Introduction To Mobile Comutin! Con"ider#tion O$ %#t# Lin& L#'er C(#nnel Alloc#tion )irele"" LAN Bluetoot( Con"ider#tion O$ Net*or& L#'er Routin! In A% Hoc Net*or&" Con"ider#tion O$ Tr#n"ort L#'er Con"ider#tion O$ Alic#tion L#'er Securit' on Mobile comutin! www.StudentRockStars.com www.StudentRockStars.com Introduction To Mobile Computing Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. Ubiquitous computing and nomadic computing are synonymous with mobile computing. Information access via a mobile device is plagued by low available bandwidth, poor connection maintenance, poor security, and addressing problems. Unlike their wired counterparts, design of software for mobile devices must consider resource limitation, battery power and display size. Consequently, new hardware and software techniques must be developed. For eample, applications need to be highly optimized for space, in order to fit in the limited memory on the mobile devices. For Internet enabled devices, the good old !C"#I" stack cannot be used$ it takes too much space and is not optimized for minimal power consumption. %iven the plethora of cellular technologies that have emerged in such a market, it becomes etremely difficult to provide support for inter&device communication. ' new hardware technology solution, Bluetooth, has been proposed to overcome this barrier. 'ny device with a (luetooth chip will be able to communicate seamlessly with any other device having a similar chip irrespective of the communication technologies they might be using. For the sake of eplanation, an analogy can be drawn between the )ava *irtual +achine and (lue tooth. In the recent past, cellular phone companies have shown an interesting growth pattern. !he number of customers has been steadily increasing but the average airtime per user has slowed to a constant. !o increase the user average connect time, many cellular providers have started providing data services on their networks which entices the user to use the mobile device for both voice and data communication. !ypical data services include chat, e&mail, Internet browsing. 'n eample of this type of service is SMS ,-hort +essage -ervice.. It is a data service in a %-+ cellular network that allows the users to send a maimum of /01& character message at a time ,similar to paging.. Inherently, this service is not feasible for browsing, checking e&mail or chatting. %-+ networks provide another service called GPRS ,%eneral "acket 2adio -ervice. that allows information to be sent and received across the cellular network. !here has also been a recent effort defining common standards for providing data services on hand&held devices. WAP ,3ireless 'pplication "rotocol. and KVM ,4ilobyte *irtual +achine. deserve a mention here. 3'" is a protocol suite that comprises of protocols tailored for small devices. 3'" has been developed by the 3'" Forum www.StudentRockStars.com www.StudentRockStars.com 5 www.wapforum.org6 and runs over an underlying bearer protocol like I" or -+-. In the 3'" model, a service provider operates a 3'" gateway to convert Internet content to a miniaturized subset of 7!+8 that is displayed by a mini-browser on the mobile device. Companies like 9okia, :ricsson and +otorola have already developed 3'" enabled phones. 's of now, these phones are available and functional mostly in :urope. 7!+8, the de&facto Internet language, is not optimized for these devices. 7andheld devices are characterized by small display sizes, limited input capabilities and limited bandwidth. !he 7!+8 document model consisting of headers, titles, paragraphs, etc, does not work well for a /1 row by /; character wide screen. 4eeping in mind the memory constraints of the mobile device, the browser should not be heavy ,i.e. the markup language should not be too detailed.. 'lternative markup languages that have been proposed include HDM ,7andheld <evice +arkup 8anguage && a prevalent standard., WM ,3ireless +arkup 8anguage && 3'" brainchild. and Comp!ct HTM . <etails about these standards can be obtained from w=c site . Curious readers can also subscribe to the mailing list www&mobile>w=.org. !he popular mini& browser in the market right now is "P#bro$%er from phone.com 5www.phone.com6. !he browser has been licensed to many cellular phone manufacturers like +otorola, :ricsson, -ony and !oshiba. www.StudentRockStars.com www.StudentRockStars.com Con%ider!tion &' D!t! in( !)er !he data link layer is the second layer in the ?-I ,open systems interconnection. seven&layer reference model. It responds to service requests from the network layer above it and issues service requests to the physical layer below it. !he data link layer is responsible for encoding bits into packets prior to transmission and then decoding the packets back into bits at the destination. (its are the most basic unit of information in computing and communications. "ackets are the fundamental unit of information transport in all modern computer networks, and increasingly in other communications networks as well. !he data link layer is also responsible for logical link control, media access control, hardware addressing, error detection and handling and defining physical layer standards. It provides reliable data transfer by transmitting packets with the necessary synchronization, error control and flow control. !he data link layer is divided into two sublayers@ the media access control ,+'C. layer and the logical link control ,88C. layer. !he former controls how computers on the network gain access to the data and obtain permission to transmit it$ the latter controls packet synchronization, flow control and error checking. !he data link layer is where most 8'9 ,local area network. and wireless 8'9 technologies are defined. 'mong the most popular technologies and protocols generally associated with this layer are :thernet, !oken 2ing, F<<I ,fiber distributed data interface., '!+ ,asynchronous transfer mode., -8I" ,serial line Internet protocol., """ ,point&to&point protocol., 7<8C ,high level data link control. and '<CC" ,advanced data communication control procedures.. !he data link layer is often implemented in software as a driver for a network interface card ,9IC.. (ecause the data link and physical layers are so closely related, many types of hardware are also associated with the data link layer. For eample, 9ICs typically implement a specific data link layer technology, so they are often called :thernet cards, !oken 2ing cards, etc. !here are also several types of network interconnection devices that are said to operate at the data link layer in whole or in part, because they make decisions about what to do with data they receive by looking at data link layer packets. !hese devices include most bridges and switches, although switches also encompass functions performed by the network layer. www.StudentRockStars.com www.StudentRockStars.com <ata link layer processing is faster than network layer processing because less analysis of the packet is required. www.StudentRockStars.com www.StudentRockStars.com Ch!nnel Alloc!tion In Mobile Computing Channel allocation deals with the allocation of channels to cells in a cellular network. ?nce the channels are allocated, cells may then allow users within the cell to communicate via the available channels. Channels in a wireless communication system typically consist of time slots, frequency bands and#or C<+' pseudo noise sequences, but in an abstract sense, they can represent any generic transmission resource. !here are three maAor categories for assigning these channels to cells ,or base&stations.. !hey are Fied Channel 'llocation, <ynamic Channel 'llocation and 7ybrid Channel 'llocation which is a combination of the first two methods. *i+ed Ch!nnel Alloc!tion Fied Channel 'llocation ,FC'. systems allocate specific channels to specific cells. !his allocation is static and can not be changed. For efficient operation, FC' systems typically allocate channels in a manner that maimizes frequency reuse. !hus, in a FC' system, the distance between cells using the same channel is the minimum reuse distance for that system. !he problem with FC' systems is quite simple and occurs whenever the offered traffic to a network of base stations is not uniform. Consider a case in which two adAacent cells are allocated 9 channels each. !here clearly can be situations in which one cell has a need for 9Bk channels while the adAacent cell only requires 9&m channels ,for positive integers and m. In such a case, k users in the first cell would be blocked from making calls while m channels in the second cell would go unused. Clearly in this situation of non&uniform spatial offered traffic, the available channels are not being used efficiently. FC' has been implemented on a widespread level to date. D)n!mic Ch!nnel Alloc!tion <ynamic Channel 'llocation ,<C'. attempts to alleviate the problem mentioned for FC' systems when offered traffic is non&uniform. In <C' systems, no set relationship eists between channels and cells. Instead, channels are part of a pool of resources. 3henever a channel is needed by a cell, the channel is allocated under the constraint that frequency reuse requirements can not be violated. !here are two problems that typically occur with <C' based systems. www.StudentRockStars.com www.StudentRockStars.com First, <C' methods typically have a degree of randomness associated with them and this leads to the fact that frequency reuse is often not maimized unlike the case for FC' systems in which cells using the same channel are separated by the minimum reuse distance. -econdly, <C' methods often involve comple algorithms for deciding which available channel is most efficient. !hese algorithms can be very computationally intensive and may require large computing resources in order to be real&time. www.StudentRockStars.com www.StudentRockStars.com H)brid Ch!nnel Alloc!tion Scheme !he third category of channel allocation methods includes all systems that are hybrids of fied and dynamic channel allocation systems. -everal methods have been presented that fall within this category and in addition, a great deal of comparison has been made with corresponding simulations and analyses 5Co, :lnoubi, )iang, 4atzela, Cue, Dhang6. 3e will present several of the more developed hybrid methods below. Ch!nnel Borro$ing is one of the most straightforward hybrid allocation schemes. 7ere, channels are assigned to cells Aust as in fied allocation schemes. If a cell needs a channel in ecess of the channels previously assigned to it, that cell may borrow a channel from one of its neighboring cells given that a channel is available and use of this channel wonEt violate frequency reuse requirements. 9ote that since every channel has a predetermined relationship with a specific cell, channel borrowing ,without the etensions mentioned below. is often categorized as a subclass of fied allocation schemes. !he maAor problem with channel borrowing is that when a cell borrows a channel from a neighboring cell, other nearby cells are prohibited from using the borrowed channel because of co&channel interference. !his can lead to increased call blocking over time. !o reduce this call blocking penalty, algorithms are necessary to ensure that the channels are borrowed from the most available neighboring cells$ i.e., the neighboring cells with the most unassigned channels. !wo etensions of the channel borrowing approach are Borro$ing $ith Ch!nnel &rdering ,(C?. and Borro$ing $ith Direction!l Ch!nnel oc(ing ,(<C8.. (orrowing with Channel 8ocking was designed as an improvement over the simpler Channel (orrowing approach as described above 5:lnoubi6. (C? systems have two distinctive characteristics 5:lnoubi6@ /. !he ratio of fied to dynamic channels varies with traffic load. F. 9ominal channels are ordered such that the first nominal channel of a cell has the highest priority of being applied to a call within the cell. !he last nominal channel is most likely to be borrowed by neighboring channels. ?nce a channel is borrowed, that channel is locked in the co&channel cells within the reuse distance of the cell in question. !o be GlockedG means that a channel can not be used or borrowed. Dhang and Cum 5Dhang6 presented the (<C8 www.StudentRockStars.com www.StudentRockStars.com scheme as an improvement over the (C? method. From a frequency reuse standpoint, in a (C? system, a channel may be borrowed only if it is free in the neighboring co&channel cells. !his criteria is often too strict. In (orrowing with <irectional Channel 8ocking, borrowed channels are only locked in nearby cells that are affected by the borrowing. !his differs from the (C? scheme in which a borrowed channel is locked in every cell within the reuse distance. !he benefit of (<C8 is that more channels are available in the presence of borrowing and subsequent call blocking is reduced. ' disadvantage of (<C8 is that the statement Gborrowed channels are only locked in nearby cells that are affected by the borrowingG requires a clear understanding of the term Gaffected.G !his may require microscopic analysis of the area in which the cellular system will be located. Ideally, a system can be general enough that detailed analysis of specific propagation measurements is not necessary for implementation. ' natural etension of channel borrowing is to set aside a portion of the channels in a system as dynamic channels with the remaining ,nominal. channels being fied to specified cells. If a cell requires an etra channel, instead of borrowing the channel from a neighboring cell, the channel is borrowed from the common GbankG of dynamic channels. 'n important consideration in hybrid systems of this type is the ratio of dynamic channels to fied channels. 'nalysis by Co and 2eudlink 5Co & /HI=6 showed that given ten channels per cell, an optimum ratio was J fied channels and F dynamic channels. In general, the optimum ratio depends upon the traffic load 5Dhang6. In addition to (<C8, a second channel allocation method was presented by Cum and Dhang 5Dhang6. 2eferred to as 8ocally ?ptimized <ynamic 'ssignment -trategy ,8?<'., this method is best described as a purely dynamic channel allocation procedure as opposed to a hybrid method. In this strategy there are no nominal channels$ all channels are dynamic. 3hen a given cell needs to accommodate a call, it chooses from among the bank of available channels according to some cost criteria. !he channel with minimum cost is assigned. In a general sense, the cost is a measure of the future blocking probability in the vicinity of the cell given that the candidate channel is assigned. ' more detailed description of the cost function will be addressed below. D)n!mic Ch!nnel Re!%%ignment www.StudentRockStars.com www.StudentRockStars.com -imilar to the goals of dynamic channel assignment is the process of <ynamic Channel 2eassignment ,<C2.. 3hereas a <C' scheme allocates a channel to an initial call or handover, a <C2 system switches a cellEs channel ,that is currently being used. to another channel which is closer to the optimum according to frequency reuse or other cost criteria. !hus, for eample, a user communicating with channel n may be switched to channel m during the middle of her#his call if channel m is a more efficient use of the available bandwidth from a frequency reuse point of view. "hilosophically, <C2 is equivalent to <C'. Simul!tion !nd Comp!ri%on o' Ch!nnel Alloc!tion Scheme% ' great deal of work is available comparing various realizations of channel allocation schemes 5Co, :lnoubi, )iang, 4atzela, Cue, Dhang6. In comparing performance, typical system metrics include blocking probability of new calls and blocking probability of handover calls. !hese metrics are written as functions of offered traffic ,where the traffic may be written in a variety of forms.. It is generally assumed that a blocked new call is preferred over a blocked hand&off call. !he idea being that with a blocked hand&off, users are forced to terminate communication in the middle of their session. If this blocking happens at a particularly inopportune time, the results could be disastrous ,e.g., business partners cut off in the middle of a vital negotiation.. In the case of a blocked new call, at least the business negotiation hasnEt started and the involved parties arenEt interrupted. (locking probability is an important metric throughout the field of queuing theory and in the case of +#+#/ queues, the :rlang&( formula is often used for analysis of blocking probability. (ecause blocked calls can be very disconcerting, systems are typically designed to have blocking probabilities of no more than /K or FK. !his is consistent with the assumption of small offered traffic loads. Co and 2eudink were the first researchers to present published comparisons of different channel allocation schemes. !heir comparison was based on simulation of an outdoor vehicular wireless communication system 5Co & /HI/, Co & /HIF, )akes6. !he simulation divided a region into a grid of square cells. !he movement of vehicles had a two dimensional normal distribution with 1 mean and =1 mph standard deviation in each of the two orthogonal directions. "oisson arrivals were assumed for the rate of calls per vehicle and call durations were assume to have a truncated normal distribution ,truncated on the left at zero. with a GmeanG H1 seconds ,true mean of /1=.; seconds.. www.StudentRockStars.com www.StudentRockStars.com Co and 2eudinkEs study considered uniform and non&uniform distributions of spatial traffic. In the uniform case, all cells had approimately the same call arrival rate while in the non&uniform case, some cells had a significantly higher call arrival rate. 3ith both the uniform and non&uniform spatial distributions, fied channel allocation schemes were optimally matched so that the cells with the greatest numbers of calls had the greatest number of channels to deal with those calls. In both cases of uniform and non&uniform traffic, results showed that for low blocking probabilities, dynamic channel allocation schemes could handle more calls than fied channel allocation schemes. +ore specifically, in the case of uniform traffic, the <C' approach outperformed the FC' approach when the blocking probability was lower than /1K. 't a blocking probability of /K, the <C' approach could handle over /1K more calls than the FC' approach. In the case of non&uniform traffic, the <C' approach outperformed FC' for blocking rates up to 01K. 't a blocking rate of /K, <C' could handle almost I1K more calls per cell than FC'. Co and 2eudink performed another comparison involving dynamic channel reassignment in 5Co & /HI=6. In this hybrid procedure, the total number of available channels is broken into two groups@ fied and dynamic channels. 3hen a cell requires a channel, it first searches for an available fied channel that is pre&assigned to the cell. If none of the fied channels are available, a dynamic channel is searched for from the common bank of dynamic channels. If this search is in vain, the call is blocked. 3hen users who were assigned fied channels end their calls, these freed fied channels are then assigned to users in the same cell who are currently using dynamic channels. !his frees the dynamic channel for future use and ensures that a large number of channels being used are the optimally&spaced, fied channels. 2esults from Co and 2eudinkEs study of dynamic channel reassignment showed that channel use was increased by over 01K compared to fied channel allocation for a blocking rate of /K. !his result corresponds to uniform offered traffic. www.StudentRockStars.com www.StudentRockStars.com ,h!ng !nd -um comp!red 'our ch!nnel !%%ignment Fied Channel 'ssignment ,FC'., (orrowing with Channel ?rdering ,(C?., (orrowing with <irectional Channel 8ocking ,(<C8. and 8ocally ?ptimized <ynamic 'ssignment ,8?<'.. 3ith respect to uniform offered traffic, their results showed that (<C8 had the lowest blocking probability followed by (C?, 8?<' and FC'. 3ith non&uniform offered traffic, the relative performance of the four methods was the same with the eception that in this case, 8?<' performed better than (C?. It makes sense that the ordering for (<C8, (C? and FC' was as found. Indeed, (<C8 was specifically designed as an improvement over (C? and (C? was designed as an improvement over FC' 5Dhang, :lnoubi6. !he fact that the performance of 8?<' varies under uniform versus non&uniform traffic is rather interesting however. !he reason behind this phenomenon is that 8?<' provides optimal channel allocation only in local regions. %iven non&uniform traffic which consists of dense regions in certain local areas, 8?<' will accommodate these regions of high traffic offering. 7owever, in a global sense, the 8?<' algorithm will not necessarily provide the optimal allocation. 3ith uniform offered traffic, 8?<' does not have any regions with peak traffic to optimize$ i.e., no local regions within which the benefits of 8?<' can be realized. Furthermore, with respect to the entire region, the optimization is generally not optimal in a global sense. !he result is that with uniform traffic, 8?<' does not have any advantage to offer over (C?. From the previous discussion we see that one general result of all of the comparisons is that dynamic channel allocation outperforms fied channel allocation for low blocking rates ,below /1K in most cases.. (locking rates above /K or FK are generally not tolerated. !his is generally an accepted guideline throughout the telecommunications industry and we will adhere to this design constraint as well. www.StudentRockStars.com www.StudentRockStars.com Common Principle &' Ch!nnel Alloc!tion !he large array of possible channel allocation systems can become cumbersome. 7owever, all channel allocation methods operate under simple, common principles. !hroughout this report we have touched on three points which an efficient channel allocation scheme should address@ /. Channel allocation schemes must not violate minimum frequency reuse conditions. F. Channel allocation schemes should adapt to changing traffic conditions. =. Channel allocation schemes should approach ,from above. the minimum frequency reuse constraints so as to efficiently utilize available transmission resources. 's the first requirement suggests, all channel allocation schemes adhere to condition /. From a frequency reuse standpoint, a fied channel allocation system distributes frequency ,or other transmission. resources to the cells in an optimum manner$ i.e., common channels are separated by the minimum frequency reuse distance. !hus, a fied channel allocation scheme perfectly satisfies condition = as well. 7owever, a fied allocation scheme does not satisfy condition F. "hilosophically, any dynamic channel allocation scheme will meet the requirements of all of the above three conditions to some degree. 't the system architecture level dynamic channel allocation schemes may differ widely, but fundamentally, their only difference is in the degree to which they satisfy condition =. <ifferent <C' schemes attempt to satisfy condition = ,in addition to conditions / and F. by approaching the minimum frequency reuse constraint arbitrarily closely, and by doing so in as short a time period as possible. !he above three conditions point to the fact that design of dynamic channel allocation schemes falls within the general class of optimization problems. Furthermore, since we can always assume that the available number of base stations is finite and the transmission resources will always be countable ,due to FCC requirements if nothing else. then our problem can be reduced to the subclass of combinatorial optimization problems. 's with all combinatorial optimization problems, there will eist a solution space and a cost function 5'arts L 4orst6. ' typical element of the solution space could be a particular layout of frequency channels among the base&stations. !he cost function can be loosely characterized as the difference between the frequency reuse of an arbitrary solution and the frequency reuse of the optimized solution. !he error associated with a non&optimized cost is realized as a future increased blocking probability or an otherwise unwarranted lack of www.StudentRockStars.com www.StudentRockStars.com channel availability. It is typically assumed that the solution to the wireless dynamic channel allocation problem is 9"&complete 5Cue, Co & /HI/6. !he definition of np&completeness follows from the conAecture made in the late /H01Es that there eists a class of combinatorial optimization problems of such inherent compleity that any algorithm, solving each instance of such a problem to optimality, requires a computational effort that grows superpolynomially with the size of the problem. In the case of dynamic channel allocation, the compleity is generally attributed to the required inclusion of co&channel interference in any analysis of dynamic channel allocation schemes 5Cue6. !he author is aware of one published article to date offering an analytical method ,approimate. for calculating the performance of dynamic channel allocation 5see Cue6. 2ecently, several approimation techniques have been proposed as methods for solving condition = of the dynamic channel allocation problem. In particular there has been interest in applying simulated annealing techniques 5<uque&'nton6 and neural network methods 5Chan, 4unz, Funabiki6 to dynamic channel allocation. www.StudentRockStars.com www.StudentRockStars.com Wirele%% A. ' $irele%% A. or WA. is a wireless local area network, which is the linking of two or more computers without using wires. 38'9 utilizes pread&spectrum or ?F<+ modulation technology based on radio waves to enable communication between devices in a limited area, also known as the basic service set. !his gives users the mobility to move around within a broad coverage area and still be connected to the network. For the home user, wireless has become popular due to ease of installation, and location freedom with the gaining popularity of laptops. "ublic businesses such as coffee shops or malls have begun to offer wireless access to their customers$ some are even provided as a free service. 8arge wireless network proAects are being put up in many maAor cities. %oogle is even providing a free service to +ountain *iew, California and has entered a bid to do the same for -an Francisco. 9ew Cork City has also begun a pilot program to cover all five boroughs of the city with wireless Internet access. Hi%tor) &' Wirele%% A. In /HI1 University of 7awaii, under the leadership of 9orman 'bramson, developed the worldMs first computer communication network using low&cost ham&like radios, named '8?7'net. !he bi& directional star topology of the system included seven computers deployed over four islands to communicate with the central computer on the ?ahu Island without using phone lines. GIn /HIH, F.2. %feller and U. (apst published a paper in the I::: "roceedings reporting an eperimental wireless local area network using diffused infrared communications. -hortly thereafter, in /HJ1, ". Ferrert reported on an eperimental application of a single code spread spectrum radio for wireless terminal communications in the I::: 9ational !elecommunications Conference. In /HJN, a comparison www.StudentRockStars.com www.StudentRockStars.com between Infrared and C<+' spread spectrum communications for wireless office information networks was published by 4aveh "ahlavan in I::: Computer 9etworking -ymposium which appeared later in the I::: Communication -ociety +agazine. In +ay /HJ;, the efforts of +arcus led the FCC to announce eperimental I-+ bands for commercial application of spread spectrum technology. 8ater on, +. 4avehrad reported on an eperimental wireless "(O system using code division multiple access. !hese efforts prompted significant industrial activities in the development of a new generation of wireless local area networks and it updated several old discussions in the portable and mobile radio industry. !he first generation of wireless data modems was developed in the early /HJ1Es by amateur radio operators. !hey added a voice band data communication modem, with data rates below H011 bit#s, to an eisting short distance radio system, typically in the two meter amateur band. !he second generation of wireless modems was developed immediately after the FCC announcement in the eperimental bands for non&military use of the spread spectrum technology. !hese modems provided data rates on the order of hundreds of kbit#s. !he third generation of wireless modem 5then6 aimed at compatibility with the eisting 8'9s with data rates on the order of +bit#s. -everal companies 5developed6 the third generation products with data rates above / +bit#s and a couple of products 5had6 already been announced 5by the time of the first I::: 3orkshop on 3ireless 8'9s6.G G!he first of the I::: 3orkshops on 3ireless 8'9 was held in /HH/. 't that time early wireless 8'9 products had Aust appeared in the market and the I::: J1F.// committee had Aust started its activities to develop a standard for wireless 8'9s. !he focus of that first workshop was evaluation of the alternative technologies. 5(y /HH06, the technology 5was6 relatively mature, a variety of applications 5had6 been identified and addressed and technologies that enable these applications 5were6 well understood. Chip sets aimed at wireless 8'9 implementations and applications, a key enabling technology for rapid market growth, 5were6 emerging in the market. 3ireless 8'9s 5were being6 used in hospitals, stock echanges, and other in building and campus settings for nomadic access, point&to&point 8'9 bridges, ad& hoc networking, and even larger applications through internetworking. !he I::: J1F.// standard and variants and alternatives, such as the wireless 8'9 interoperability forum and the :uropean 7I":28'9 specification 5had6 made rapid progress, and the unlicensed "C- 5 Unlicensed "ersonal Communications -ervices 6 and the proposed -U":29et, later on renamed as U&9II, bands also presented new opportunities.G www.StudentRockStars.com www.StudentRockStars.com ?n )uly F/, /HHH, 'ir"ort debuted at the +acworld :po in 9ew Cork City with -teve )obs picking up an i(ook supposedly to give the cameraman a better shot as he surfed the 3eb. 'pplause quickly built as people realized there were no wires. !his was the first time 3ireless 8'9 became publicly available at consumer pricing and easily available for home use. (efore the release of the 'irport, 3ireless 8'9 was too epensive for consumer use and used eclusively in large corporate settings. ?riginally 38'9 hardware was so epensive that it was only used as an alternative to cabled 8'9 in places where cabling was difficult or impossible. :arly development included industry&specific solutions and proprietary protocols, but at the end of the /HH1s these were replaced by standards, primarily the various versions of I::: J1F.// ,3i&Fi.. 'n alternative '!+&like ; %7z standardized technology, 7I":28'9, has so far not succeeded in the market, and with the release of the faster ;N +bit#s J1F.//a ,; %7z. and J1F.//g ,F.N %7z. standards, almost certainly never will. In 9ovember F110, the 'ustralian Commonwealth -cientific and Industrial 2esearch ?rganization ,C-I2?. won a legal battle in the U- federal court of !eas against (uffalo !echnology which found the U- manufacturer had failed to pay royalties on a U- 38'9 patent C-I2? had filed in /HH0. C-I2? are currently engaged in legal cases with computer companies including +icrosoft, Intel, <ell, 7ewlett&"ackard and 9etgear which argue that the patent is invalid and should negate any royalties paid to C-I2? for 38'9&based products. Bene'it% &' Wirele%% A. !he popularity of wireless 8'9s is a testament primarily to their convenience, cost efficiency, and ease of integration with other networks and network components. !he maAority of computers sold to consumers today come pre&equipped with all necessary wireless 8'9 technology. !he benefits of wireless 8'9s include@ Convenience@ !he wireless nature of such networks allows users to access network resources from nearly any convenient location within their primary networking environment ,home or office.. www.StudentRockStars.com www.StudentRockStars.com 3ith the increasing saturation of laptop&style computers, this is particularly relevant. +obility@ 3ith the emergence of public wireless networks, users can access the internet even outside their normal work environment. +ost chain coffee shops, for eample, offer their customers a wireless connection to the internet at little or no cost. "roductivity@ Users connected to a wireless network can maintain a nearly constant affiliation with their desired network as they move from place to place. For a business, this implies that an employee can potentially be more productive as his or her work can be accomplished from any convenient location. <eployment@ Initial setup of an infrastructure&based wireless network requires little more than a single access point. 3ired networks, on the other hand, have the additional cost and compleity of actual physical cables being run to numerous locations ,which can even be impossible for hard&to&reach locations within a building.. :pandability@ 3ireless networks can serve a suddenly&increased number of clients with the eisting equipment. In a wired network, additional clients would require additional wiring. Cost@ 3ireless networking hardware is at worst a modest increase from wired counterparts. !his potentially increased cost is almost always more than outweighed by the savings in cost and labor associated to running physical cables. www.StudentRockStars.com www.StudentRockStars.com Di%!d/!nt!ge &' Wirele%% A. 3ireless 8'9 technology, while replete with the conveniences and advantages described above, has its share of downfalls. For a given networking situation, wireless 8'9s may not be desirable for a number of reasons. +ost of these have to do with the inherent limitations of the technology. -ecurity@ 3ireless 8'9 transceivers are designed to serve computers throughout a structure with uninterrupted service using radio frequencies. (ecause of space and cost, the antennas typically present on wireless networking cards in the end computers are generally relatively poor. In order to properly receive signals using such limited antennas throughout even a modest area, the wireless 8'9 transceiver utilizes a fairly considerable amount of power. 3hat this means is that not only can the wireless packets be intercepted by a nearby adversaryEs poorly&equipped computer, but more importantly, a user willing to spend a small amount of money on a good quality antenna can pick up packets at a remarkable distance$ perhaps hundreds of times the radius as the typical user. In fact, there are even computer users dedicated to locating and sometimes even cracking into wireless networks, known as wardrivers. ?n a wired network, any adversary would first have to overcome the physical limitation of tapping into the actual wires, but this is not an issue with wireless packets. !o combat this consideration, wireless networks users usually choose to utilize various encryption technologies available such as 3i&Fi "rotected 'ccess ,3"'.. -ome of the older encryption methods, such as 3:" are known to have weaknesses that a dedicated adversary can compromise. (See main article: Wireless security.) Range: The typical range of a common 80.!!g networ" with stan#ar# e$uipment is on the or#er of tens of meters. While sufficient for a typical home% it will be insufficient in a larger structure. To obtain a##itional range% repeaters or a##itional access points will ha&e to be purchase#. 'osts for these items can a## up $uic"ly. (ther technologies are in the #e&elopment phase% howe&er% which feature increase# range% hoping to ren#er this #isa#&antage irrele&ant. (See Wi)*+) Reliability: ,i"e any ra#io fre$uency transmission% wireless networ"ing signals are sub-ect to a wi#e &ariety of interference% as well as comple. propagation effects (such as multipath% or especially in this case Rician fa#ing) that are beyon# the control of the networ" a#ministrator. /n the case of typical networ"s% www.StudentRockStars.com www.StudentRockStars.com mo#ulation is achie&e# by complicate# forms of phase-shift "eying (0S1) or $ua#rature amplitu#e mo#ulation (2*))% ma"ing interference an# propagation effects all the more #isturbing. *s a result% important networ" resources such as ser&ers are rarely connecte# wirelessly. Spee#: The spee# on most wireless networ"s (typically !-!08 )bit3s) is reasonably slow compare# to the slowest common wire# networ"s (!00 )bit3s up to se&eral 4bit3s). There are also performance issues cause# by T'0 an# its built-in congestion a&oi#ance. 5or most users% howe&er% this obser&ation is irrele&ant since the spee# bottlenec" is not in the wireless routing but rather in the outsi#e networ" connecti&ity itself. 5or e.ample% the ma.imum *6S, throughput (usually 8 )bit3s or less) offere# by telecommunications companies to general- purpose customers is alrea#y far slower than the slowest wireless networ" to which it is typically connecte#. That is to say% in most en&ironments% a wireless networ" running at its slowest spee# is still faster than the internet connection ser&ing it in the first place. 7owe&er% in speciali8e# en&ironments% the throughput of a wire# networ" might be necessary. 9ewer stan#ar#s such as 80.!!n are a##ressing this limitation an# will support pea" throughputs in the range of !00-00 )bit3s. Wireless ,*9s present a host of issues for networ" managers. :nauthori8e# access points% broa#caste# SS/6s% un"nown stations% an# spoofe# )*' a##resses are -ust a few of the problems a##resse# in W,*9 troubleshooting. )ost networ" analysis &en#ors% such as 9etwor" /nstruments% 9etwor" 4eneral% an# 5lu"e% offer W,*9 troubleshooting tools or functionalities as part of their pro#uct line. www.StudentRockStars.com www.StudentRockStars.com Architecture &' Wirele%% A. 'll components that can connect into a wireless medium in a network are referred to as stations. 'll stations are equipped with wireless network interface cards ,39ICs.. 3ireless stations fall into one of two categories@ access points and clients. Acce%% point% 'ccess points ,'"s. are base stations for the wireless network. !hey transmit and receive radio frequencies for wireless enabled devices to communicate with. Client% 3ireless clients can be mobile devices such as laptops, personal digital assistants, I" phones, or fied devices such as desktops and workstations that are equipped with a wireless network interface. B!%ic %er/ice %et !he basic service set ,(--. is a set of all stations that can communicate with each other. !here are two types of (--@ independent (-- and infrastructure (--. :very (-- has an identification ,I<. called the (--I<, which is the +'C address of the access point servicing the (--. Independent b!%ic %er/ice %et 'n independent (-- is an ad&hoc network that contains no access points, which means they can not connect to any other basic service set. In'r!%tructure b!%ic %er/ice %et 'n infrastructure (-- can communicate with other stations not in the same basic service set by communicating through access points. 0+tended %er/ice %et www.StudentRockStars.com www.StudentRockStars.com 'n etended service set ,:--. is a set of connected (--es. 'ccess points in an :-- are connected by a distribution system. :ach :-- has an I< called the --I< which is a =F&byte ,maimum. character string. For eample, GlinksysG is the default --I< for 8inksys routers. T)pe% &' Wirele%% A. Peer1to1peer ' peer&to&peer ,"F". allows wireless devices to directly communicate with each other. 3ireless devices within range of each other can discover and communicate directly without involving central access points. !his method is typically used by two computers so that they can connect to each other to form a network. If a signal strength meter is used in this situation, it may not read the strength accurately and can be misleading, because it registers the strength of the strongest signal, which may be the closest computer. J1F.// specs define the physical layer ,"7C. and +'C ,+edia 'ccess Control. layers. 7owever, unlike most other I::: specs, J1F.// includes three alternative "7C standards@ diffuse infrared operating at / +bit#s in$ frequency&hopping spread spectrum operating at / +bit#s or F +bit#s$ and direct&sequence spread spectrum operating at / +bit#s or F +bit#s. ' single J1F.// +'C standard is based on C-+'#C' ,Carrier -ense +ultiple 'ccess with Collision 'voidance.. !he J1F.// specification includes provisions designed to minimize collisions. (ecause two mobile units may both be in range of a common access point, but not in range of each other. !he J1F.// has two basic modes of operation@ 'd hoc mode enables peer&to&peer transmission between mobile units. Infrastructure mode in which mobile units communicate through an access point that serves as a bridge to a wired network infrastructure is the more common wireless 8'9 application the one being covered. -ince wireless communication uses a more open medium for communication in comparison to wired 8'9s, the J1F.// designers also included a shared&key encryption mechanism, called wired equivalent privacy ,3:"., or 3i&Fi "rotected 'ccess, ,3"', 3"'F. to secure wireless computer networks. Bridge www.StudentRockStars.com www.StudentRockStars.com ' bridge can be used to connect networks, typically of different types. ' wireless :thernet bridge allows the connection of devices on a wired :thernet network to a wireless network. !he bridge acts as the connection point to the 3ireless 8'9. www.StudentRockStars.com www.StudentRockStars.com Introduction &' Bluetooth Bluetooth is an industrial specification for wireless personal area networks ,"'9s.. (luetooth provides a way to connect and echange information between devices such as mobile phones, laptops, "Cs, printers, digital cameras, and video game consoles over a secure, globally unlicensed short&range radio frequency. !he (luetooth specifications are developed and licensed by the (luetooth -pecial Interest %roup. Uses (luetooth is a standard and communications protocol primarily designed for low power consumption, with a short range ,power&class& dependent@ / meter, /1 meters, /11 meters. 5/6 based on low&cost transceiver microchips in each device. (luetooth enables these devices to communicate with each other when they are in range. !he devices use a radio communications system, so they do not have to be in line of sight of each other, and can even be in other rooms, as long as the received transmission is powerful enough. Cl#"" M#+imum Permitted Po*er ,m)-dBm. R#n!e ,#ro+im#te. Cl#"" / 100 mW (20 dBm) ~100 meters Cl#"" 0 2.5 mW (4 dBm) ~10 meters Cl#"" 1 1 mW (0 dBm) ~1 meter It has to be noted that in most cases the effective range of class F devices is etended if they connect to a class / transceiver, compared to pure class F network. !his is accomplished by higher sensitivity and transmitter power of the Class / device. !he higher transmitter power of Class / device allows higher power to be received by the Class F device. Furthermore, higher sensitivity of Class / device allows reception of much lower transmitted power of the Class F devices. !hus, allowing operation of Class F devices at much higher distances. <evices that use a power amplifier on the transmit, have improved receive sensitivity, and highly optimized antennas are available that routinely achieve ranges of /km within the (luetooth Class / standard. 2er"ion %#t# R#te
www.StudentRockStars.com www.StudentRockStars.com 2er"ion /.0 1 Mbit/s 2er"ion 0.3 4 E%R 3 Mbit/s )iMedi# Alli#nce ,roo"ed. 53 - 480 Mbit/s Bluetooth Pro'ile% In order to use (luetooth, a device must be compatible with certain (luetooth profiles. !hese define the possible applications and uses of the technology. i%t o' !pplic!tion% +ore prevalent applications of (luetooth include@ 3ireless control of and communication between a mobile phone and a hands&free headset or car kit. !his was one of the earliest applications to become popular. 3ireless networking between "Cs in a confined space and where little bandwidth is required. 3ireless communications with "C input and output devices, the most common being the mouse, keyboard and printer. !ransfer of files between devices with ?(:O. !ransfer of contact details, calendar appointments, and reminders between devices with ?(:O. 2eplacement of traditional wired serial communications in test equipment, %"- receivers, medical equipment, bar code scanners, and traffic control devices. For controls where infrared was traditionally used. -ending small advertisements from (luetooth enabled advertising hoardings to other, discoverable, (luetooth devices. -eventh&generation game consolesP9intendo 3ii, -ony "lay-tation =Puse (luetooth for their respective wireless controllers. <ial&up internet access on personal computer or "<' using a data&capable mobile phone as a modem. 2eceiving commercial advertisements ,GspamG. via a kiosk, e.g. at a movie theatre or lobby Bluetooth /%# Wi1*i in net$or(ing www.StudentRockStars.com www.StudentRockStars.com (luetooth and 3i&Fi have slightly different applications in todayEs offices, homes, and on the move@ setting up networks, printing, or transferring presentations and files from "<'s to computers. (oth are versions of unlicensed spread spectrum technology. (luetooth differs from 3i&Fi in that the latter provides higher throughput and covers greater distances, but requires more epensive hardware and higher power consumption. !hey use the same frequency range, but employ different multipleing schemes. 3hile (luetooth is a cable replacement for a variety of applications, 3i&Fi is a cable replacement only for local area network access. (luetooth is often thought of as wireless U-(, whereas 3i&Fi is wireless :thernet, both operating at much lower bandwidth than the cable systems they are trying to replace. 7owever, this analogy is not entirely accurate since any (luetooth device can, in theory, host any other (luetooth devicePsomething that is not universal to U-( devices, therefore it would resemble more a wireless Fire3ire.
(luetooth eists in a many products, such as phones, printers, modems and headsets. !he technology is useful when transferring information between two or more devices that are near each other in low& bandwidth situations. (luetooth is commonly used to transfer sound data with phones ,i.e. with a (luetooth headset. or byte data with hand&held computers ,transferring files.. (luetooth simplifies the discovery and setup of services between devices. (luetooth devices advertise all of the services they provide. !his makes using services easier because there is no longer a need to setup network addresses or permissions as in many other networks. Wi1*i www.StudentRockStars.com www.StudentRockStars.com 3i&Fi is more like traditional :thernet networks, and requires configuration to set up shared resources, transmit files, and to set up audio links ,for eample, headsets and hands&free devices.. It uses the same radio frequencies as (luetooth, but with higher power output resulting in a stronger connection. 3i&Fi is sometimes called Gwireless :thernet.G !his description is accurate, it also provides an indication of its relative strengths and weaknesses. 3i&Fi requires more setup, but is better suited for operating full&scale networks because it enables a faster connection, better range from the base station, and better security than (luetooth. Computer re2uirement%
' personal computer must have a (luetooth adapter in order to be able to communicate with other (luetooth devices ,such as mobile phones, mice and keyboards.. 3hile some desktop computers already contain an internal (luetooth adapter, most require an eternal (luetooth dongle. +ost recent laptops come with a built&in (luetooth adapter. Unlike its predecessor, Ir<', which requires a separate adapter for each device, (luetooth allows multiple devices to communicate with a computer over a single adapter. www.StudentRockStars.com www.StudentRockStars.com &per!ting S)%tem Support +ac ?- O has supported (luetooth since version /1.F released in F11F ?f +icrosoft platforms, 3indows O" -ervice "ack F and later releases have native support for (luetooth. "revious versions required the users to install their (luetooth adapterEs own drivers, which was not directly supported by +icrosoft. +icrosoftEs own (luetooth dongles ,that are packaged with their (luetooth computer devices. have no eternal drivers and thus require at least 3indows O" -ervice "ack F. 8inu provides two (luetooth stacks, with the (lueD stack included with most 8inu kernels. It was originally developed by Qualcomm and 'ffi. (lueD supports all core (luetooth protocols and layers. Speci'ic!tion% !nd 'e!ture% !he (luetooth specification was developed in /HHN by )aap 7aartsen and -ven +attisson, who were working for :ricsson +obile "latforms in 8und, -weden. !he specification is based on frequency&hopping spread spectrum technology. !he specifications were formalized by the (luetooth -pecial Interest %roup ,-I%., organized by +ohd -yarifuddin. !he -I% was formally announced on +ay F1, /HHJ. !oday it has over I111 companies worldwide. It was established by :ricsson, -ony :ricsson, I(+, Intel, !oshiba, and 9okia, and later Aoined by many other companies. Bluetooth 3#4 !nd 3#4B *ersions /.1 and /.1( had many problems, and manufacturers had difficulties making their products interoperable. *ersions /.1 and /.1( also had mandatory (luetooth hardware device address ,(<R'<<2. transmission in the Connecting process, rendering anonymity impossible at a protocol level, which was a maAor setback for services planned to be used in (luetooth environments, such as Consumerium. Bluetooth 3#3 2atified as I::: -tandard J1F./;./&F11F. +any errors found in the /.1( specifications were fied. 'dded support for non&encrypted channels. 2eceived -ignal -trength Indicator ,2--I.. www.StudentRockStars.com www.StudentRockStars.com Bluetooth 3#5 !his version is backward&compatible with /./ and the maAor enhancements include the following@ Faster Connection and <iscovery *#apti&e fre$uency-hopping sprea# spectrum (*57), which improves resistance to radio frequency interference by avoiding the use of crowded frequencies in the hopping sequence. 7igher transmission speeds in practice, up to IF/ kbit#s, as in /./. :tended -ynchronous Connections ,e-C?., which improve voice quality of audio links by allowing retransmissions of corrupted packets. 7ost Controller Interface ,7CI. support for three&wire U'2!. 2atified as I::: -tandard J1F./;./&F11;. www.StudentRockStars.com www.StudentRockStars.com Bluetooth 5#4 !his version, specified on /1th 9ovember F11N is backward&compatible with /./. !he main enhancement is the introduction of an :<2 of =.1 +bit#s. !his has the following effects@ !hree times faster transmission speedPup to /1 times in certain cases ,up to F./ +bit#s.. 8ower power consumption through a reduced duty cycle. -implification of multi&link scenarios due to more available bandwidth. !he practical data transfer rate is F./ megabits per second and the basic signalling rate is about = megabits per second. !he G(luetooth F.1 B :<2G specification given at the (luetooth -pecial Interest%roup ,-I%. includes :<2 and there is no specification G(luetooth F.1G as used by many vendors. !he 7!C !y!9 pocket "C phone, shows G(luetooth F.1 without :<2G on its data sheet and another source states (luetooth F.1 without :<2 is equivalent to version /.F with additional bug fies. In many cases it is not clear whether a product claiming to support G(luetooth F.1G actually supports the :<2 higher transfer rate. Bluetooth 5#3 (luetooth Core -pecification *ersion F./ , is fully backward&compatible with /./, and was adopted by the (luetooth -I% on 'ugust /, F11I. !his specification includes the following features@ :tended inquiry response@ provides more information during the inquiry procedure to allow better filtering of devices before connection. !his information includes the name of the device, a list of services the device supports, as well as other information like the time of day, and pairing information. -niff subrating@ reduces the power consumption when devices are in the sniff low&power mode, especially on links with asymmetric data flows. 7uman interface devices ,7I<. are epected to benefit the most, with mouse and keyboard devices increasing the battery life by a factor of = to /1. www.StudentRockStars.com www.StudentRockStars.com :ncryption "ause 2esume@ enables an encryption key to be refreshed, enabling much stronger encryption for connections that stay up for longer than F=.= hours ,one (luetooth day.. -ecure -imple "airing@ radically improves the pairing eperience for (luetooth devices, while increasing the use and strength of security. It is epected that this feature will significantly increase the use of (luetooth. 9FC cooperation@ automatic creation of secure (luetooth connections when 9FC radio interface is also available. For eample, a headset should be paired with a (luetooth F./ phone including 9FC Aust by bringing the two devices close to each other ,a few centimeters.. 'nother eample is automatic uploading of photos from a mobile phone or camera to a digital picture frame Aust by bringing the phone or camera close to the frame *uture &' Bluetooth (roadcast Channel@ enables (luetooth information points. !his will drive the adoption of (luetooth into cell phones, and enable advertising models based around users pulling information from the information points, and not based around the obAect push model that is used in a limited way today. !opology +anagement@ enables the automatic configuration of the piconet topologies especially in scatternet situations that are becoming more common today. !his should all be invisible to the users of the technology, while also making the technology Aust work. @ enables the use of alternative ands for transporting (luetooth profile data. !he (luetooth 2adio will still be used for device discovery, initial connection and profile configuration, however when lots of data needs to be sent, the high speed alternate +'C "7CEs will be used to transport the data. !his means that the proven low power connection models of (luetooth are used when the system is idle, and the low power per bit radios are used when lots of data needs to be sent. improvements@ enable audio and video data to be transmitted at a higher quality, especially when best effort traffic is being transmitted in the same www.StudentRockStars.com www.StudentRockStars.com (luetooth technology already plays a part in the rising *oice over I" ,*?I". scene, with (luetooth headsets being used as wireless etensions to the "C audio system. 's *?I" becomes more popular, and more suitable for general home or office users than wired phone lines, (luetooth may be used in cordless handsets, with a base station connected to the Internet link. High %peed Bluetooth ?n the (luetooth -pecial Interest %roup announced its selection of the 3i+edia 'lliance +ulti&(and ?rthogonal Frequency <ivision +ultipleing ,+(&?F<+. version of U3( for integration with current (luetooth wireless technology. U3( integration will create a version of (luetooth wireless technology with a high&speed#high&data&rate option. !his new version of (luetooth technology will meet the high&speed demands of synchronizing and transferring large amounts of data, as well as enabling high&quality video and audio applications for portable devices, multi&media proAectors and television sets, and wireless *?I". 't the same time, (luetooth technology will continue catering to the needs of very low power applications such as mice, keyboards, and mono headsets, enabling devices to select the most appropriate physical radio for the application requirements, thereby offering the best of both worlds. Bluetooth 6#4 !he net version of (luetooth after vF./, code&named -eattle ,the version number of which is !(<. has many of the same features, but is most notable for plans to adopt ultra&wideband ,U3(. radio technology. !his will allow (luetooth use over U3( radio, enabling very fast data transfers of up to NJ1 +bit#s, while building on the very low& power idle modes of (luetooth. "ltr! o$ Po$er Bluetooth ?n )une /F, F11I, 9okia and (luetooth -I% announced that 3ibree will be a part of the (luetooth specification as an ultra low power (luetooth technology. :pected use cases include watches displaying Caller I< www.StudentRockStars.com www.StudentRockStars.com information, sports sensors monitoring your heart rate during eercise, as well as medical devices. !he +edical <evices 3orking %roup is also creating a medical devices profile and associated protocols to enable this market. www.StudentRockStars.com www.StudentRockStars.com Technic!l In'orm!tion &' Bluetooth Communic!tion !nd connection ' master (luetooth device can communicate with up to seven devices. !his network group of up to eight devices is called a piconet. ' piconet is an ad&hoc computer network, using (luetooth technology protocols to allow one master device to interconnect with up to seven active devices. Up to F;; further devices can be inactive, or parked, which the master device can bring into active status at any time. 't any given time, data can be transferred between the master and one other device, however, the devices can switch roles and the slave can become the master at any time. !he master switches rapidly from one device to another in a round&robin fashion. ,-imultaneous transmission from the master to multiple other devices is possible, but not used much.. (luetooth specification allows connecting two or more piconets together to form a scatternet, with some devices acting as a bridge by simultaneously playing the master role and the slave role in one piconet. !hese devices are planned for F11I. +any U-( (luetooth adapters are available, some of which also include an Ir<' adapter. ?lder ,pre&F11=. (luetooth adapters, however, have limited services, offering only the (luetooth :numerator and a less& powerful (luetooth 2adio incarnation. -uch devices can link computers with (luetooth, but they do not offer much in the way of services that modern adapters do. Setting up connection% 'ny (luetooth device will transmit the following sets of information on demand@ <evice name. <evice class. 8ist of services. www.StudentRockStars.com www.StudentRockStars.com !echnical information, for eample, device features, manufacturer, (luetooth specification, clock offset. 'ny device may perform an inquiry to find other devices to which to connect, and any device can be configured to respond to such inquiries. 7owever, if the device trying to connect knows the address of the device, it always responds to direct connection requests and transmits the information shown in the list above if requested. Use of device services may require pairing or acceptance by its owner, but the connection itself can be started by any device and held until it goes out of range. -ome devices can be connected to only one device at a time, and connecting to them prevents them from connecting to other devices and appearing in inquiries until they disconnect from the other device. :very device has a unique NJ&bit address. 7owever these addresses are generally not shown in inquiries. Instead, friendly (luetooth names are used, which can be set by the user. !his name appears when another user scans for devices and in lists of paired devices. +ost phones have the (luetooth name set to the manufacturer and model of the phone by default. +ost phones and laptops show only the (luetooth names and special programs that are required to get additional information about remote devices. !his can be confusing as, for eample, there could be several phones in range named !0/1 ,see (lueAacking.. P!iring "airs of devices may establish a trusted relationship by learning ,by user input. a shared secret known as a pass"ey. ' device that wants to communicate only with a trusted device can cryptographically authenticate the identity of the other device. !rusted devices may also encrypt the data that they echange over the air so that no one can listen in. !he encryption can, however, be turned off, and passkeys are stored on the device file system, not on the (luetooth chip itself. -ince the (luetooth address is permanent, a pairing is preserved, even if the (luetooth name is changed. "airs can be deleted at any time by either device. <evices generally require pairing or prompt the owner before they allow a remote device to use any or most of their services. -ome devices, such as -ony :ricsson phones, usually accept ?(:O business cards and notes without any pairing or prompts. www.StudentRockStars.com www.StudentRockStars.com Certain printers and access points allow any device to use its services by default, much like unsecured 3i&Fi networks. "airing algorithms are sometimes manufacturer&specific for transmitters and receivers used in applications such as music and entertainment. Air Inter'!ce *or Bluetooth !he protocol operates in the license&free I-+ band at F.N&F.NJ=; %7z. !o avoid interfering with other protocols that use the F.N; %7z band, the (luetooth protocol divides the band into IH channels ,each / +7z wide. and changes channels up to /011 times per second. Implementations with versions /./ and /.F reach speeds of IF=./ kbit#s. *ersion F.1 implementations feature (luetooth :nhanced <ata 2ate ,:<2. and reach F./ +bit#s. !echnically, version F.1 devices have a higher power consumption, but the three times faster rate reduces the transmission times, effectively reducing power consumption to half that of /. devices ,assuming equal traffic load.. Securit) (luetooth implements confidentiality, authentication and key derivation with custom algorithms based on the -'F:2B block cipher. In (luetooth, key generation is generally based on a (luetooth "I9, which has to be entered into both devices. !his procedure might get modified slightly, if one of the devices has a fied "I9, which is the case e.g. for headsets or similar devices with a restricted user interface. Foremost, an initialization key or master key is generated, using the :FF algorithm !he :1 stream cipher is used for encrypting packets, granting confidentiality and is based on a shared cryptographic secret, namely a previously generated link key or master key. !hose keys, used for subsequent encryption of data sent via the air interface, hardly rely on the (luetooth "I9, which has been entered into one or both devices. ' demonstration of this reduction has been put effort in by C. -haked and '. 3ool in . 'n overview of the most important vulnerabilities and the most common eploits to those vulnerabilities is presented in. Soci!l concern% www.StudentRockStars.com www.StudentRockStars.com 54467 In 9ovember F11=, (en and 'dam 8aurie from '.8. <igital 8td. discovered that serious flaws in (luetooth security may lead to disclosure of personal data. It should be noted, however, that the reported security problems concerned some poor implementations of (luetooth, rather than the protocol itself. In a subsequent eperiment, +artin 7erfurt from the trifinite.group was able to do a field&trial at the Ce(I! fairgrounds, showing the importance of the problem to the world. ' new attack called (lue(ug was used for this eperiment. !his is one of a number of concerns that have been raised over the security of (luetooth communications. In F11N the first purported virus using (luetooth to spread itself among mobile phones appeared on the -ymbian ?-. !he virus was first described by 4aspersky 8ab and requires users to confirm the installation of unknown software before it can propagate. !he virus was written as a proof&of&concept by a group of virus writers known as FH' and sent to anti&virus groups. !hus, it should be regarded as a potential ,but not real. security threat to (luetooth or -ymbian ?- since the virus has never spread in the wild. In 'ugust F11N, a world&record&setting eperiment ,see also (luetooth sniping. showed that the range of Class F (luetooth radios could be etended to /.IJ km ,/.1J mile. with directional antennas and signal amplifiers. !his poses a potential security threat because it enables attackers to access vulnerable (luetooth&devices from a distance beyond epectation. !he attacker must also be able to receive information from the victim to set up a connection. 9o attack can be made against a (luetooth device unless the attacker knows its (luetooth address and which channels to transmit on. 54487 In 'pril F11;, Cambridge University security researchers published results of their actual implementation of passive attacks against the "I9&based pairing between commercial (luetooth devices, confirming the attacks to be practicably fast and the (luetooth symmetric key establishment method to be vulnerable. !o rectify this vulnerability, they carried out an implementation which showed that stronger, asymmetric key establishment is feasible for certain classes of devices, such as handphones. www.StudentRockStars.com www.StudentRockStars.com In )une F11;, Caniv -haked and 'vishai 3ool published the paper GCracking the (luetooth "I9/,G which shows both passive and active methods for obtaining the "I9 for a (luetooth link. !he passive attack allows a suitably equipped attacker to eavesdrop on communications and spoof if they were present at the time of initial pairing. !he active method makes use of a specially constructed message that must be inserted at a specific point in the protocol, to make the master and slave repeat the pairing process. 'fter that, the first method can be used to crack the "I9. !his attackEs maAor weakness is that it requires the user of the devices under attack to re&enter the "I9 during the attack when the device prompts them to. 'lso, this active attack probably requires custom hardware, since most commercially available (luetooth devices are not capable of the timing necessary. In 'ugust F11;, police in Cambridgeshire, :ngland, issued warnings about thieves using (luetooth&enabled phones to track other devices left in cars. "olice are advising users to ensure that any mobile networking connections are de&activated if laptops and other devices are left in this way. 54497 In 'pril F110, researchers from -ecure 9etwork and F&-ecure published a report that warns of the large number of devices left in a visible state, and issued statistics on the spread of various (luetooth services and the ease of spread of an eventual (luetooth worm. In ?ctober F110, at the 8uemburgish 7ack.lu -ecurity Conference, 4evin Finistere and !hierry Doller demonstrated and released a remote root shell over (luetooth on +ac ?-O /1.=.H and /1.N. !hey also demonstrated the first (luetooth "I9 and 8inkkeys cracker, which is based on the research of 3ool and -haked. Blue:!c(ing@ (lueAacking allows phone users to send business cards anonymously using (luetooth wireless technology. (lueAacking does 9?! involve the removal or alteration of any data from the device. !hese business cards often have a clever or flirtatious message rather than the typical name and phone number. (lueAackers often look for the receiving phone to ping or the user to react. !hey then send another, more personal message to that device. ?nce again, in order to carry out a blueAacking, the sending and receiving devices must be within range of each other, which is typically /1 meters for most mobile devices. "hone owners who receive blueAack messages should refuse to add the contacts to their address book. <evices that are set in non& www.StudentRockStars.com www.StudentRockStars.com discoverable mode are not susceptible to blueAacking. 7owever, the use of the 8inu application 2edfang, allows this to be bypassed. 5/6 He!lth concern% (luetooth uses the microwave radio frequency spectrum in the F.N %7z to F.NJ=; %7z range. +aimum power output from a (luetooth radio is / m3, F.; m3, and /11 m3 for Class =, Class F, and Class / devices respectively, which puts Class / at roughly the same level as cell phones, and the other two classes much lower. 'ccordingly, Class F and Class = (luetooth devices are considered less of a potential hazard than cell phones, and Class / may be comparable to that of cell phones. www.StudentRockStars.com www.StudentRockStars.com Con%ider!tion &' .et$or( !)er !he net$or( l!)er is the third layer out of seven in the ?-I model and the third layer out of five in the !C"#I" model. In the !C"#I" reference model it is called the Internet l!)er. In all of the models, the network layer responds to service requests from the transport layer and issues service requests to the data link layer. In essence, the network layer is responsible for end to end ,source to destination. packet delivery, whereas the data link layer is responsible for node to node ,hop to hop. packet delivery. !he network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks while maintaining the quality of service, and error control functions. !he network layer deals with transmitting information all the way from its source to its destination & transmitting from anywhere, to anywhere. 7ere are some things that the network layer needs to address@ Is the network connection&oriented or connectionlessS For eample, snail mail is connectionless, because you can send a letter to someone without them doing anything and they will receive the letter. ?n the other hand, the telephone system is connection&oriented, because the other party is required to pick up the phone before communication can be established. !he ?-I 9etwork 8ayer protocol can be either connection&oriented, or connectionless. !he !C"#I" Internet 8ayer ,equivalent to ?-IEs 9etwork 8ayer. supports only the connectionless Internet "rotocol ,I".. 3hat are the %lobal 'ddressesS :verybody in the network needs to have a unique address which determines who they are. !his address will normally be hierarchical, so you can be GFred +urphyG to <ubliners, or GFred +urphy, <ublinG to people in Ireland, or GFred +urphy, <ublin, IrelandG to people anywhere in the world. ?n the internet, these addresses are known as I" 'ddresses. 7ow do you forward a messageS www.StudentRockStars.com www.StudentRockStars.com !his is of particular interest to mobile applications, where a user may rapidly move from place to place, and it must be arranged that his messages follow him. *ersion N of the Internet "rotocol ,I"vN. doesnEt really allow for this, though it has been hacked somewhat since its inception. Fortunately, the forthcoming I"v0 has a much better designed solution, which should make this type of application much smoother. i%t o' .et$or( l!)er %er/ice% Forwarding 2outing www.StudentRockStars.com www.StudentRockStars.com P!c(et *or$!rding In .et$or( !)er *or$!rding is the relaying of packets from one network segment to another by nodes in a computer network. ' unicast forwarding pattern, typical of many networking technologies including the overwhelming maAority of Internet traffic ' multicast forwarding pattern, typical of "I+ ' broadcast forwarding pattern, typical of bridged :thernet
!he simplest forwarding model & unicasting & involves a packet being relayed from link to link along a chain leading from the packetEs source to its destination. 7owever, other forwarding strategies are commonly used. (roadcasting requires a packet to be duplicated and copies sent on multiple links with the goal of delivering www.StudentRockStars.com www.StudentRockStars.com a copy to every device on the network. In practice, broadcast packets are not forwarded everywhere on a network, but only to devices within a broadcast domain, making broadcast a relative term. 8ess common than broadcasting, but perhaps of greater utility and theoretical significance is multicasting, where a packet is selectively duplicated and copies delivered to each of a set of recipients. 9etworking technologies tend to naturally support certain forwarding models. For eample, fiber optics and copper cables run directly from one machine to another form natural unicast media & data transmitted at one end is received by only one machine at the other end. 7owever, as illustrated in the diagrams, nodes can forward packets to create multicast or broadcast distributions from naturally unicast media. 8ikewise, traditional :thernet ,/1('-:; and /1('-:F, but not the more modern /1('-:&!. are natural broadcast media & all the nodes are attached to a single, long cable and a packet transmitted by one device is seen by every other device attached to the cable. :thernet nodes implement unicast by ignoring packets not directly addressed to them. ' wireless network is naturally multicast & all devices within a reception radius of a transmitter can receive its packets. 3ireless nodes ignore packets addressed to other devices, but require forwarding to reach nodes outside their reception radius. 't nodes where multiple outgoing links are available, the choice of which, all, or any to use for forwarding a given packet requires a decision making process that, while simple in concept, is of sometimes bewildering compleity. -ince a forwarding decision must be made for every packet handled by a node, the total time required for this can become a maAor limiting factor in overall network performance. +uch of the design effort of high&speed routers and switches has been focused on making rapid forwarding decisions for large numbers of packets. !he forwarding decision is generally made using one of two processes@ routing, which uses information encoded in a deviceEs address to infer its location on the network, or bridging, which makes no assumptions about where addresses are located and depends heavily on broadcasting to locate unknown addresses. !he heavy overhead of broadcasting has led to the dominance of routing in large networks, particularly the Internet$ bridging is largely relegated to small networks where the overhead of broadcasting is tolerable. 7owever, since large networks are usually composed of many smaller networks linked together, it would be inaccurate to state that bridging has no use on the Internet$ rather, its use is localized. www.StudentRockStars.com www.StudentRockStars.com Routing In .et$or( !)er Routing ,or routing. is the process of selecting paths in a network along which to send data or physical traffic. 2outing is performed for many kinds of networks, including the telephone network, the Internet, and transport networks. 2outing directs forwarding, the passing of logically addressed packets from their source toward their ultimate destination through intermediary nodes$ typically hardware devices called bridge routers, gateways, firewalls, or switches. ?rdinary computers with multiple network cards can also forward packets and perform routing, though with more limited performance. !he routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. !hus constructing routing tables, which are held in the routersE memory, becomes very important for efficient routing. 2outing, in a more narrow sense of the term, is often contrasted with bridging in its assumption that network addresses are structured and that similar addresses imply proimity within the network. (ecause structured addresses allow a single routing table entry to represent the route to a group of devices, structured addressing ,routing, in the narrow sense. outperforms unstructured addressing ,bridging. in large networks, and has become the dominant form of addressing on the Internet, though bridging is still widely used, albeit within localized environments. www.StudentRockStars.com www.StudentRockStars.com About Adhoc .et$or( 'n ad hoc network is a dynamic multi&hop wireless network that is established by a group of mobile hosts on a shared wireless channel by virtue of their proimity to each other. -ince wireless transmissions are locally broadcast in the region of the transmitting host, hosts that are in close proimity can hear each other and are said to be neighbors. !he transitive closure of the neighborhood of all the hosts in the set of mobile hosts under consideration forms an ad hoc network. !hus, each host is potentially a router and it is possible to dynamically establish routes by chaining together a sequence of neighboring hosts from a source to a destination in the ad hoc network. !he scarcity of the wireless channels makes it difficult for resource critical applications to eecute in wireless environments. 'lso, efficient resource utilization becomes a challenging task. !his proAect focuses on mechanisms for routing in ad&hoc networks such that the routes would have a higher chance of satisfying the required resources Hi%tor) o' Ad hoc .et$or(%## In /HH0 !I+:8C started looking at theoretical aspects of approimations to minimum dominating sets. 9odes in dominating sets were identified as candidate nodes for maintaining shared information in a network. !his work led to the genesis of routing based on spine architecture. !he spine was an approimation to minimum connected dominating set. -everal routing algorithms based on spine were developed, such as "-2, ?-2 etc. (ut global computation was the maAor drawback of the spine architecture. ?ver the years this work evolved into C:<'2 which briefly, is a Qo- routing architecture for ad& hoc networks based on management and computation of core nodes ,dominating nodes. and distributed state. www.StudentRockStars.com www.StudentRockStars.com Routing Protocol In Mobile ADhoc .et$or(% +obile ad&hoc networks, also known as short&lived networks, are autonomous systems of mobile nodes forming network in the absence of any centralized support. !his is a new form of network and might be able to provide services at places where it is not possible otherwise. 'bsence of fied infrastructure poses several types of challenges for this type of networking. 'mong these challenges is routing. (y routing, we mean process of echanging information from one station to the other stations of the network. 2outing protocols of mobile ad&hoc network tend to need different approaches from eisting Internet protocols, since most of the eisting Internet protocols were designed to support routing in a network with fied structure. In the academic and industrial world, those who think about such things have written quite a few papers proposing various routing solutions for mobile ad&hoc networks. "roposed solutions could be classified into si types@ table&driven, on&demand, hierarchical, power&aware, geographical, and multicast protocols. !able&driven protocols are one of the old ways of acquiring routing in mobile ad&hoc networks. !hese protocols maintain consistent overview of the network. :ach node uses routing tables to store the location information of other nodes in the network. !his information is used to transfer data among various nodes of the network. !o ensure the freshness of the routing tables, these protocols adopts different sorts of mechanisms. ?ne of the adopted methods is broadcasting Ghello,G a special message containing address information, at fied intervals of time. ?n receiving this message, each node updates its routing tables with fresh locations information of other participating nodes. <estination -equence <istance *ector routing protocol ,<-<*., 3ireless 2outing "rotocol ,32". and Cluster& head %ateway -witch 2outing ,C%-2. are some of the popular table& driven protocols for mobile ad&hoc networks. !able&driven protocols might not be considered an effective routing solution for mobile ad&hoc network. 9odes in mobile ad&hoc networks operate with low battery power and with limited bandwidth. "resence of high mobility, large routing tables and low scalability result in consumption of bandwidth and battery life of the nodes. +oreover continuous updates could create unnecessary network overhead. www.StudentRockStars.com www.StudentRockStars.com &n Dem!nd Routing Protocol 'nother in the family of routing protocols for mobile ad&hoc network is on&demand routing protocols. 3ith on&demand protocols, if a source node requires a route to the destination for which it does not have route information, it initiates a route discovery process which goes from one node to the other until it reaches to the destination or an intermediate node has a route to the destination. It is the responsibility of the route request receiver node to reply back to the source node about the possible route to the destination. !he source node uses this route for data transmission to the destination node. -ome of the better known on&demand protocols are 'd&hoc ?n& demand <istance *ector routing ,'?<*., <ynamic -ource 2outing ,<-2. and !emporary ?rdered 2outing 'lgorithm ,!?2'.. !hese protocols differ on storing the previously known route information and on how they use the established route data. 'gain, in a network with many participating nodes we may suffer with same sort of problems what we have seen in table&driven protocols. Conclu%ion In conclusion, routing is one of the core issues in mobile ad&hoc network. 'n effective routing mechanism will be helpful to etend the successful deployment of mobile ad&hoc networks. Current routing protocols provide routing solutions up to a certain level, but are lacking the ability to handle other related issues. +oreover most of these protocols have designed and implemented on small scale. If these protocols could be etended further by taking into accounts other routing related factors we may come out with a standard routing solution for mobile ad&hoc network. www.StudentRockStars.com www.StudentRockStars.com Pro:ect Go!l% %iven the nature of the network and the requirements of the applications, the following are the key goals of C:<'2. ,a. 2oute computation must be distributed because centralized routing in a dynamic network is impossible even for fairly small networks. ,b. 2oute computation should not involve the maintenance of global state, or even significant amounts of volatile non&local state. In particular, link state routing is not feasible for highly dynamic networks because of the significant state propagation overhead when the network topology changes. ,c. 's few nodes as possible must be involved in state propagation and route computation, since this involves monitoring and updating at least some state in the network. ?n the other hand, every host must have quick access to routes on& demand. ,d. :ach node must only care about the routes corresponding to its destination, and must not be involved in frequent topology updates for parts of the network to which it has no traffic. ,e. -tale routes must be either avoided, or detected and eliminated quickly. ,f. (roadcasts must be avoided as far as possible because broadcasts are highly unreliable in ad&hoc networks. ,g. If the topology stabilizes, then routes must converge to the optimal routes. ,h. It is desirable to have a backup route when the primary route has become stale and is being recomputed. ,i. 'pplications provide a minimum bandwidth requirement for a connection, and the routing algorithm must efficiently compute a route that can satisfy the bandwidth requirement with high probability. ,A. !he amount of state propagation and topology update information must be kept to a minimum. In particular, every change in available bandwidth should not result in updated state propagation. www.StudentRockStars.com www.StudentRockStars.com ,k. <ynamic links ,either unstable or low bandwidth links. must not cause state propagation throughout the network. ?nly stable high bandwidth link information must be propagated throughout the network. ,l. !he Qo- route computation algorithm should be simple and robust. 2obustness, rather than optimality, is the key requirement. www.StudentRockStars.com www.StudentRockStars.com Tr!n%port !)er In Mobile Computing Tr!n%port l!)er In computing and telecommunications, the tr!n%port l!)er is the second highest layer in the four and five layer !C"#I" reference models, where it responds to service requests from the application layer and issues service requests to the Internet layer. It is also the name of layer four of the seven layer ?-I model, where it responds to service requests from the session layer and issues service requests to the network layer. !he definitions of the transport layer are slightly different in these two models. !his article primarily refers to the !C"#I" model. -ee also the ?-I model definition of the transport layer. ' tr!n%port protocol is a protocol on the transport layer. !he two most widely used transport protocols on the Internet are the connection oriented !C" ,!ransmission Control "rotocol., and U<" ,User <atagram "rotocol.. !C" is the more complicated and most common. ?ther options are the <atagram Congestion Control "rotocol ,<CC". and -tream Control !ransmission "rotocols. !he transport layer is typically handled by processes in the host computer operational system, and not by routers and switches. !he transport layer usually turns the unreliable and very basic service provided by the 9etwork layer into a more powerful one. In the !C"#I" model, the transport layer is responsible for delivering data to the appropriate application process on the host computers. !his involves statistical multipleing of data from different application processes, i.e. forming data packets, and adding source and destination port numbers in the header of each transport layer data packet. !ogether with the source and destination I" address, the port numbers constitutes a network socket, i.e. an identification address of the process&to&process communication. In the ?-I model, this function is supported by the session layer. Finally, some transport layer protocols, for eample !C" but not U<", provides end&to&end reliable communication, i.e. error recovery by means of error detecting code and automatic repeat request ,'2Q. protocol. !he '2Q protocol also provides flow control, which may be combined with congestion avoidance. + www.StudentRockStars.com www.StudentRockStars.com i%t &' Tr!n%port !)er Ser/ice% !here is a long list of services that can be optionally provided by the transport layer. 9one of them are compulsory, because not all applications want all the services available. -ome can be wasted overhead, or even counterproductive in some cases. Connection&oriented !his is normally easier to deal with than connection&less models, so where the 9etwork layer only provides a connection&less service, often a connection&oriented service is built on top of that in the !ransport layer. -ame ?rder <elivery !he 9etwork layer doesnEt generally guarantee that packets of data will arrive in the same order that they were sent, but often this is a desirable feature, so the !ransport layer provides it. !he simplest way of doing this is to give each packet a number, and allow the receiver to reorder the packets. 2eliable <ata "ackets may be lost in routers, switches, bridges and hosts due to network congestion, when the packet queues are filled and the network nodes have to delete packets. "ackets may be lost or corrupted in for eample :thernet due to interference and noise, since :thernet does not retransmit corrupt packets. "ackets may be delivered in the wrong order by an underlying network. -ome transport layer protocols, for eample !C", can fi this. (y means of an error detection code, for eample a checksum, the transport protocol may check that the data is not corrupted, and verify that by sending an 'C4 message to the sender. 'utomatic repeat request schemes may be used to retransmit lost or corrupted data. (y introducing segment numbering in the transport layer packet headers, the packets can be sorted in order. ?f course, error free is impossible, but it is possible to substantially reduce the numbers of undetected errors. Flow Control !he amount of memory on a computer is limited, and without flow control a larger computer might flood a computer with so much information that it canEt hold it all before dealing with it. 9owadays, this is not a big issue, as memory is cheap while bandwidth is comparatively epensive, but in earlier times it was more important. Flow control allows the receiver to say G3hoaTG before it is overwhelmed. -ometimes this is already provided by www.StudentRockStars.com www.StudentRockStars.com the network, but where it is not, the !ransport layer may add it on. Congestion avoidance 9etwork congestion occurs when a queue buffer of a network node is full and starts to drop packets. 'utomatic repeat request may keep the network in a congested state. !his situation can be avoided by adding congestion avoidance to the flow control, including slow&start. !his keeps the bandwidth consumption at a low level in the beginning of the transmission, or after packet retransmission. (yte orientation 2ather than dealing with things on a packet&by&packet basis, the !ransport layer may add the ability to view communication Aust as a stream of bytes. !his is nicer to deal with than random packet sizes, however, it rarely matches the communication model which will normally be a sequence of messages of user defined sizes. "orts ,"art of the transport layer in the !C"#I" model, but of the session layer in the ?-I model. "orts are essentially ways to address multiple entities in the same location. For eample, the first line of a postal address is a kind of port, and distinguishes between different occupants of the same house. Computer applications will each listen for information on their own ports, which is why you can use more than one network&based application at the same time. www.StudentRockStars.com www.StudentRockStars.com Tr!n%port Protocol Comp!ri%on T!ble U%P TCP %CCP SCTP Packet header size 8 Btes 20 Btes !aries 12 Btes " !ariab#e $h%&k 'eader (ra&s)*rt #aer )acket e&tit +ata,ram -e,me&t +ata,ram +ata,ram P*rt &%mberi&, .es .es .es .es /rr*r detecti*& 0)ti*&a# .es .es .es 1e#iabi#it2 /rr*r rec*3er b a%t*matic re)eat re4%est (516) 7* .es 7* .es !irt%a# circ%its2 -e4%e&ce &%mberi&, a&d re*rderi&, 7* .es .es 0)ti*&a# 8#*9 c*&tr*# 7* .es .es .es $*&,esti*& a3*ida&ce2 !ariab#e c*&,esti*& 9i&d*9: s#*9 start: time *%ts 7* .es .es .es M%#ti)#e streams 7* 7* 7* .es www.StudentRockStars.com www.StudentRockStars.com Applic!tion !)er In Mobile Computing !he !pplic!tion l!)er is the seventh level of the seven&layer ?-I model. It interfaces directly to and performs common application services for the application processes$ it also issues requests to the presentation layer. !he common application layer services provide semantic conversion between associated application processes. 9ote: :amples of common application services of general interest include the virtual file, virtual terminal, and Aob transfer and manipulation protocols. !he application layer of the four layer and five layer !C"#I" models corresponds to the application layer, the presentation layer and session layer in the seven layer ?-I model. !he application layer is the top layer in the ?-I protocol stack. 'pplications that provide network features reside at this layer and access underlying communication protocols. :amples include file access and transfer over the network, resource sharing, and print services. !he ?-I model specifies that applications must provide their own layer I protocols. !he ?-I F!'+ ,File !ransfer 'ccess and +anagement. utility and the O.N11 electronic mail standard provide services at the ?-I application layer. In the Internet world, the application layer resides directly on top of the !C"#I" protocol stack. In this model, the presentation layer and session layer of the ?-I protocol stack are used. !he application layer talks directly with the transport layer ,!C" and U<".. Common Internet applications in the application layer include !elnet, F!" ,File !ransfer "rotocol., 9F- ,9etwork File -ystem., -+!" ,-imple +ail !ransport "rotocol., and <9- ,<omain 9ame -ystem.. www.StudentRockStars.com www.StudentRockStars.com Securit) In Wirele%% Mobile Computing Securit) in Bro!d Sen%e -ecuring information from unauthorized access is a maAor problem for any network & wireline or wireless -ecurity, in a broad sense, focuses on network security, system security, information security, and physical security. It is made up of a suite of multiple technologies that solve numerous authentication, information integrity, and identification problems. It includes the following technologies U firewalls, authentication servers, biometrics, cryptography, intrusion detection, virus protection, and *"9s. "nder%t!nding the Component%
A Schematic of Security Architecture for Mobile WAP-based Devices www.StudentRockStars.com www.StudentRockStars.com Securit) Problem% -ecurity is an even greater problem for wireless networks, since radio signals travel through the open atmosphere where they can be intercepted by individuals who are constantly on the move P and therefore difficult to track down. -econdly, wireless solutions are, almost universally, dependent on public&shared infrastructure where you have much less control of, and knowledge about, the security discipline employed. 7orror stories of hackers scanning airwaves and siphoning off cellular I< numbers for fraudulent use have become commonplace. :ven pager messages are no longer safe. 7ere are some eamples of common security breaches@ Interception of law enforcement data on -+2, private radio or C<"< networks by criminal elements Interception of credit card authorizations over wireless networks "hysical breach of security at unmanned base stations or other communications centers. Interception of e&mail messages on wireless internet connections -tealing of cellular airtime 3hile it may not be possible to make any system completely secure, there are certain steps that can be and must be taken to ensure that the risk of security breaches is minimized. -ources of -ecurity 8eaks +any local echange carriers use microwave communications for their inter&8'!' calls. -ince the frequencies used by carriers is public information, it is not at all difficult for an intruder to intercept both voice and data transmissions. :ven with inter&echange circuits increasingly being converted to fiber, radio and satellite transmissions are still used by many carriers. 9etwork providers should be asked specifically what type of circuits are used for traffic back&haul from base stations, and in particular what circuits will be used in any proposed networking solution. !ampering with Cellular 9'+s as a -ecurity 8eak ' common problem in the cellular industry is the theft of air time by individuals who make cellular calls without paying for them. !hese people have found a relatively easy way of pirating the numeric assignment numbers ,9'+s. of valid users. :ven combinations of 9'+ www.StudentRockStars.com www.StudentRockStars.com plus +'9/ or +'9F sequences are no longer secure. "C- digital networks are somewhat more secure than analog cellular networks. Ste!ling In'orm!tion It is not uncommon for individuals intent on industrial espionage to scoop up vast quantities of information by placing small scanners at appropriate locations and searching with very powerful algorithms. Credit card numbers and bank account numbers are among the most common types of information stolen. 3hile such an effort does require determination and planning on the part of thieves, it should be remembered that often the law breaker is far more motivated than is the person in charge of security. -ecurity system designers need to keep this in mind and to make their security arrangement as tight as the technology and the budget will allow. www.StudentRockStars.com www.StudentRockStars.com Wirele%% A. Securit) Con%ider!tion% 3ireless 8'9s used to ,some still do. rely on 3ired :quivalent "rivacy ,3:". protocol & that uses N1 bit encryption. !his is not strong enough encryption in todayEs environment. !his code can be broken in a day or less by a good encryption hacker, according to University of (erkeleyEs research team. !he following schematic from e3eek ,February /F, F11/ issue. shows how this is possible. 9ow vendors have started implementing superior encryption codes. 's an eample, Cisco 'ironet =;1 wireless 8'9 uses 2adius security protocol based on /FJ bit encryption. 3ireless 8'9 infrastructure planners should investigate the level of security built into vendorEs hardware. %o to our siteEs 3ireless -ecurity pages for more. For virus protection in wireless environment, go here. Impro/ing WA. Securit) I::: J1F.//i +ore durable standards based security solution. !he standard will be approved in late F11= with vendors building products to comply with it in F11N in our estimation. Interim -olutions@ a number of solutions have been proposed by different vendors. -ome of these are described hereunder@ 'theros ,' chip vendor. ':- -olution & 'theros is to include ':- ,advanced :ncryption -tandard. in its net generation of chips. 'theros builds chips for J1F.//a, J1F.//b and J1F.//g. ':- is in firmware. :ventually will require chip upgrade.
upgrade in future when J1F.//i is implemented. -ymbol has announced a scaled&down version of !4I" called +obile Computer +ode ,+C+. for handheld devices that can not handle full& fledged !4I".. CiscoEs ":'"& "rotected :tensible authentication "rotocol & Combines transport layer security and :'". 'uthored by +icrosoft, Cisco and 2-' -ecurity Inc., it is already in some products. -pecial -ecurity %ateway boes & From (lue-ocket and 2eefedge 3:"F & 2ebuild 3:" using new 'dvanced :ncryption -tandard ,':-. instead of 2CN and 4erberos authentication P!c(et Ke)ing 1 Thi% relie% on modi'ic!tion to RC; th!t e%%enti!ll) clo%e% the loop hole in W0P www.StudentRockStars.com www.StudentRockStars.com SS. <Simple Secure .et$or(= Initi!ti/e 'rom S)mbol> Inter%il> Intermec> Micro%o't !nd Ci%co 1 "nder thi% %cheme> encr)ption (e) ch!nge% periodic!ll) VP.% 'or H!ndheld De/ice% VP. Client h!% been built 'or Poc(et PC 1 go to http7??$$$#poc(etpc#com Admit&ne 'or Poc(et PC 'rom *un( %o't$!re 1 http7??$$$#'un(#com Certicom@% Mo/i!nVP. 'or Windo$% C0> P!lm> !nd S)mbi!n 1 http7??$$#certicom#com Mergic VP. 'ort P!lm &S http7??$$$#mergic#com www.StudentRockStars.com www.StudentRockStars.com De%igning 'or Securit) in Mobile Computing !here are several steps that can be taken in designing for security in mobile computing networks and applications@ Ph)%ic!l Securit)> Policie% !nd Procedure% !here is no point in implementing epensive hi&tech security systems while the physical security of end user devices, base stations, and information servers is ignored. ' notebook left in the back seat of an unlocked car is an obvious and only too common security violation that should be discouraged in the strongest possible terms. !his potential problem will soon be eacerbated with the advent of inepensive "C-#"C9 micro&cells located in small and unattended sites throughout communities. Applic!tion !nd S)%tem A%%i%ted Securit) !he use of user passwords and similar mechanisms is very common method of ensuring security. 3e shall not dwell on these techniques here. Instead, we shall concentrate on mobile computing security issues. Di!l B!c( !% ! Securit) Techni2ue 2emote access type mobile computing applications can incorporate dial back technique where users and their location are known. +any hardware&based security servers provide this feature. *ire$!ll% A Securit) Ser/er% !t the Ho%t +any specialized security companies are providing security servers that can be installed at the corporate host server. -everal 2emote 'ccess -ervers also provide this functionality as an integral part of the communications server. Cylink is well&known for providing 2'- security products in wireline remote access environment. Cou may get more information from their web site. www.StudentRockStars.com www.StudentRockStars.com 2acalMs %uardata 3atchword II token offers convenient alternatives to passwords based on common names, birthdays, etc. 3hen using 3atch3ord II, critical information is never entered in clear. !he operating principle is based on the challenge#response mechanism described in the '9-I OH.F0 secure sign&on standard. !he user enables the token by entering a "I9. !he 3atch3ord %enerate process takes a digital challenge from the host computer system entered into the token P which then generates a seven&digit response@ a one&time password. !he response is calculated from the challenge using the <:- cryptographic process. !here is a security controller or server at the host between the modem pool and the information server. It is anticipated that the net generation of security products will integrate security into the modem or communications server products. 9ow, wireless security servers are being provided by companies such as Certicom, <iversinet, :ntrust ,subsidiary of 9ortel., -oneraEs -mart!rust ,for m&commerce., etc.. "lease see references to these vendors further down in the page.. www.StudentRockStars.com www.StudentRockStars.com De%igning 'or Securit) in Mobile Computing## !here are several steps that can be taken in designing for security in mobile computing networks and applications@ Ph)%ic!l Securit)> Policie% !nd Procedure% !here is no point in implementing epensive hi&tech security systems while the physical security of end user devices, base stations, and information servers is ignored. ' notebook left in the back seat of an unlocked car is an obvious and only too common security violation that should be discouraged in the strongest possible terms. !his potential problem will soon be eacerbated with the advent of inepensive "C-#"C9 micro&cells located in small and unattended sites throughout communities. Applic!tion !nd S)%tem A%%i%ted Securit) !he use of user passwords and similar mechanisms is very common method of ensuring security. 3e shall not dwell on these techniques here. Instead, we shall concentrate on mobile computing security issues. Di!l B!c( !% ! Securit) Techni2ue 2emote access type mobile computing applications can incorporate dial back technique where users and their location are known. +any hardware&based security servers provide this feature. *ire$!ll% A Securit) Ser/er% !t the Ho%tB +any specialized security companies are providing security servers that can be installed at the corporate host server. -everal 2emote 'ccess -ervers also provide this functionality as an integral part of the communications server. Cylink is well&known for providing 2'- security www.StudentRockStars.com www.StudentRockStars.com products in wireline remote access environment. Cou may get more information from their web site. %uardata 3atchword II token offers convenient alternatives to passwords based on common names, birthdays, etc. 3hen using 3atch3ord II, critical information is never entered in clear. !he operating principle is based on the challenge#response mechanism described in the '9-I OH.F0 secure sign&on standard. !he user enables the token by entering a "I9. !he 3atch3ord %enerate process takes a digital challenge from the host computer system entered into the token P which then generates a seven&digit response@ a one&time password. !he response is calculated from the challenge using the <:- cryptographic process. !here is a security controller or server at the host between the modem pool and the information server. It is anticipated that the net generation of security products will integrate security into the modem or communications server products. 9ow, wireless security servers are being provided by companies such as Certicom, <iversinet, :ntrust ,subsidiary of 9ortel., -oneraEs -mart!rust ,for m&commerce., etc.. "lease see references to these vendors further down in the page.. D!t! 0ncr)ption Proce%% in Mobile Computing :ncryption involves scrambling digital information&bits with mathematical algorithms and is the most potent protection available against security intrusions into wireless and wire line communications. <ifferent encryption schemes have been proposed and implemented. !he <ata :ncryption -tandard ,<:-. is one algorithm that has held sway since the /HI1s. 2-', based on public key cryptography and named for the three +I! professors P 2ivest, -hamir and 'dleman P who developed it, is another. "retty %ood "rivacy ,"%". is a public domain implementation of 2-' available for non&commercial use on the Internet in 9orth 'merica. +any cellular carriers are now providing encryption between cell sites and the +!-?. Unfortunately, the last segment ,i.e., between the end user device and the cell, or base station. obviously cannot be encrypted and this is where all the theft occurs. For end&to&end security, the only answer is to build encryption#decryption capabilities into the end user device itself. Unfortunately, this can be done only with end user devices on digital cellular networks P and digital cellular is still not ubiquitous ,only N1 percent&coverage in the U.-. in /HH;, according to <ataquest.. www.StudentRockStars.com www.StudentRockStars.com 0ncr)ption Ke) T)pe% !here are three types of keys used in encrypting data@ /. ' private key known only by the sender and the recipient F. ' private#public key combination =. ' one&time key www.StudentRockStars.com www.StudentRockStars.com Vendor Director) 3ireless -ecurity -oftware*endors ,%eneral&purpose 3ireless 8'9 and 3'9 Issues. Bluefire Security Technologies website : email : tel : address : www.bluefiresecurity.com N/A 1-410-637-8171 Product Service Descri!tion : provides complete security solution for !ndeld devices" deliverin# firew!ll" intrusion prevention" inte#rity m!n!#ement" encryption" !utentic!tion !nd policy-b!sed enterprise security m!n!#ement fe!ture t!t !llow secure use of mobile !nd wireless !pplic!tions. Blueice "esearch - now !art of #e$us - Swedish %om!any &'une ())(* website : email : tel : address : www.ne$us.co m N/A N/A Product Service Descri!tion : %ultip!ss solution provides &'( services to &)As !nd sm!rt pones - user !utentic!tion" certific!te re*uest !ndlin#" di#it!l si#n!ture verific!tion !s well !s di#it!l receipt services Bluesoc+et website : email : tel : address : www.bluesoc+et.com info,bluesoc+et.com 1-781-3-8-0888 7 New .n#l!nd .$ecutive &!r+ 4t /loor 0urlin#ton" %A 01803" 12A Product Service Descri!tion : &rovidin# 34AN security !nd m!n!#ement solutions %erticom website : email : tel : address : www.certicom.com N/A 1-510-780-51-- Product Service Descri!tion : 6erticom7s %ovi!n6rypt product for &!lm 82" uses te new Adv!nced .ncryption 2t!nd!rd 9A.2: !l#oritm" encrypts e!c record in ! &!lm7s d!t!b!se. ,-Secure website : email : tel : address : www.f- secure.com N/A N/A Product Service Descri!tion : Antivirus for &)As - &oc+et &6" &!lm 82 !nd No+i! ;-00 92ymbi!n 82 pl!tform:. /- 2ecure7s 2ecurity,<!nd includes its /ile6rypto softw!re. /ile6rypto uses 1-8bit encryption !nd re*uires ! p!ssword to decrypt files. .ncryption is controlled vi! policy !dministr!tion tools" wic lets (= m!n!#ers ret!in some control over te w!y users !ndle sensitive d!t!. www.StudentRockStars.com www.StudentRockStars.com PDA-./ website : email : tel : address : www.pd!lo+.com N/A N/A Product Service Descri!tion : &)A4o+> uses Penflow0s Biometric Signature "ecognition 9find out more:" wic me!sures uni*ue be!viour!l c!r!cteristics" to ensure only te ri#tful owner is #r!nted !ccess to teir &oc+et &6. (dentific!tion only t!+es ! millisecond? PDA Defense website : email : tel : address : www.pd!defense.com N/A N/A Product Service Descri!tion : &)A )efense provides multi-l!yered security 91-8-bit 0lowfis encryption: for &!lm" &oc+et &6 !nd 0l!c+berry devices. &)A )efense is bein# used witin milit!ry" te 3ite <ouse" te /0( !nd civili!n enterprises. &)A )efense .nterprise supports or#!ni@!tions wit 50 &)A users or more. Trust Digitals PDA Secure website : email : tel : address : www.trustdi#it!l.com N/A N/A Product Service Descri!tion : =rust )i#it!l provides bot st!nd-!lone !nd enterprise 9networ+ed0 version of its softw!re for securin# &)A d!t! Mergic 1P# for Palm .S website : email : tel : address : www.mer#ic.com N/A N/A Product Service Descri!tion : %er#ic> A&N !llows you to securely !ccess ! priv!te networ+" suc !s your corpor!te or ome 4AN" usin# ! connection to te (nternet. =is me!ns t!t you c!n !ccess resources on your 4AN Bust !s if you were directly connected to it. Tip% *or Wirele%% Securit) www.StudentRockStars.com www.StudentRockStars.com :nterprises should look at the enterprise security principles and infrastructure before deciding on handheld security software. !herefore, wireless security issues should be addressed consistent with overall enterprise security architecture. Cou should analyze the entire transaction or message path, including wireless network, *"9 gateways, wireless network providerEs routers#gateways, network interconnections between I-"s and the enterprise, enterprise firewalls, enterprise authentication servers, user location hardware like wireless routers and handheld device itself :tend eisting authentication management infrastructure for mobile security, if possible assuming that such software supports wireless networks and mobile devices. If you are medium or large enterprise, focus on directories, authentication servers, access management servers, *"9 gateways and I" address management tools Install anti&virus software for the handheld device. V 2oaming issues between wireless networks should be considered. 2emember, wireless security is a problem in not only wireless 8'9s. It is also a problem in wireless wide&area networks, including those supplied by I-"s. Install filtering to avoid flooding of e&mails on handheld devices (esides user id and passwords, augment security by at authentication servers, smart cards, biometrics, "4I or digital certificates. www.StudentRockStars.com www.StudentRockStars.com Critic!l Succe%% *!ctor% 'or Wirele%% Securit) Information Courtesy of Capslock Capslock ,www.capslock.fi., a provider of secure wireless infrastructure software for etending web and other application access to all wireless devices, has created the following list of considerations to help organizations implement secure wireless access@ -ecurity may be hard, and soft. -I+ cards that work with the current generation of 3'" devices are easy to use and do provide a hardware approach to basic encryption and decryption capabilities. (ut not all wireless devices can use them. Future "<' and -mart "hone platforms, running :"?C, +obile )ava, +obile 8inu, "alm?- or 3indows C: =.1 or later will require something different. ' software approach provides the only possible multi&platform security solution and should be considered instead of or in addition to -I+ cards. +irror, mirror on the call. 3hatever degree of security you implement for your web application, you should mirror it for mobile access to that application. -ecurity is not automatic for wireless access. It is a different transport, separate from the fied connection to your web application. <onMt transmit unencrypted transactions to wireless devices that are not secured or encrypted on your web site. +ake the same assumptions about security for the wireless services you offer as you do on your web site. . ItMs safer at home. !he best wireless security implementation may be defeated or ineffective when a user is roaming. +ake sure that planning and testing of security measures account for users that roam. ?ne is the loneliest number. 9o single security solution is likely to address all security risks. (e prepared to implement multiple approaches to completely secure wireless application access. For many, the perception eists that viruses are the primary or only security threat in the wireless world. *iruses are a real threat, but only half of the problem. -ending data in the clear that should be encrypted, and allowing user access without authentication pose even greater security threats. ' wireless security plan should address all of these eposures. ?ne size doesnMt fit all. <ifferent levels of security are needed for different mobile services. -ecure chatting services probably donMt require the same robust encryption you would implement for a commerce transaction. -ecurity should be tailored to the wireless application to prevent over&securing some mobile services, and leaving others eposed. (ut donMt the service provider make these decisions. www.StudentRockStars.com www.StudentRockStars.com -ervice providers should offer an easy download of a secure client component when needed, but users should have a say about when they invoke these measures. !hen, the wireless device should graphically display when a secure connection is in use. W!tch th!t he!/) li'ting# !he processing power and memory capacity of many wireless devices is quite limited. -elect encryption solutions that account for these limited resources and rely on the server to do as much of the Wheavy liftingX as possible. (enchmarking the performance of security solutions with mobilized applications is highly recommended. There m!) be chin(% in )our !rmor# Cour wireless carrier provides some security for you, including security between the wireless device and the base station and across the carrierMs physical network connecting base stations and switching centers. (ut the carrierMs security measures end with the network and therefore donMt provide end&to&end, cross&platform security for any wireless device. For eample, 3'" Internet access introduces a point of potential vulnerability where the 3ireless !ransport 8ayer -ecurity ,38!-., which secures the connection between the mobile device and the 3'" gateway, changes to a -ecure -ocket 8ayer ,--8. connection between the 3'" gateway and the 3eb server. ' comprehensive solution for wireless access should provide a secure end&to&end channel for transmission, authentication and encryption that works in any kind of network environment, fied or wireless, that supports !C"#I".eV www.StudentRockStars.com www.StudentRockStars.com Mobile Computing Applic!tion I%%ue% !he programs used in mobile devices like mobile phones, laptops, palm computers, etc. for internet connectivity and other computer related activities are called mobile computing applications. !he various issues and designs of mobile computing application are discussed under various headings below. Technic!l De%ign First comes the !echnical <esign Issues, which consist of network design, capacity planning, response time calculations, data compression considerations, system availability design and security issues. !he technical design plays a key role in a mobile computing proAect and offers unique challenges to the system professionals. .et$or( De%ign 'll issues regarding 3ireless 8'9 design and 3ide 'rea 2adio 9etwork <esign which network design comprises are discussed below. !# Wirele%% A. de%ign i%%ue% !he number of mobile users who will use wireless 8'9 and the number of them active during the peak period. !he types of 8'9 application accessed by them. ,4eeping in mind that wireless 8'9s will not be acceptable for the intended users as they operate at much slower speeds than wired 8'9s.. Use of notebook with a wireless 9IC as a primary and user device. 2oaming areas, location L range of needed access point. Impact of construction materials in single penetration. "referred technology&spread spectrum or frequency hopping. 2adio frequency interference from any other devices in office, factory or campus etc. www.StudentRockStars.com www.StudentRockStars.com b# Wide Are! R!dio .et$or( De%ign I%%ue% !he need of building a private radio network. +ost appropriate radio network technology for the suite of applications. +atching of user application&usage profiles to a given network capacity. Integration of 29' technology with a radio network infrastructure. :nsuring good coverage L minimum number of dead spots. If distributed wireless network design with several +C--s must be usedS +anaging the way logic networks will be influenced by network design options. The C!p!cit) Pl!nning C re%pon%e time C!lcul!tion%# ' mobile computing application transaction has to cover a synchronous set of hardware as well as software components before it reaches the destination server. <iverse physical links, wireless L wired line in between the end userEs client application software and the information server are present in its reverse path too. -o scheduling on a network requires comple rules, which makes it difficult to build a mathematical model to estimate response times. "lanning reliable capacities in advance is a hard task still. !he network providers give an estimate using comple queuing models or rule&of thumb calculation based on the other customerEs eperience. www.StudentRockStars.com www.StudentRockStars.com D!t! Compre%%ion Con%ider!tion 's the bandwidth of wireless network is scarce L inepensive it is necessary to compress data to get the maimum out of this bandwidth. !his is usually done in the modem by going beyond the modem hardware in reducing the quantity of traffic on wireless networks using client application programs. S)%tem !/!il!bilit) De%ign 2ather than sticking on with the general base station hardware L network controllers, redundancy L message switches are typically built on fault&tolerant platforms. "ublic shared network providers must be approached for details of their redundancies. +C-- is another vital component that badly needs inbuilt redundancy. Securit) i%%ue% It is tough to track down securing information by unauthorized access. Common security breaches of mobile computing applications include, 9etwork by criminal elements. "hysical breach security at communication centers mainly unmanned base stations. Interception of credit card authorization over wireless network. Careful security considerations including on&the&air encryption L firewalls must be used. &ther th!n technic!l de%ign the ne+t m!:or i%%ue under Mobile computing !pplic!tion i% 0rgonomic% C ogi%tic% De%ign $here the de%igner% e/!lu!te the 'ollo$ing# Form factor of end user device (attery life Input method&keyboard, pen, touch or voice 2uggedness 3hether "ortable or fied -afety L 7ealth issues. www.StudentRockStars.com www.StudentRockStars.com +obile computing application deals with the future of computer usage and is therefore of great relevance. www.StudentRockStars.com www.StudentRockStars.com Mobile Applic!tion De/elopment Pl!t'orm +obile application development platforms are aided by various specific as well as generic sets of tools. !he following are the various choices in development tools. !raditional +icrosoft 3indows HJ # F111 # 9! # O" tools.
"alm ?- 'pplication <evelopment tools@ )ava being the standard dominant application development tool for server side programming has made it easier to write safe and reliable code through features, like automatic memorizing and standard eception&handling. )ava interfaces are supported by several application servers.
+odern 'pplication -erver !ools offer application server solutions in a web environment based on conventional application servers and this etension is moulded for mobile applications and wireless networks. Wirele%% .et$or( %peci'ic de/elopment# -everal mobile gateway vendors like I(+, (road beam, ?racle, -ybase, and !elecordia technologies offer mobile application development tools kit. Investigating specialized middleware for wireless and mobile applications are conducted to find the vendors who address all these requirements. D!t! %)nchroniD!tion product% 9umerous files L <(+- synchronization products are available to solve the problem of synchronizing information in notebook and "<'s with master information in the desktop or the server. Customization can be done through '"Is. !he various choices in development tools being furnished for +obile application development platforms, decision&making regarding use of the same, becomes easy. www.StudentRockStars.com www.StudentRockStars.com