Mobile Computing. Logical entities are instances of a running user application or a mobile agent. Mobile agents can migrate any where over internet.



Similar documents
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

TCP for Wireless Networks

Mobile Communications Chapter 9: Mobile Transport Layer

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Improved Digital Media Delivery with Telestream HyperLaunch

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

LIST OF FIGURES. Figure No. Caption Page No.

communication over wireless link handling mobile user who changes point of attachment to network

Fundamentals of Mobile and Pervasive Computing

Beginners Guide to Mobile Technology

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Mobile and Sensor Systems

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007

10CS64: COMPUTER NETWORKS - II

Mobile Computing/ Mobile Networks

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Challenges for Nomadic Computing: Mobility Management and Wireless Communications

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

TCP/IP In Cellular Networks

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

CME: A Middleware Architecture for Network-Aware Adaptive Applications

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Introduction Chapter 1. Uses of Computer Networks

Introduction to Mobile Computing

HANDBOOK 8 NETWORK SECURITY Version 1.0

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

WAN Data Link Protocols

Cellular and Networks Application and Data Usage

9 Simple steps to secure your Wi-Fi Network.

Wireless LANs vs. Wireless WANs

Mobility (and philosophical questions about names and identity) David Andersen CMU CS The problem

Hello viewers, welcome to today s lecture on cellular telephone systems.

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

A Study on Fourth Generation Wireless Network Using QualNet Simulator

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

How To Write A Transport Layer Protocol For Wireless Networks

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE standard.

Wireless and Mobile Networks

Security in Ad Hoc Network

Basic Network Design

CDMA-based network video surveillance System Solutions

TOPOLOGIES NETWORK SECURITY SERVICES

Mobile Wireless Overview

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Challenging Issues and Limitations of Mobile Computing

MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet

Written examination in Computer Networks

CHAPTER 7 SUMMARY AND CONCLUSION

Remote Home Security System Based on Wireless Sensor Network Using NS2

Tactical Service Bus: The flexibility of service oriented architectures in constrained theater environments

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

Should and Can a Communication System. Adapt Pervasively An Unofficial View

Mobility and cellular networks

Congestions and Control Mechanisms n Wired and Wireless Networks

5. Security in the IPN

Guideline for setting up a functional VPN

MOBILITY AND MOBILITY MANAGEMENT: A CONCEPTUAL FRAMEWORK

Fixed, nomadic, portable and mobile applications for and e WiMAX networks

Review: Lecture 1 - Internet History

Analysis of TCP Performance Over Asymmetric Wireless Links

10. Wireless Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

SJBIT, Bangalore, KARNATAKA

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Internet 3.0: Ten Problems with Current Internet Architecture and a Proposal for the Next Generation

Comparing Mobile VPN Technologies WHITE PAPER

Disaster-Resilient Backbone and Access Networks

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Microsoft Windows Server System White Paper

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

The Qualcomm CDMA Digital Cellular System

University of Cyprus

Mobile IP and Wireless Application Protocol

TORA : Temporally Ordered Routing Algorithm

Feature and Technical

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

EE6390. Fall Research Report. Mobile IP in General Packet Radio System

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

TCP in Wireless Mobile Networks

Lecture 02b Cloud Computing II

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Wireless Security for Hotspots & Home PCCW Feb, 2009

Opportunistic Ad Hoc Networking: the Case for Car to Car Communications

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Cellular IP: A New Approach to Internet Host Mobility

The Shift to Wireless Data Communication

Virtual Access Points

Transcription:

Migration is important for survival. Mobility originated from the desire to move either toward resources or away from scarcity. Mobile computing about both physical and logical computing entities that move. Physical entities are computers that change locations Logical entities are instances of a running user application or a mobile agent. Mobile agents can migrate any where over internet. But active applications can only move to a local cluster of computers. R. K. Ghosh CSE 100, April, 2005 1 of 19

Buzzwords Mobile, ubiquitous, nomadic, untethered, pervasive and any time, any where, any person computing are used by researchers to refer to computing that uses small portable devices and wireless communication n/w. Nomadic computing refer to limited migration. Migration is within a building at a pedestrian speed. Interleaved pattern of user relocation and indoor connections In the same vein, users carrying laptop with DIAL-UP modems are engaged in nomadic computing. R. K. Ghosh CSE 100, April, 2005 2 of 19

Buzzwords Mobile computing requires wireless n/w to support outdoor mobility and handoff from one n/w to the next at a pedestrian or vehicular speed. Traveler in car using laptop connected with a GSM phone engaged in mobile computing. Ubiquitous computing or pervasive computing refers to access to computer network all the time at any location by any person. Ubiquitous computing can not be realized unless mobile computing matures. R. K. Ghosh CSE 100, April, 2005 3 of 19

Relationships: Nomadic Mobile Laptops, PDAs, other hand held device No n/w Fixed n/w Fixed wireless n/w Wireless n/w (A) wireless n/w (B) Nomadic computing Mobile computing Ubiquitous computing R. K. Ghosh CSE 100, April, 2005 4 of 19

Mobility/context aware applications Naming and locating Routing data and messages Reliability in presence of disconnection Data management Transaction models Security R. K. Ghosh CSE 100, April, 2005 5 of 19

Mobile computing affects entire spectrum of issues in computing. First of all it is distributed + mobile computing. Distributed computing as we know works on static wired network. Node may initiate computation some where and migrate to another place. So two major problem that arise due to mobility Searching for current location of a mobile node. To impose a communication structure among nodes. R. K. Ghosh CSE 100, April, 2005 6 of 19

Physical location of mobile is not the network address, so how do we route the message to a mobile host. This question is being addressed by two different communities: Internet community and cellular community Work of Internet community involves Mobile IP Aims at standards that can extend IP in order to deal with location of Mobile host. Mobile IP work assumes connection-less, packet switching scenario. R. K. Ghosh CSE 100, April, 2005 7 of 19

Cellular community s effort based on location management of cellular phone users. It deals with connection oriented communication, since it is motivated by issues in call-setup in telephony. Main problem in mobility management is to find an appropriate trade-off between searching and informing. Searching is performed when address of the message recipient is not known at least not known precisely. R. K. Ghosh CSE 100, April, 2005 8 of 19

Informing is a responsibility of the mobile unit when it migrates. Extreme situations can be 1. Mobile unit never informs works for units receiving few messages and for units which don t move during receiving. 2. Always informs works well for units receiving messages frequently. R. K. Ghosh CSE 100, April, 2005 9 of 19

Ad hoc network routing is the ultimate challenge. Ad hoc networks arise in rapid deployment scenarios: 1. Emergency disaster management. 2. Military operation in remote sites. 3. Business meeting venues without infrastructure support. Many routing algorithms are designed: AODV, DSR, DSDV, TORA, FSR, LAR, ABR, etc. There are interesting application of conventional graph theoretic problems in ad hoc network routing. R. K. Ghosh CSE 100, April, 2005 10 of 19

Main cause of loss of packets in wired network is congestion because error rates are very low. In wireless n/w congestion still remains a problem, but he situation is some what reversed. Wired and wireless n/w require different techniques to achieve reliability and flow control. TCP works is unsuitable for wireless n/w as it interprets errors as packet loss. R. K. Ghosh CSE 100, April, 2005 11 of 19

ITCP (split/indirect TCP) splits TCP into two parts One between sender and local MSS of the recipient. The other between local MSS and recipient. If MH switches cell during life time of a ITCP connection center point of connection moves to new MSS. sender remains completely unaware about it. R. K. Ghosh CSE 100, April, 2005 12 of 19

Disconnection/weak connection support is important. CODA file system provides support for this. It is implemented as a client side cache management system. The issue concerns making a file system highly available while maintaining consistency. Caching in mobile environment is quite different. MSS can not keep state information (due to scale) for all client. So invalidation by notification. R. K. Ghosh CSE 100, April, 2005 13 of 19

Categories of information dissemination: 1. Wide area services such as stock quotes on national scale 2. Macroservices such weather on a regional scale. 3. Microservices traffic condition in an immediate vicinity. Can be extend to even picocells such finding a parking slot. R. K. Ghosh CSE 100, April, 2005 14 of 19

Providing services will require addressing of following new issues Interoperability and adaptability to n/w environments ranging from high to low bandwidths and infra red communication links Energy efficient data access. Support for mobility and disconnection. Support for active services, triggers (even notification), periodic data delivery. R. K. Ghosh CSE 100, April, 2005 15 of 19

Two modes of information dissemination are 1. Publish. 2. Provide on demand. Published data is filtered by client and server provides directory information for assisting the filtering. Advantages of information dissemination by publishing are: Hot spots can be broadcast frequently which saves energy at client, avoid congestion. Directory helps client to tune in selectively. R. K. Ghosh CSE 100, April, 2005 16 of 19

Handoff management an MH moves from one cell to another while being connected. Desirable features are: probability of call dropping is minimized. ping-pong handoffs avoided. interruption is minimized. R. K. Ghosh CSE 100, April, 2005 17 of 19

Conventional model will not work. Kangaroo-joey transaction Two-tier transaction Team transaction Isolation-Only transaction R. K. Ghosh CSE 100, April, 2005 18 of 19

Security is a major concern. Authentication schemes. Encryption schemes. Payment schemes. E-tickets getting a service by producing a ticket. E-currency issues like anonymity, creditworthiness, non-repudiation, etc. Mobile agent security. R. K. Ghosh CSE 100, April, 2005 19 of 19