effect of this problem is that it leads to
inefficient spectrum usage as well as unnecessary transmission delays unless these are
carefully addressed by a wireless MAC protocol.
Mobile computing
Mobile Computing is a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device without having to be connected to a fixed
physical link.
Mobile computing refers to the computational tasks performed by mobile users using their
handsets. Since the handsets have very limited processing power and memory, these devices
by themselves do not have the capability to carry out any significant and meaningful
computations and can only serve as the front-end for invoking remote applications.
Page 22 of 129
IT6601 – MOBILE COMPUTING
Ubiquitous computing
Wireless Computing
Networks are everywhere in today's world. Nearly every computer connects to some
type of network, whether it is a direct link to the Internet or a local LAN composed of many
different devices. In any case, communication is the key. The foundation of any network is
some sort of pathway for digital data (bits) to move back and forth between connected agents.
Cables, ranging from coaxial to optical, have long dominated this realm. However, the radio
so called wireless solution is increasingly emerging as a viable alternative to direct physical
connection.
Wireless has several advantages over traditional physically connected networks. More
importantly, wireless seeks to address two issues that are becoming increasingly critical:
Page 23 of 129
IT6601 – MOBILE COMPUTING
portability and mobility. Portability refers to the ability to easily move from one fixed
location to another. Many workers with laptops,
Wireless has the potential to make this easy, eliminating the need for pre-planned jacks
and extra cables. Mobility is the concept of being able to maintain a connection even while on
the moving stage.
The terms "mobile" and "wireless" are often used interchangeably but in reality, they
are two very different concepts applied to modern computing and technology.
Wireless does not mean mobile. Traditional computers or other non-mobile devices
can access wireless networks.
One very common example is the use of a localized browser product in a local area
network (LAN), where the router takes what used to be a cabled interaction and makes it
wireless. Other kinds of wireless networks called wide area networks (WAN) can even use
components of 3G or 4G wireless systems made specifically for mobile devices,
Mobile and wireless systems really accomplish two very different things. While a
wireless system provides a fixed or portable endpoint with access to a distributed network, a
mobile system offers all of the resources of that distributed network to something that can go
anywhere.
A Wi-Fi hotspot is typically a resource for someone who has a relatively fixed device,
such as a laptop computer that doesn’t have its own internal Internet access built in. By
contrast, mobile devices already have inherent access to the Internet or other wireless systems
through those cell tower networks that ISPs and telecom companies built specifically for
them.
Mobile computing also requires the applications themselves - their design and
development, and the hardware at the client and server sides. Wireless networking is
increasingly replacing traditional networks because of the low setup time and low initial
investment required to set up the wireless network. Wireless networks appear in various
forms such as WLANs (Wireless LANs), mobile cellular networks; personal area networks
(PANs) and ad hoc networks, etc.
Page 24 of 129
IT6601 – MOBILE COMPUTING
One popular example of a fixed infrastructure wireless network is a Wireless LAN (WLAN)
that implements the IEEE 802.11 protocol. An access point (AP) provides the last hop
connectivity of the mobile nodes to a wired network.
All communication goes through APs which perform bridging† between the wireless and the
wired mediums. A station must be recognized by an AP to be able to connect to the network.
The AP may require authentication and this in turn is used as the basic means to keep out the
unauthorized users.
In an infra structure less network, the communication between hosts occurs directly or via a
few intermediate nodes that form the hops.
A recent development in this context, is wireless networking of various types of devices using
the Bluetooth technology. The Bluetooth technology can also be used to establish direct
wireless connection of cell phones with devices such as printers, cameras, scanners, laptop
and desk computers. Bluetooth is gradually replacing cables and infrared as the dominant
way of exchanging information between devices.
Page 25 of 129
IT6601 – MOBILE COMPUTING
One of the objectives of the bluetooth technology is to enable users to easily connect to
a wide range of personal computing and telecommunication devices, without the need to buy,
carry, or lay out cables. In fact, the Bluetooth technology enables setting up of personal area
networks (PANs) known as piconets and ad hoc networks known as scatternets.
Page 26 of 129
IT6601 – MOBILE COMPUTING
Page 27 of 129
IT6601 – MOBILE COMPUTING
Guard space
Complex receivers,
Inflexible, needed.(Multipath
needs more Inflexible, antennas
Disadvantages Frequencies are a propagation)
complicated power typically fixed.
scarce resource. Synchronization
control for senders.
difficult
Typically combined
Used in many 3G
with Standard in fixed
systems, Higher Only in
TDMA(Frequency networks together
complexity, Lower combination with
Comments Hopping and with FDMA/SDMA
expectations, TDMA,FDMA or
patterns) and used in many mobile
Integrated with CDMA is useful.
SDMA(Frequency networks.
TDMA/FDMA.
reuse)
Page 28 of 129
IT6601 – MOBILE COMPUTING
UNIT – II
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Part – A
1. How do you classify TCPs? (May 2012)
TCP in single hop wireless networks
Indirect TCP (I-TCP)
Fast retransmission
Snooping TCP(S-TCP)
Mobile TCP(M-TCP)
Freeze TCP
TCP in multihop wireless networks
2. What are the possible locations of tunnel end point in mobile IP? (June 2014) (Or)
What are the possible locations for care of Address? (Dec 2013)
Tunnel is a secure path from HA to FA that ensures the successful delivery of packets
to the MN.Care of Address is a termination point of a tunnel toward a MH, for data grams
forwarded to the MH while it is away from home.
1. Foreign agent care-of address: the address of a foreign agent that MH registers with
2. Co-located care-of address: an externally obtained local address that a MH gets.
(or)
What is Care of Address? Differentiate types of Care of Address. (Dec 2012)
Care of Address gives the current location of the mobile Node. There are two types of CoA.
They are:
Foreign agent care-of address (FACoA): The mobile node receives the same CoA as
the foreign agent. All mobile nodes in the foreign network are given the same CoA.
Co-located care-of address (Co-CoA): A mobile node acquires a co-located care-of
address as a local IP address through some external means, which the mobile node then
associates with one of its own network interfaces. The address might be dynamically acquired
as a temporary address by the mobile node, such as through DHCP.
3. What are the four messages supported by mobile IP? When and why binding update
is generated in mobile IP? (May 2015(MP))
Page 29 of 129
IT6601 – MOBILE COMPUTING
Message Types:
A binding is the association of the home address with a care-of address. Binding
Update (BU) message is used to notify the respective node about current location (CoA) of the
MN. BU is sent by HA to CN. The message contains the fixed IP address of the mobile node
and the care-of-address.
Compatibility
Transparency
Scalability
Efficiency and
Security
5. List the advantages in transaction - oriented TCP. (Nov 2015) (June 2012)
I-TCP splits the connection into two parts – a wired/fixed and a wireless/mobile part.
This isolates problems on the wireless link from the fixed network. However, this also requires
that intermediate systems are able to look into IP packets to split the connection. This prevents
the usage of IPsec – end-to-end security and I-TCP (or proxy solutions in general) does not go
together.
Page 30 of 129
IT6601 – MOBILE COMPUTING
Mobile hosts can be disconnected for a longer time - no packet exchange is possible,
e.g., in a tunnel, disconnection due to overloaded cells or mux.
With higher priority traffic TCP disconnects after time-out completely
TCP freezing
MAC layer is often able to detect interruption in advance.
MAC can inform TCP layer of upcoming loss of connection.
TCP stops sending, but does now not assume a congested link.
MAC layer signals again if reconnected.
In the mobile IP, packets that are sent to a mobile host by the correspondent host are
first routed to the mobile host's home agent and then forwarded to the mobile host at its
current location by its home agent.
11. Give the advantages and disadvantages of Indirect – TCP. (May 2015)
Advantages of I-TCP:
I-TCP segments a TCP connection into a fixed and wireless part.
It does not require any changes in the TCP protocol.
Transmission errors on wireless link do not propagate into the fixed network.
Allows the use of a different transport layer protocol between foreign agent and mobile
host.
Optimizations of new mechanisms are easy.
Disadvantages of I- TCP:
Increased Handover Latency
The Foreign agent must be a trusted entity.
Page 31 of 129
IT6601 – MOBILE COMPUTING
13. Differentiate Foreign and Home Agent in Mobile IP technology. (Nov 2012)
14. What are the three basic mechanism associated with Mobile IP?
BOOTP (Boot Protocol): The BOOTP protocol is used for booting (starting) a diskless
computer over a network. Since a diskless computer does not store the operating system program
in its permanent memory, the BOOTP protocol helps to download and boot over a network,
using the operating system files stored on a server located in the network
Page 32 of 129
IT6601 – MOBILE COMPUTING
Part - B
University Questions
Mobile IP
1. a) Explain the Key mechanisms in Mobile IP.(16)
b) Briefly discuss about agent discovery in Mobile IP. (8) (Nov 2013) (Nov 2012)
c) Describe in detail about the registration procedure in Mobile IP.(8) (Nov 2013) (Nov 2012)
d) Explain in detail tunneling and encapsulation in Mobile IP.(8) (May 2015)(May 2013)
2. a) Explain the goals, assumptions, requirements and packet delivery for mobile IP. (16)
(May 2012). (Or)
b) Sketch the schematic of a mobile IP network and explain the packet delivery between the
mobile and corresponding node. (16)(Dec 2015) (Or)
c) Explain how end to end packet delivery is done in mobile IP. (8) (May 2013 /MP)
3. Briefly explain DHCP client initialization procedure. (8) (May 2014) (May 2013) (Nov 2013)
(Nov 2014)
TCP / IP
4. Describe the Architecture of TCP/IP and the structure of TCP segment.(16) (Reg 2013)
5. Explain in detail Snooping TCP and its advantages and disadvantages.(8) (May 2014)
(May 2015) (May 2013) (Dec 2013) (Nov 2012)
6. What is Transaction oriented TCP? Explain. (8) (May 2014) (Nov 2014)
7. Write short notes on (1) Fast/Transmit Recovery (2) Transmission/Timeout freezing. (8) (May
2015) (Nov 2012)
8. List the steps for TCP adaptation. (4) (May 2012)
9. What happens in the case of I-TCP if the mobile is disconnected? Discuss.(6)(May 2013)
10. Explain the following protocols used in mobile transport layer: (16) (Dec 2015)
(1)Indirect TCP (2) Snooping TCP (3) Mobile TCP (4) Transaction Oriented TCP
Page 33 of 129
IT6601 – MOBILE COMPUTING
Part – B
1. Explain a) Agent discovery, b) Registration, c) Tunneling and d) Encapsulation
mechanisms in Mobile IP. (Or) Explain the Key Mechanisms in Mobile IP. (16)
Internet protocol
Fig. 2.1Schematic model of Mobile IP
The two discovery methods are: Agent advertisement and Agent solicitation.
Mobility agents transmit agent advertisements to advertise their services on a
network. In the absence of agent advertisements, a mobile node can solicit advertisements.
This is known as agent solicitation.
Agent Advertisement
Generally foreign and home agents advertise their presence through periodic agent
advertisement messages. An agent advertisement message is an Internet Control Message
Protocol (ICMP) router advertisement.
Page 34 of 129
IT6601 – MOBILE COMPUTING
This message lists one or more CoA’s and a flag indicating whether it is a home agent or
foreign agent. This is the popular method used in agent discovery.
Mobile nodes use agent advertisements to determine their current point of attachment to the
Internet or to an organization's network.
A foreign agent must continue to send agent advertisements. This way, mobile nodes that are
already registered with it will know that they have not moved out of range of the foreign agent
and that the foreign agent has not failed.
Agent Solicitation
If a mobile node (MN) does not receive any CoA, then mobile node should implement
agent solicitation message. (Similar to ICMP router solicitation messages.) The main purpose
of this message sent by Mobile node (MN) is to search for a foreign agent(FA).
The rate at which a mobile node sends solicitations is limited by the mobile node.
These messages should not flood the network. The mobile node can send three initial
solicitations at a maximum rate of one per second while searching for an agent.
For a dynamic wireless network where the MNs move at a greater speed, a number of
messages are sent per second.
After registering with an agent (or) if the response for the message is very slow, then
the rate at which solicitations are sent is reduced, to limit the overhead on the local network.
Page 35 of 129
IT6601 – MOBILE COMPUTING
If a mobile node is registering a foreign agent care-of address, the mobile node must register
via that foreign agent.
If a mobile node is using a co-located care-of address, and receives an Agent Advertisement
from a foreign agent on the link on which it is using this care-of address, the mobile node
should register via that foreign agent (or via another foreign agent on this link). If a mobile
node is otherwise using a co-located care-of address, the mobile node must register directly
with its home agent.
Page 36 of 129
IT6601 – MOBILE COMPUTING
Step 1: If the mobile node is on a new network , it registers with the foreign agent by sending a
registration request message which includes Permanent IP address of MN and IP address of its
home agent.
Step 2: The foreign agent in turn performs the registration process by sending a registration
request with IP of MN and IP of foreign agent to the home agent.
Step 3: When the home agent receives the request , it updates the mobility binding by
associating the CoA of mobile node with its home address.
Step 4: The home agent then sends an acknowledgement to the foreign agent.
Step 5: The foreign agent in turn updates its visitor list by inserting the entry for the mobile
node and relays the reply to the mobile node.
Foreign Network
Step 1:
Foreign Agent
Registration
Request Visitors List
Step 2: Registration
Request
Mobile
Node Step 5:
Registration Reply
Home Agent
Tunneling:
Tunneling establishes a virtual pipe for the packets available between a tunnel entry
and an endpoint. Tunneling is the process of sending a packet via tunnel and it is achieved by a
mechanism called encapsulation.
Page 37 of 129
IT6601 – MOBILE COMPUTING
The packet agent is forwarded by the home agent to the foreign agent. When the packet
comes to the foreign agent (CoA), it delivers the packet to the mobile node.
d) Encapsulation:
Encapsulation refers to arranging a packet header and data in the data part of the new packet.
Encapsulation of one packet into another as payload
e.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone)
Types : IP-in-IP-encapsulation, minimal encapsulation or GRE (Generic Record
Encapsulation)
i) IP-in-IP-encapsulation (mandatory, RFC 2003)
Tunnel between HA and COA
Page 38 of 129
IT6601 – MOBILE COMPUTING
Decapsulation:
It is the process of disassembling the data part of an encapsulated packet.
Whenever a packet is sent from a higher protocol layer to a lower protocol layer, the
operations of encapsulation and decapsulation usually take place.
2. a) Explain the goals, requirements and packet delivery for mobile IP. (16)(May 2012).
(Or)
b) Sketch the schematic of a mobile IP network and explain the packet delivery between
the mobile and corresponding node. (16) (Dec 2015) (Or)
c) Explain how end to end packet delivery is done in mobile IP. (8) (May 2013 /MP)
Mobile IP:
Mobile IP is standard communications protocol that allows mobile device users to move
from one network to another while maintaining their permanent IP address.
Mobile IP extends the Internet Protocol (IP) for forwarding Internet traffic to mobile devices
(known as mobile nodes) when they are not connecting through their home network.
Mobile IP makes the mobility transparent to applications and higher level protocols. It
allows the users to stay connected to Internet from any location without any change in their
IP address.
Page 39 of 129
IT6601 – MOBILE COMPUTING
interruption of connectivity is short then it must survive the change of the attachment point.
Only effects of mobility should be higher delay and lower bandwidth.
Scalability - Mobile IP should be scalable over a large number of
participants.
Efficiency - Adding mobility should not compromise the efficiency of the
system. It must consider the lower bandwidth of wireless links. Enhancing IP for mobility
must not generate too many new messages flooding the whole network.
Security - All of the messages related to the management of Mobile
IP should be authenticated. IP layer must guarantee that the IP address of the receiver is
correct.
HA 3
Home Network FA (Router)
(Router) 2 MN
Internet 4
1
CN Router
Page 40 of 129
IT6601 – MOBILE COMPUTING
7. The MN’s IP address acts as the source address and the CN’s IP address acts as the
destination address. The packet is routed to the FA. After receiving the packet, FA forwards
the packet to CN.
Route Optimization:
In the mobile IP protocol, all the data packets to the mobile node go through the home
agent. ecause of this there will be heavy traffic between HA and CN in the network, causing
latency to increase.
Therefore, the following route optimization needs to be carried out to overcome this problem.
Enable direct notification of the corresponding host
Direct tunnelling from the corresponding host to the mobile host
Binding cache maintained at the corresponding host
The association of the home address with the care of address is called binding.
3. Briefly explain DHCP client initialization procedure. (8) (May 2014) (May 2013)
(Nov 2013) (Nov 2014)
Dynamic Host Configuration Protocol: (DHCP)
DHCP was developed based on bootstrap protocol (BOOTP). DHCP provides several
types of information to a user including its IP address. To manage dynamic configuration
information and dynamic IP addresses, IETF standardized an extension to BOOTP known as
dynamic host configuration protocol (DHCP).
The DHCP client and server work together to handle the roaming status and to assign
IP address on a new network efficiently. The DHCP server allocates an IP address from a pool
of IP addresses to a client.
Page 41 of 129
IT6601 – MOBILE COMPUTING
Description:
DHCP provides configuration parameters to Internet hosts. DHCP is based on client
server model. DHCP server hosts allocates nework addresses and deliver configuration
parameters to dynamically configured hosts. Server provides initialization parameters through
DHCP. The client requests initialization parameters from a DHCP server.
Client/Server-Model
The client sends via a MAC broadcast a request to the DHCP server (might be via a
DHCP relay)
Server
Several servers can be configured for DHCP, coordination not yet standardized (i.e.,
manual configuration)
Renewal of configurations
IP addresses have to be requested periodically, simplified protocol
Disadvantage:
No authentication of DHCP information specified
Page 42 of 129
IT6601 – MOBILE COMPUTING
DHCP Protocol:
Page 43 of 129
IT6601 – MOBILE COMPUTING
4. (a) Describe the TCP / IP Protocol Suite and Architecture of TCP/IP. (10)
TCP / IP Protocol Suite:
The TCP/IP protocol suite was developed by DARPA to provide seamless communication
services across an internetwork consisting of a large number of different networks. The
TCP/IP protocol suite is a collection of a large number of protocols. The protocol suite has
been named after the two most important protocols of the protocol suite:
Page 44 of 129
IT6601 – MOBILE COMPUTING
Transport Layer:
The specific transport layer protocol converts the message into small parts and attaches certain
information to it. The transport layer protocol first converts a message into segments and
passes these segments to the Internet layer protocol (IP).
IP Layer:
The IP layer protocol attaches certain information to the segments such as the destination host
address to form packets. A TCP segment is carried in one or more IP packets. The IP passes
on the packets to the network interface layer protocol.
The application layer deals with messages; the transport layer deals with segments; the
internet layer deals with packets; and the data link layer deals with frames.
Page 45 of 129
IT6601 – MOBILE COMPUTING
Application layer:
The protocols at this layer are used by applications to establish communication with other
applications which may possibly be running on separate hosts. Examples of application layer
protocols are http, ftp, and telnet.
Transport layer:
It provides reliable end-to-end data transfer services. The term end-to-end means that
the end points of a communication link are applications or processes. Therefore, sometimes
protocols at this layer are also referred to as host-to-host protocols. Several applications or
processes run on a host.
Thus, to identify the end point, it is not only the computer that needs to be identified,
but also the exact process or application that would receive the message needs to be identified.
This is efficiently accomplished by using the concept of a port number.
The transport layer provides its services by making use of the services of its lower
layer protocols. This layer includes both connection-oriented (TCP) and connectionless (UDP)
protocols.
Internet layer:
The Internet layer packs data into data packets that are technically known as IP
datagrams. Each IP datagram contains source and destination address (also called IP address)
information that is used to forward the datagrams between hosts and across networks.
The Internet layer is also responsible for routing of IP datagrams. In a nutshell, this
layer manages addressing of packets and delivery of packets between networks using the IP
address.
The main protocols included at the Internet layer are IP (Internet Protocol), ICMP
(Internet Control Message Protocol), ARP (Address Resolution Protocol), RARP (Reverse
Address Resolution Protocol) and IGMP (Internet Group Management Protocol).
Page 46 of 129
IT6601 – MOBILE COMPUTING
The functionalities of this layer actually consist of the functionalities of the two
lowermost layers of the ISO/ OSI protocol suite, namely data link and physical layers.
Data link Layer : The data link layer protocols help deliver data packets by making use of
physical layer protocols. A few popular data link layer protocols are Ethernet, Token Ring,
FDDI, and X.25. Ethernet is possibly the most common data link layer protocol
Physical Layer:. The physical layer defines how data is physically sent through the network,
including how bits are electrically or optically signalled by hardware devices that interface
with a network medium, such as coaxial cable, optical fibre, or twisted pair of copper wires.
4. b) Explain the structure of TCP segment and IP Datagram. (8) (Reg. 2013)
The message in the form of a block of data is passed to TCP by the sending
application. The TCP breaks it into many small parts and attaches certain control information
(called TCP header) to each small part. Each small part of the data along with the TCP header
is called a segment
The TCP header includes several items of information including the following:
(i) Destination Port
(ii) Checksum
(iii) Sequence number
Page 47 of 129
IT6601 – MOBILE COMPUTING
Page 48 of 129
IT6601 – MOBILE COMPUTING
I-TCP segments a TCP connection into a fixed part and a wireless part. Figure below
shows an example with a mobile host connected via a wireless link and an access point to
the ‘wired’ internet where the correspondent host resides. The correspondent node could also
use wireless access.
The following would then also be applied to the access link of the correspondent host.
Standard TCP is used between the fixed computer and the access point. No computer in
the internet recognizes any changes to TCP. Instead of the mobile host, the access point now
terminates the standard TCP connection, acting as a proxy. This means that the access point is
now seen as the mobile host for the fixed host and as the fixed host for the mobile host.
Between the access point and the mobile host, a special TCP, adapted to wireless links, is used.
Foreign Agent:
A good place for segmenting the connection between mobile host and correspondent host
is at the foreign agent of mobile IP. The foreign agent controls the mobility of the mobile host
anyway and can also hand over the connection to the next foreign agent when the mobile host
Indirect TCP segments a TCP connection into two parts moves on.
The correspondent host in the fixed network does not notice the wireless link or the
segmentation of the connection.
The foreign agent acts as a proxy and relays all data in both directions.
Mechanisms
If the correspondent host sends a packet, the foreign agent acknowledges this packet and
tries to forward the packet to the mobile host. If the mobile host receives the packet, it
acknowledges the packet. However, this acknowledgement is only used by the foreign agent.
If a packet is lost on the wireless link due to a transmission error, the correspondent host
would not notice this. In this case, the foreign agent tries to retransmit this packet locally to
maintain reliable data transport.
Similarly, if the mobile host sends a packet, the foreign agent acknowledges this packet
and tries to forward it to the correspondent host.
Page 49 of 129
IT6601 – MOBILE COMPUTING
If the packet is lost on the wireless link, the mobile hosts notice this much faster due to
the lower round trip time and can directly retransmit the packet. Packet loss in the wired
network is now handled by the foreign agent.
Fig. 2.12 Socket and state migration after handover of a mobile host
Snooping:
S- TCP is a protocol that improves TCP performance by modifying the software at the base
station while preserving the end-to-end TCP semantic. The modified software at the base
station is known as snoop. It monitors every packet that passes through the TCP connection in
both directions,
A good place for the enhancement of TCP could be the foreign agent in the Mobile IP.
In this approach, the foreign agent buffers all packets with destination mobile host and
additionally ‘snoops’ the packet flow in both directions to recognize acknowledgements. The
reason for buffering packets toward the mobile node is to enable the foreign agent to
perform a local retransmission in case of packet loss on the wireless link. The foreign agent
buffers every packet until it receives an acknowledgement from the mobile host.
If the foreign agent does not receive an acknowledgement from the mobile host within a
certain amount of time, either the packet or the acknowledgement has been lost.
Alternatively, the foreign agent could receive a duplicate ACK which also shows the loss
of a packet. Now the foreign agent retransmits the packet directly from the buffer,
performing a much faster retransmission compared to the correspondent host.
To remain transparent, the foreign agent must not acknowledge data to the correspondent
host. This would make the correspondent host believe that the mobile host had received the
data and would violate the end-to-end semantic in case of a foreign agent failure.
Page 51 of 129
IT6601 – MOBILE COMPUTING
However, the foreign agent can filter the duplicate acknowledgements to avoid
unnecessary retransmissions of data from the correspondent host.
If the foreign agent now crashes, the time-out of the correspondent host still works and
triggers a retransmission. The foreign agent may discard duplicates of packets already
retransmitted locally and acknowledged by the mobile host. This avoids unnecessary traffic
on the wireless link.
Data transfer from the mobile host with destination correspondent host works as follows.
The foreign agent snoops into the packet stream to detect gaps in the sequence numbers of
TCP. As soon as the foreign agent detects a missing packet, it returns a negative
acknowledgement (NACK) to the mobile host. The mobile host can now retransmit the
missing packet immediately. Reordering of packets is done automatically at the
correspondent host by TCP.
Page 52 of 129
IT6601 – MOBILE COMPUTING
Using negative acknowledgements between the foreign agent and the mobile host
assumes additional mechanisms on the mobile host
All efforts for snooping and buffering data may be useless if certain encryption
schemes are applied end-to-end between the correspondent host and mobile host.
Mobile TCP
Special handling of lengthy and/or frequent disconnections, M-TCP splits as I-TCP does. In
mobile wireless networks, users would badly suffer from unacceptable delays in TCP
communications and frequent disconnections caused by events such as signal fades, lack of
bandwidth, handoff, unless these are explicitly handled by the protocol. The M-TCP protocol
tries to avoid the sender window from shrinking or reverting to slow-start when bit errors
cause a packet loss.
The TCP connection between the fixed host and the mobile host is segmented into wired
and wireless parts — the wired part connection between the fixed host (FH) and the
supervisory host (SH) and the wireless part connection between the SH and the mobile host
(MH).
Many MHs are connected to SH through several base stations as shown in Fig. . The SH
supervises all the packets transmitted to MH and the acknowledgements sent by MH. It is also
used as an interface between FH and MH and vice versa.
When a packet is sent to FH by MH using SH, the wired part uses the normal unmodified TCP
and the wireless part uses the modified version of TCP known as M-TCP to deliver data to
MH. This packet is acknowledged only when the MH receives the packet.
Page 53 of 129
IT6601 – MOBILE COMPUTING
windows size of the sender FH. When MH moves from its current SH region to a new SH
region, a state transfer take places, so that the new SH can maintain TCP connection between
FH and MH.
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network
adapted TCP on wireless link
TCP phases
connection setup, data transmission, connection release using 3-way-handshake needs
3 packets for setup and release, respectively. Thus, even short messages need a minimum of 7
packets.
Transaction oriented TCP
RFC1644, T-TCP, describes a TCP version to avoid this overhead
connection setup, data transfer and connection release can be combined
thus, only 2 or 3 packets are needed
Advantage:
Efficiency
Disadvantage:
Requires changed TCP
Mobility not longer transparent
Page 54 of 129
IT6601 – MOBILE COMPUTING
Advantage:
The advantage of this scheme is that it reduces the time for the MH to get reconnected,
otherwise FH would wait for RTO unnecessarily.
Disadvantages:
The disadvantage of this approach is that it does not propose a general approach for
TCP communication in mobile wireless networks.
It does not address the specific error characteristics of the wireless medium.
The basic idea in this scheme is to “freeze” the TCP senders’ streams, little before a
disconnection is to occur. This is done by artificially sending a “Zero Windows
Advertisement” informing the sender that the receiver cannot receive data at the moment.
When the sender resumes its connectivity, the receiver can unfreeze the sender by sending the
value of its actual receiver window.
Advantages:
The avoidance of the slow-start period upon re-establishment of connectivity.
It does not require the involvement of the intermediate nodes and hence it can be used
if the IP payload is encrypted.
This method offers a promising approach for use in Virtual Private Networks (VPNs)
Selective retransmission
• Change of foreign agent often results in packet loss
• TCP reacts with slow-start although there is no congestion
• Forced fast retransmit
• as soon as the mobile host has registered with a new foreign agent, the MH sends
duplicated acknowledgements on purpose
• This forces the fast retransmit mode at the communication partners
• Additionally, the TCP on the MH is forced to continue sending with the actual window
size and not to go into slow-start after registration
Advantage
simple changes result in significant higher performance
Disadvantage
Further mix of IP and TCP, no transparent approach
Page 55 of 129
IT6601 – MOBILE COMPUTING
The probable reason for a packet loss in a fixed network is a temporary overload
some point in the transmission path, i.e., a state of congestion at a node. Congestion may
appear from time to time even in carefully designed networks. The packet buffers of a router
are filled and the router cannot forward the packets fast enough because the sum of the input
rates of packets destined for one output link is higher than the capacity of the output link. The
only thing a router can do in this situation is to drop packets. A dropped packet is lost for the
transmission, and the receiver notices a gap in the packet stream. Now the receiver does not
directly tell the sender which packet is missing, but continues to acknowledge all in-sequence
packets up to the missing one.
The sender notices the missing acknowledgement for the lost packet and assumes
a packet loss due to congestion. Retransmitting the missing packet and continuing at full
sending rate would increase the congestion. Although it is not guaranteed that all packets of
the TCP connection take the same way through the network, this assumption holds for most of
the packets. To mitigate congestion, TCP slows down the transmission rate dramatically. All
other TCP connections experiencing the same
congestion do exactly the same so the congestion is soon resolved. This cooperation of TCP
connections in the internet is one of the main reasons for its survival as it is today. Using UDP
is not a solution, because the throughput is higher compared to a TCP connection just at the
beginning. As soon as everyone uses UDP, this advantage disappears. After that, congestion is
standard and data transmission quality is unpredictable. Even under heavy load, TCP
guarantees at least sharing of the bandwidth.
Slow start
TCP’s reaction to a missing acknowledgement is quite drastic, but it is necessary
to get rid of congestion quickly. The behavior TCP shows after the detection of congestion is
called slow start. The sender always calculates a congestion window for a receiver. The start
size of the congestion window is one segment (TCP packet). The sender sends one packet and
waits for acknowledgement. If this acknowledgement arrives, the sender increases the
Page 56 of 129
IT6601 – MOBILE COMPUTING
congestion window by one, now sending two packets (congestion window = 2). After arrival
of the two corresponding acknowledgements,the sender again adds 2 to the congestion
window, one for each of the acknowledgements. Now the congestion window equals 4. This
scheme doubles the congestion window every time the acknowledgements come back, which
takes one round trip time (RTT). This is called the exponential growth of the congestion
window in the slow start mechanism. It is too dangerous to double the congestion window
each time because the steps might become too large. The exponential growth stops at the
congestion threshold.
As soon as the congestion window reaches the congestion threshold, further
increase of the transmission rate is only linear by adding 1 to the congestion window each time
the acknowledgements come back. Linear increase continues until a time-out at the sender
occurs due to a missing acknowledgement, or until the sender detects a gap in transmitted data
because of continuous acknowledgements for the same packet. In either case the sender sets
the congestion threshold to half of the current congestion window. The congestion window
itself is set to one segment and the sender starts sending a single segment. The exponential
growth (as described above) starts once more up to the new congestion threshold, then the
window grows in linear fashion.
The TCP primarily deploys a flow control technique to control congestion in a network. Traffic
congestion occurs when the rate at which data is injected by a host into the network exceeds the
rate at which data can be delivered to the network. A flow control technique helps adapt the rate
Page 57 of 129
IT6601 – MOBILE COMPUTING
of data transmission by the TCP at the sending host end. The flow control technique helps to
prevent the build-up of congestion in the network and at the same time helps to prevent buffer
overrun at the slow receivers. If data transmissions occur at a much faster rate than what the
network infrastructure can comfortably support, then data packets get built up at the routers.
When the buffers at routers start to overflow, the packets start getting lost.
Additionally, if data transmissions by a sender take place at a much faster rate than what a slower
receiver can handle, then the receiver’s buffer starts to get flooded and hence the packets get lost.
TCP handles both these causes of packet loss by reducing the rate at which data is transmitted at
the sender’s end. Thus, a receiver uses the flow control mechanism to restrict how fast a sender
can transmit. However, to provide an acceptably fast data transmission service, once congestion
disappears the transmission rate at the sender’s end needs to be increased to a suitable value.
Thus we can say that a flow control technique helps TCP dynamically adjust the transmission
rate at the sender’s end, reducing the transmission rate as congestion starts to develop and
increasing it as congestion starts to disappear.
The flow control mechanism deployed by TCP (called the sliding window protocol) is primarily
based on the concepts of congestion window and advertised window. When a sender starts to
send data packets, the receiver indicates an advertised window (or receiver window) to the
sender while sending acknowledgements.
The advertised window is usually set equal to the size of the receive buffer at the receiver. The
sender uses the advertised window size obtained from the receiver to determine the maximum
amount of data that it can transmit to the receiver without causing buffer overflow at the
receiver. In other words, to prevent buffer overflow at the receiver, the data packets transmitted
by a sender without having received acknowledgments for them should not exceed the size of the
buffer available at the receiving end.
For each segment sent, a sending host expects to receive an acknowledgment. A congestion
window indicates the maximum number of segments that can be outstanding without the receipt
of the corresponding acknowledgement before the TCP at the sender’s end pauses transmitting
and waits for an acknowledgement to arrive. The TCP at a sender’s end pauses if the number of
segments for which the acknowledgement is outstanding becomes equal to the congestion
window. A sender sets the congestion window size to 1 and keeps on increasing it until duplicate
acknowledgements are received or until the number of outstanding packets becomes equal to the
size of the advertised window.
Upon receipt of an acknowledgement, TCP detects packet loss using Retransmission timeout
(RTO) and duplicate acknowledgements. After transmitting a segment, a TCP sender sets the
retransmission timer for only one packet. If an acknowledgement for the packet is not received
before the timer goes off, the packet is assumed to be lost. RTO is dynamically calculated.
Timeouts can take too long.
Page 58 of 129
IT6601 – MOBILE COMPUTING
Again the TCP sender assumes that a packet loss has occurred if it receives three duplicate
acknowledgements consecutively. In TCP, when a receiver does not get a packet that it expects
in a sequence but gets an out of order packet, it considers that the expected packet might have
got lost and it indicates this to the sender by transmitting an acknowledgment for the last packet
that was received in order. Thus, three duplicate acknowledgement are also generated if a packet
is delivered at least three places beyond its in-sequence location.
In wired networks, packet losses primarily occur on account of congestions encountered in the
transmission path. However, in a wireless environment packet losses can also occur due to
mobility and channel errors. In wired networks, bit errors are rare. On the other hand, wireless
networks are vulnerable to noise. Noise can cause intermittent bit errors. Further, there can be
intermittent disconnections due to fading and also due to obstructions that may be encountered
by a mobile host.
The packets may get lost during handoff. An intermittent disconnection may cause the TCP at
the sender’s end to time out for an acknowledgement and cause it to retransmit. This would
cause unnecessary retransmissions to occur, even though the packet may be buffered at a router.
Also, various additional causes of packet loss can result in a high rate of packet loss in a mobile
wireless network. These losses would be interpreted by TCP as symptoms of congestion and
force it to operate in slow start. This would cause the network to operate inefficiently and result
in unacceptable slow data transmission.
Page 59 of 129
IT6601 – MOBILE COMPUTING
UNIT - III
MOBILE TELECOMMUNICATION SYSTEM
Global System for Mobile Communication (GSM) – General Packet Radio Service
(GPRS) – Universal Mobile Telecommunication System (UMTS).
Part – A
Page 60 of 129
IT6601 – MOBILE COMPUTING
7. What are the security issues in mobile networking?(June 2013) (Nov 2013)
Access control/authentication
Confidentiality
Anonymity
Page 61 of 129
IT6601 – MOBILE COMPUTING
SS7 also enables Non-Call-Associated Signalling, which is signalling not directly related
to establishing a telephone call.
10. Why are so many identifiers/addresses needed in GSM? Give reasons. (Nov 2012)
The international mobile station equipment identity (IMEI) uniquely identifies a mobile
station internationally. A mobile station can only be operated if a SIM with a valid IMSI is
inserted into equipment with a valid IMEI. The real telephone number of a mobile station is the
mobile subscriber ISDN number (MSISDN).The Mobile Station Roaming Number (MSRN) is a
temporary location dependent ISDN number. It is assigned by the locally responsible VLR
(Visitor Location Register) to each mobile station in its area.
12. What are the four possible handover scenarios in GSM? (Dec 2014 ) (or)
What are the reasons for Handover? (Dec 2013)
Reasons for hand off:
To avoid call termination: call drops
When the capacity for connecting new calls of a given cell is used up.
Interference in the channels.
When the user behaviors change: Speed and mobility.
UMTS networks are different from the 2G networks in the following respects:
Higher speech quality – It supports the adv the UMTS supports the advanced data and
information services and can be called a true multimedia network.
Page 62 of 129
IT6601 – MOBILE COMPUTING
Higher data rate - The UMTS supports 2 Mbps data rate, which is much higher than
that supported by the 2G mobile systems.
Virtual home environment (VHE) - A user roaming from his network to other UMTS
networks will not feel any discontinuity or service difference, thus giving a “feeling”
of being in the home network.
14. What are the elements of UMTs network? (Reg. 2013)
GPRS offers end to end packet switched data transfer services which can be categorized
into the following two types:
Page 63 of 129
IT6601 – MOBILE COMPUTING
Part – B
University Questions
GSM
1. Discuss the localization, Calling and handover features of GSM Systems. (16) (Dec 2013)
(June 2013) (Or)
Explain in detail the architecture of GSM. Also explain mobility management and
handover. (16) (June 2014)
Explain how mobility management is done in GSM. (8) (Dec 2014)
Discuss in detail the various handover scenarios in GSM. (6) (June 2013)
2. Write a detailed note on GSM system Architecture with a neat diagram. (16) (Dec 2012) (June
2013) (Nov 2015)(Or)
Explain the reference architecture of GSM. (16) (June 2012) (Dec 2013) (May 2015) (Or)
Explain the functional architecture of GSM (10) (May 2015) (Dec 2014)
Explain the features of GSM radio interfaces (8) (Dec 2012)
3. Explain the functions of Cellular wireless networks. List its advantages. (8) (Dec 2014)
4. Explain the services of GSM networks. (16) (Dec 2013)
5. Explain the security services of GSM. (8) (May 2015) (Dec 2012) (Dec 2013)
6. Explain the Mobile Terminated Call and Mobile Originated Call in GSM. (8) (May 2015)
GPRS:
7. Explain the architecture of GPRS. (8) (May 2015) (Dec 2014) (Or)
Explain the GPRS architecture and data services. (8)(Dec 2012) (Or)
What are the advantages of GPRS and GSM? Also explain the architecture of GPRS. (8)
(Dec 2013) (Or)
Explain the GPRS architecture and GPRS procedures in detail (16) (May 2015) (Or)
What is the goal of GPRS? Explain the network and protocol architecture of GPRS.(16) (Dec
2015)
8. Explain the network services of GPRS and mobility support in GPRS.(16) (June 2012)
9. Describe the reliability and delay classes in GPRS. Also explain the GPRS procedures. (10)
(June 2013) (Dec 2014)
UMTS
10. Explain the UMTS architecture in detail. (Reg 2013)
Page 64 of 129
IT6601 – MOBILE COMPUTING
Part - B
1. Explain in detail about GSM architecture. (16) (Dec 2012) (June 2013) (Nov 2015)
(June 2012) (Dec 2013) (May 2015)
GSM is a PLMN (Public Land Mobile Network). An important characteristic of the GSM
system is that it provides data services in addition to voice services.GSM networks operate in
four different radio frequencies. Most GSM networks operate either in the 900 MHz or in the
1800 MHz frequency bands.
GSM comes with a hierarchical, complex system architecture comprising many entities,
interfaces, and acronyms. A GSM system consists of three subsystems, the radio sub system
(RSS), the network and switching subsystem (NSS), and the operation subsystem
(OSS).Generally, a GSM customer only notices a very small fraction of the whole network –
the mobile stations (MS) and some antenna masts of the base transceiver stations (BTS).
Several providers setup mobile networks following the GSM standard within each country.
Components
MS (mobile station)
BS (base station)
MSC (mobile switching center)
LR (location register)
Subsystems
RSS (radio subsystem): covers all radio aspects
NSS (network and switching subsystem): call forwarding, handover,
switching
OSS (operation subsystem): management of the network
Page 65 of 129
IT6601 – MOBILE COMPUTING
Radio Interfaces :
The connection between the RSS and the NSS via the A interface (solid lines) and the
connection to the OSS via the O interface (dashed lines). The A interface is typically based on
circuit-switched PCM-30 systems (2.048 M bit/s), carrying up to 30 64 k bit/s connections,
whereas the O interface uses the Signalling System No. 7 (SS7) based on X.25 carrying
management data to/from the RSS.
Components
Base station subsystem (BSS): A GSM network comprises many BSSs, each controlled
by a base station controller (BSC). The BSS performs all functions necessary to maintain radio
connections to an MS, coding/decoding of voice, and rate adaptation to/from the wireless
network part. Besides a BSC, the BSS contains several BTSs.
Base transceiver station (BTS): A BTS comprises all radio equipment, i.e., antennas,
signal processing, amplifiers necessary for radio transmission. A BTS can form a radio cell or,
using sectorized antennas, several cells and is connected to MS via the Um interface (ISDN U
interface for mobile use), and to the BSC via the Abis interface. The Um interface contains all
Page 66 of 129
IT6601 – MOBILE COMPUTING
the mechanisms necessary for wireless transmission (TDMA, FDMA etc.) and will be discussed
in more detail below. The Abis interface consists of 16 or 64 k bit/s connections.
Base Station Controller (BSC): The BSC basically manages the BTSs. It reserves radio
frequencies, handles the handover from one BTS to another within the BSS, and performs paging
of the MS. The BSC also multiplexes the radio channels onto the fixed network connections at
the A interface.
Mobile Station (MS) : The MS comprises all user equipment and software needed for
communication with a GSM network.
An MS consists of user independent hard- and software and of the subscriber identity
module (SIM), which stores all user-specific data that is relevant to GSM.3 While an MS can be
identified via the international mobile equipment identity (IMEI).
The SIM card contains many identifiers and tables, such as card-type, serial number, a list
of subscribed services,
The MS stores dynamic information while logged onto the GSM system, such as, e.g., the
cipher key Kc and the location information consisting of a temporary mobile subscriber identity
(TMSI) and the location area identification (LAI). MS can also offer other types of interfaces to
users with display, loudspeaker, microphone, and programmable soft keys. Further interfaces
comprise computer modems, IrDA, or Bluetooth.
The “heart” of the GSM system is formed by the network and switching subsystem
(NSS). The NSS connects the wireless network with standard public networks, performs
handovers between different BSSs, comprises functions for worldwide localization of users and
supports charging, accounting, and roaming of users. The NSS consists of the following switches
and databases:
MSCs are high-performance digital ISDN switches. They set up connections to other
MSCs and to the BSCs via the A interface, and form the fixed backbone network of a GSM
system. Typically, an MSC manages several BSCs in a geographical region. A gateway MSC
(GMSC) has additional connections to other fixed networks, such as PSTN and ISDN.
Page 67 of 129
IT6601 – MOBILE COMPUTING
BSC can also connect to public data networks (PDN) such as X.25. An MSC handles all
signaling needed for connection setup, connection release and handover of connections to other
MSCs. The standard signaling system No. 7 (SS7) is used for this purpose.
The HLR is the most important database in a GSM system as it stores all user-relevant
information. This comprises static information, such as the mobile subscriber ISDN number
(MSISDN), subscribed services (e.g., call forwarding, roaming restrictions, GPRS), and the
international mobile subscriber identity (IMSI). Dynamic information is also needed, e.g., the
current location area (LA) of the MS, the mobile subscriber roaming number (MSRN), the
current VLR and MSC
The VLR associated to each MSC is a dynamic database which stores all important
information needed for the MS users currently in the LA that is associated to the MSC (e.g.,
IMSI,MSISDN, HLR address). If a new MS comes into an LA the VLR is responsible for, it
copies all relevant information for this user from the HLR. This hierarchy of VLR and HLR
avoids frequent HLR updates and long-distance signaling of user information.
The third part of a GSM system, the operation subsystem (OSS), contains the necessary
functions for network operation and maintenance. The OSS possesses network entities of its own
and accesses other entities via SS7 signaling.
The OMC monitors and controls all other network entities via the O interface (SS7 with
X.25). Typical OMC management functions are traffic monitoring, status reports of network
entities, subscriber and security management, or accounting and billing.
As the radio interface and mobile stations are particularly vulnerable, a separate AuC has
been defined to protect user identity and data transmission. The AuC contains the algorithms for
authentication as well as the keys for encryption and generates the values needed for user
authentication in the HLR.
Page 68 of 129
IT6601 – MOBILE COMPUTING
The EIR is a database for all IMEIs, i.e., it stores all device identifications registered for
this network. As MSs are mobile, they can be easily stolen. With a valid SIM, anyone could use
the stolen MS. The EIR has a blacklist of stolen (or locked) devices.
2(a) Explain the Bearer services, Tele services and Supplementary services of GSM
network. (NOV 2013) (or) Explain the services of GSM networks. (16) (Dec 2013)
GSM permits the integration of different voice and data services and the interworking
with existing networks. Services make a network interesting for customers.
Bearer Services
Tele Services
Supplementary services.
A mobile station MS is connected to the GSM public land mobile network (PLMN)
through Um interface. GSM-PLMN is the infrastructure needed for the GSM network. This
network is connected to transit networks, e.g., integrated services digital network (ISDN) or
traditional public switched telephone network (PSTN).
Bearer services now comprise all services that enable the transparent transmission of
data between the interfaces to the network.In the classical GSM model, bearer services are
connection-oriented and circuit- or packet-switched. These services only need the lower three
layers of the ISO/OSI reference model.
Within the mobile station MS, the mobile termination (MT) performs all network specific
tasks (TDMA, FDMA, coding etc.) and offers an interface for data transmission (S) to the
terminal TE which can then be network independent.
Tele services are application specific and may thus need all seven layers of the ISO/OSI
reference model. These services are specified end-to-end, i.e., from one terminal TE to another.
Page 69 of 129
IT6601 – MOBILE COMPUTING
Bearer services
GSM specifies different mechanisms for data transmission, the original GSM allowing
for data rates of up to 9600 bit/s for non-voice services. Bearer services permit transparent and
non-transparent, synchronous or asynchronous data transmission.
Transparent bearer services only use the functions of the physical layer (layer 1) to
transmit data. Data transmission has a constant delay and throughput if no transmission errors
occur. The only mechanism to increase transmission quality is the use of forward error correction
(FEC), which codes redundancy into the data stream and helps to reconstruct the original data in
case of transmission errors. Depending on the FEC, data rates of 2.4, 4.8, or 9.6 k bit/s are
possible.
Non-transparent bearer services use protocols of layers two and three to implement
error correction and flow control. These services use the transparent bearer services, adding a
radio link protocol (RLP). This protocol comprises mechanisms of high-level data link control
(HDLC) and special selective-reject mechanisms to trigger retransmission of erroneous data. The
achieved bit error rate is less than 10–7, but now throughput and delay may vary depending on
transmission quality.
Tele services
GSM mainly focuses on voice-oriented tele services. These comprise encrypted voice
transmission, message services, and basic data communication with terminals as known from the
PSTN or ISDN (e.g., fax). The main service is telephony.
Page 70 of 129
IT6601 – MOBILE COMPUTING
The primary goal of GSM was the provision of high-quality digital voice transmission,
offering at least the typical bandwidth of 3.1 kHz of analog phone systems.
Voice over IP (VoIP) is a methodology and group of technologies for the delivery of
voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the
Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony,
broadband telephony, and broadband phone service
Another service offered by GSM is the emergency number. The same number can be
used throughout Europe. This service is mandatory for all providers and free of charge. This
connection also has the highest priority, possibly pre-empting other connections, and will
automatically be set up with the closest emergency center. A useful service for very simple
message transfer is the short message service (SMS), which offers transmission of messages of
up to 160 characters.
The successor of SMS, the enhanced message service (EMS), offers a larger message size
(e.g., 760 characters, concatenating several SMs), formatted text, and the transmission of
animated pictures, small images and ring tones in a standardized way (some vendors offered
similar proprietary features before).EMS never really took off as the multimedia message service
(MMS) was available.MMS offers the transmission of larger pictures (GIF, JPG, WBMP), short
video clips etc. and comes with mobile phones that integrate small cameras.
Another non-voice tele service is group 3 fax, which is available worldwide. In this
service, fax data is transmitted as digital data over the analog telephone network according to the
ITU-T standards T.4 and T.30 using modems. Typically, a transparent fax service is used, i.e.,
fax data and fax signaling is transmitted using a transparent bearer service. Lower transmission
quality causes an automatic adaptation of the bearer service to lower data rates and higher
redundancy for better FEC.
Supplementary services
In addition to tele and bearer services, GSM providers can offer supplementary services.
Similar to ISDN networks, these services offer various enhancements for the standard telephony
service, and may vary from provider to provider. Typical services are user identification, call
redirection, or forwarding of ongoing calls. Standard ISDN features such as closed user groups
and multiparty communication may be available. Closed user groups are of special interest to
companies because they allow, for example, a company-specific GSM sub-network, to which
only members of the group have access.
2(b) Explain in detail about mobility management and handover in GSM. (8)
Mobility management entails keeping track of the MS while it is on the move. The mobility
management procedures vary across three distinct scenarios, namely:
MS is turned off
MS is turned on but is idle
MS has an active call
In the first scenario, when it cannot be reached by the network because it does not respond to
the paging message, the MS is considered to be in the turned-off state. In this scenario, the MS
obviously fails to provide any updates in relation to changes in Location Area (LA), if any exist.
In this state, the MS is considered detached from the system (IMSI detached).
In the second scenario, the MS is in the ready state to make or receive calls. The system
considers it attached (IMSI attached), and it can be successfully paged. While on the move, the
MS must inform the system about any changes in LA; this is known as location updating.
In the third scenario, the system has active radio channels that are allowed to the MS for
conversation/data flow. The MS is required to change to new radio channels if the quality of
current channels drops below a certain level; this is known as handover. The MSC (sometimes
BSC) makes the decision to handover an analysis of information that is obtained real-time from
the MS and BTS.
All operations revolve around the three scenarios presented above. Also provides paging,
IMSI detach/attach and more complex operations such as location update, call handover, mobile
terminated call, mobile originated call, and mobile-to-mobile call.
Location Update
Location updating is the mechanism that is used to determine the location of an MS in the idle
state. The MS initiates location updating, which can occur when:
The MS is first switched on
The MS moves within the same VLR area, but to a new LA
The MS moves to a new VLR area
A location updated timer expires
Page 72 of 129
IT6601 – MOBILE COMPUTING
The GMSC then identifies the subscriber's HLR based upon the MSISDN and invokes the
MAP/C operation Send Routing Information (SRI) towards the HLR to locate the MS. The SRI
contains the MSISDN. The HLR uses the MSISDN to obtain the IMSI.
Because of past location updates, the HLR already knows the VLR that currently serves the
subscriber. The HLR queries the VLR using the MAP/D operation Provide Roaming Number
(PRN) to obtain the MSRN. The PRN contains the subscriber's IMSI.
The VLR assigns a temporary number known as the mobile station roaming number (MSRN),
which is selected from a pool, and sends the MSRN back in an MAP/D
MSRN Acknowledgement to the HLR.
The HLR then passes the MSRN back to the GMSC in a MAP/C Routing Information
Acknowledgement message. To the PSTN, the MSRN appears as a dialable number.
Since the GMSC now knows the MSC in which the MS is currently located, it generates an
IAM with the MSRN as the called party number. When the MSC receives the IAM, it
recognizes the MSRN and knows the IMSI for which the MSRN was allocated. The MSC then
returns the MSRN to the pool for future use on another call.
The MSC sends the VLR a MAP/B Send Information message requesting information, including
the called MS's capabilities, services subscribed to, and so on. If the called MS is authorized and
capable of taking the call, the VLR sends a MAP/B Complete Call message back to the MSC.
The MSC uses the LAI and TMSI received in the Complete Call message to route a BSSMAP
Page message to all BSS cells in the LA.
Page 73 of 129
IT6601 – MOBILE COMPUTING
1. The calling subscriber uses the MSISDN to dial the mobile subscriber.
2. The MSISDN causes the call to be routed to the mobile network gateway MSC (GMSC).
3. The GMSC uses information in the called number digits to locate the mobile subscriber's
HLR.
4. The HLR has already been informed about the location (VLR address) for the mobile
subscriber; it requests a temporary routing number to allow the call to be routed to the
correct MSC.
5. The MSC/VLR responds with a temporary routing number that is only valid for the
duration of this call.
6. The routing number is returned to the GMSC.
7. The call is made using ISUP (or TUP) signaling between the GMSC and the visited
MSC.
Handover in GSM:
One of the key elements of a mobile phone or cellular telecommunications system is that
the system is split into many small cells to provide good frequency re-use and coverage.
However as the mobile moves out of one cell to another it must be possible to retain the
connection. The process by which this occurs is known as handover or handoff.
Types of handover:
Intra-BTS handover: This form of GSM handover occurs if it is required to change the
frequency or slot being used by a mobile because of interference, or other reasons. In this
form of GSM handover, the mobile remains attached to the same base station transceiver,
but changes the channel or slot.
Inter-BTS Intra BSC handover: This form of GSM handover or GSM handoff occurs
when the mobile moves out of the coverage area of one BTS but into another controlled
by the same BSC. In this instance the BSC is able to perform the handover and it assigns
a new channel and slot to the mobile, before releasing the old BTS from communicating
with the mobile.
Inter-BSC handover: When the mobile moves out of the range of cells controlled by
one BSC, a more involved form of handover has to be performed, handing over not only
from one BTS to another but one BSC to another. For this the handover is controlled by
the MSC.
Inter-MSC handover: This form of handover occurs when changing between networks.
The two MSCs involved negotiate to control the handover.
Page 74 of 129
IT6601 – MOBILE COMPUTING
Introduction
GPRS when integrated with GSM significantly improves and simplifies Internet access. It
transfers data packets from GSM mobile stations to external packet data networks (PDNs).
Packets can be directly routed from the GPRS mobile stations to packet switched networks
making it easy to connect to the Internet.
GSM uses a billing system based on the time (duration) of connection, whereas GPRS uses a
billing system based on the amount of transmitted data rather than the duration of the connection.
So, users can remain continuously connected to the system, and yet get charged only for the
amount of transmitted data.
Goals of GPRS
GPRS should also allow for broadcast, multicast, and unicast service. The overall goal is the
provision of a more efficient and thus cheaper packet transfer service for typical internet
applications that usually rely solely on packet transfer. GPRS does not only represent a software
update to allow for the bundling of channels.
Service Class
Users of GPRS can specify a QoS-profile. This determines the service precedence (high, normal,
low), reliability class and delay class of the transmission and user data throughput. GPRS should
adaptively allocate radio resources to fulfill these user specifications. Delay within a GPRS
network is incurred by channel access delay, coding for error correction, and transfer delays in
the fixed and wireless part of the GPRS network.
Page 75 of 129
IT6601 – MOBILE COMPUTING
The delay introduced by external fixed networks is out of scope. However, GPRS does not
produce additional delay by buffering packets as store and forward networks do. If possible,
GPRS tries to forward packets as fast as possible. GPRS includes several security services such
as authentication, access control, user identity confidentiality, and user information
confidentiality .Even a completely anonymous service is possible, as, e.g., applied for road toll
systems that only charge a user via the MS independent of the user’s identity.
GPRS Services
GPRS offers end-to-end packet-switched data transfer services which can be categorized into the
following two types:
The PTP service is between two users and can either be connectionless or connection-oriented.
The PTM is a data transfer service from one user to multiple users. Again, there are two types of
PTM services. One is multicast PTM where the data packets are broadcast in a certain area and
the other is group call PTM where the data packets are addressed to a group of users.
GPRS architecture
All GSNs are integrated into the standard GSM architecture, and many new interfaces have been
defined .The gateway GPRS support node (GGSN) is the interworking unit between the GPRS
Page 76 of 129
IT6601 – MOBILE COMPUTING
network and external packet data networks (PDN). This node contains routing information for
GPRS users, performs address conversion, and tunnels data to a user via encapsulation.
The GGSN is connected to external networks (e.g., IP or X.25) via the Gi interface and
transfers packets to the SGSN via an IP-based GPRS backbone network (Gn interface).The other
new element is the serving GPRS support node (SGSN) which supports the MS via the Gb
interface. The SGSN, for example, requests user addresses from the GPRS register (GR), keeps
track of the individual MSs’ location, is responsible for collecting billing information (e.g.,
counting bytes), and performs several security functions such as access control.
The SGSN is connected to a BSC via frame relay and is basically on the same hierarchy
level as an MSC. The GR, which is typically a part of the HLR, stores all GPRS-relevant data.
GGSNs and SGSNs can be compared with home and foreign agents, respectively, in a mobile IP
network.
The MSC, which is responsible for data transport in the traditional circuit-switched GSM,
is only used for signaling in the GPRS scenario. Before sending any data over the GPRS
network, an MS must attach to it, following the procedures of the mobility management. The
attachment procedure includes assigning a temporal identifier, called a temporary logical link
identity (TLLI), and a ciphering key sequence number (CKSN) for data encryption.
For each MS, a GPRS context is set up and stored in the MS and in the corresponding
SGSN. This context comprises the status of the MS.
Besides attaching and detaching, mobility management also comprises functions for
authentication, location management, and ciphering (here, the scope of ciphering lies between
MS and SGSN, which is more than in standard GSM).
In idle mode an MS is not reachable and all contexts is deleted. In the standby state only
movement across routing areas is updated to the SGSN but not changes of the cell.
Permanent updating would waste battery power; no updating would require system-wide
paging. The update procedure in standby mode is a compromise. Only in the ready state every
movement of the MS is indicated to the SGSN.
Confidentiality
Page 77 of 129
IT6601 – MOBILE COMPUTING
Page 78 of 129
IT6601 – MOBILE COMPUTING
CDMA 2000 and UMTS were developed separately and are two separate ITU approved
3G standards. In these networks, coverage is provided by a combination of various cell sizes,
ranging from “in building” pico cells to global cells provided by satellites, giving service to the
remote regions of the world.
The UMTS was developed mainly for countries with GSM networks, and it is expected
that all GSM networks will be upgraded to UMTS networks. Because it is a new technology, a
whole new radio access network has to be built. An important advantage of UMTS is that it gives
significantly enhanced capacities to operators.
The UMTS specification has been designed so that the UMTS systems are compatible
with GSM networks. Therefore, the UMTS networks can easily work with any existing
GSM/GPRS network. The UMTS systems use different frequency bands, so the BTSs do not
interfere with each other. UMTS (Universal Mobile Telecommunications Service) is a third-
generation (3G) broadband, packet-based transmission of text, digitized voice, video, and
multimedia at data rates up to 2 megabits per second (Mbps).
UMTS offers a consistent set of services to mobile computer and phone users, no matter
where they are located in the world. UMTS is based on the Global System for Mobile (GSM)
communication standard. It is also endorsed by major standards bodies and manufacturers as the
planned standard for mobile users around the world.
Once UMTS is fully available, computer and phone users can be constantly attached to
the Internet wherever they travel and, as they roam, will have the same set of capabilities. Users
will have access through a combination of terrestrial wireless and satellite transmissions. Until
UMTS is fully implemented, users can use multi-mode devices that switch to the currently
available technology (such as GSM 900 and 1800) where UMTS is not yet available.
The UMTS networks are different from the 2G networks in the following respects:
Higher speech quality: In addition to speech traffic, the UMTS supports the advanced data and
information services and can be called a true multimedia network.
Higher data rate: The UMTS supports 2 Mbps data rate, which is much higher than that
supported by the 2G mobile systems.
Virtual home environment (VHE): A user roaming from his network to other UMTS networks
will not feel any discontinuity or service difference, thus giving a “feeling” of being in the home
network. In contrast, in a 2G network, a user is registered to a visitor location and is also charged
a roaming overhead.
Page 79 of 129
IT6601 – MOBILE COMPUTING
UMTS specifies a complete network system, which includes the radio access network
(UMTS Terrestrial Radio Access Network, or UTRAN), the core network (Mobile Application
Part, or MAP) and the authentication of users via SIM (subscriber identity module) cards. The
technology described in UMTS is sometimes also referred to as Freedom of Mobile Multimedia
Access (FOMA). UMTS should also provide several bearer services, real-time and non real time
services, circuit and packet switched transmission, and many different data rates.
Handover should be possible between UMTS cells, but also between UMTS and GSM or
satellite networks. To reflect the asymmetric bandwidth needs of typical users, UMTS should
provide a variable division of uplink and downlink data rates. Finally, UMTS has to fit into the
IMT-2000 framework. As the global UMTS approach is rather ambitious, a more realistic
alternative for the initial stages would be UMTS cells in cities providing a subset of services.
Features of UMTS
UMTS supports maximum theoretical data transfer rates of 42 M bit/s. UMTS networks
in many countries have been or are in the process of being upgraded with High-Speed Downlink
Packet Access (HSDPA), sometimes known as 3.5G. The high data speeds of UMTS are now
most often utilized for Internet access
The above diagram shows the very simplified UMTS reference architecture which
applies to both UTRA solutions. The UTRA network (UTRAN) handles cell level mobility and
comprises several radio network subsystems (RNS). The functions of the RNS include radio
channel ciphering and deciphering, handover control, radio resource management etc. UTRAN
communicates with the core network (CN). The CN contains functions for inter-system
handover, gateways to other networks (fixed or wireless), and performs location management if
there is no dedicated connection between UE and UTRAN.
UMTS further subdivides the above simplified architecture into so-called domains The
user equipment domain is assigned to a single user and comprises all the functions that are
needed to access UMTS services. Within this domain are the USIM domain and the mobile
equipment domain. The USIM domain contains the SIM for UMTS which performs functions for
encryption and authentication of users, and stores all the necessary user-related data for UMTS.
Page 80 of 129
IT6601 – MOBILE COMPUTING
Typically, this USIM belongs to a service provider and contains a micro processor for an
enhanced program execution environment (USAT, UMTS SIM application toolkit). The end
device itself is in the mobile equipment domain. All functions for radio transmission as well as
user interfaces are located here.
The infrastructure domain is shared among all users and offers UMTS services to all
accepted users. This domain consists of the access network domain, which contains the radio
access networks (RAN), and the core network domain, which contains access network
independent functions. The core network domain can be separated into three domains with
specific tasks.
The serving network domain comprises all functions currently used by a user for
accessing UMTS services. All functions related to the home network of a user, e.g., user data
look-up, fall into the home network domain. Finally, the transit network domain may be
necessary if, for example, the serving network cannot directly contact the home network.
The UMTS network architecture can be divided into three main elements:
The User Equipment (UE) is the name by which a cell phone is referred to. The new
name was chosen because of the considerably greater functionality that the UE incorporates
compared to a cell phone. It can be thought of as both a mobile phone used for talking and a data
terminal attached to a computer with no voice capability.
The RNS is the equivalent of the Base Station Subsystem (BSS) in GSM. It provides and
manages the wireless interface for the overall network.
Page 81 of 129
IT6601 – MOBILE COMPUTING
Core Network
The core network is the equivalent of the GSM Network Switching Subsystem (NSS).
The CN contains functions for inter-system handover, gateways to other networks (fixed or
wireless) and performs location management if there is no dedicated connection between UE and
UTRAN
Page 82 of 129
IT6601 – MOBILE COMPUTING
UNIT – IV
MOBILE AD-HOC NETWORKS
Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of
Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks
(VANET) – MANET Vs VANET – Security.
Part – A
1. Define MANET. Give examples for MANETs. (May/June 2013)
Mobile Ad hoc network are realized through short lived links among mobile devices,
such temporary or adhoc networks that are established and maintained on the fly and work
without the support of any form of fixed infrastructure such as a base station are known as
Mobile Adhoc networks (MANETS).Examples are: Disaster relief efforts, Military networks.
2. Define Ad hoc network. How is an Ad hoc network set up without the infrastructure
support? (Nov/Dec 2013)
The network is ad hoc because it does not rely on a pre existing infrastructure, such as
routers in wired networks or access points in managed (infrastructure) wireless networks. A
network can be established through cooperation among the devices themselves. In the
simplistic realization of this concept, a mobile device wanting to communicate can forward its
packets to its neighbor and the neighbor nodes in turn can forward those to their neighbours
and so on until the destination is reached.
Routing is the process of selecting best paths in a network. In the past, the term routing
also meant forwarding network traffic among networks. The purpose of routing is to find the
best path between the source and destination for forwarding packets in any store and forward
network. Also routing is a easy task because the routes to nodes can be uniquely and efficiently
identified based on the subset structure encoded in IP.
4. How routing in MANETS id different from routing in traditional networks? (Reg. 2013)
There are 3 important ways in which MANET routing protocol differs from routing of
packets in a traditional network.
Page 83 of 129
IT6601 – MOBILE COMPUTING
In MANET the topology is dynamic because of the mobility of the nodes whereas
in traditional networks it is static.
In the simple IP based addressing scheme deployed in wired networks, the IP
address encapsulated in the subnet structure does not work because of nodes
mobility.
5. What are proactive and reactive protocols? (Nov/Dec 2014, May/June 2013)
Proactive protocols: It is also known as table driven protocols. In this protocol, each
node in a routing table maintains information about routes to every other node in the network.
These tables are periodically updated in the face of random network topology changes.
Example: DSDV (Destination sequence distance vector)
Reactive protocols: It is also known as on demand routing protocol. This protocol nodes
do not maintain up to date routes to different destinations and new routes are discovered only
when required. It uses a flooding technique in order to determine the route.
Availability
Confidentiality
Integrity
Authentication
Non-repudiation
8. What are the contents of link state advertisement message? (Reg. 2013)
Page 84 of 129
IT6601 – MOBILE COMPUTING
The design of a MANET is carried out primarily based on the anticipated node density,
average rate of node movements and the expected traffic. The traffic in a network can be of
various types. A network protocol should leverage the characteristics of specific traffic types
that are expected to improve its performance. The common traffic types are:
Bursty traffic
Large packets sent periodically
12. Why is routing in Multi-hop Adhoc networks complicated? (Dec 2012) (May 2015)
Dynamic topology, No Physical Links
Unreliable links
Limited resources (battery, processing power)
Low link bandwidth
No default router available
Page 85 of 129
IT6601 – MOBILE COMPUTING
13. How does the symmetry of wireless links influence the routing algorithms proposed
in Wireless?
Most algorithms fail if the links are asymmetric (unidirectional links). In DSR – the
algorithm states that the receiver simply sends the packet collecting routers on the way
between source and destination back to the source by choosing the routers in the reverse
order. If reverse links do not exist, then DSR has to find the reverse path again. The path must
reach the other side – without a route is quite difficult.
14. Differentiate wired networks and adhoc wireless networks based on routing. (Nov
2012) (Dec 2013) (or) What is the difference between infrastructure and adhoc
networks? (Dec 2014) (Nov 2015)
15. What are the contents of link state advertisement message? (Reg. 2013)
Page 86 of 129
IT6601 – MOBILE COMPUTING
Part - B
University Questions
1. Describe the reactive routing protocols. (8) (Dec 2014)
2. i) Explain the Dynamic Source Routing in Adhoc networks with example(8) (Dec 2012)
(June 2013) (June 2014) (May 2015)
ii) Explain the DSR routing protocol with suitable example. What are the advantages and
pitfalls of cache maintenance in DSR? (16) (Dec 2013)
3. Discuss the routing protocols in MANET (8) (Nov 2014)
4. Explain the multicast routing protocols in detail (8) (Nov 2013)
-o0o –o0o –o0o-
PART B
1. Explain the dynamic source routing for ad hoc networks in detail. (May 2015, Dec
2013, June 2014, Dec 2012, June 2013)
Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks. The
dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed
specifically for use in multi-hop wireless ad hoc networks of mobile nodes. A dynamic source
routing network can configure and organize itself independently of oversight by human
administrators.DSR allows the network to be completely self-organizing and self-configuring,
without the need for any existing network infrastructure or administration. It is similar to
AODV in that it forms a route on-demand when a transmitting node requests one.
However, it uses source routing instead of relying on the routing table at each
intermediate device. In an ad-hoc network where nodes exchange packets from time to time,
i.e., the network is only lightly loaded, and DSDV or one of the traditional distance vector or
link state algorithms is used for updating routing tables. Although only some user data has to
be transmitted, the nodes exchange routing information to keep track of the topology. These
algorithms maintain routes between all nodes, although there may currently be no data
exchange at all. This causes unnecessary traffic and prevents nodes from saving battery power.
Dynamic source routing (DSR), therefore, divides the task of routing into two separate
problems.
Page 87 of 129
IT6601 – MOBILE COMPUTING
The basic principle of source routing is also used in fixed networks, e.g. token rings.
Dynamic source routing eliminates all periodic routing updates and works as follows. If a node
needs to discover a route, it broadcasts a route request with a unique identifier and the
destination address as parameters. Any node that receives a route request does the following. If
the node has already received the request (which is identified using the unique identifier), it
drops the request packet. If the node recognizes its own address as the destination, the request
has reached its target. Otherwise, the node appends its own address to a list of traversed hops in
the packet and broadcasts this updated route request.
Using this approach, the route request collects a list of addresses representing a possible
path on its way towards the destination. As soon as the request reaches the destination, it can
return the request packet containing the list to the receiver using this list in reverse order. One
condition for this is that the links work bi-directionally. If this is not the case, and the
destination node does not currently maintain a route back to the initiator of the request, it has to
start a route discovery by itself. The destination may receive several lists containing different
paths from the initiator. It could return the best path, the first path, or several paths to offer the
initiator a choice.
Page 88 of 129
IT6601 – MOBILE COMPUTING
Applying route discovery to the above example for a route from N1 to N3 at time t1 results in
the following.
1. N1 broadcasts the request ((N1), id = 42, target = N3), N2 and N4 receive this request.
2. N2 then broadcasts ((N1, N2), id = 42, target = N3), N4 broadcasts ((N1, N4),id = 42,
target = N3). N3 and N5 receive N2’s broadcast, N1, N2, and N5 receive N4’s broadcast.
3. N3 recognizes itself as target, N5 broadcasts ((N1, N2, N5), id = 42, target =N3). N3
and N4 receive N5’s broadcast. N1, N2, and N5 drop N4’s broadcast packet, because they all
recognize an already received route request (and N2’s broadcast reached N5 before N4’s did).
4. N4 drops N5’s broadcast, N3 recognizes (N1, N2, N5) as an alternate, but longer
route.N3 now has to return the path (N1, N2, N3) to N1. This is simple assuming symmetric
links working in both directions. N3 can forward the information using the list in reverse order.
The assumption of bi-directional links holds for many ad-hoc networks. However, if
links are not bi-directional, the scenario gets more complicated. The algorithm has to be
applied again, in the reverse direction if the target does not maintain a current path to the
source of the route request.
N3 has to broadcast a route request ((N3), id = 17, target = N1). Only N5 receives this
request.N5 now broadcasts ((N3, N5), id = 17, target = N1), N3 and N4 receive the
broadcast.N3 drops the request because it recognizes an already known id. N4 broadcasts ((N3,
N5, N4), id = 17, target = N1), N5, N2, and N1 receive the broadcast.N5 drops the request
packet, N1 recognizes itself as target, and N2 broadcasts ((N3, N5, N4, N2), id = 17, target =
N1). N3 and N5 receive N2’s broadcast. N3 and N5 drop the request packet.
Page 89 of 129
IT6601 – MOBILE COMPUTING
Now N3 holds the list for a path from N1 to N3, (N1, N2, N3), and N1 knows the path
from N3 to N1, (N3, N5, N4, N1). But N1 still does not know how to send data to N3! The
only solution is to send the list (N1, N2, N3) with the broadcasts initiated by N3 in the reverse
direction. This example shows clearly how much simpler routing can be if links are
symmetrical.
The basic algorithm for route discovery can be optimized in many ways.
To avoid too many broadcasts, each route request could contain a counter. Every node
rebroadcasting the request increments the counter by one. Knowing the maximum network
diameter (take the number of nodes if nothing else is known), nodes can drop a request if the
counter reaches this number.
A node can cache path fragments from recent requests. These fragments can now be used
to answer other route requests much faster. A node can also update this cache from packet
headers while forwarding other packets. If a node overhears transmissions from other nodes, it
can also use this information for shortening routes.
After a route has been discovered, it has to be maintained for as long as the node sends
packets along this route. Depending on layer two mechanisms, different approaches can be
taken:
If the link layer uses an acknowledgement (as, for example, IEEE 802.11) the node
can interpret this acknowledgement as an intact route.
If possible, the node could also listen to the next node forwarding the packet, so
getting a passive acknowledgement.
A node could request an explicit acknowledgement.
This situation is complicated if links are not bi-directional. If a node detects connectivity
problems, it has to inform the sender of a packet, initiating a new route discovery starting from
the sender. Alternatively, the node could try to discover a new route by itself.
Although dynamic source routing offers benefits compared to other algorithms by being
much more bandwidth efficient, problems arise if the topology is highly dynamic and links are
asymmetrical.
2 Discuss in detail about Destination Sequence Distance Vector routing protocol and
Zone Routing Protocol. (Nov 2012)
destination, a sequence number that is created by the destination itself. Each node periodically
forwards routing table to its neighbors.
Each node increments and appends its sequence number when sending its local routing
table. Each route is tagged with a sequence number; routes with greater sequence numbers are
preferred. Each node advertises a monotonically increasing even sequence number for itself.
When a node finds that a route is broken, it increments the sequence number of the route and
advertises it with infinite metric. Destination advertises new sequence number
The strategies to avoid this problem which are used in fixed networks (poisoned-
reverse/split horizon) do not help in the case of wireless ad-hoc networks, due to the rapidly
changing topology. This might create loops or unreachable regions within the network.
Damping: Transient changes in topology that are of short duration should not
destabilize the routing mechanisms. Advertisements containing changes in the topology
currently stored are therefore not disseminated further. A node waits with dissemination if
these changes are probably unstable. Waiting time depends on the time between the first and
the best announcement of a path to a certain destination.
For each node N1 stores the next hop toward this node, the metric (here number of
hops), the sequence number of the last advertisement for this node, and the time at which the
path has been installed first. The table contains flags and a settling time helping to decide when
the path can be assumed stable. Router advertisements from N1 now contain data from the
first, third, and fourth column: destination address, metric, and sequence number. Besides
being loop-free at all times, DSDV has low memory requirements and a quick convergence via
triggered updates.
Page 91 of 129
IT6601 – MOBILE COMPUTING
1. Each router in the network collects route information from all its neighbours.
2. After gathering information the node determines the shortest path to the destination based on
the gathered information.
3. Based on the gathered information a new routing table is generated.
4. The router broadcasts this table to its neighbours. On receipts by neighbours the neighbor
nodes recomputed their respective routing tables.
5. This process continues till the routing information becomes stable.
The ZRP is a hybrid protocol that overcomes the shortcomings of both proactive and
reactive routing protocol. ZRP divides the entire network into overlapping zones of variable
size where routing inside the zone is performed using proactive approach and outside the zone
is performed using reactive approach. The size of a zone is not determined by geographical
measurement but is given by a radius of length ρ, where ρ is the number of hops to the
perimeter of the zone. The routing in ZRP is divided into two parts: Intra zone routing and inter
zone routing
Intrazone routing
First, the packet is sent within the routing zone of the source node to reach the peripheral
nodes. Each node collects information about all the nodes in its routing zone proactively. This
strategy is similar to a proactive protocol like DSDV. Each node maintains a routing table for
its routing zone, so that it can find a route to any node in the routing zone from this table. In the
original ZRP proposal, intrazone routing is done by maintaining a link state table at each node.
Each node periodically broadcasts a message similar to a hello message kwon as a zone
notification message.
A zone notification message dies after k hops, i.e., after reaching the node´s neighbors
at a distance of k hops.
Interzone routing
The packet is sent from the peripheral nodes towards the destination node. The
interzone routing discovers routes to the destination reactively. Consider a source (S) and a
destination (D). If D is within the routing zone of S, the routing is completed in the intrazone
routing phase. Otherwise, S sends the packet to the peripheral nodes of its zone through border
casting.
Page 92 of 129
IT6601 – MOBILE COMPUTING
Evaluation of ZRP
When the radius of the routing zone is 1, the behaviour of ZRP is like a pure reactive
protocol, for example, like DSR. When the radius of the routing zone is infinity (or the
diameter of the network), ZRP behaves like a pure proactive protocol, for example, like
DSDV.The optimal zone radius depends on node mobility and route query rates.
Control traffic generated by a protocol is the number of overhead packets generated due
to route discovery requests. In ZRP, control traffic is generated due to interzone and intrazone
routing. Hello messages transmitted for neighbour discovery are not considered as control
traffic since mobility has no effect on it. In the intrazone routing, each node needs to construct
the border cast tree for its zone. With a zone radius of r, this requires complete exchange of
information over a distance of 2r-1 hops. For unbounded networks with a uniform distribution
of nodes intrazone control traffic.
The intrazone control traffic grows fast in practice with increase in zone radius. So, it is
important to keep the zone radius small.The control traffic can be reduced drastically with
early query termination, when a RREQ message is prevented from going to the same region of
the network multiple times. However, the amount of control traffic depends both on node
mobility and query rate.
For a fixed CMR, the route query response time decreases initially with increased zone
radius. However, after a certain radius, the response time increases with zone radius. This is
due to the fact that the network takes longer time to settle even with small changes in large
routing zones.
Page 93 of 129
IT6601 – MOBILE COMPUTING
ZRP ARCHITECTURE
In zone routing protocol, a routing zone is defined for each node separately and the
zones of neighboring nodes overlap. The routing zone has a radius ρ expressed in hops. The
zone thus includes the nodes, where distance from center node is at most ρ hops. A routing
zone with radius two can be seen in figure 1, where the routing zone of S includes nodes A-K
but not L.
1. Intra Zone Routing Protocol (IARP) : IARP is used by a node to communicate with the
interior nodes of its zone and is limited by the zone radius .It maintains routes inside the zone,
each node continuously needs to update the routing information in order t determine the
peripheral nodes as well as maintain a map of which nodes can be reached locally.
2. Inter Zone Routing Protocol (IERP) : IERP is used to communicate between nodes of
different zones. It is reactive routing component which offers enhanced route discovery. The
IERP needs to be able to take advantage of the local connectivity provided by IARP. Route
discovery is done through a process called border casting that uses a Bordercast Routing
Protocol (BRP) to only transmit route requests to peripheral nodes.
3. Border cast Routing Protocol (BRP) : BRP is used to direct the route requests initiated by
the IERP to the peripheral nodes and also utilizes the topology information provided by IARP
Page 94 of 129
IT6601 – MOBILE COMPUTING
to construct a border cast tree. For route requests away from areas of network, a query control
mechanism is employed by BRP.
ZRP ARCHITECTURE
3. (a) Explain in detail about the attacks on ad hoc networks. (8) (Reg. 2013)
One of the large varieties of attacks that are possible in a MANET, many are
essentially routing attacks. There are various attacks on a MANET can be classified into
passive and active attacks based on the means of attack.
Passive attack: Targets to monitor and steal the data exchanged in the network without
disrupting the network operations. It becomes very difficult to identify these attacks since these
do not have any perceivable symptoms. These attacks can be reduced by using suitable
encryption techniques.
Active attack: It is destructive and disturbs the normal functionality of the network.
The below table shows a classification of various types of security attacks against MANETs
into active and passive attacks.
Page 95 of 129
IT6601 – MOBILE COMPUTING
Attacks can also be classified according to the specific layer of the protocol stack that they
target and it is shown in the below table.
Layer Attacks
Routing loop
By sending tampered routing packets, an attacker can create a routing loop. This will
result in data packets being sent around endlessly, consuming bandwidth and causing
dissipation of power for a no of nodes. In this attack the packets are prevented from reaching
their intended recipients and thus it can be considered to be a type of denial of service (DOS)
attack.
A malicious code can be virus, worm, spyware or a Trojan. In a MANET an attacker can
propagate malicious code and can slow down the nodes, overload the network or even crash
the nodes.
Repudiation attack
In this attack, an attacker creates a large no of half opened TCT connections with the
victim nodes by sending a large no of SYN packets to them. This causes the TCP connection
tables of the victim nodes to overflow.
Page 96 of 129
IT6601 – MOBILE COMPUTING
Session hijacking
In a typical session all the communications are authenticated only at the beginning of the
session. The attacker can spoof the IP address of a node that has just started a session and
hijack the session from the victim and perform a DOS attack.
Fabrication attack
In AODV routing, when a node detects a broken link while forwarding a packet it sends a
route message towards the packet sender. In this attack a malicious code sends a false route
error message to the packet sender even when the next hop link is not broken.
Black hole
A node can set up a route to some destination through itself and when the actual data
packets are received from other nodes and these are simply dropped. This node forms a black
hole to which data packets enter but never leave.
Grey hole
A special case of the black hole attack is the grey hole attack. The malicious router can
also accomplish this attack selectively, e.g. by dropping packets for a particular network
destination, at a certain time of the day, a packet every n packets or every t seconds, or a
randomly selected portion of the packets. This is rather called a gray hole attack. If the
malicious router attempts to drop all packets that come in, the attack can actually be discovered
fairly quickly through common networking tools such as trace route. Also, when other routers
notice that the compromised router is dropping all traffic, they will generally begin to remove
that router from their forwarding tables and eventually no traffic will flow to the attack.
Partitioning
In this kind of attack, the attacker partitions a network by causing some nodes to split up
from the other nodes (i.e.) one set of nodes is not able to communicate with the other set of
nodes. By analyzing the network topology the attacker can choose to make the partitioning
between the set of nodes that causes the most harm to the system. This attack can be
accomplished in many ways such as by tampering routing packets as in the previous attacks. It
can also be launched through some physical attack such as radio jamming.
Blacklist
This attack tries to exploit a loophole in security mechanisms. Some ad hoc routing
protocols try to tackle this security problem by keeping a list of perceived malicious codes.
Each node has a blacklist of what it thinks bad nodes and thereby avoids using them when
Page 97 of 129
IT6601 – MOBILE COMPUTING
setting up routing paths. An attacker might to try to get a good node blacklisted causing the
other good nodes to add this node to their respective blacklists and so avoid it.
Wormhole
In a wormhole attack a direct link (tunnel) between the two nodes is established. This is
referred as wormhole link. Here one node eavesdrops messages at one end and tunnels them
through the wormhole link to the other node which then replays them. Once wormhole is
established a malicious node can use it for traffic analysis or make a denial of service attack by
dropping certain data or control packets.
It is essential that in an ad hoc network, all nodes participate in the routing process.
However, it is possible that a node may act selfishly and process only the routing information
that is related to itself either maliciously or to conserve energy. This behavior /attack can create
network instability or even segment the network.
There are few important issues that are relevant to the design of suitable MANET protocols.
Network size and node density are the two important parameters of a MANET that need
to be considered while designing an appropriate routing protocol for a network. Network size
refers to the geographical area.For larger networks, clustering is essential to keep the
communication overheads low. The cluster size as well as a specific clustering solution for a
network would to a large extent depend on node density.
Connectivity
The term connectivity of a node usually refers to the number of neighbours. Here the
neighbour of a node is one that is in its transmission range. The term connectivity is also
sometimes used to refer to a link between the two nodes. The term link capacity denotes the
bandwidth of the link. In a MANET both the number of neighbouring nodes and the capacities
of the links to different neighbours may vary significantly.
Network topology
The topology of a network denotes the connectivity among the various nodes of the
network. Mobility of the nodes affects the network topology. Due to node mobility, new links
can form and some links may get dissolved. Other than mobility nodes can become inoperative
Page 98 of 129
IT6601 – MOBILE COMPUTING
due to discharged batteries or hardware failures and thereby cause changes to the topology. The
rate at which the topology changes needs to be appropriately considered in the design of an
effective network.
User traffic
The design of a MANET is carried out primarily based on the anticipated node density,
average rate of node movements and the expected traffic. The traffic in a network can be of
various types. A network protocol should leverage the characteristics of specific traffic types
that are expected to improve its performance. The common traffic types are:
Bursty traffic
Large packets sent periodically
Operational environment
The operational environment of a mobile network is usually either urban, rural and
maritime. These operational environments support the line of sight (LOS) communication. But
there can be a significant difference in the node density and the mobility values in different
operational environments, requiring different designs of mobile networks to suit an operational
environment.
Energy constraint
There is no infrastructure in a MANET, the mobile nodes themselves store and forward
packets. Also the mobile nodes as routers leads to nodes incurring perennial routing related
with workload and this consequently results in continual battery drainage.
4. Discuss in detail about the traditional routing protocols. (16) (Reg. 2013)
The term link state denotes the state of a connection of one router with one of its
neighbours. A neighbour of a router is one with which it can directly communicate without
taking any help from the intervening routers. Each router determines its local connectivity
information and floods the network with this information with a link state advertisement. As a
Page 99 of 129
IT6601 – MOBILE COMPUTING
router in the network receives this link state advertisement it stores this packet in a link state
packet database. (LSPDB).
Link state routing is a complex routing technique in which each router shares
information with other routers about the reachability of other networks and the metric to reach
the other networks in order to determine the best path. Routing is the process of moving
packets across a network from one host to another. It is usually performed by dedicated
devices called routers. Packets are the fundamental unit of information transport in all modern
computer networks, and increasingly in other communications networks as well. They are
transmitted over packet switched networks, which are networks on which each message (i.e.,
data that is transmitted) is cut up into a set of small segments prior to transmission.
The metric is based on number of hops, link speeds, traffic congestion and other factors
as determined by the network designers. A hop is the trip that a packet takes from one router to
another as it traverses a network on the way to its destination.
The basic concept of link-state routing is that every node constructs a map of the
connectivity to the network, in the form of a graph, showing which nodes are connected to
which other nodes. Each node then independently calculates the next best logical path from it
to every possible destination in the network. The collection of best paths will then form the
node's routing table. Link-state algorithms are sometimes characterized informally as each
router 'telling the world about its neighbours"
Link state routing is an improvement over distance vector routing protocols, the other
main class of routing protocols for packet switched networks. These protocols, such as RIP
(routing information protocol), normally use only a single metric (such as hop count) and
which exchange all of their table information with all other routers on a regular basis. Link
state routing normally requires more memory and processing than distance vector routing, but
there is less transmission overhead and it reacts more quickly to changes in network
connectivity.
Next, each node periodically (and in case of connectivity changes) sends a short message, the
link-state advertisement which
This message is then flooded throughout the network. As a necessary precursor, each node
in the network remembers, for every other node in the network, the sequence number of the
Page 100 of 129
IT6601 – MOBILE COMPUTING
last link-state message which it received from that node. Starting with the node which
originally produced the message, it sends a copy to all of its neighbours. When a link-state
advertisement is received at a node, the node looks up the sequence number it has stored for
the source of that link-state message.
If this message is newer (i.e., has a higher sequence number), it is saved, and a copy is sent
in turn to each of that node's neighbours. This procedure rapidly gets a copy of the latest
version of each node's link-state advertisement to every node in the network. Networks running
link state algorithms can also be segmented into hierarchies which limit the scope of route
changes. These features mean that link state algorithms scale better to larger networks.
The link-state advertisement (LSA) is a basic communication means of the OSPF routing
protocol for the Internet Protocol (IP). It communicates the router's local routing topology to
all other local routers in the same OSPF area. OSPF is designed for scalability, so some LSAs
are not flooded out on all interfaces, but only on those that belong to the appropriate area. In
this way detailed information can be kept localized, while summary information is flooded to
the rest of the network. Link-state protocols implement an algorithm called the shortest path
first (SPF, also known as Dijkstra's Algorithm) to determine the path to a remote destination.
The basic characteristic of a link state routing protocol is that every router constructs a graph
representing the connectivity between the various nodes in the network based on the
information received from other routers. The link state advertisement message contains:
Distance vector protocols (a vector contains both distance and direction), such as RIP,
determine the path to remote networks using hop count as the metric. A hop count is defined as
the number of times a packet needs to pass through a router to reach a remote destination. A
distance-vector routing protocol requires that a router inform its neighbors of topology changes
periodically. Compared to link-state protocols, which require a router to inform all the nodes in
a network of topology changes, distance-vector routing protocols have less computational
complexity and message overhead.
The term vector means that routes are advertised as a vector (distance, direction) where
distance is the no of hops between the two nodes and direction is defined in terms of the next
hop router to which the packets need to be forwarded. The distance vector protocols are based
on the well known Bellman Ford algorithm.
1. Periodic updates
2. Neighbors
3. Broadcast updates
4. Entire routing table is included with routing update
As a router receives the routing information of its neighbouring nodes, it updates its own
routing table by examining the received information and in turn informs its own neighbours of
the changes. This is also referred as “routing by rumour” because routers are relying on the
information they receive from other routers and have no way to determine if the information is
actually valid. A number of techniques have been suggested to cope with instability and
inaccurate routing information. The routers using the distance vector protocol do not have
knowledge of the entire path that a packet would take to reach its destination. Instead they just
know the following vector:
Direction in (or the specific network interface over) which a packet should be
forwarded.
Its own distance from the destination.
5. (a) Explain in detail about VANETs. Also Differentiate MANET with VANET.
(April/May 2015)
Multi hop communication often results in rather large networks. In a city or a busy
highway the diameter of the network can be several tens of kilometers. Any vehicle that goes
out of the signal range of all other vehicles in the network is excluded from the network. A
vehicle that was outside the communication range of a vehicle that is already in the network
and as a result can join the network.
VANETs support a wide range of applications - from simple one hop information
dissemination of, e.g., cooperative awareness messages (CAMs) to multi-hop dissemination of
messages over vast distances. A VANET can offer a significant utility value to a motorist.
Electronic brake lights, which allow a driver (or an autonomous car or truck) to react to
vehicles braking even though they might be obscured (e.g., by other vehicles).
Platooning, which allows vehicles to closely (down to a few inches) follow a leading vehicle
by wirelessly receiving acceleration and steering information, thus forming electronically
coupled "road trains".
Traffic information systems, which use VANET communication to provide up-to-the minute
obstacle reports to a vehicle's satellite navigation system.
Uses of VANET
VANET can help drivers to get advance information and warnings from a nearby
environment through message exchanges. The trailing vehicles get advance notification
of the collision ahead on the road. The driver can also get advance information on the
road condition ahead or a warning about the application of emergency electronic brake by
a vehicle ahead in the lane.
A VANET can help disseminate geographical information to the driver as he continues to
drive.
Drivers may have the opportunity to engage in other leisurely tasks such as VOIP with
family, watch news highlights, listen to series of media files known as podcasts or even
carry out some business activities such as participate in an office video conference
session.
5.(b) Explain in detail about Vehicular Adhoc networks (VANET). Also Differentiate
MANET with VANET. (April/May 2015)
There are few important issues that are relevant to the design of suitable MANET protocols.
Network size and node density are the two important parameters of a MANET that need
to be considered while designing an appropriate routing protocol for a network. Network size
refers to the geographical area.For larger networks, clustering is essential to keep the
communication overheads low. The cluster size as well as a specific clustering solution for a
network would to a large extent depend on node density.
Connectivity
The term connectivity of a node usually refers to the number of neighbours. Here the
neighbour of a node is one that is in its transmission range. The term connectivity is also
sometimes used to refer to a link between the two nodes. The term link capacity denotes the
bandwidth of the link. In a MANET both the number of neighbouring nodes and the capacities
of the links to different neighbours may vary significantly.
Network topology
The topology of a network denotes the connectivity among the various nodes of the
network. Mobility of the nodes affects the network topology. Due to node mobility, new links
can form and some links may get dissolved. Other than mobility nodes can become inoperative
due to discharged batteries or hardware failures and thereby cause changes to the topology. The
rate at which the topology changes needs to be appropriately considered in the design of an
effective network.
User traffic
The design of a MANET is carried out primarily based on the anticipated node density,
average rate of node movements and the expected traffic. The traffic in a network can be of
various types. A network protocol should leverage the characteristics of specific traffic types
that are expected to improve its performance. The common traffic types are:
Bursty traffic
Large packets sent periodically
Operational environment
The operational environment of a mobile network is usually either urban, rural and
maritime. These operational environments support the line of sight (LOS) communication. But
there can be a significant difference in the node density and the mobility values in different
operational environments, requiring different designs of mobile networks to suit an operational
environment.
Energy constraint
There is no infrastructure in a MANET, the mobile nodes themselves store and forward
packets. Also the mobile nodes as routers leads to nodes incurring perennial routing related
with workload and this consequently results in continual battery drainage.
MANET Vs VANET:
MANETs are a kind of wireless ad hoc networks that usually has a routable
networking environment on top of a Link Layer ad hoc network. A mobile ad-hoc network
(MANET) is a self-configuring infrastructure- less network of mobile devices connected by
wireless.
Each device in a MANET is free to move independently in any direction, and will
therefore change its links to other devices frequently
MANET can contain many nodes that have un-controlled moving patterns. But since
VANET is formed mainly by vehicles so node movement is restricted by factors like road
course, traffic and traffic regulations. Because of the restricted node movement it is quite
likely that the VANET will be supported by some fixed infrastructure that provide some
services and access to stationary networks.
The fixed infrastructure will be deployed at critical locations like slip roads, service
stations, dangerous intersections or places well-known for hazardous weather conditions. Both
VANET and MANET are characterized by the movement and self-organization of the nodes
UNIT – V
MOBILE PLATFORMS AND APPLICATIONS
PART A
Features of Palm OS
The layers which are included in android software attack are as follows:
Application Layer
Application framework
10. What are the responsibilities, constraints and requirements of a Mobile operating
system? (Reg.2013)
Constraints
Limited Memory
Limited Screen Size
Miniature Keyboard
Limited Processing Power
Limited Battery Power
A mobile operating system is a software that allows smartphones, tablets & other
devices to run application and programs.
Eg: Android, iOS, PalmOS, Symbian
15. List out the most popular Mobile Payment Schemes. (Reg.2013)
Three popular types of M-payment schemes are currently being used:
(a) Bank account based
(b) Credit card based
(c) Micropayment
PART – B
1. Discuss in detail about the requirements and the constraints included in Mobile OS.
(Reg. 2013)
There are a few special constraints under which the operating system of a mobile
device needs to operate. There are also a few special features that are required to be
supported by a mobile OS, but are not present in traditional operating systems.
1. Special Constraints
The operating system for a mobile device needs to function in the presence of many
types of constraints which are not present in a traditional computer. As an example of such a
constraint, consider the fact that a mobile device is powered by severely limited energy
stored in a tiny battery. Therefore, an important constraint for a mobile device lies in
avoiding complex computations and hence entering into a low power sleep mode as soon as
possible. Such a constraint is not usually imposed on a traditional operating system. Further,
the number of times that a mobile device is typically turned on per day is significantly higher
than that of a desktop or any other computer.
Due to this constraint, the mobile OS would need to be loaded (booted) much faster
each time after it is switched on, compared to a desktop. Consequently, the kernel of a
mobile OS needs to be of a very small size. There are several such constraints which
influence the design of a mobile OS. It can be argued that coping with such constraints is an
important reason why the operating system of a mobile device needs to differ significantly
from a general-purpose operating system. Some of the important constraints of a mobile OS
Limited memory
A mobile device usually has much less permanent and volatile storage compared to
that of a contemporary desktop or laptop. To cope with the limited memory of a mobile
device, the OS must be as small as possible and yet provide a rich set of functionalities to
meet user demands. The size of the kernel is, therefore, considered to be a very important
figure of merit of a mobile OS.
The size of a mobile handset needs to be small to make it portable. This limits the size
of the display screen. Consequently, new innovative user interfaces need to be supported by
the mobile OS to overcome this constraint and minimize user inconveniences. For example,
many handsets provide easy configurability of the interface to suit individual preferences,
switching between menu and iconic interfaces, etc.
Miniature keyboard
Mobile handsets are either provided with a small keypad or the small-sized display
screen is designed to be used as a keyboard in a touch screen mode using a stylus. In both
these arrangements, typing in the documents and entering the string commands is difficult.
This mandates the provision of some facility for word completion prompts and availability of
capabilities for free form handwriting recognition.
Consequently, the operating system for a mobile device needs to be not only
computationally efficient, but also at the same time expected to minimize power
consumption. The techniques used by an OS to reduce power consumption include putting
the processor and display screen into sleep mode within a few seconds of inactivity, and
varying the intensity of transmitted antennae power as per requirement, etc.
Several facilities and services that are normally not expected to be supported by a
traditional operating system are mandated to be supported by a mobile OS.
Mobile devices are often required to be connected to the base station and various
types of peripheral devices, computers and other mobile devices. This requires enhanced
communication support. The types of communication protocols used for communication with
the base station depend on the generation of the communication technology (1G, 2G, etc.) in
which the mobile device is deployed. Considering that a mobile should be usable across the
existing technology spectrum, it becomes necessary to simultaneously support two or more
generations of technology.
For communication with other devices and with computers, TCP/IP and wireless
LAN protocols also need to be supported. For web browsing as well as communication with
other personal devices such as pen drive and headphones, though mobile devices are
equipped with USB and other types of ports, mobility constraints often make infrared or
Bluetooth connections preferable. This mandates the operating system to support multiple
interfacing protocols and hardware interfaces.
A miniature keyboard forms the main user input mechanism for an inexpensive
mobile device. Sophisticated mobile devices (smart phones) usually support the QUERTY
keyboard. Many recent mobile devices also support touch screen or even stylus-based input
mechanisms along with the handwriting recognition capability.
These issues dictate the choice and complexity of the user interaction part of the OS to a
large extent and to a smaller extent the internal design of the operating system. A mobile OS
needs to support a variety of input mechanisms to make it generic and usable by different
manufacturers of mobile devices.
2. Explain in detail about Windows mobile, Palm OS and Symbian OS. (Reg. 2013)
Windows Mobile
Based on the Microsoft’s Windows CE operating system, the company designed the
Pocket PC 2000 operating system in the year 2000. It was targeted for PDAs and not mobile
phones. Since the usage of mobile phones was increasing at a brisk rate, Microsoft
introduced its Windows Mobile operating system in the year 2003. It was developed based
on Pocket PC 2000 and was targeted specifically as an operating system for mobile phones
which the different cell phone vendors can use in their cell phones.
Apple’e iOS and RIM’s Blackberry OS which are essentially confined to use on
Apple’s iPhone and the Blackberry, Microsoft intended the Windows mobile operating
system to be used across a wide cross section of mobile phone manufacturers.
Since the Windows Mobile operating system was developed to be suitable for use on
multiple vendor platforms, Microsoft defined a hardware specification for hand-held
computers that can run its Windows Mobile operating system in order to simplify the design
of the operating system and to reduce the number of versions of the operating system. It was
also intended to make the cell phones manufactured by different vendors appear uniform.
Microsoft planned that many users are familiar with the desktop version of Windows,
they find it easy to operate Windows mobile. Besides the core capabilities required by a
mobile device, many third-party software applications are available for Windows mobile.
These software applications can be purchased via the Windows Marketplace for mobiles.
Palm OS was designed for ease of use with the provision of a touch screen-based
graphical user interface. Palm OS was upgraded to facilitate installation in several different
mobile devices, such as smart phones of different makes, wrist watches, hand-held gaming
consoles, bar code readers and GPS devices. The key features of the current Palm OS (named
Garnet) are the following:
Symbian OS
Symbian operating system was developed through collaboration among a few
prominent mobile device manufacturers including Nokia, Ericsson, Panasonic, and Samsung.
Their objective was to develop a single industry standard operating system. Symbian had a
vision of a single collaborative effort towards the realization of a versatile mobile OS
installable on a wide range of smart phones, in reality, the different participants tried to exert
control over the direction of evolution of the operating system and consequently it became
huge and unwieldy.
(a) Series 60: The series-60 platform was until recently the leading smart phone platform in
the world. The relatively large sized colour screen, easy-to-use interface and an extensive
suite of applications make it well-suited to support advanced features such as rich content
downloading and MMS (Multimedia Messaging Service). Series 60 was mainly being used
on Nokia’s smart phones and Samsung handsets.
(b) UIQ interface: UIQ (earlier known as User Interface Quartz) is a software package
developed by UIQ Technology for Symbian OS. Essentially, this is a graphical user interface
layer that provides capabilities for third-party application developers to develop applications
and effortlessly create user interfaces.
A few other important features supported by the Symbian operating system are given below:
• It supports a number of communication and networking protocols including TCP,
UDP, PPP, DNS, FTP, WAP, etc. For personal area networking, it supports Bluetooth,
InfraRed and USB connectivity.
• It supports pre-emptive multitasking scheduling and memory protection. Symbian is
a microkernel-based operating system.
• CPU is switched into a low-power mode when the application is not responding to
an event.
• It is optimized for low-power and memory requirements. Applications, and the OS
itself, follow an object-oriented design paradigm.
• All Symbian programming is event-based, and the CPU is switched into a low-
power mode when the applications are not directly dealing with an event. This is achieved
through a programming idiom called active objects.
3. Explain in detail about android and its software stack with its layers. (Reg. 2013)
Android
Google acquired a small start up company called Android, which was developing an
operating system for mobile devices based on Linux. It is a group of 82 technology and
mobile communication companies that are collaborating to develop the Android operating
system as an open source software for mobile devices. It facilitated any application developer
can write Android applications.
Android soon became feature-rich due to its open source nature. Google could embed
its search engine into Android, the way Internet Explorer is embedded into Windows and
also by giving away the operating system free and focusing on the search advertisement
revenue,
Mobile users expect to browse real web pages, and not the simplified mobile versions
of those pages. Many mobile handsets support browsing alternative sites provided by many
website operators for mobile handsets with small screens and limited interfacing capabilities.
However, android scores over those operating systems by providing a built-in full web
browser capable of rendering full web pages and not just small mobile versions.
Android provides an RDBMS SQLite for data storage and data sharing across various
applications. It has several innovative pre-installed applications such as Gmail, Maps, voice
search, etc. Android allows application developers to write code in the Java language. It
facilitates the development of applications with the help of a set of core Java libraries
developed by Google.
Application layer
The Android operating system comes with a set of basic applications such as web
browser, email client, SMS program, maps, calendar, and contacts repository management
programs. All these applications are written using the Java programming language J2ME.
Android applications do not have control over their own priorities. This design is intentional
and is intended to help aggressively manage resources to ensure device responsiveness and
even kill an application when needed.
Application Layer
Application Framework
Kernel
Application framework
The Android runtime consists of two components. A set of libraries provides most of
the functionalities available in the core libraries of the Java language. The other runtime is
the Dalvik virtual machine. Most applications that run on Android are written in Java.
Dalvik translates a Java application program into machine code of the mobile device
and executes it by invoking the operating system. These can be compiled to ARM native
code and installed using the Android native development kit (SDK).Dalvik VM is not a
traditional JVM, but a custom VM designed to run multiple instances efficiently on a single
device. Every Android application runs its own process with its own instance of the Dalvik
virtual machine.
Kernel
Android kernel has been developed based on a version of Linux kernel. However, it
has excluded the native X Window System and does not support the full set of standard GNU
libraries. It difficult to reuse the existing Linux applications or libraries on Android. Based on
the Linux kernel code, Android implements its own device drivers, memory management,
process management and networking functionalities. Android is multitasking and allows
applications to run concurrently.
For example, it is possible to hear music and read or write an email at the same time. This
layer is the one that is commonly used by the cell phone users. Google initially maintained
the kernel code they contributed to in the Linux public distribution. Since 2010, Google no
longer maintains its Android kernel extensions in the Linux public distribution. Now Google
maintains its own code tree. This has marked the branching of Android from Linux code in
the public distribution.
Application Components
Activity: Each activity presents a GUI screen of an application. For example, a chat
application might have one activity that allows to create a chat, another to view the previous
chat sessions, etc. Different activities form a cohesive chat application.
Content providers: Content providers are used for reading and writing data that are either
private to an application or shared across applications. By using the content provider, an
application can query or modify the stored data.
Service: A service denotes a background task and not for interacting through a user interface.
For example, a service might play music in the background while the user is interacting with
a different application.
Advantages of Android
• The mobile platform Android is an open platform and can be ported on almost every
type of cell phone.
• The Android SDK to develop applications is possible on every operating system.
• Android requires a low footprint of 250 KB.
• The emulator of the Android platform has a modern design and is easy to use.
• Application installation on the emulator/device is possible via Android Debug
Bridge (adb) or via Eclipse (with ADT plug-in)
• Google offers a very good documentation as well as many examples which cover
the most basic and important techniques used to get in touch with Android and the
application development on it.
• Android supports robust libraries for media access, communication and data
transfer.
• Android offers a real database SQLite using which meaningful data manipulation
and data sharing across applications is possible.
• Android has an integrated web browser which gives an experience similar to web
browsing using a desktop PC.
• Android uses the standardized and open programming language Java.
4. Discuss about M-commerce and its structure in detail. (16) (Reg. 2013)
Mobile Commerce
Mobile commerce (M-commerce in short) is an important application of mobile
computing.
Page 120 of 129
IT6601 – MOBILE COMPUTING
The popularity of m-commerce can be traced to the convenience it offers both to the
buyers and sellers. The use of computers and networking in trade related transactions has
been limited to automatic teller machines (ATMs), banking networks, debit and credit card
systems, electronic money and electronic bill payment systems (E-payment). Each of these
modes of transaction has its own advantages and disadvantages with a detailed investigation
for use in M-commerce. Mobile payment is a natural evolution of E-payment schemes and
has found an important place in M-commerce.
Applications of M-Commerce
Advertising
Using the demographic information collected by the wireless service providers and
based on the current location of a user, a good targeted advertising can be done. The wireless
service provider may also keep track of the history of the purchases made by customers by
directing advertisements to mobile phones. Customers may also solicit specific
advertisements. For example, suppose a consumer in a shop is fascinated by a new electronic
product and wishes to buy it but only after getting more details about it. For this purpose, he
can view all the relevant advertisements for the product by taking the picture of the bar code
using his mobile device.
Comparison shopping
Consumers can use their mobile phones to get a comparative pricing analysis of a
product at different stores and also the prices of the related products. For example, suppose
consumers visiting a shop can use their mobile phones to access a web-based comparison
shopping application. By scanning the bar code on a product, the consumer can see the price
of this product at different shops in the adjacent area.
Mobile ticketing
Mobile phones can be used to purchase movie tickets (called m-tickets) using credit
cards. After the payment is received, a unique bar code is sent to the purchaser’s mobile
phone by an SMS. The purchase can gain entry to the movie hall by showing the bar code
downloaded into the mobile device to a bar code reader at the entrance.
Consider another example. A customer books a train ticket using the mobile phone.
An m-ticket or a text message is sent to the mobile phone. Inside the train, by showing the m-
ticket on his mobile phone to the ticket collector, the traveller occupies the seat.
Interactive advertisements
In an interactive advertisement, customers can scan a bar code in an advertisement for
a product appearing on a TV screen using their mobile phones. By scanning the bar code, the
consumer can order the product by invoking an internet application.
Catalogue shopping
Mobile phones can be used to place orders for products listed in a catalogue. For
example, a consumer might receive a catalogue by SMS from a catalogue shopping
company. Each product on sale is accompanied by a unique bar code. By scanning the bar
codes, the consumer can buy products directly from the catalogue shopping company.
would normally sell it through a dealer network rather than selling the product directly to the
consumers. Here, the manufacturer and the dealers are said to be the B2B partners.
In this application, mobile phones can be used by dealers to order products. The
orders can be sent to the supplier in a standard format. By scanning the bar code on a product
by using the camera of a mobile phone and specifying the quantity required through a simple
application, a dealer can automatically re-order goods. Mobile phones can be used to gather
information about the status of consignments during the transport and delivery process. By
reading the bar code on a packet using a mobile device, a truck driver can confirm in real-
time that a consignment has been delivered.
Mobile phones can be used to keep track of the stock in a distributed inventory
system and send updates to a central database. By using a mobile phone to scan bar codes or
RFID tags on products, employees can update the stock in real time. Mobile phones (as
opposed to dedicated mobile scanners already used in warehouses) are the particularly
attractive tools where the stock is stored in many locations. An example of such an
application is the stock control of apparel items warehoused in the various department stores.
Information about the supply chain processes can be made available via mobile
devices. By scanning an RFID tag using a mobile phone, it is possible for a manager or
anyone in the supply chain to check information about a product’s state in the supply chain.
This kind of accurate information can help manage the business efficiently.
browsers installed on the users’ mobile devices. The server-side programs, performing
database access and computations, reside on the host computer (servers).
Mobile devices
Hand-held devices essentially present user interfaces to the mobile users. The users
specify their requests using the appropriate interface programs, which are then transmitted to
the mobile commerce application on the Internet. The results obtained from the mobile
commerce application are displayed in suitable formats.
Mobile middleware
The main purpose of mobile middleware is to seamlessly and transparently map the
Internet content to mobile phones that may sport a wide variety of operating systems, markup
languages, micro browsers, and protocols. Most mobile middleware also handle encrypting
and decrypting communication in order to provide secure transactions.
Network
Mobile commerce has become possible mainly because of the availability of wireless
networks. User requests are delivered either to the closest wireless access point (in a wireless
local area network environment) or to a base station (in a cellular network environment).
Wired networks are optional for a mobile commerce system. However, host computers
(servers) are generally connected to wired networks such as the Internet. So user requests are
routed to these servers using transport and/or security mechanisms provided by wired
networks.
Host computers
Host computers are essentially servers that process and store all the information
needed for mobile commerce applications. Most application programs used in the mobile
commerce are hosted on these. These applications usually consist of three major components:
web servers, database servers, and application programs and support software. The web
servers help interact with the mobile client. The database servers store data. The application
program is the middleware that implements the business logic of the mobile commerce
application
Advantages
Disadvantages
1. Mobile devices do not generally offer graphics or processing power of a PC. The users are
therefore constrained to use small screen and keyboard and low resolution pictures and
videos.
2. The small screens of mobile devices limit the complexity of applications. For example, the
menu choice, and text typing capability are severely constrained
3. The underlying network imposes several types of restrictions. For example, the available
bandwidth is severely restricted, and international reach is prohibitively expensive.
Therefore, ubiquity of M-commerce is hard to achieve in practice.
Cell phones are small in size and therefore can easily be carried everywhere like a
wallet. Considering their portability and the powerful feature sets that they provide, they
have now come to play an important part in today’s society. For example, many handsets
provide facilities for radio and television reception, timer and clock, Internet access, camera,
and calculator. These applications are well known and standard. These are usually developed
by the operating system developers themselves and are bundled with the operating system.
However, the true power and distinguishing features of a handset come into picture with the
third-party developed applications.
The SDK comes with an Integrated Development Environment (IDE) and other tools
which are required to develop applications. Android SDK converts Java byte code to
Android’s Dalvik VM byte code. It is important to realize that while developing android-
based applications, the developer codes the applications using Java but the mobile device
running Android does not finally run the Java byte code but runs the Dalvik VM byte code.
For this reason, applications developed using J2ME cannot be run directly on Android
mobile phones although they both use execution environments that are derivations of JVM.
The environment to develop applications for Android consists of the Android SDK,
the IDE Eclipse and the Java Development Kit (JDK). After installing the SDK, which is
done by simply extracting the downloaded ZIP file in a folder, the path to the SDK has to be
set in the path environment variable. Eclipse can be used as the IDE, which also
automatically installs the Android SDK as a plug-in. After installing this plug-in, one can
start the development of Android applications.
Features of SDK
Using the SDK, one can either run the application on the actual Android device or a
software emulator on the host machine. This is achieved by using the Android Debug Bridge
(ADB) available with the SDK.
• A client program which runs on the developer’s (called host) machine. One can
invoke a client from a shell by issuing an adb command.
• A server program which runs as a background process on the host machine. The
server manages communication between the client and an ADB daemon that runs on the
emulator or the Android handset.
A mobile payment (or M-payment) may be defined as any payment instrument where
a mobile device is used to initiate, authorize and confirm an exchange of financial value in
return for goods and services.
Mobile devices include mobile phones, PDAs, and any other device that connects to a
mobile network for making payments. A mobile device can also be used for payment of bills
with access to account-based payment instruments such as electronic funds transfer, Internet
banking payments, direct debit and electronic bill presentment.
Issue in Mobile Payment system: An important issue which influences the establishment of
the mobile payment procedure is the technical infrastructure needed on the customer side. A
sophisticated technology may fail if the customer is not able to handle it with ease.
There are simple procedures based on simple message exchange via short messaging
services (SMS) may prove more successful. The important payment solutions will be SMS-
based, which can easily be charged to the mobile phone bill of customers. Some other
procedures may integrate two or more solutions.
Problems / Disadvantages:
In each of these approaches, a third party service provider (bank, credit card
company, or telecom company) makes a payment on the customer’s behalf. First, the service
provider may require pre-payment from users, leading to some financial gain through
investment of this fund. A service provider may charge a small amount as service charge,
which can decrease with increasing customer base.
In this scheme, the bank account of the customer is linked to his mobile phone
number. When the customer makes an M-payment transaction with a vendor or in a shopping
complex, based on Bluetooth or wireless LAN connectivity with the vendor, the bank
account of the customer is debited and the value is credited to the vendor’s account.
In the credit card based M-payment, the credit card number is linked to the mobile
phone number of the customer. When the customer makes an M-payment transaction with a
merchant, the credit card is charged and the value is credited to the merchant’s account.
Credit card based solutions have a limitation, being heavily dependent on the level of
penetration of credit cards in a country.
Micropayment
Micropayment is intended for payment for small purchases such as from vending
machines. The mobile device can communicate with the vending machine directly using a
Bluetooth or wireless LAN connection to negotiate the payment and then the micropayment
is carried out. A customer makes a call to the number of a service provider where the per call
charge is equal to the cost of the vending item. Thus, the micropayment scheme is
implemented through the cooperation of the mobile phone operator and a third party service
provider. This approach has been used for vending from Coca-Cola machines.