Mobile Computing Unit 3 Notes Printed
Mobile Computing Unit 3 Notes Printed
IP Layer :
● The internet layer is a group of internetworking methods, protocols, and specifications
in the Internet protocol suite that are used to transport datagrams (packets) from the
originating host across network boundaries, if necessary, to the destination host
specified by a network address (IP address) which is defined for this purpose by the
Internet Protocol (IP).
● The internet layer derives its name from its function of forming an internet
(uncapitalized), or facilitating internetworking, which is the concept of connecting
multiple networks with each other through gateways.
Packet Delivery :
Correspondent node (CN)─ an MN or a fixed IP host linked to a router, which
communicates IP packets to another MN in a home or foreign network.
Location Management :
● Location Areas :
○ A hybrid of paging and update
○ Used in the current cellular networks such as GSM
○ Partitions the cells into location areas (LA) – e.g., around 10 cells in diameter
in current systems
○ Each cell (BTS) periodically announces its LA id
○ If a mobile station arrives at a new location area, it updates the base station
about its presence
○ When locating a MS, the network pages the cells in an LA
● Dynamic/Distributed Location Management :
○ Timer based : A MS sends an update after some given time T
○ Movement based : A MS sends an update after it has visited N different cells
○ Distance based : A MS sends an update after it has moved away for D distance
(need ability to measure distance)
○ Profile based : A MS predicts its mobility model and updates the network
when necessary
Registering :
● Mobile node sends an update (called) registration request) to its home agent with the
care-of address information
● Home agent approves/disapproves the request
● Home agent adds the necessary information to its routing table
● Home agent sends a registration reply back to the mobile node
Encapsulation :
● Encapsulation describes the process of placing an IP datagram inside a network
packet or frame
● Encapsulation refers to how the network interface uses packet switching hardware
○ two machines communicating across IEEE 802.3 using IP encapsulates each
datagram in a single Ethernet packet for transmission
○ the encapsulation standard for TCP/IP specifies:
■ that an IP datagram occupies the data portion of the IEEE 802.3 packet
■ the IEEE 802.3 packet type must be set to IP
Tunneling :
● By contrast, the term tunneling refers to the use of a high level transport service to
carry packets or messages from another service.
● the key difference between tunneling and encapsulation lies in whether IP transmits
datagrams in hardware packets or uses a high level transport service.
● IP encapsulates each datagram in a packet when it uses hardware directly.
● It creates a tunnel when it uses a high level transport delivery service to send
datagrams from one point to another.
Route Optimization :
● Route optimization enables the datagrams to be routed directly in both directions.
● Route optimization also provides support for smooth handoffs by letting the previous
foreign agent tunnel datagrams to mobile node's current location.
● The route optimization extension adds a conceptual data structure, the binding cache,
to the correspondent node and to the foreign agent.
● The binding cache contains bindings for mobile nodes' home addresses and their
current care-of addresses.
● With the binding the correspondent node can tunnel datagrams directly to the mobile
node's care-of address.
● Every time the home agent receives a datagram that is destined to a mobile node
currently away from home, it sends a binding update to the correspondent node to
update the information in the correspondent node's binding cache.
● After this the correspondent node can directly tunnel packets to the mobile node. Thus
direct bi-directional communication is achieved with route optimization.
DHCP :
● The Dynamic Host Configuration Protocol (DHCP) is a standardized network
protocol used on Internet Protocol (IP) networks.
● The DHCP is controlled by a DHCP server that dynamically distributes network
configuration parameters, such as IP addresses, for interfaces and services.
● A router or a residential gateway can be enabled to act as a DHCP server. A DHCP
server enables computers to request IP addresses and networking parameters
automatically, reducing the need for a network administrator or a user to configure
these settings manually.
● In the absence of a DHCP server, each computer or other device (e.g., a printer) on
the network needs to be statically (i.e., manually) assigned to an IP address.
Ad Hoc Network :
● An ad-hoc network is a local area network (LAN) that is built spontaneously as
devices connect.
● Instead of relying on a base station to coordinate the flow of messages to each node in
the network, the individual network nodes forward packets to and from each other.
Localization :
● Physical localization occurs when the exact physical location of the nodes is provided
in reference to a coordinate system.
● Symbolic localization only provides location information that refers to abstract
predefined notions of place: in the kitchen, on the second floor, next to a building etc.
● In fine-grained localization the nodes in the network can measure their distance or
angle estimates to (a number of) their neighbors, and thus infer their position
● In coarse-grained localization only proximity (connectivity) information is available.
A node is in the position to detect its neighboring nodes, but it does not possess any
information regarding its distance to them, except perhaps an upper bound of it
implied by its detection capability range.
MAC Issues :
● Hidden Terminal Problem:
○ A hidden node is one that is within the range of the intended destination but
out of range of sender
○ Node B can communicate with A and C both
○ A and C cannot hear each other
○ When A transmits to B, C cannot detect the transmission using the carrier
sense mechanism -> C falsely thinks that the channel is idle
○ If C transmits, collision will occur at node B
VoIP :
● VoIP (voice over IP) is the transmission of voice and multimedia content over
Internet Protocol (IP) networks.
● VoIP encapsulates audio via a codec into data packets, transmits them across an IP
network and decapsulates them back into audio at the other end of the connection.
● By eliminating the use of circuit-switched networks for voice, VoIP reduces network
infrastructure costs, enables providers to deliver voice services over their broadband
and private networks, and allows enterprises to operate a single voice and data
network.
● VoIP also piggybacks on the resiliency of IP-based networks by enabling fast failover
around outages and redundant communications between endpoints and networks.
IPSEC :
● In computing, Internet Protocol Security (IPsec) is a network protocol suite that
authenticates and encrypts the packets of data sent over a network.
● IPsec includes protocols for establishing mutual authentication between agents at the
beginning of the session and negotiation of cryptographic keys for use during the
session.
● IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of
security gateways (network-to-network), or between a security gateway and a host
(network-to-host).
● Internet Protocol security (IPsec) uses cryptographic security services to protect
communications over Internet Protocol (IP) networks.
● IPsec supports network-level peer authentication, data-origin authentication, data
integrity, data confidentiality (encryption), and replay protection.
TCP/IP :
● TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication
language or protocol of the Internet. It can also be used as a communications protocol
in a private network (either an intranet or an extranet).
● TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol,
manages the assembling of a message or file into smaller packets that are transmitted
over the Internet and received by a TCP layer that reassembles the packets into the
original message.
● The lower layer, Internet Protocol, handles the address part of each packet so that it
gets to the right destination. Each gateway computer on the network checks this
address to see where to forward the message.
● Even though some packets from the same message are routed differently than others,
they'll be reassembled at the destination.
Snooping TCP :
Mobile TCP :
Unit - 4
Mobile Databases :
● Mobile computing devices (e.g., smartphones and PDAs) store and share data over a
mobile network, or a database which is actually stored by the mobile device. This
could be a list of contacts, price information, distance travelled, or any other
information.
● Many applications require the ability to download information from an information
repository and operate on this information even when out of range or disconnected.
● This type of access and work load generated by such users is different from the
traditional workloads seen in client–server systems of today.
Data Hoarding :
● A mobile device─ not always connected to the server or network, neither does the
device retrieve data from a server or a network for each computation
● Rather, the device caches required specific data, which may be required for future
computations, during the interval in which the device is connected to the server or
network.
● Advantages :
○ No access latency (delay in retrieving the queried record from the server over
wireless mobile networks)
○ The client device API has instantaneous data access to hoarded or cached data
○ After a device caches the data distributed by the server, the data is hoarded at
the device
Data Dissemination :
● The UAProf (User Agent Profile) specification is concerned with capturing capability
and preference information for wireless devices. This information can be used by
content providers to produce content in an appropriate format for the specific device.
● UAProf files typically have the file extensions rdf or xml, and are usually served with
mimetype application/xml.
● A UAProf file describes the capabilities of a mobile handset, including Vendor,
Model, Screen Size, Multimedia Capabilities, Character Set support, and more.
Service Discovery :
● Service discovery is the automatic detection of devices and services offered by these
devices on a computer network.
● A service discovery protocol (SDP) is a network protocol that helps accomplish
service discovery.
● Service discovery requires a common language to allow software agents to make use
of one another's services without the need for continuous user intervention.
● There are many service discovery protocols, including:
● Bluetooth Service Discovery Protocol (SDP)
● DNS Service Discovery (DNS-SD), a component of Zero Configuration
Networking
● Dynamic Host Configuration Protocol (DHCP)
● Internet Storage Name Service (iSNS)
● Jini for Java objects.
● Mobility :
○ The search cost to locate mobile elements is added to the cost of each
communication involving them.
○ Efficient data structures, algorithms, and query execution plans must be
devised for representing, managing, and querying the location of mobile
elements, which is a fast changing data.
● Wireless Medium :
○ Wireless networks are more expensive, offer less bandwidth, and are less
reliable than wireline networks.
● Portability :
○ Mobile elements must be light and small to be easily carried around.
○ Such considerations, in conjunction with a given cost and level of technology,
will keep mobile elements having less resources than static elements,
including memory, screen size and disk capacity.
Data Replication :
Data Synchronization :
● the mobile sends an Alert command for signaling the wish to begin a refresh-only
synchronization
● the computer responds with a Status command for accepting the request
● the mobile sends one or more Sync command containing an Add sub-command
for each item (e.g., phonebook entry); if the number of entries is large, it does not
include the <Final/> tag;
● in the latter case, the computer requests to continue with an appropriate Alert
message, and the mobile sends another chunk of items; otherwise, the computer
confirms it received all data with a Status command