mobile networking

Upload: packia-maharajan

Post on 14-Jan-2016

218 views

Category:

Documents


0 download

DESCRIPTION

mobile networking

TRANSCRIPT

Paper Presentation Mobile Networking CS II Year

2009ByM. PackiaLakshmi.(01808132028)P.Sahana.( 01808132037)

Anna University Thirukuvalai Campus

Mobile Networking

Contents1. Introduction.2. Generations of Mobile Network3. Applications Of Mobile Networking4. Benefits Of Mobile Networking5. Mobile Network Architecture And Its Functions6. Latest Technologies Of Mobile Network7. Conclusion

Introduction:Mobile Computing is a technology that allows transmission of data, via computer, without having to be connected to a fixed physical link. In the past, wireless communications predominantly used, circuit switching to carry voice over the network; however, more recently both voice and data are being transmitted over both circuit-switched and packet-switched networks.Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move mobility.Generations of Mobile Network First Generation (1981 NMT launch)The first mobile systems were based on analogue transmission. They had a low traffic density of one call per radio channel, poor voice quality, and they used insecure and unencrypted transmission, which led to the spoofing of identities. Second Generation (1991 GSM launch)The second generation of mobile systems was based on digital transmission with a number of different standards (GSM, ERMES, CT2, CT3, DCS 1800, DECT). GSM (Global System for Mobile) communications is the most popular standard in use today using SIM (Subscriber Identity Module) technology for encryption authentication and billing purposes. The transmission uses TDMA (Time Division Multiple Access) and CDMA One (Code Division Multiple Access One) techniques to increase data traffic on the network. Second to Third Generation Bridge (2000 GPRS launch)The introduction of GPRS is seen as an extra period of mobile networking development, between 2G and 3G. GPRS (General Packet Radio Service) is a data service which enables mobile devices to send and receive e-mails and picture messages. It operates at the speeds of up to 115kbit/s, which has been increased to a maximum of 384kbit/s by using EDGE (Enhanced Data Rates for Global Evolution). Typical GSM data transmission rates reached 9.6kbit/s. Third Generation (2003 First UK 3G launch)The third generation of mobile systems unifies different mobile technology standards, and uses higher frequency bands for transmission and CDMA to deliver data rates of up to 2Mbit/s to support multimedia services. The European standard is UMTS (Universal Mobile Telecommunication Systems). Mobile systems continue to use digital transmission with SIM authentication. Data transmission uses a WCDMA (Wideband Code Division Multiple Access). Technique to achieve data rates between 384kbit/s and 2048kbit/s. Fourth Generation (2007+)4G is still at the research stage. It is based on an ad hoc networking model where there is no need for a fixed infrastructure operation. Ad hoc networking requires global mobility features (e.g. Mobile IP) and connectivity to a global IPv6 network to support an IP address for every mobile device. Seamless roaming in heterogeneous IP networks (e.g. 802.11 WLAN, GPRS and UMTS) will be possible with higher data rates, from 2Mbit/s to 10100Mbit/s, offering reduced delays and new services. As mobile devices will not rely on a fixed infrastructure, they will require enhanced intelligence to self configure in ad hoc networks and have routing capabilities to route over a packet-switched network.Applications of Mobile NetworkingMobile networking means time efficiency. Efficient utilization of resources (i.e.: staff) to save transportation costs and other non quantifiable costs. Applications of mobile networking are: Emergency Services:Ability to receive information on the move is vital where the emergency services are involved. Information regarding the address, type and other details of an incident can be dispatched quickly, via a CDPD system using mobile computers, to one or several appropriate mobile units which are in the vicinity of the incident. Here the reliability and security implemented in the CDPD system would be of great advantage. In court:Defense counsels can take mobile computers in court. When the opposing counsel references a case which they are not familiar, they can use the computer to get direct, real-time access to on-line legal database services, where they can gather information on the case and related precedents. Therefore mobile computers allow immediate access to a wealth of information, making people better informed and prepared. In companies:Managers can use mobile computers in, say, critical presentations to major customers. They can access the latest market share information. At a small recess, they can revise the presentation to take advantage of this information. They can communicate with the office about possible new offers and call meetings for discussing responds to the new proposals. Therefore, mobile computers can leverage competitive advantages. Credit Card Verification:At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit cards for transactions, the intercommunication required between the bank central computer and the POS terminal, in order to effect verification of the card usage, can take place quickly and securely over cellular channels using a mobile computer unit. This can speed up the transaction process and relieve congestion at the POS terminals. Electronic Mail/Paging:Usage of a mobile unit to send and read emails is a very useful asset for any business individual, as it allows him/her to keep in touch with any colleagues as well as any urgent developments that may affect their work. Access to the Internet, using mobile computing technology, allows the individual to have vast arrays of knowledge at his/her fingertips. Paging is also achievable here, giving even more intercommunication capability between individuals, using a single mobile computer device.Benefits: Mobility Solution at the Network Layer:With the mobile router deployed in a moving vehicle, repeated reconfiguration of the various devices attached to that router as the vehicle travels is no longer necessary. Because the mobile router operates at the network layer and is independent of the physical layer, it operates transparently over cellular, satellite, and other wireless or fixed media. Always-On Connection to the Internet:This feature supports an always-on connection to the Internet, providing access to current and changing information. For example, aircraft pilots can access the latest weather updates while flying and EMS vehicles can be in communication with emergency room technicians while on the way to the hospital. Versatile:Any IP-enabled device can be connected to the mobile router LAN ports and achieve mobility. Applications that are not specifically designed for mobility can be accessed and deployed. Dynamic Mobile Networks:The dynamic network enables dynamic registration of mobile networks, which results in minimal configuration on the home agent making administration and set up easier. When configured for dynamic registration, the mobile router tells the home agent which networks are configured in each registration request. The home agent dynamically adds these networks to the forwarding table and there is no need to statically define the networks on the home agent.Mobile Network Architecture and its Functions:In a network setting the permanent home of a mobile node such as (a laptop or pads) is known as home network and the entity with in the home network that performs mobility management functions on the mobile node known as the home agent. The network in which the mobile node is currently residing is known as foreign network and the entity within the foreign network that helps the mobile node with the mobility management function known as foreign agent. A correspondent is the entity wishing to communicate with the mobile node.

Node BNodeAMobile Network Architecture

The IP address is changes from subnet to subnet. So that some problem's are fixed. To avoid this problem Two IP addresses are used. These IP addresses are called as Home address and care of address. Home address is static known to everybody to identify of the host. The care of address is changes at each new point of the attachment.The followings are functions of mobile networking: Correspondent X wants to transmit an IP datagram to node A. the home address of A is advertised and known to X does not know whether A is in the home network or somewhere else.therefore,X sends the packet to A with As home address as the destination IP address in the IP header. The IP datagram is routed to As home network. At the As home network, the incoming IP datagram is intercepted by the home agent.The home agent discovers that A is in a foreign network. A care-of-address has been allocated to A by this foreign network and available with the home agent. The home agent encapsulates the entire datagram inside a new IP datagram, with the care-of-address in the new datagram with the care-of-address is retransmitted by the home agent. At the foreign network, the incoming IP datagram is intercepted by the foreign agent. The foreign agent is the counterpart of the home agent in the foreign network. The foreign agent strips off the outer IP header, and delivers the original datagram to A. A intends to respond to this message and sends traffic to X in this example, X is not mobile; therefore X has a fixed IP address .For routing As IP datagram to X,each datagram is sent to some router in the foreign network.Typically,this router is the foreign agent. A uses Xs IP static address as the destination address in the IP header. The IP datagram from A to X travels directly across the network, using Xs IP address as the destination address.Latest technologies of Mobile Network: Bluetooth:Bluetooth is a wireless protocol for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs). It was originally conceived as a wireless alternative to data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 frequencies. It can achieve a gross data rate of 1 Mb/s. Bluetooth provides a way to connect and exchange information between devices such as mobile phones, telephones, laptops, personal computers, printers,Global Positioning System (GPS) receivers, digital cameras, and video game consoles through a secure, globally unlicensed Industrial, Scientific, and Medical (ISM) 2.4 GHz short-range radio frequency bandwidth.

RFID:RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less.

The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. WiMAX:

WiMAX means Wireless Broadband. It offers an alternative to high bandwidth wireline access networks like fiber optic, cable modems and DSL(Digital Subscriber Line).In the above figure indicates the function of WiMAX that contains the following functions: A subscriber sends wireless traffic at the speeds ranging from 2M to 155M bit/sec from a fixed antenna on a building. The base station receives transmissions from multiple sites and sends traffic over wireless or wired links to a switching center using 802.16 protocols. The switching center sends traffic to on ISP or the public switched telephone networks.Conclusion:Most of these have to do with the inherent limitations of the technology. Security:In such a environment weak security link from a wireless network could become a point of vulnerability for the entire system.therefore,in a mobile computing environment,it is necessary to have a robust security and trust infrastructure. Range:The typical range of a common 802.11g network with standard equipment is on the order of tens of meters. While sufficient for a typical home, it will be insufficient in a larger structure. Reliability:We cant expect the packets reach to destination because making interference and propagation effects all the more disturbing. As a result, important network resources such as servers are rarely connected wirelessly. Speed:The speed on most wireless networks (typically 1-108 Mbit/s) is reasonablyslow compared to the slowest common wired networks (100 Mbit/s up to several Gbit/s).If the above disadvantages are recovered, the mobile network will grow very well. In future, the world will captured by mobile networking. The world without mobile networking is impossible.

1