You are on page 1of 158

MOBILE COMPUTING

(ECS-087)
Anurag Malik
Associate Professor
CE & IT Dept. M.I.T Moradabad
B.Tech VIII CS / IT
UNIT II
Recommended Books:
1.
2.
3.

4.
5.

J. Schiller, Mobile Communications, Addison Wesley


Asok K.S Talukder, Mobile Computing-Technology,
Applications & Service Creation, TMH
Raj Kamal,Mobile Computing, Oxford University
Press
Charles Perkins, Mobile IP, Addison Wesley
M.V.D. Heijden, M. Taylor, Understanding WAP, Artech House

Wireless Networking

While the term wireless network may technically be used to refer to any type
of network that is wireless, the term is most commonly used to refer to a
telecommunications network whose interconnections between nodes is
implemented without the use of wires, such as a computer network (which is a
type of communications network).
Wireless telecommunications networks are generally implemented with some
type of remote information transmission system that uses electromagnetic
waves, such as radio waves, for the carrier and this implementation usually
takes place at the physical level or "layer" of the network.
Types of Wireless Networking
Wireless LAN : Similar to other wireless devices, it uses radio instead of wires
to transmit data back and forth between computers on the same network. .
Wi-Fi: Wi-Fi is a commonly used wireless network in computer systems which
enable connection to the internet or other machines that have Wi-Fi
functionalities. Wi-Fi networks broadcast radio waves that can be picked up by
Wi-Fi receivers that are attached to different computers or mobile phones.
Fixed Wireless Data: Fixed wireless data is a type of wireless data network
that can be used to connect two or more buildings together in order to extend
or share the network bandwidth without physically wiring the buildings together.

Types of Wireless
Networking

Wireless MAN :A type of wireless network that connects several Wireless


LANs.
WiMAX: WiMAX is the term used to refer to wireless MANs.
Mobile devices networks
Global System for Mobile Communications (GSM): The GSM network is
divided into three major systems which are :the switching system, the base
station system, and the operation and support system (Global System for
Mobile Communication (GSM)). The cell phone connects to the base system
station which then connects to the operation and support station; it then
connects to the switching station where the call is transferred where it needs to
go (Global System for Mobile Communication (GSM)). This is used for cellular
phones, is the most common standard and is used for a majority of cellular
providers.
Personal Communications Service (PCS): PCS is a radio band that can be
used by mobile phones in North America. Sprint happened to be the first
service to set up a PCS.
D-AMPS: D-AMPS, which stands for Digital Advanced Mobile Phone Service,
is an upgraded version of AMPS but it is being phased out due to
advancement in technology. The newer GSM networks are replacing the older
system.

WLAN

Wireless LAN or WLAN is a wireless local area network, which is the


linking of two or more computers without using wires and that doesn't
rely on wired Ethernet connections
WLAN utilizes spread-spectrum or OFDM modulation technology
based on radio waves to enable communication between devices in a
limited area, also known as the basic service set. This gives users the
mobility to move around within a broad coverage area and still be
connected to the network.
Wireless LAN (WLAN) are typically restricted in their diameter to
buildings, a campus, single rooms etc.. and are operated by
individuals, not a large scale network providers.
WLANs employ access points that provide access within a radius of 65
to 300 feet.
WLANs try to provide all the features of wired LANs, but without the
wires. The only noticeable differences to the end user tend to be in
speed (ranging from 1 to 54Mbps, with some manufacturers currently
offering proprietary 108Mbps solutions) and security (the wireless
access point is shared among everybody nearby, so security issues
exist with WLANs that don't exist for wired networks).

IEEE 802 Standards

IEEE 802.1 Bridging (networking) and Network Management


IEEE 802.2 Logical link control (inactive)
IEEE 802.3 Ethernet
IEEE 802.4 Token bus (disbanded)
IEEE 802.5 Defines the MAC layer for a Token Ring (inactive)
IEEE 802.6 Metropolitan Area Networks (disbanded)
IEEE 802.7 Broadband LAN using Coaxial Cable (disbanded)
IEEE 802.8 Fiber Optic TAG (disbanded)
IEEE 802.9 Integrated Services LAN (disbanded)
IEEE 802.10 Interoperable LAN Security (disbanded)
IEEE 802.11 Wireless LAN & Mesh (Wi-Fi certification)
IEEE 802.12 demand priority (disbanded)
IEEE 802.13 Not used (officially)

IEEE 802.13ah:-Defines "Copper for the first mile" for Metro Area Networks (proposed)
IEEE 802.14 Cable modems (disbanded)
IEEE 802.15 Wireless PAN

IEEE 802.15.1 (Bluetooth certification)

IEEE 802.15.4 (ZigBee certification)


IEEE 802.16 Broadband Wireless Access (WiMAX certification)

IEEE 802.16e (Mobile) Broadband Wireless Access

IEEE 802.16.1 Local Multipoint Distribution Service


IEEE 802.17 Resilient packet ring
IEEE 802.18 Radio Regulatory TAG
IEEE 802.19 Coexistence TAG
IEEE 802.20 Mobile Broadband Wireless Access
IEEE 802.21 Media Independent Handoff
IEEE 802.22 Wireless Regional Area Network

Design Goals for Wireless


LANs
Global, seamless operation

Low power for battery use


No special permissions or licenses needed to use the LAN
Robust transmission technology
Simplified spontaneous cooperation at meetings
Easy to use for everyone, simple management
Protection of investment in wired networks
Security (no one should be able to read my data)
Privacy (no one should be able to collect user profiles)
Safety (low radiation)
Transparency concerning applications and higher layer
protocols,
Location awareness if necessary
6

Advantages Of Wireless
Network

The popularity of wireless LANs is a testament primarily to their


convenience, cost efficiency, and ease of integration with other
networks and network components. The majority of computers sold to
consumers today come pre-equipped with all necessary wireless LAN
technology. The benefits of wireless LANs include:
Convenience: The wireless nature of such networks allows users to
access network resources from nearly any convenient location within
their primary networking environment (home or office). With the
increasing saturation of laptop-style computers, this is particularly
relevant.
Mobility: With the emergence of public wireless networks, users can
access the internet even outside their normal work environment. Most
chain coffee shops, for example, offer their customers a wireless
connection to the internet at little or no cost.
Productivity: Users connected to a wireless network can maintain a
nearly constant affiliation with their desired network as they move from
place to place. For a business, this implies that an employee can
potentially be more productive as his or her work can be accomplished
from any convenient location.

Advantages Of Wireless
Network

Deployment: Initial setup of an infrastructure-based


wireless network requires little more than a single access
point. Wired networks, on the other hand, have the
additional cost and complexity of actual physical cables
being run to numerous locations (which can even be
impossible for hard-to-reach locations within a building).
Expandability: Wireless networks can serve a suddenlyincreased number of clients with the existing equipment. In
a wired network, additional clients would require additional
wiring.
Cost: Wireless networking hardware is at worst a modest
increase from wired counterparts. This potentially
increased cost is almost always more than outweighed by
the savings in cost and labor associated to running
physical cables.
8

Advantages Of Wireless
Network
Flexibility: Within radio coverage, nodes can communicate without

further restriction. Radio waves can penetrate walls, senders and


receivers can be placed anywhere. Furthermore wiring is difficult if
firewall separate buildings (real firewall, made of brick not routers).
Planning: Only wireless ad hoc networks allow communication without
previous planning, any wired network needs wiring plans. As long as
devices follows the same standard, they can communicate. For wired
networks, additional cabling with the right plugs and probably inter
networking units (such as switches) have to be provided.
Design: Only wireless networks allow for the design of small,
independent devices which can for example be put into a pocket.
Cables not only restrict users but also designers of small PDA's,
notepads etc. Furthermore, wireless senders and receivers can be
hidden in historic buildings, i.e. current networking technology can be
introducing without being visible.
Robustness: Wireless networks can survive disasters, e.g.,
earthquake or users pulling a plug. If the wireless devices survive,
people can still communicate. Networks requiring a wired
infrastructure will typically break down completely.

Disadvantages Of Wireless
Network
Security: Wireless LAN transceivers are designed to serve

computers
throughout a structure with uninterrupted service using radio frequencies.
Because of space and cost, the antennas typically present on wireless
networking cards in the end computers are generally relatively poor. In order to
properly receive signals using such limited antennas throughout even a
modest area, the wireless LAN transceiver utilizes a fairly considerable amount
of power.
Range: The typical range of a common 802.11g network with standard
equipment is on the order of tens of meters. While sufficient for a typical home,
it will be insufficient in a larger structure. To obtain additional range, repeaters
or additional access points will have to be purchased. Costs for these items
can add up quickly.
Reliability: Like any radio frequency transmission, wireless networking
signals are subject to a wide variety of interference, as well as complex
propagation effects that are beyond the control of the network administrator. In
the case of typical networks, modulation is achieved by complicated forms of
phase-shift keying (PSK) or quadrature amplitude modulation (QAM), making
interference and propagation effects all the more disturbing. As a result,
important network resources such as servers are rarely connected wirelessly.
Speed: The speed on most wireless networks (typically 1-108 Mbit/s) is
reasonably slow compared to the slowest common wired networks (100 Mbit/s
up to several Gbit/s). There are also performance issues caused by TCP and
its built-in congestion avoidance.

10

Disadvantages of Wireless
Network

Quality of services: WLAN's typically offers lower quality than their wired
counterparts. The main reason for this drawback are the lower bandwidth
due to limitations in the radio transmission (e.g., only 1-10 M bits/s), higher
error rates due to inference and higher delay or delay variations.
Cost: While, The cost of wireless interface, cost more their counterpart in
wired LAN.
Proprietary solutions: Due to slow standardization procedure, many
companies have come up with propriety solutions offering standardized
functionality plus many enhanced features. However the additional feature
only work in a homogeneous environment.
Restrictions: All wireless products have to comply with national
regulations. Several government and non-governmental institutions
worldwide regulates the operation and restrict frequencies to minimize
interference.

11

Wireless Network
Architecture

Stations
All components that can connect into a wireless medium in a network
are referred to as stations.
All stations are equipped with wireless network interface cards
(WNICs).
Wireless stations fall into one of two categories:
1.Wireless access point [1 access points and 2.clients].
1.Access point
Access points (APs) are base stations for the wireless network.
They transmit and receive radio frequencies for wireless enabled
devices to communicate with.
2.Clients
Wireless clients can be mobile devices such as laptops, personal
digital assistants, IP phones, or fixed devices such as desktops and
workstations that are equipped with a wireless network interface.

12

Types of WLAN

The private home or small business WLAN: This consists of one or


two access points covering around a 100- to 200-foot radius. The
equipment is common enough to be found in most office supply or
electronics stores, or even some retail stores like Target or Wal-Mart.
With few exceptions, hardware in this category subscribes to the
802.11a, b, or g standards (also known as Wi-Fi).
The enterprise class WLAN: This type has a larger number of
individual access points covering a wider area. The access points
themselves have features not needed for a home or small office, like
better security, authentication, remote management, and tools to help
integrate with existing networks. Each access point has a larger
coverage area than home or small office products, and all are
designed to work together to cover a much larger area. Equipment
here also adheres to the 802.11a, b, or g standard, and in the future
will likely adhere to further security-refining standards such as 802.1x.

13

Types of WMAN

The Wireless Metropolitan Area Network (WMAN): The Indiana


University wireless network is an example of this. A WMAN covers an
area from multiple city blocks up to a city's boundaries. The most
common type of WMAN is a collection of individual enterprise class
wireless networks that collectively allow users to access all of them.
For example, IU's WMAN is a collection of individual buildings' and
departments' WLANs taken together as a whole.
Wireless WAN (Wide Area Network): Although a WAN by definition is
the exact opposite of a LAN, Wireless WANs (WWANs) deserve brief
mention here. Most WANs exist to connect LANs that are not in the
same geographical area.
But recently, cellular phone companies like Sprint (for BroadBand
Direct) and AT&T (among others) have begun offering WWAN
technology that the end user can access directly. Those WWANs use
cellular data technology to cover extremely wide areas. While they are
considerably slower than wireless LAN speeds (most advertise
between 50 to 144Kbps; compare this to dial-up speeds, which are
around 56Kbps), they're still better than the lowest end of DSL speeds
(128Kbps), plus they allow far greater mobility than standard 802.11a,
b, or g wireless.

14

WLAN Application areas

Networks in exhibition halls


Hospitals
Warehouses
Airports
Structure of networks in Historic buildings
Extension of existing wired local area
networks in offices, universities etc.

15

16

Infrastructure Vs. Ad-hoc

Wireless communication enables information transfer among a


network of disconnected, and often mobile, users. Popular
wireless networks such as mobile phone networks and
wireless LANs are traditionally infrastructure-based, i.e. base
stations, access points and servers are deployed before the
network can be used. In contrast, ad hoc networks are
dynamically formed amongst a group of wireless users and
require no existing infrastructure or pre-configuration.
The dynamic and self-organizing nature of ad hoc networks
makes them particular useful in situations where rapid network
deployments are required or it is prohibitively costly to deploy
and manage network infrastructure.

17

Infrastructure Vs. Ad-hoc


Here are key differences between the modes.

Because Ad Hoc Mode does not require an access point, it's easier to
set up, especially in a small or temporary network.

Infrastructure takes advantage of the high power of an access point to


cover wide areas. Ad Hoc Mode connections are limited, for example
between two laptops, to the power available in the laptops.

Because the network layout (the network topology) in Ad Hoc Mode


changes regularly, system resources are taken just to maintain
connectivity.

As the Ad Hoc topology changes, throughput and range will change,


sometimes in unanticipated ways.

In an Ad Hoc network with many computers, the amount of interference


for all computers will go up, since each is trying to use the same
frequency channel.

In Ad Hoc Mode, chains of computers will connect to pass your data, if


your computer is not directly in range. On the other hand, you do not
have control over the path your data takes. The automatic configuration
routines may send your data through several computers, causing
significant network delays

18

19

20

21

IEEE 802.11 Protocol architecture and


Bridging

22

23

24

25

26

27

28

29

30

31

802.11 Physical Layer


3 versions: 2 radio (typ. 2.4 GHz), 1 IR
data rates 1 or 2 Mbit/s
FHSS (Frequency Hopping Spread Spectrum)
spreading, despreading, signal strength, typ. 1 Mbit/s
min. 2.5 frequency hops/s (USA), two-level GFSK modulation
DSSS (Direct Sequence Spread Spectrum)
DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift Keying),
DQPSK for 2 Mbit/s (Differential Quadrature PSK)
preamble and header of a frame is always transmitted with 1 Mbit/s, rest
of transmission 1 or 2 Mbit/s
chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code)
max. radiated power 1 W (USA), 100 mW (EU), min. 1mW
Infrared
850-950 nm, diffuse light, typ. 10 m range
carrier detection, energy detection, synchonization

32

IEEE 802.11 PHY Frame Format


Using FHSS

Synchronization ():The PLCP preamble starts with 80 bit synchronization,


which is 010101 bit pattern, used for synchronization of potential receivers
and signal detection by the CCA.
Start frame delimiter (SFD): indicate the start of frame and provide frame
synchronization.
PLCP_PDU Length word (PLW): indicates the length of payload .
PLCP signaling field (PSF): indicates the data rates of the payload. (0000lowest data rates1 Mbit/s), 0010- 2 Mbit/s, 1111- 8.5 Mbit/s).
Header Error Check (HEC); PLCP header is protected by 16 bit checksum
with polynomial G(x)= x16 + x12 + x + 1

Bits

80

Synchronization

PLCP Preamble

16

SFD

12

PLW

PSF

16

HEC

variable

Payload

PLCP Header

33

IEEE 802.11 PHY Frame Format


Using
DSSSused for synchronization, energy detection,
Synchronization:

Bits

frequency offset compensation.


Start Frame delimiter (SFD): used for synchronization at the
beginning of a frame and consist of pattern 1111001110100000.
Signal: used to indicate the data rate of payload. Value 0x0A
indicates 1 Mbit/s (DBPSK), 0x14 indicates 2 Mbit/s(DQPSK).
Service: reserved for future use, however 0x00 indicates an
IEEE802.11 compliant frame.
Length: used for length indication of the payload in microseconds.
Header error check (HEC): Signal , service and length fields are
protected by this checksum using standard polynomial.

128
Synchronization

PLCP Preamble

16

SFD

Signal

8
Service

16
Length

16

variable

HEC

Payload

PLCP Header

34

802.11 MAC Layer I


DFWMAC
Traffic services

Asynchronous Data Service (mandatory)

exchange of data packets based on best-effort

support of broadcast and multicast


Time-Bounded Service (optional)

implemented using PCF (Point Coordination Function)


Access methods
DFWMAC-DCF CSMA/CA (mandatory)

collision avoidance via randomized back-off mechanism

minimum distance between consecutive packets

ACK packet for acknowledgements (not for broadcasts)


DFWMAC-DCF w/ RTS/CTS (optional)

Distributed Foundation Wireless MAC

avoids hidden terminal problem


DFWMAC- PCF (optional)

access point polls terminals according to a list

35

36

37

38

IEEE 802.11 MAC Frame


Format

Types (Control Frames, management frames, data frames)


Sequence Numbers (important against duplicated frames due to lost ACKs)
Address (receiver, transmitter( physical), BSS identifier, sender (logical) )
Miscellaneous (sending time, checksum, frame control, data)

Bytes

Frame
Control

Bits

2
Protocol
Version

Duration ID

4
Type

Address 1

1
Subtype

Address 2

1
To
DS

1
From
DS

Address 3

Sequence
Control

1
MoreFr
ag

1
Retry

Address 4

1
Power
Mgmt

0 2312

Data

CRC

1
MoreDa
ta

WEP

Order

39

IEEE 802.11 MAC Packet


Frame Control: (2 bytes). Contain several subfields and
Structure
perform many functions.

1.
2.

3.
4.

5.
6.
7.

8.

9.

10.

Protocol version:(2 bits): indicates current protocol


Type : (2 bits): determine function of a frame, mgmt =00, control=01,
data=10, reserved=11.
Subtype : (4 bits) :subtype of type field, eg:- association, beacon.
To DS / From DS : (1 bit each) for differentiating of transmission of
frames among stations and access points.
More Fragments : (1 bits) : to remind (if) more frames are left.
Retry : (1 bit) : to indicate retransmitted frame.
Power Management : (1 bit) :indicates the mode (power-save mode) of
station after successful transmission of a frame.
More data: (1 bit): to indicate that sender has more data to send than
the current frame, use by an access point, station.
Wired Equivalent Privacy (WEP)(1 bit): indicate that the standard
security mechanism of 802.11 is applied.

Order: (1 bit) : If this bit is set to 1 the received frames must be


processed in strict order

40

IEEE 802.11 MAC Packet


Duration / ID : (2 bytes): contains the value indicating the period of
Structure
time in which the medium is occupied.

Address 1 to 4: (6 bytes each) : contain standard IEEE 802 MAC


addresses. The meaning of each address depends on the DS bits in the
frame control field.
Sequence Control : (2 bytes): Due to acknowledgment mechanism
frames may be duplicated. Therefore a sequence number is used to
filter duplicates.
Data : (max 2312 bytes): The MAC frame may contain arbitrary data
which is transferred transparently from a sender to the receiver.
Checksum (4 bytes): Finally a 32 bits checksum is used to protect the
frame.
* To / From DS bits : 00= between wireless nodes without access point
* To / From DS bits : 01= between an access point and station
* To / From DS bits : 10= between wireless nodes via access points
* To / From DS bits : 11= between accesses points over distribution
system

41

42

43

44

45

IEEE 802.11b

frequency:

transmission power:

2,4 GHz frequency band, also called ISM (= Industrial Scientific


Medical Band), not regulated
850 - 950 nm at infrared
min. 1mW
max. 100mW in Europe (1W in the USA)

reach:

of 10m (IR) to 30km or more with the help of special antennas


(directional antennas)

46

Comparison
Parameters

Standards 802.11
802.11

802.11b

802.11a / h

802.11g

Frequency
band, GHz

2,4 (ISM-Band)

2,4 (ISM-Band)

5,1

2,4 (ISM-Band)

Bit rate, MBit/s

1-11

11

54

54

Use field

building, territory

building, territory

in the buildings

building, territory

Deployment

End 1990

actually

Since 2000

Since March 2003

Available Hardware

Marketable NICs and


APs

Marketable NICs and


APs

Experimental operation Pre-standard Products

Data security

WEP

64/128/256 bit WEP

802.11i - security approaches for WLAN


(encryption, authentication);
WPA - WiFi Protected Access (competition with
802.11i)

none

802.11e (Ende 2003): use of QoS-approaches;


realization of multimedia applications/
Voice over IP

QoS for multimedia- none


transmission

Problematic

low bit rate


low bit rate
low interoperability

National restrictions

Pre-standard

47

Wireless MAC: Motivation

The main question in connection with MAC in the wireless is whether it is possible to use
elaborate Medium Access Control(MAC) schemes from the wired networks, for example
CSMA/CD as used in the original specification of IEEE 802.3 networks(Ethernet)
Considering the carrier sense multiple access with collision detection (CSMA/CD) which
works as follows. A sender senses the medium(a wire or a coaxial cable) to see if it is
free. If the medium is busy, the sender waits until it is free. If the medium is free, the
sender starts transmitting data and continues to listen into the medium. If the sender
now detects a collision while sending. , it stops at once and sends a jamming signal.
But the scheme fails in wireless network. CSMA/CD is not really interested in collision at
the sender, but rather in those at the receiver. The signal should reach the receiver
without collisions. But sender is the one detecting collision. This is not a problem using
wires, as more or less the same signal strength can be assumed all over the wire. If a
collision occurs somewhere in the wire, everybody will notice it. The situation is dierent
in wireless networks. The strength of a signal decrease proportionally to the square of
the distance to the sender. The sender may now apply carrier sense and detect an idle
medium. Thus, the sender starts sending- but a collision happens at the receiver due to
second sender. but the sender wont know the collision due to hidden terminal problem
see section ??. The same can happen to the collision detection. The sender detects no
collision, assumes that data has been transmitted without errors, but actually a collision
might have destroyed the data at the receiver. Thus, this very common MAC scheme
from wired network fails in wireless scenario.

48

Bluetooth
History
The developers of this wireless technology

first used the name


"Bluetooth" as a code name, but as time past, the name stuck.
The word "Bluetooth" is taken from the 10th century Danish King Harald
Bluetooth. King Bluetooth had been influential in uniting Scandinavian
Europe during an era when the region was torn apart by wars and
feuding clans.
The founders of the Bluetooth SIG felt the name was fitting because:
1) Bluetooth technology was first developed in Scandinavia, and
2) Bluetooth technology is able to unite differing industries such as the
cell phone, computing, and automotive markets. Bluetooth wireless
technology simplifies and combines multiple forms of wireless
communication into a single, secure, low-power, low-cost, globally
available radio frequency.
Invented in 1994 by L. M. Ericsson, Sweden
Named after Harald Blaatand Bluetooth, king of Denmark 940-981 A.D.
Bluetooth SIG founded by Ericsson, IBM, Intel, Nokia and Toshiba in Feb
1998
More than 1900 members today
Bluetooth version 1.0 and 1.1 have been released

49

What is Bluetooth
Bluetooth is a universal radio interface, operates on 79 channels in the
2.4 GHz frequency band with 1 Mhz carrier spacing that enables electronic
devices to connect and communicate wirelessly via short-range (10-100
m), ad-hoc networks.
Key Features :

Peak data rate : 1 Mbps ,Low power consumption ,Low cost


(Components (radios and chips) and device adapters are cheaper).

Affordable and appropriate technology.

Younger technology and therefore is less mature.

Ability to simultaneously handle both voice and data

Line of sight not required

connection of peripheral devices (loudspeaker, joystick, headset )

support of ad-hoc networking (small devices, low-cost )

bridging of networks (e.g., GSM via mobile phone - Bluetooth laptop )

Simple, cheap, replacement of IrDA, low range, lower data rates( 2.4
GHz, FHSS, TDD, CDMA)

Piconet is a collection of Bluetooth devices which are synchronized to


the same hoping sequence

50

Motivation for Bluetooth


Ubiquitous Computing

environment of intelligent
networked devices

Cordless
headset
mouse
Cell
phone

Mobile access to LANs/Internet


Home Networking
Automatic Synchronization of
data

Started as a Cable
replacement technology

Voice applications - hands-free


headset
51

System Challenges

Work across a diverse set of devices with varying


computing power and memory
Dynamic environment - the number, location and
variety of devices changing - connection
establishment, routing and service discovery
protocols have to take this into consideration
Unconscious connection establishment
Size of the implementation should be small. The
power consumption should not be more than a
fraction of the host device .

52

Piconets , Masters and


In principle each unit is a peer with the
Slaves
same hardware capabilities
Two or more Bluetooth units that share a
channel form a piconet (Bluetooth
Network)
One of the participating units is becomes
the master (by defn the unit that establishes
the piconet).
Participants may change roles if a slave
unit wants to take over as master
Only one master (primary station) in a
piconet. Upto 7 slaves (Secondary station).
The reason for the upper limit of eight
active devices, is the 3-bit address used in
bluetooth
The communication b/w primary and
secondary can be one to one or one-to-many.

53

Device Addressing

Bluetooth Device Address (BD_ADDR)


unique 48 bit address
Active Member Address (AM_ADDR)
- 3 bit address to identify active slave in a
piconet
- MAC address of Bluetooth device
- all 0 is broadcast address
Parked Member Address (PM_ADDR)
- 8 bit parked slave address

54

Why Scatternets

A group of overlapping piconets is called a scatternet

Users in a piconet share a 1 Mbps channel individual throughput decreases


drastically as more units are added
The aggregate and individual throughput of users in a scatternet is much greater
than when each user participates on the same piconet
Collisions do occur when 2 piconets use the same 1 MHz hop channel
simultaneously. As the number of piconets increases, the performance degrades
gracefully.
Two additional types of Devices:
Parked Devise (P) : can not actively participate in the piconet i.e. they do not
have a connection, but are known & can be reactivated within some
milliseconds. If a parked devices wants to communicate and there are already 7
active slaves, one slave has to switch to park mode to allow the parked device
to switch to active mode. More than 200 devices can be parked. This lead to the
idea of forming groups of piconets called scatternet.
Devices in Stand-By (SB): do not participate in the piconet

55

Inter-piconet communication
A unit may participate in more
than one piconet on a TDM basis.
To participate on a piconet it
needs the masters identity and the
clock offset.
While leaving the piconet it
informs the master.
The master can also multiplex as
slave on another piconet. But all
traffic in its piconet will suspended
in its absence.
56

System Architecture
Applications
TCS BIN BNEP

SDP

IP
RFCOMM

Co

Data

ntr
ol

TCP/UDP

L2CAP
Audio
Link Manager

Baseband
RF
Bluetooth Protocol Stack

The Radio, Baseband and Link


Manager are on firmware. The
higher layers could be in software.
The interface is then through the
Host Controller (firmware and
driver). The HCI (Host Controller
Interface) interfaces between the
baseband and L2CAP provides a
command interface to the baseband
controller and link manager and
access to the hardware status and
control registers. The HCI Interface
defined for Bluetooth are UART,
RS232
and
USB.
Audio
Applications may directly use the
basband layer after encoding the
57
audio signals.

System Architecture
The core protocols of Bluetooth comprise the following elements:
Radio: Specification of the air interface, i.e. frequencies, modulation and
transmit power.
Baseband: Description of basic connection establishment, packet formats,
timing and basic QoS parameters (Bandwidth, Latency, Error rate.
Link manager Protocol: Link set-up and management between devices
including security functions and parameter negotiation. Link Manager
handles
- Piconet management (attach/detach slaves, master- slave switch)
- Link Configuration (low power modes, QoS, packet
type selection)
- Authentication, pairing, encryption, synchronization, capability negotiation,
QoS negotiation, Power control
Logical Link Control and adaptation protocol (L2CAP): Adaptation of
higher layers to the baseband (connection & connection-oriented services) .
Its functions include
1. Protocol multiplexing
2. Segmentation and reassembly
3. QoS specifications
4. Signalling channel for connection request, config etc
Service Discovery Protocol: Devices discovery in close proximity plus
querying of service characteristics.

58

Higher layers
SDP : Service Discovery Protocol runs on a client server model. Each
device runs only one SDP server and one client may be run for each
application.

RFCOMM : It is cable replacement Protocol that emulates a serial line


interface following RS-232 standards.
This allows for a simple replacement of serial line cables and enables many
legacy applications and protocols to run over Bluetooth.
It supports multiple serial ports over single physical channels
BNEP is used for transferring another protocol stack's data via an L2CAP channel. Its
main purpose is the transmission of IP packets in the Personal Area Networking
Profile. BNEP performs a similar function to SNAP in Wireless LAN.

Application : This layer basically deal in performing different applications


such as audio , N/W ,telephony ,management

59

A UART (Universal Asynchronous Receiver/Transmitter) is the microchip with


programming that controls a computer's interface to its attached serial devices.
Specifically, it provides the computer with the RS-232C Data Terminal Equipment
( DTE ) interface so that it can "talk" to and exchange data with modems and other
serial devices. The UART converts the bytes it receives from the computer along
parallel circuits into a single serial bit stream for outbound transmission.
TCS BIN (Telephony Control Protocol Specification- Binary): describes a bitoriented protocol that defines call control signaling for the establishment of voice and
data calls between Bluetooth devices. It also describes mobility and group
management functions.
The Bluetooth Network Encapsulation Protocol (BNEP) Bluetooth devices
communicate with each other by using standard networking protocols to transport
control and data packets over a network. Devices may use protocols such as TCP,
IPv4 or IPv6. These protocols have dissimilar network packet formats. To provide
seamless transmission of network packets over the L2CAP layer in the protocol stack,
an intermediate protocol is required that encapsulates dissimilar network packet
formats as a standard common format.The Bluetooth Network Encapsulation Protocol
(BNEP) provides this encapsulation by replacing the networking header, such as an
Ethernet header, with a BNEP headers.

60

Bluetooth Profiles

A Bluetooth profile is a specification that defines the minimum requirements that the
Bluetooth device must support in a specific usage scenario. These requirements define
the end-user services and the features and procedures that the Bluetooth device must
support to enable interoperability with peer devices.
There are two types of profiles: conforming and interoperability. Conforming profiles
define the core requirements for Bluetooth devices and are available by default.
Interoperability profiles, which are based on the conforming profiles, define the minimum
requirements for Bluetooth devices to support specific applications. Bluetooth profiles
have implicit and explicit dependencies on each other.
To use Bluetooth wireless technology, a device shall be able to interpret certain
Bluetooth profiles, which are definitions of possible applications and specify general
behaviors that Bluetooth enabled devices use to communicate with other Bluetooth
devices. These profiles include settings to parameterize and to control the
communication from start. Adherence to profiles saves the time for transmitting the
parameters anew before the bi-directional link becomes effective. There are a wide
range of Bluetooth profiles that describe many different types of applications or use
cases for devices
ProfileDescription

Generic Access Profile (GAP) Defines the generic requirements for detecting and establishing a
connection to a Bluetooth device.
Generic Object Exchange Profile (GEOP) Defines procedures for the support of the
Object Exchange Protocol (OBEX) usage models.
Serial Port Profile (SPP) Defines procedures required for configuring serial cable connections
between peer Bluetooth devices using RFCOMM.

61

Bluetooth Air Interface Choices


Made
ISM Band

Frequency Hopping

Global Availability
License Free
2,400-2,483.5 MHz in
Europe and US
2,471-2,497 MHz in
Japan

Interference from baby


monitors, garage door
openers, cordless phones
and microwave ovens.
Spread-Spectrum
for
interference suppression
FH supports low power,
low
cost
radio
implementations
62

Frequency Hopping
1Mhz

79

83.5 Mhz

Divide Frequency band into 1 MHz hop channels


Radio hops from one channel to another in a pseudo
-random manner as dictated by a hop sequence
The instantaneous (hop) bandwidth remains small
Narrow band interference rejection

63

Piconet Channel

The piconet channel is represented by a pseudo-random


hopping sequence (through 79/23 RF frequencies)
The hopping sequence is unique for the piconet and is
determined by the device address of the master of the
piconet. The phase is determined by the master clock.
Channel is divided into time slots - 625 microsecs each .
Each slot corresponds to a different hop frequency.
Time Division Duplex - master and slave alternately
transmit/listen.
Packet start aligned with slot start
64

Physical Link

Synchronous Connection Oriented (SC0) Link : - classical


Telephone (voice))
- symmetric point-to-point link between m and s
- reserved 2 consecutive slots at regular intervals
- master can support upto 3 simultaneous SCO links
mainly for audio/voice
- never retransmitted
Asynchronous Connection-less (ACL) Link : (Typical
data application (web traffic))
- symmetric/asymmetric
- point-to-multipoint between
master and all slaves
- on a per-slot basis (polling
scheme for control) - only one ACL link per piconet- packets
retransmitted (ARQ)

65

Packets

All data on the piconet channel is conveyed in packets


13 packet types are defined for the Baseband layer
- Control packets (ID, NULL, FHS, POLL)
- Voice packets (SCO)
- Data packets (ACL)
Multi-slot packets (1/3/5) : To support high data rates. Packets
always sent on a single-hop carrier that for the first slot.
After multi-slot packet revert to original hop sequence.
Packet format - (68/72 bits) Access Code, (54 bits) Header, (02745 bits) Payload.

66

Packet Format
72 bits 54 bits
Access
Header
code
prea
mble

sync

trailer

AM
addres
s

type

flow

0 - 2745 bits
Payload

ARQ
N

SEQ
N

HEC

ACL
data
header

SCO

Voice

Single-slot packets 64 kbps


Unprotected/ 1/3 or 2/3 FEC
Never retransmitted
Robust CVSD encoding used

CRC

1/3/5 slot packets


Unprotected/ 2/3 FEC
ARQ scheme retransmit lost data pkts

67

Header

Addressing (3) : Max 7 slaves per piconet


Packet type (4) : 13 packet types (some unused)
Flow control (1)
1-bit ARQ
(1) : Broadcast packets are not Acked
Sequencing (1) : for filtering retransmitted packets
HEC
(8) : Verify Header Integrity
Total = 18 bits
Encode with 1/3 FEC to get 54 bits

68

Data Rates on ACL


TYPE

SYMMETRIC
(Kbps)

ASYMMETRI
C (Kbps)

DM1 (2/3 FEC)

108.8

108.8

108.8

DH1

172.8

172.8

172.8

DM3

256.0

384.0

54.4

DH3

384.0

576.0

86.4

DM5

286.7

477.8

36.3

DH5

432.6

721.0

57.6.

(unprotected)

69

Access Code

Access code is used for timing synchronization, inquiry and


paging. There are 3 types of access codes
Channel Access Code (CAC) : Used to identify a unique
piconet. Derived from the device address of the master of the
piconet. All normal (non inquiry and paging) packets on the
piconet will use the CAC.
Device Access Code (DAC) : Used for paging procedure
(initial synchronization). Derived from the device address of
the slave.
Inquiry Access Code : Used for inquiry procedure (to get
device addresses). 2 types : Generic and Device IACs
70

Error Correction/Flow
Control

Error Correction
- 1/3 FEC
- 2/3 FEC
- ARQ (Retransmit till Ack is received/ timeout)
Flow Control
- FIFO queues at TX and RX
- If RX queue is full the flow control bit is set in the
header of the next packet sent. - The TX freezes its FIFO
queue till the bit is reset.

71

Bluetooth Connection
Establishment

Two step process : Inquiry to get device address


Paging for Synchronization

Inquiry : Uses the Inquiry hop sequence and the IAC (DIAC or
GIAC). If a device wants to establish a piconet, a user of the device
wants to scan for other devices in the radio range. The device starts
the inquiry procedure by sending an inquiry access code (IAC) that
is common to all Bluetooth devices and IAC is broadcast over 32 so
called wake-up carriers in turn. Devices in standby that listen
periodically may enter the inquiry mode periodically to search for
IAC messages on wake-up carriers. As soon as a device detects an
inquiry it returns a packet containing its device address and timing
info required by the master to initiate a connection. From that
moment on the device acts as a slave. If the inquiry was successful,
a device enters the page mode.

72

Bluetooth Connection
Establishment

Paging : Uses the Paging hop sequence and the DAC of the
device to be paged. After finding all required devices the
master is able to set up connections to each devices, i.e.
setting up a piconet. Depending on the device addresses
received the master calculates special hopping sequences to
contact each device individually. The slaves answer and
synchronize with the masters clock, i.e. start with the hopping
sequence defined by the master. The master may continue to
page more devices that will be added to the piconet. As soon
as a device synchronize to the hopping pattern of the piconet it
also enters the connection state.

73

Connection Establishment Inquiry


No master and slaves at this point

Inquiry

Inquiry pkt

Inquiry Scan
FHS pkt

Device A

Inquiry Response

Device B
74

Connection Establishment Paging


Master
Page

Slave

Page pkt

Page Scan
ID pkt

Master Page
Response
Assigns active
addr

FHS pkt
ID pkt

Slave Page
Response
Uses FHS to get
CAC and clk info

POLL
NULL

Connected

Connected
75

Connection Establishment
times
Inquiry

Paging

Typical

5.12 s

0.64 s

Max

15.36 s

7.38 s

Connected

76

Connection Modes

Active Mode : Device actively participates on the piconet


channel
Power Saving modes
Sniff Mode : Slave device listens to the piconet at a reduced
rate . Least power efficient.
Hold Mode : The ACL link to the slave is put on hold. SCO
links are still supported. Frees capacity for inquiry, paging,
participation in another piconet.
Park Mode : The slave gives up its active member address.
But remains synchronized (beacon channel). Listens to
broadcasts. Most power efficient.
77

Intra-piconet communication
The master controls all traffic on the piconet
SCO link - reservation
The master allocates capacity for SCO links by reserving slots
in pairs.
ACL link polling scheme
The slave transmits in the slave-to-master slot only when it has
been addressed by its MAC address in the previous master-toslave slot. Therefore no collisions.
78

Major Baseband states of a


Bluetooth device
standby

unconnected

Detach

page

inquiry

Transmit AMA

Park AMA

Connected AMA

Hold AMA

Sniff AMA

connecting

active

Low Power

79

Bluetooth Applications (1)

replaces perhaps infrared in the area of the coupling of peripherals


completely
Intelligent Shop
shop informs the buyer about special offers by mobile phone or handles
inquiries for offers in the individual halls
Bluetooth-capable ticket machine
Payment over mobile telephone is carried out without contacts
control of home appliances by mobile telephone
The Bluetooth technology connects all your office peripherals
wirelessly. Connect your PC or notebook to printers, scanners and faxes
without the ugly and trouble some cable attachments. You can increase
your freedom by connecting your mouse or the keyboard wirelessly to your
computer.
Bluetooth allows us to have three way phones. At home, your phone
functions as a portable phone (fixed line charge). When you're on the
move, it functions as a mobile phone (cellular charge). And when your
phone comes within range of another mobile phone with built-in Bluetooth
wireless technology it functions as a walkie-talkie (no telephony charge).

80

Bluetooth Applications (2)

In meetings and conferences you can transfer selected


documents instantly with selected participants, and
exchange electronic business cards automatically, without
any wired connections.
Connect your wireless headset to your mobile phone,
mobile computer or any wired connection to keep your
hands free for more important tasks when you're at the
office or in your car
If your digital cameras in Bluetooth enabled, you can
send still or video images from any location to any
location without the hassle of connecting your camera to
the mobile phone on the wireline phone.
Upon arriving at your home, the door automatically
unlocks for you, the entry way lights come on, and the
heat is adjusted to your pre-set preferences.
81

Bluetooth Applications (3)

Have automatic synchronization of your desktop, mobile computer,


notebook (PC-PDA and PC-HPC) and your mobile phone. For instance,
as soon as you enter your office the address list and calendar in your
notebook will automatically be updated to agree with the one in your
desktop, or vice versa.

Automatic Message Delivery: Compose e-mails on your portable PC


while you're on an airplane. As soon as you've landed and switched on
your mobile phone, all messages are immediately sent.

IBM researchers are working on a number of personal devices like a


WatchPad that could be connected with other devices through Bluetooth.
The Watch Pad is very thin and contains 8MB of RAM. They are also
working on a version of CyberPhone called CyberPhone - that can project
data onto a small mirror. The CyberPhone can show as much information
as a small PDA because of high resolution VGA screen.

82

Multiple Access Protocol

If many users share a channel


and two or more users transmit packets simultaneously,

collision may occur.

To avoid the collision, suitable access protocol

should be selected.

Channel
Signal space is divided and assigned to each user.
Orthogonal (no interference among users)
Assignment (ex. frequency, time slot, code)Static
Assignment
Simple, but inefficient.Demand Assignment
Efficient, but circuit control function are required.
83

Classification

84

Scheduled Multiple Access


Protocol
Static assignmentWhether each user is active or not,
channel assignment is fixed to each user.TDMA:
Time Division Multiple AccessFDMA: Frequency
Division Multiple Access
Demand assignmentChannel assignment to each
user is done on demandCentral control:
Polling/SelectionDistributed control: Token Passing
Protocol

85

Multiple Access Protocol


Comparison

86

TCP functions

Offers connections between two applications


Within a connection TCP can give certain
guarantees, such as in-order delivery or
reliable data transmission using transmission
technique.
It has built-in mechanisms to behave in a
network friendly manner for eg. If TCP
encounters packet loss, it assumes network
internal congestion and slows down the
transmission rate.
87

Problems With TCP in Wireless


Networks
The performance of TCP is generally lower in wireless

networks

than in wired.
TCP cannot distinguish problems that typically occur in wireless
networks from congestion. The congestion control algorithms in
TCP are based on the assumptions that data is lost mainly due to
congestion and that data loss due to transmission errors is rare .
Therefore, data loss is interpreted as a signal of congestion in the
network.
Even in a wireless network, where data loss may not be related to
congestion, data loss still signals congestion to the sender.
TCP segments may be lost if the radio conditions are poor and the
link layer protocol provides a low reliability. After some
retransmission attempts the link layer protocol gives up and leaves
further error recovery to TCP.
Handover events may also lead to data loss.
TCP may also misinterpret a sudden increase in the round trip time
as data loss. If the delay is long enough for the retransmission
timer to expire before an acknowledgment is received, then TCP
misinterprets the delay as an indication of data loss due to
congestion

88

Problems With TCP in Wireless


Networks

The delayed data is unnecessarily retransmitted and TCP enters slow

start. A highly variable round trip time can also lead to a large RTO
(Retransmission Time Out), since the RTO is based both on estimates
of the round trip time and on variations in the round trip time. If the
RTO is large, then TCP reacts slowly to data loss.
Round trip time variations may also be caused by handover or
competing traffic.
Queuing in routers, base stations, and other intermediate nodes may
also lead to a long round trip time.
A long round trip time may cause low throughput and underutilization
of the network, since it takes a number of round trip times before the
congestion window reaches the capacity of the network.
TCP performance is degraded, especially for short lived flows, which
transmits a small amount of data
Larger bandwidth and delay variation make TCP estimate the RTO
value incorrectly.
Spurious transmissions due to the incorrect RTO value decrease the
TCP throughput.

89

Factors Affecting TCP


Performance

Channel Losses:
Low Bandwidth
Signal Fading
Movement Across Cells
Channel Asymmetry
Link Latency

90

TCP Improvement

Indirect TCP (I-TCP)


Snoop TCP
Mobile TCP
Fast Retransmit / Fast Recovery
Transmission / Time-out Freezing
Selective Retransmission
Transaction-Oriented TCP (T/TCP)
91

Indirect TCP (I-TCP):


Access Point (Foreign Agent

Wired Internet
Wireless TCP

Standard TCP

I-TCP segments a TCP connection into a fixed part and wireless. Mobile host
connected via a wireless link an access point to the wired internet where the
correspondent host resides. Standard TCP is used b/w the wired computer & the
access point. Instead of the mobile host, the access point now terminates the
standard TCP connection, acting as a proxy. This mean that the access point is now
seen as the mobile host for the fixed host & as the fixed host for mobile host. B/W
the access point & the mobile host, a special TCP, adapted to wireless links is used.
A handoff mechanism is proposed to handle the situation when the wireless host
moves across different cells.
Consequence- A consequence of using I-TCP is that the TCP Acks are not end-toend thereby violating the end-to-end semantics of TCP.
Hosts in the fixed part of the net do not notice the characteristics of the wireless
part.

92

Snooping TCP
Local Re-transmission

Correspondent Host

Foreign Agent
Wired Internet

Mobile Host

Snooping of ACKs
Buffering of Data
End-to-End TCP Connection

Snooping means secretive investigations into things that do not concern oneself. One of
the drawback of I-TCP is the segmentation of the single TCP connection into two TCP
connections. This loses the original end to end TCP semantic. The following TCP
enhancement i-e snooping TCP works completely transparently & hence doesnt loses
end-to-end semantic. The main function of the enhancement is buffering of packets close
to the mobile host to perform fast local retransmission in case of packet loss.
In this approach, Foreign agent buffers all packets with destination mobile host &
additionally snoops the packet flow in both directions to recognize acknowledgments.
Data transfer to the mobile host in snooping TCP takes place as follows:

The foreign FA agent buffers data until is receives an acknowledgement from the mobile host, FA
detects packet loss via duplicate ACKs or time-out and then perform faster retransmission compared to
the correspondent host, this all is transparent for the fixed n/w.

This would make the correspondent host believe that mobile host had received the
data & would violate the end-to-end semantic in case of a foreign agent failure data
transfer the mobile host with destination correspondent host works as follows as FA
snoops into the stream to detect gaps in the sequence no. of TCP. FA detects packet loss
on the wireless link via sequence numbers, FA answers directly with a Nack to the MH.
MH can now retransmit data with only a very short delay.
Adv. & Disadv

Detect missing packets


Perform NACK
Reordering of packets is done automatically at the correspondent host by TCP.

93

TCP Improvement

Mobile TCP (M-TCP) :-It has the same goals as I-TCP & snooping TCP i.e. It
also uses a split connection based approach but tries to preserve end-to-end
semantics. M-TCP adopts a three-level hierarchyAt the lowest level, mobile hosts communicate with mobile support stations in
each cell; which are in turn controlled by a supervisory host (SH); The SH is
connected to the wired n/w and serves as the point where the connections is
split.A TCP client exists at the SH.
The TCP client receives the segment from the TCP sender & passes it to M-TCP
client to send it to the wireless device. Thus, B/W the sender & the SH, standard
TCP is used while M-TCP is used b/w the SH & the wireless device. M-TCP is
designed to recover quickly from the wireless losses due to disconnections & to
eliminate serial timeouts. TCP on the SH does not acknowledge packets it
receive until the wireless device acknowledged then.
Fast retransmit / Fast recovery :As moving to a new foreign agent can cause packet loss or time out at mobile
hosts or corresponding hosts. TCP concludes congestion & goes into slow start,
although there is no congestion. The idea is to artificially force the fast retransmit
behavior on the mobile host & correspondent host side. As soon as the mobile
host registers at a new foreign agent using mobile IP, it starts sending duplicated
acknowledgements to correspondent hosts. The proposal is to send three
duplicates. This forces the correspondent host to go into fast retransmit mode.

94

Fast Retransmit

Fast Retransmit is an enhancement to TCP which reduces the time a sender waits
before retransmitting a lost segment.
A TCP sender uses a timer to recognize lost segments. If an acknowledgement is
not received for a particular segment within a specified time (a function of the
estimated Round-trip delay time), the sender will assume the segment was lost in
the network, and will retransmit the segment.
Duplicate acknowledgement is the basis for the fast retransmit mechanism which
works as follows: after receiving a packet (e.g. with sequence number 1), the
receiver sends an acknowledgement by adding 1 to the sequence number (i.e.,
sequence number 2) which means that the receiver receives the packet number 1
and it expects packet number 2 from the sender. Lets assume that three
subsequent packets have been lost. In the meantime the receiver receives the
packet number 5 and 6. After receiving packet number 5, the receiver sends
another acknowledgement, but still only for the sequence number 2. When the
receiver receives packet number 6, it sends yet another acknowledgement value of
2. In this way, the sender receives more than one acknowledgement with the same
sequence number 2 which is called duplicate acknowledgement.
The fast retransmit enhancement works as follows: if a TCP sender receives a
specified number of acknowledgements which is usually set to three duplicate
acknowledgements with the same acknowledge number (that is, a total of four
acknowledgements with the same acknowledgement number), the sender can be
reasonably confident that the segment with the next higher sequence number was
dropped, and will not arrive out of order. The sender will then retransmit the packet
that was presumed dropped before waiting for its timeout.

95

Fast Recovery

After fast retransmit sends what appears to be the missing segment, congestion avoidance,
but not slow start is performed. This is the fast recovery algorithm. It is an improvement that
allows high throughput under moderate congestion, especially for large windows.
The reason for not performing slow start in this case is that the receipt of the duplicate ACKs
tells TCP more than just a packet has been lost. Since the receiver can only generate the
duplicate ACK when another segment is received, that segment has left the network and is in
the receiver's buffer. That is, there is still data flowing between the two ends, and TCP does
not want to reduce the flow abruptly by going into slow start.
The fast retransmit and fast recovery algorithms are usually implemented together as follows.
1. When the third duplicate ACK in a row is received, set ssthresh to one-half the current
congestion window, cwnd, but no less than two segments. Retransmit the missing segment.
Set cwnd to ssthresh plus 3 times the segment size. This inflates the congestion window by
the number of segments that have left the network and which the other end has cached (3).
2. Each time another duplicate ACK arrives, increment cwnd by the segment size. This
inflates the congestion window for the additional segment that has left the network. Transmit
a packet, if allowed by the new value of cwnd.
3. When the next ACK arrives that acknowledges new data, set cwnd to ssthresh (the value
set in step 1). This ACK should be the acknowledgment of the retransmission from step 1,
one round-trip time after the retransmission. Additionally, this ACK should acknowledge all
the intermediate segments sent between the lost packet and the receipt of the first duplicate
ACK. This step is congestion avoidance, since TCP is down to one-half the rate it was at
when the packet was lost.
The fast retransmit algorithm first appeared in the 4.3BSD Tahoe release, and it was followed
by slow start. The fast recovery algorithm appeared in the 4.3BSD Reno release.

96

TCP Improvement

Transmission / Time-out freezing :- The MAC layer can inform the TCP layer of
an upcoming loss of connection or that the current interruption is not caused by
congestion. TCP can now stop sending and Freezes the current state of its
congestion window & further timers. If the MAC layer notices the upcoming interrupting
early enough both the mobile & correspondent nodes can be informed. As soon as,
the MAC layer detects connectivity again, it signals TCP that it can resume operation
at exactly the same point where it had been forced to stop.
Selective Retransmissions- (TCP SACK) : -A very useful extension of TCP is the
use of selective retransmission. TCP ACKs are cumulative i.e. they acknowledge inorder receipt of packets up to a certain packet. If a single packet is lost, the sender
has to retransmit everything starting from the lost packet ( go-back-n retransmission).
This obviously waste bandwidth . using RFC 2018, TCP can indirectly requests a
selective re-transmission of packets. The receiver can acknowledge single packets,
not only trains of in-sequence packets. The sender can now determine precisely which
packet is needed & can retransmit.
Adv. Sender retransmits only the lost packet
Transaction oriented TCP (T/TCP) :- Using TCP requires several packets over the
wireless link. First, TCP uses a 3-way handshake to establish the connection atleast
one additional packet is usually needed for transmission, of the request & requires
three more packets to close the connection via a three-way handshake. To reduce this
overhead, led to the development of a T/TCP. T/TCP can combine packets for
connection establishments & connection release with user data packets. This can
reduce the no. of packets down to two instead of seven.
Adv.: reduction in overhead which standard TCP has for connection setup &
connected release.

97

Configuration Parameter /
Factors to adapt TCP to
wireless
environment
1.
Large Windows
2.
3.
4.
5.
6.

Limited Transmit
Large MTU (Maximum Transfer Unit)
Selective Acknowledgement
Explicit Congestion Notification
Timestamp

98

Datacasting or Data
Broadcasting
Datacasting (data broadcasting) is the broadcasting of data

over a wide area via radio waves.


It most often refers to supplemental information sent by
television stations along with digital television, but may also
be applied to digital signals on analog TV or radio. It
generally does not apply to data which is inherent to the
medium, which defines virtual channels for DTV or direct
broadcast satellite systems; or to things like cable modem or
satellite modem, which use a completely separate channel
for data.
Datacasting often provides news, weather, traffic, stock
market, and other information which may or may not relate to
the program[s] it is carried with. It may also be interactive,
such as gaming, shopping, or education.

99

Datacasting or Data
Broadcasting
The need for Data Broadcast:

Due to the limited bandwidth of the mobile systems,


data should be organized and presented to the users
based on its need.
Data Broadcast can be used to manage sending
(pushing) the same data interest to the listening clients
without a prior request (or lock).

100

Data Broadcasting

Server continually broadcasts data to MUs.


Scalability: Cost does not depend on number of
users listening.
Mobile Unit may/may not have cache.
Facilitates data access during disconnected periods.
Allows location dependent data access.
No need to predict with 100% accuracy the future
data needs.
Broadcast based on probability of access.
Periodic broadcasting of all data.
101

MOBILE IP ( Problem
situation)

The address of a host consists of two parts (1) the higher order bits of the address
determine the n/w on which the host resides (2) the remaining low order bits
determine the host number. IP decides the next-hop by determining the network
information from the destination IP address of the packet. On the other hand, higher
level layers like TCP maintain information about connections that are indexed by a
quadruplet containing the IP addresses of both the endpoints and the port numbers.
Thus, while trying to support mobility on the Internet under the existing protocol
suite, we are faced with two mutually conflicting requirements:

A mobile node has to change its IP address whenever it changes its point of
attachment, so that packets destined to the node are routed correctly.

To maintain existing TCP connections, the mobile nodes IP address must


remain the same. Changing the IP address will cause the connection to be
distrupted and lost.
computer mobility in heterogenic networks
relocation between different IP-subnets
Goal: transparent migration and localization, compatibility to IP, no changes of
existing routers
Idea: introduction of temporary/ actual IP-addresses (also care-of-address, COA);
mapping of permanent to temporary IP-addresses using localization technique

102

Motivation

Mobile IP is a proposed standard protocol that builds on the Internet


Protocol for packet routing and delivery by making mobility transparent
to applications and higher level protocols like TCP.
Changed perceptions of the Internet due to large variety of wireless
devices offering IP connectivity, such as PDAs, handhelds, and digital
cellular phones.
Routing
based on IP destination address, network prefix (e.g. 129.13.42)
determines physical subnet
change of physical subnet implies change of IP address to have a
topological correct address (standard IP) or needs special entries in
the routing tables
Specific routes to end-systems?
Change of all routing table entries to forward packets to the right
Destination
Does not scale with the number of mobile hosts and frequent Changes
in the location, security problems

103

Motivation
Changing the IP-address?: One simple solution is to let the mobile host

change its address as it goes to the new network


Adjust the host IP address depending on the current location
Almost impossible to find a mobile system, DNS updates take to long time
TCP connections break, security problems
Without specific support, delivery not possible for mobile nodes away from
its home IP subnet (because routing based on the network prefix and destn IP
addr).
Cannot change IP address on moving to new IP-subnet (because cannot
maintain tpt/higher level connections).
Use of DHCP to obtain a new address to associate it with the new network. This
approach has several drawbacks.
The configuration files would need to be changed
Each time the computer moves from one network to another, it must be
rebooted.
The DNS tables need to be revised so that every other host in the Internet is
aware of the change.
If the host roams from one N/W to another during a transmission, the data
exchange will be interrupted. This is because the ports and IP addresses of the
client and the server must remain constant for the duration of the connection.

104

MOBILE IP :Introduction

Mobile IP was developed to enable computers to maintain Internet


connectivity while moving from one Internet attachment point to another.
It is an Internet Engineering Task Force( IETF) standard communications
protocol that is designed to allow mobile device users to move from one
network to another while maintaining a permanent IP address.
Provides an efficient, scalable mechanism for roaming within the
Internet.
Using Mobile IP, nodes may change their point-of-attachment to the
Internet without changing their IP address. This allows them to maintain
transport and higher layer connections while moving.
Does not assume base stations exist everywhere
Simple
Correspondent hosts dont need to know about mobility
Works both for changing domains and network interfaces
Although applicable for wired environment, it is particularly suited for
wireless environment
In Mobile connectivity : connection is maintained whereas in Nomadic
connectivity: new connection after every move.

105

Requirements to Mobile IP (RFC


2002)
Compatibility
support of the same layer 2 protocols as IP
no changes to current end-systems and routers required
mobile end-systems can communicate with fixed systems
Transparency
mobile end-systems keep their IP address
continuation of communication after interruption of link possible
point of connection to the fixed network can be changed
Efficiency and scalability
only little additional messages to the mobile system required
(connection typically via a low bandwidth radio link)
world-wide support of a large number of mobile systems
Security
authentication of all registration messages

106

Mobile
IP:
Terminology
Home Network: It is the subnet the MN belongs to with respect to its IP address. No

mobile IP support is needed within the home network.


Foreign Network: It is the current subnet the MN visits and which is not the home net
Mobile Node (MN): It is the node that moves across networks without changing its IP
address
Correspondent Node (CN): It is the host with which MN is corresponding (TCP)
Home Agent (HA)
host in the home network of the MN, typically a router
Maintains the mobility binding table where each entry is identified by the tuple
<permanent home address, temporary care-of-address, association lifetime>.
The purpose of this table is to map a mobile nodes home address with its COA
and forward packets accordingly.
registers the location of the MN, tunnels IP packets to the COA
Foreign Agent (FA)
host in the current foreign network of the MN, typically a router
Maintains
a visitor list which contains information about the mobile nodes
currently visiting that n/w. Each entry in the visitor list is identified by the tuple
<permanent home address, home agent address, media address of the mobile
node, association lifetime>.
forwards tunneled packets to the MN, typically the default router for MN
Care-of Address (COA)
address of the current tunnel end-point for the MN (at FA or MN)
actual location of the MN from an IP point of view

107

108

Data transfer to the mobile


systemHA 2
home network
Internet

receiver

3
FA

CN
sender

MN

foreign
network

1. Sender sends to the IP addr of MN,


HA intercepts packet (proxy ARP)
2. HA tunnels packet to COA, here FA,
by encapsulation
3. FA forwards the packet to the MN

109

Source: Schiller

Data transfer from the mobile


systemHA
1

home network

MN

sender
Internet

FA

foreign
network

1. Sender sends to the IP address


of the receiver as usual,
FA works as default router

CN
receiver

110

Source: Schiller

Mobile IP: Basic


Operation

Agent Discovery

Advertisement
Agent Solicitation

MN Registration
IN-Service (Packet Tunneling)
Deregistration
111

Mobile IP: Basic Operation


The basic Mobile IP protocol has four distinct stages . These are:
Agent Discovery: Agent Discovery consists of the following steps:

A.
1.

2.

3.

Mobility agents advertise their presence by periodically


broadcasting Agent Advertisement messages. An Agent
Advertisement message lists one or more care-of addresses and a
flag indicating whether it is a home agent or a foreign agent.
The mobile node receiving the Agent Advertisement message
observes whether the message is from its own home agent and
determines whether it is on the home network or a foreign network.
If a mobile node does not wish to wait for the periodic
advertisement, it can send out Agent Solicitation messages that will
be responded by a mobility agent.
Registration: Registration consists of the following steps:

B.
1.

2.

If a mobile node discovers that it is on the home network, it


operates without any mobility services.
If the mobile node is on a new network, it registers with the foreign
agent by sending a Registration Request message which includes
the permanent IP address of the mobile host and the IP address of
its home agent.

112

Agent advertisement

HA/FA periodically send advertisement messages into their physical subnets


MN listens to these messages and detects, if it is in home/foreign network
MN reads a COA from the FA advertisement messages

7 8

15 16

23 24
type
code
checksum
#addresses addr. size
lifetime
router address 1
preference level 1
router address 2
preference level 2
...

31

type
length
sequence number
registration lifetime R B H F M G V reserved
COA 1
COA 2
...
113

Packet Format Agent


advertisement

Type: set to 9- if the agent also routes traffic from non-mobiles, set to 16- if it does not route
anything other than mobile traffic.
Length: 8 bit Define the total length of the extension message.
Sequence Number: Define the Total no. of advertisement sent since initialization .
Life Time : 16 bit Maximum lifetime in seconds that the agent will accept the request or node an
request during registration.
Care of Address: A list of address available for uses as Care of Address (COA): This field will be
used by foreign agent.

The mobile host can choose one of these addresses.

The selection of this COA is announced in the registration request message.

Code: 8 bit- see the table ahead.


The following bits specify the characteristics of an agent:
R- Registration Required. No co located COA

B - Agent is busy and doesnt accept registration at this moment

H Agent act as a home agent

F Agent act as a foreign agent

M Agent uses minimal encapsulation

G Agent uses generic routing encapsulation (GRE)

R Agent supports header compression

T - Reverse Tunneling

114

Mobile IP: Basic Operation


3.

4.

5.

6.

The foreign agent in turn performs the registration


process on behalf of the mobile host by sending a
Registration Request containing the permanent IP
address of the mobile node and the IP address of the
foreign agent to home agent
When the home agent receives the Registration
Request, it updates the mobility binding by associating
the care-of address of the mobile node with its home
address.
The home agent then sends an acknowledgement to
the foreign agent.
The foreign agent in turn updates its visitor list by
inserting the entry for the mobile node and relays the
reply to the mobile node.
115

Registration Process in
Mobile IP
Foreign Network

Foreign Agent
1. Registration
Request

Mobile Node

Visitor List

4. Registration
Reply

2. Registration
Request

3. Registration
Reply
Home Agent
Mobility Binding
Table

116

Mobile IP: Basic Operation


C.
1.

2.

3.

4.

5.

In Service: This stage can be subdivided into the following steps:


When a correspondent node wants to communicate with the mobile
node, it sends an IP packet addressed to the permanent IP address of
the mobile node.
The home agent intercepts this packet and consults the mobility
binding table to find out if the mobile node is currently visiting any
other network.
The home agent finds out the mobile nodes care-of address and
constructs a new IP header that contains the mobile nodes care-of
address as the destination IP address. The original IP packet is put
into the payload of this IP packet. It then sends the packet. This
process of encapsulating one IP packet into payload of another is
known as IP-within-IP encapsulation , or tunneling.
When the encapsulated packet reaches the mobile nodes current
network, the foreign agent decapsulates the packet and finds out the
mobile nodes home address. It then consults the visitor list to see if it
has an entry for that mobile node.
If there is an entry for the mobile node on the visitor list, the foreign
agent retrieves the corresponding media address and relays it to the
mobile node.

117

Mobile IP: Basic Operation


6.

7.

D.

When the mobile node wants to send a message to a


correspondent node, it forwards the packet to the foreign
agent, which in turn relays the packet to the
correspondent node using normal IP routing.
The foreign agent continues serving the mobile node until
the granted lifetime expires. If the mobile node wants to
continue the service, it has to reissue the Registration
Request.
Deregistration: If a mobile node wants to drop its care-of
address, it has to deregister with its home agent. It achieves
this by sending a Registration Request with the lifetime set to
zero. There is no need for deregistering with the foreign agent
as registration automatically expires when lifetime becomes
zero. However if the mobile node visits a new network, the old
foreign network does not know the new care-of address of the
mobile node. Thus datagrams already forwarded by the home
agent to the old foreign agent of the mobile node are lost.

118

Tunneling Operation in Mobile


Correspondent
IPSrc Dest
Node
CN

MN

Payload

(CN)

Header
Original IP Packet
Header
Home Agent (HA)

Payload

HA COA

Original IP Packet
Encapsulated IP Packet

TUNNEL
Foreign Agent (FA)
Src
Mobile
Node
(MN)

Dest

CN MN
Header

Payload
Original IP Packet
( decapsulated )

119

Encapsulation
original IP header

new IP header

outer header

original data

new data

inner header

original data

120

Triangle Routing
Correspondent Node

Home Agent

Foreign Agent

Mobile Node

121

Mobile IP: Other Issues

Reverse Tunneling
firewalls permit only topological correct
addresses
Optimizations

Triangular Routing: HA informs sender the current


location of MN
Change of FA: new FA informs old FA to avoid
packet loss

122

Reverse tunneling (RFC


3024)HA
2

MN

home network
Internet

sender

1
FA

CN
receiver

foreign
network

1. MN sends to FA
2. FA tunnels packets to HA
by encapsulation
3. HA forwards the packet to the
receiver (standard case)
123

Mobile IP: Reverse


tunneling

Router accept often only topological correct addresses


(firewall!)

a packet from the MN encapsulated by the FA is now topological


correct
furthermore multicast and TTL problems solved (TTL in the home
network correct, but MN is too far away from the receiver)

Reverse tunneling does not solve

problems with firewalls, the reverse tunnel can be abused to


circumvent security mechanisms (tunnel hijacking)
optimization of data paths, i.e. packets will be forwarded through
the tunnel via the HA to a sender (double triangular routing)

124

Optimization of
forwarding
Triangular Routing

sender sends all packets via HA to MN


higher latency and network load
Solutions
sender learns the current location of MN
direct tunneling to this location
HA informs a sender about the location of MN
Binding request:
Binding Update:
Binding Acknowledgement
Binding Warning

125

Problems with mobile IP

Security
authentication with FA problematic, for the FA
typically belongs to another organization
no
protocol for key management and key
distribution has been standardized in the Internet
patent and export restrictions
Firewalls
typically mobile IP cannot be used together with
firewalls, special set-ups are needed (such as
reverse tunneling)
QoS
many new reservations in case of RSVP
tunneling makes it hard to give a flow of packets a
special treatment needed for the QoS
126

MOBILE IP & IPv6

Mobile IP was developed for IPv4, but IPv6 simplifies


the protocols

security is integrated and not an add-on, authentication of


registration is included
COA can be assigned via auto-configuration (DHCPv6 is one
candidate), every node has address auto-configuration
no need for a separate FA, all routers perform router advertisement
which can be used instead of the special agent advertisement
MN can signal a sender directly the COA, sending via HA not
needed in this case (automatic path optimization)
soft hand-over, i.e. without packet loss, between two subnets is
supported
MN sends the new COA to its old router, the old router
encapsulates all incoming packets for the MN and forwards them
to the new COA.
authentication is always granted

127

IPv6 Vs IPv4
IPv6 is 128 bits, can support up to 2128 IPv4 is 32 bits IP address
addresses to fulfill future needs with better and can support up to 232
security and network related features
addresses
IPv6 can handle different speed of networks, IPv4 is not so scalable.
from Extra Low Frequency networks to very high
speed of 500Gbits/s.
IPv6 provide a security layer that places IPv4 does not provide
"options" in separate extension headers
IPv6 has an anycast address that allows nodes IPv4 does not provide
to control the path which their traffic flows
IPv6 connects to global internet using a while
IPv4
manually
combination of it's global prefixes,
renumbers to connect to
the
internet.
IPv6
renumbers automatically

128

Motivation
Wireless Application Protocol

HTTP/HTML have not been designed for mobile devices and applications.
Because of fundamental limitations of power and form-factor, mass-market handheld devices tend
to have:

Less powerful CPUs, Less memory (ROM and RAM), Restricted power consumption,
Smaller displays, Different input devices (eg, a phone keypad).
Similarly, wireless data networks present a more constrained communication environment
compared to wired networks.
Because of fundamental limitations of power, available spectrum, and mobility, wireless data
networks tend to have:

Less bandwidth, More latency, Less connection stability, Less predictable availability.
Mobile networks are growing in complexity and the cost of all aspects for provisioning of more
value added services is increasing.
In order to meet the requirements of mobile network operators, solutions must be:

Interoperable terminals from different manufacturers communicate with services in the


mobile network;

Scaleable mobile network operators are able to scale services to customer needs;

Efficient provides quality of service suited to the behaviour and characteristics of the mobile
network;

Reliable provides a consistent and predictable platform for deploying services; and

Secure enables services to be extended over potentially unprotected mobile networks while
still preserving the integrity of user data; protects the devices and services from security
problems such as loss of confidentiality.

129

Motivation
Wireless Application Protocol

integrity of user data; protects the devices and services from security problems such as
loss of confidentiality.
HTTP causes many problems already in fixed networks, but even more in wireless
networks.
1. Bandwidth and delay
2. Caching
3. POSTing
The problems with HTTP/HTML are well known and have encouraged many different
proprietary and standardized solutions such as

Image scaling, Content transformation, Content extraction / semantic


compression

Special Languages and protocols, Push technologies.


WAP empowers mobile users with wireless devices to easily access and interact with
information and services.
A standard created by wireless and Internet companies to enable Internet access from
a cellular phone.
Wireless networks and phones have specific needs and requirements & not addressed
by existing Internet technologies
WAP enables any data transport

TCP/IP, UDP/IP, GUTS (IS-135/6), SMS, or USSD.

Optimizes the content and air-link protocols

Utilizes plain Web HTTP 1.1 servers & utilizes standard Internet markup
language technology (XML)

130

WAP
The point of this standard was to show internet contents on wireless
clients, like mobile phones. The WAP protocol is the leading standard
for information services on wireless terminals like digital mobile
phones.

WAP is an application communication protocol

WAP is used to access services and information

WAP is inherited from Internet standards

WAP is for handheld wireless devices such as mobile phones, pagers,


two-way radios, smartphones and communicators

WAP is a protocol designed for micro browsers

WAP enables the creating of web applications for mobile devices.

WAP uses the mark-up language WML (not HTML). WML is defined
as an XML 1.0 application

The WAP standard is based on Internet standards (HTML, XML and


TCP/IP). It consists of a WML language specification, a WMLScript
specification, and a Wireless Telephony Application Interface (WTAI)
specification.

WAP is published by the WAP Forum, founded in 1997 by Ericsson,


Motorola, Nokia, and Unwired Planet. Forum members now represent
over 90% of the global handset market, as well as leading
infrastructure providers, software developers and other organizations.

131

WAP

WAP supports most wireless networks. These include CDPD, CDMA,


GSM, PDC, PHS, TDMA, FLEX, ReFLEX, iDEN, TETRA, DECT,
DataTAC, and Mobitex.
WAP is supported by all operating systems. Ones specifically
engineered for handheld devices include PalmOS, EPOC, Windows
CE, FLEXOS, OS/9, and JavaOS
WAPs that use displays and access the Internet run what are called
microbrowsers--browsers with small file sizes that can accommodate
the low memory constraints of handheld devices and the lowbandwidth constraints of a wireless-handheld network.
Although WAP supports HTML and XML, the WML language (an XML
application) is specifically devised for small screens and one-hand
navigation without a keyboard. WML is scalable from two-line text
displays up through graphic screens found on items such as smart
phones and communicators.
WAP also supports WMLScript. It is similar to JavaScript, but makes
minimal demands on memory and CPU power because it does not
contain many of the unnecessary functions found in other scripting
languages.

132

WAP
WAP Micro Browsers: To fit into a small wireless terminal, WAP uses a Micro
Browser. A Micro Browser is a small piece of software that makes minimal
demands on hardware, memory and CPU. It can display information written in a
restricted mark-up language called WML. The Micro Browser can also interpret a
reduced version of JavaScript called WMLScript.

What is WML? :WML stands for Wireless Markup Language. It is a mark-up


language inherited from HTML, but WML is based on XML, so it is much stricter
than HTML. WML is used to create pages that can be displayed in a WAP
browser. Pages in WML are called DECKS. Decks are constructed as a set of
CARDS.

What is WMLScript :WML uses WMLScript to run simple code on the client.
WMLScript is a light JavaScript language. However, WML scripts are not
embedded in the WML pages. WML pages only contains references to script
URLs. WML scripts need to be compiled into byte code on a server before they
can run in a WAP browser.

Examples of WAP use


1. Checking train table information
2. Ticket purchase
3. Flight check in 4. Viewing traffic information
5. Checking weather conditions
6. Looking up stock values
7. Looking up phone numbers
8. Looking up addresses
9. Looking up sport results

133

Why is HTTP/HTML not


enough?
Big pipe - small pipe syndrome
Internet
HTTP/HTML

<HTML>
<HEAD>
<TITLE>NNN Interactive</TITLE>
<META HTTP-EQUIV="Refresh" CONTENT="1800,
URL=/index.html">
</HEAD>
<BODY BGCOLOR="#FFFFFF"
BACKGROUND="/images/9607/bgbar5.gif"
LINK="#0A3990" ALINK="#FF0000" VLINK="#FF0000"
TEXT="000000" ONLOAD="if(parent.frames.length!
=0)top.location='http://nnn.com';">
<A NAME="#top"></A>
<TABLE WIDTH=599 BORDER="0">
<TR ALIGN=LEFT>
<TD WIDTH=117 VALIGN=TOP ALIGN=LEFT>
<HTML>
<HEAD>
<TITLE
>NNN
Intera
ctive<
/TITLE
>
<META
HTTPEQUIV=
"Refre
sh"
CONTEN
T="180
0,
URL=/i
ndex.h
tml">

Wireless network
WAP

<WML>
<CARD>
<DO TYPE="ACCEPT">
<GO URL="/submit?Name=$N"/>
</DO>
Enter name:
<INPUT TYPE="TEXT" KEY="N"/>
</CARD>
</WML>

Content encoding
010011
010011
110110
010011
011011
011101
010010
011010

134

WAP: Main Features

Browser
Micro browser, similar to existing web browsers
Markup/Script language

Gateway

Wap/Origin server, similar to existing web servers

Protocol layers

Transition from wireless to wired world

Server

Similar to HTML/Javascript, adapted to mobile devices

Transport layer, security layer, session layer etc.

Telephony application interface


Access to telephony functions
135

The WAP Communications


Model

WML, WMLScript, and WBMP content usually reside on


WWW servers on the Internet. A WAP gateway is placed
between the mobile network and the Internet content
servers. The WAP gateway receives WAP requests using
the binary WAP communications protocols. The WAP
gateway translates these requests from the WAP binary
protocols to the text based World Wide Web protocols and
forwards the translated requests to the content servers
using the TCP/IP network protocol.
The WAP gateway waits for the WWW text protocol
response to the original request, receives the response via
TCP/IP and then reformats it back to the binary WAP
protocols. The WAP gateway sends the reformatted
response to the WAP client via WDP.
136

Architectural Goals
The goals of the WAP Forum architecture

The goals of the WAP Forum architecture are as follows.


Provide a web-centric application model for wireless data services that
utilises the telephony, mobility, and other unique functions of wireless
devices and networks and allows maximum flexibility and ability for
vendors to enhance the user experience.
Enable the personalisation and customisation of the device, the content
delivered to it, and the presentation of the content.
Provide support for secure and private applications and communication
in a manner that is consistent and interoperable with Internet security
models.
Enable wireless devices and networks that are currently or in the near
future being deployed, including a wide variety of bearers from narrowband to wide-band.
Provide secure access to local handset functionality.
Facilitate network-operator and third party service provisioning.
Define a layered, scaleable and extensible architecture.
Leverage existing standards where possible, especially existing and
evolving Internet standards.

137

The WAP Communications


Model (WAP architecture)

WAP Gateway

WML
WMLScript
WTAI
Etc.

Web Server

WML Encoder

WSP/WTP

WMLScript
Compiler
Protocol Adapters

HTTP

CGI
Scripts
etc.

Content

WML Decks
with WML-Script

Client

138

WAP application server

Client
WML
WMLScript
WTAI

WML Encoder

WSP/WTP

WMLScript
Compiler
Protocol Adapters

Application
Logic
Content

WML Decks
with WML-Script

WAP Application Server

Etc.

139

Source: WAP Forum

WAP specifies

Wireless Application Environment

WML Microbrowser
WMLScript Virtual Machine
WMLScript Standard Library
Wireless Telephony Application Interface (WTAI)
WAP content types

Wireless Protocol Stack

Wireless Session Protocol (WSP)


Wireless Transport Layer Security (WTLS)
Wireless Transaction Protocol (WTP)
Wireless Datagram Protocol (WDP)
Wireless network interface definitions

140

WAP: reference model


Internet
HTML, Java

A-SAP

WAP

Application Layer (WAE)


S-SAP

additional services
and applications

Session Layer (WSP)


HTTP

TR-SAP
Transaction Layer (WTP)
SEC-SAP

SSL/TLS

Security Layer (WTLS)


T-SAP

TCP/IP,
UDP/IP,
media

Transport Layer (WDP)

WCMP

Bearers (GSM, CDPD, ...)

WAE comprises WML (Wireless Markup Language), WML Script, WTAI etc.

141

Source: Schiller

Service, Protocol, Bearer:


Example
WAP Over GSM Short Message Service

WAP
Proxy/Server

Mobile
WAE

WAE
Apps on
other servers
WSP

WSP

SMSC

WTP
WDP
SMS

WTP
WDP

SMS

WDP Tunnel
Protocol

WDP Tunnel
Protocol

Subnetwork

Subnetwork

142

Source: WAP Forum

WAP
stack
WAE (Wireless Application Environment):

Architecture: application model, browser, gateway, server

WSP (Wireless Session Protocol):

Provides reliable message transfer mechanisms


Based on ideas from TCP/RPC

WTLS (Wireless Transport Layer Security):

Provides HTTP 1.1 functionality


Supports session management, security, etc.

WTP (Wireless Transaction Protocol):

WML: XML-Syntax, based on card stacks, variables, ...


WTA: telephone services, such as call control, phone book etc.

Provides data integrity, privacy, authentication functions


Based on ideas from TLS/SSL

WDP (Wireless Datagram Protocol):

Provides transport layer functions


Based on ideas from UDP

Content encoding, optimized for low-bandwidth channels, simple devices

143

WDP: Wireless Datagram


Protocol

Transport layer protocol within the WAP architecture


The WAP Datagram Protocol, WDP, is a datagram oriented, network
layer protocol modeled after the User Datagram Protocol (UDP) used on
the Internet.
The WDP allows WAP to be bearer-independent by adapting the
transport layer of the underlying bearer. The WDP presents a consistent
data format to the higher layers of the WAP protocol stack, thereby
offering the advantage of bearer independence to application
developers.
uses transport mechanisms of different bearer technologies
offers a common interface for higher layer protocols
allows for transparent communication despite different technologies
addressing uses port numbers
WDP over IP is UDP/IP
WDP makes no attempt to confirm delivery, resend lost packets, or
correct errors in transmission. This is left to the higher layer protocols.

144

WDP: Wireless Datagram


Protocol

If any errors happen when WDP datagrams are sent from


one WDP entry to another (e.g. the destination is
unreachable, no application is listening to the specified
destination port etc.), Wireless Control Protocol (WCMP)
provides error handling mechanisms for WDP therefore be
implement. WCMP contains control messages that resemble
the ICMP (Internet Control Message) Protocol messages
and can also be used for diagnostic and informational
purposes. It can be used by WDP nodes and gateways to
report errors. WCMP messages are destination
unreachable, parameter problem, message too big,
reassembly failure, echo request/ reply.
T-SAP(Transport layer Service Access Point) is the
common interface to be used by the higher layers
independent of the underlying n/w
145

WTLS:Wireless Transport Layer


Security

WTLS incorporates security features that are based upon the


established Transport Layer Security (TLS/SSL) protocol
standard. It includes data integrity checks, privacy, service
denial, and authentication services.

optimized for low-bandwidth communication channels

provides
privacy (encryption)
data integrity (MACs)
authentication (public-key and symmetric)

Employs special adapted mechanisms for wireless usage


Long lived secure sessions
Optimised handshake procedures
provides
SEC-SAP(Security layer Service Access Point) is the common
interface to be used by the higher layers independent of the
underlying n/w
146

WTP: Wireless Transaction


Protocol
Designed to run on very thin clients such as mobile phones.
Advantages over different transaction services that enable applications to
provide improved reliability over datagrams services, improved
efficiency over connection-oriented services and support for transactionoriented services such as web browsing.
used to provide a simplified protocol suitable for low bandwidth wireless
stations.
low memory requirements, suited to simple devices
efficiency for wireless transmission
supports peer-to-peer, client/server and multicast applications
WTP classes of Transactions service
class 0: unreliable message transfer
class 1: reliable message transfer without result message
class 2: reliable message transfer with exactly one reliable result message
147

WSP - Wireless Session


Protocol
provides shared state between client and server, optimizes content transfer
session management (establish, release, suspend, resume)
efficient capability negotiation
key management, authentication, Internet security services
content encoding
WSP is a general-purpose session protocol, WAP has specified the
wireless session protocol/ browsing (WSP/B) which comprises protocols
and services suited for browsing-type applications. WSP/B offers
following features adapted to web browsing:
HTTP/1.1
Exchange of Session Headers
Push and Pull data transfer services
Asynchronous Requests

148

Wireless Application
Environment

Goals
To create a general-purpose application environment based mainly
on existing technologies of WWW.
To allow service providers, software manufacturers, or hardware
vendors to integrate their applications so they can reach a wide
variety of different wireless platforms in an efficient manner.
device and network independent application environment
for low-bandwidth, wireless devices
considerations of slow links, limited memory, low computing
power, small display, simple user interface (compared to
desktops), special security and access control features.
integrated Internet / WWW programming model
high interoperability
To minimize over-the-air traffic and resources consumption on the
handheld device.

149

WAE components

Architecture

User Agents

WML/WTA/Others
content formats: vCard, WML..

WML/Script

Application model, Microbrowser, Gateway, Server

XML-Syntax, based on card stacks, variables, ...

WTA

telephone services, such as call control, text


messages, phone book,
150

WAE: logical model


Origin Servers
web
server

other content
server

Client

Gateway
response
with
content

Method proxy

encoded
response
with
content

Push proxy
push
content

request

encoders
&
decoders

encoded
push
content

encoded
request

WTA
user agent

WML
user agent

other
WAE
user agents

151

WAP Push Architecture with proxy


gateway
Client
User Agents

Push OTA
Protocol

Push Proxy
Gateway
Coding
Checking

Push Access
Protocol

Push Initiator
Server
Application

In a push context the server initiates the message transfer, not the client. The
server is called push initiator (PI) and transfer content via a push proxy gateway
(PPG) to a client.. The push access protocol (PAP) controls communication
between PI and PPG. The push over the air (OTA) protocol is used between PPG
and the client. If the PI is able to use the push OTA protocol, it can directly
communicate with the client too. Example usage scenarios for push messages are
news, road conditions, e-mail indication etc.
Push Proxy gateway: The PPG provides many functions to transform protocol
messages and content exchanged between server and client. The PPG accepts
push messages from a PI and checks if this message can be forwarded to the
client. Checking comprises mapping of a client addresses onto a format valid in the
mobile network. A PPG can also multicast messages to a group of receivers.

152

WAP Push Architecture with


proxy gateway

Push Access Protocol: The PAP transfers content from PI


to the PPG. Although PAP was developed independently
from the underlying transport service, PAP over HTTP is the
first implementation. PAP offers the following operations :

Push submission
Result notification:
Push Cancellation
Status Query:
Client Capabilities Query:

Push OTA Protocol: It is a very simple protocol used on top


of WSP. The protocol offers delivery of push messages,
selection of transport services for push messages and
authentication of PIs. The standard bearer for push
messages in GSM is SMS as this is typically the only way to
reach a mobile phone from within a network.
153

WAP Applications

Some of the interesting applications of WAP (already existing or being worked on)
are:
Computer Sciences Corporation (CSC) and Nokia are working with a Finnish
fashion retailer who plans to send clothing offers direct to mobile telephones
using a combination of cursors, touch screen technology and WAP to allow wouldbe shoppers to hot-link to order-entry pages on the web.
In Finland, children already play new versions of competitive games such as
"Battleships", via the cellular networks. In the music world, Virgin Mobile in the
UK offers to download the latest pop hits to customers in a daily offering.
Scala has developed several WAP products for small to medium-sized companies
which would allow, for example, a field sales force to access customer order
information and stock availability details via a WAP handset.
A key growth area for the technology will be business-to-workforce, with companies
using WAP applications to reach employees at any time. Scala is currently
working on time-sheet applications and techniques for entering and filing expense
claims via the mobile phone.
Nokia says applications that will benefit from WAP include customer care and
provisioning, message notification and call management, e-mail, mapping
and location services, weather and traffic alerts, sports and financial
services, address book and directory services and corporate intranet
applications.

154

WAP Applications

As brought out by and the examples above WAP services are


currently limited to simple information services, but as higher speeds
become available and some of the technical issues specific to WAP
are resolved, several new service types will emerge, including:
Infotainment : They could include weather forecasts, stock quotes,
horoscopes and news
Messaging : services such as e-mail, voicemail and unified
messaging
Personal information management : services such as call
management and personal directories, which enable the
modification of personal information
Financial services : mobile banking and mobile e-commerce
services
Location-based services : services that are dependent on location
include mapping and vehicle location information

155

WAP Applications
Operator/country

Examples of the current services offered

France Telecom

Cinema information, share prices and some


banking services

KPN Telecom, The


Netherlands

Movie information, hotel information and news

Omnitel, Italy

News, flight information, lottery information and


movie listings

Optus, Australia

Share prices, news, weather forecasts and e-mail

Orange, UK

Cinema information, last minute offers (via


lastminute.com), news and business directories

SmarTone, Hong
Kong

News, e-mail, SmarTone WAP portal, language


translation and directories

Sonera, Finland

Information services, e-mail, directories and


financial data

Sprint, US

News, share prices, mapping, weather forecasts,


directories and e-mail

Telefonica Moviles,
Spain

News, traffic updates, some banking transactions,


directories and e-mail

156

The Problem Areas

One of the problem, basically to do with infrastructure (and not WAP) is that
as the mobile Internet access, thanks to WAP, increases it is likely to put ever
greater demands on existing technology infrastructures as it encourages
higher m-commerce volumes. A live example is I-mode services in Japan,
where the mobile data access has seen a unprecedented rate of growth. So,
unless the infrastructure is geared up to expect unexpected volumes, this can
have significant impact on these data services since most of these systems
are simply inadequate for big volumes. So there is a possibility of
unsatisfactory performances observed by mobile data users.
Another problem area is that the delay in the delivery of long-promised
terminals and service launches are narrowing the window of opportunity for
WAP, while the proposed developments in faster mobile networks and more
sophisticated terminals come closer. Further developments in WAP are still
required and in the meantime, other solutions will emerge.
Also as with many other technologies what matters most and what guides the
development of a technology is the emergence of killer applications. So,
unless some killer applications hit the market, which influence the mood of the
end user, WAP just like other technologies has a difficult path ahead. Already
due to lots of hype WAP proponents find them selves in a little tight position.
So, this presents a big opportunity for the developer community to develop
new and innovative applications that can realize the advantage of WAP. There
is going to be big appetite for WAP applications in the very near future

157

158

You might also like